摘要:
The invention provides a method, system, and program product for diagnosing an integrated circuit. In particular, the invention captures one or more images for each relevant circuit layer of the integrated circuit. Based on the image(s), a component netlist is generated. Further, a logic netlist is generated by applying hierarchical composition rules to the component netlist. The component netlist and/or logic netlist can be compared to a reference netlist to diagnose the integrated circuit. The invention can further generate a schematic based on the component netlist or logic netlist in which components are arranged according to port, power, and/or component pin connection information determined from the netlist. Further, the schematic can be displayed in a manner that wiring connections are selectively displayed to assist a user in intelligently arranging the circuit components.
摘要:
The invention provides a method, system, and program product for diagnosing an integrated circuit. In particular, the invention captures one or more images for each relevant circuit layer of the integrated circuit. Based on the image(s), a component netlist is generated. Further, a logic netlist is generated by applying hierarchical composition rules to the component netlist. The component netlist and/or logic netlist can be compared to a reference netlist to diagnose the integrated circuit. The invention can further generate a schematic based on the component netlist or logic netlist in which components are arranged according to port, power, and/or component pin connection information determined from the netlist. Further, the schematic can be displayed in a manner that wiring connections are selectively displayed to assist a user in intelligently arranging the circuit components.
摘要:
An exemplary method for providing recommendations to improve boot performance based on community data is disclosed. In one embodiment, such a method may comprise: 1) identifying at least one startup item on a computing device that is scheduled to run at boot time, 2) requesting startup-recommendation information for the startup item from a server, 3) receiving the startup-recommendation information for the startup item from the server, the startup-recommendation information being based on data gathered from a community of users, and then 4) presenting the startup-recommendation information for the startup item to a user. Corresponding systems and computer-readable media are also disclosed.
摘要:
A computer-implemented method may include tracking a child's usage of a computing system. The computer-implemented method may also include generating an event history based on the child's usage of the computing system and identifying a restricted event that violated a parental-control policy. The computer-implemented method may further include creating an event trail by identifying at least one event in the event history that led to the restricted event. Various other methods, systems, and computer-readable media are also disclosed.
摘要:
A method and apparatus for monitoring text-based communications to secure a computer is described. In one embodiment, the method for monitoring text-based communications to secure a computer includes defining at least one portion of the computer display that is associated with text-based communications and examining the at least one portion of the computer display to identify textual data within the text-based communications.
摘要:
Identities of owners of electronic communication aliases are collected from a plurality of client computers across a parental control system. Each collected identity corresponds to an electronic communication aliases used by at least one child associated with the originating client computer. The collected identities and the corresponding electronic communication aliases are stored. Response to receiving a collected identity, previously stored identities corresponding to the same electronic communication alias are retrieved, and compared to the received identity. The more previously stored identities match the received identity, the more likely the received identity is to be accurate. Therefore, based upon the comparison results, it can be determined whether the received identity is accurate or not. If it is determined that the received identity is false, the relevant parents are automatically notified.