摘要:
A method for providing control of Java resource runtime usage may include establishing communication with one or more Java virtual machines (JVMs) forming a hive via a hive communication channel where the hive comprises a plurality of JVMs configured to enable utilization of at least one shared resource, receiving, via the hive communication channel, environmental information indicative of hive activity relative to the at least one shared resource from at least one of the one or more JVMs, and adapting, via processing circuitry, operations associated with use of the at least one shared resource based on the environmental information.
摘要:
A system and method in one embodiment includes modules for detecting an access request by an application to access information in a mobile device, determining that the application is a potential threat according to at least one policy filter, and blocking a send request by the application to send the information from the mobile device without a user's consent. More specific embodiments include user selecting the information through a selection menu on a graphical user interface that includes information categories pre-populated by an operating system of the mobile device, and keywords that can be input by the user. Other embodiments include queuing the send request in a queue with other requests, and presenting an outbox comprising the queue to the user to choose to consent to the requests. The outbox includes graphical elements configured to permit the user to selectively consent to any requests in the queue.
摘要:
A method for providing control of Java resource runtime usage may include establishing communication with one or more Java virtual machines (JVMs) forming a hive via a hive communication channel where the hive comprises a plurality of JVMs configured to enable utilization of at least one shared resource, receiving, via the hive communication channel, environmental information indicative of hive activity relative to the at least one shared resource from at least one of the one or more JVMs, and adapting, via processing circuitry, operations associated with use of the at least one shared resource based on the environmental information.
摘要:
Methods, apparatuses, and computer program products for preserving, from resource management adjustment, portions of an overcommitted resource managed by a hypervisor are provided. Embodiments include identifying, by the hypervisor, a privileged guest from among a plurality of guests of the hypervisor; identifying, by the hypervisor, portions of the overcommitted resource that are allocated to the privileged guest; and preventing, by the hypervisor, resource management adjustment to the identified portions of the overcommitted resource that are allocated to the privileged guest.
摘要:
A kernel of the operating system reorganizes a plurality of memory units into a plurality of virtual nodes in a virtual non-uniform memory access architecture in response to receiving a configuration of the plurality of memory units from a firmware. A subsystem of the operating system determines an order of allocation of the plurality of virtual nodes calculated to maintain a maximum number of the plurality of memory units devoid of references. The memory controller transitions one or more memory units into a lower power state in response to the one or more memory units being devoid of one or more references for the period of time.
摘要:
System(s), method(s), and/or techniques (“tools”) are described that enable electronic document functionality for a limited-capability computing device. The tools may enable a computing device with limited display capabilities to present and enable navigation through nested items or hierarchical view levels of an electronic document. The tools may also build renderable view information by which a device may enable electronic document functionality based on the capabilities of that device.
摘要:
An embodiment of a method of controlling memory access includes an initial step of receiving a first request to control memory access. The embodiment of the method also includes the step of creating an instance of a data structure based on the first request. In addition to the previous two steps the embodiment of the method also includes the steps of receiving a second request to access a memory, and examining the instance of the data structure to determine whether the memory can be accessed.
摘要:
A water resistant absorbent towel dispenser. The dispenser includes a container having top, bottom and side walls housing a supply of absorbent towels, and an exterior handle for facilitating transport of the dispenser. The top wall includes a finger-accessible opening through which absorbent towels may be withdrawn. In certain embodiments, the top wall is convex upwardly, but is flexible to enable it to be depressed when dispensers are stacked vertically so as to come into load bearing contact with the towel supply. In some embodiments, the top and bottom walls have interlocking configurations to add lateral stability to vertically stacked dispensers.
摘要:
Disclosed is a web accumulator for accumulating and discharging a reserve portion of a continuous web passing through the accumulator. The accumulator, which is particularly useful for handling weak webs such as sanitary or tissue paper, includes first and second sets of rotatably mounted web rolls, each of which is partially wrapped by the web when the web is looped alternately from a roll of the first set to a roll of the second set in consecutive order. The second set of web rolls is mounted for movement towards and away from the first set of web rolls to discharge and accumulate the reserve portion of the web, and the accumulator preferably includes drive means separate from the web for driving each web roll at the speed of the web passing over it at all times including when it is accumulating or discharging. The drive means is preferably provided by a drive pulley operably connected to each web roll and preferably having the same size as its respective web roll, an endless flexible belt engaging the drive pulleys in the same sequence that the web engages the web rolls, inlet drive means for rotating the first web roll, exit drive means for rotating the exit web roll, and take-up means for taking up and releasing slack in the drive belt occurring when the second set of rolls moves towards or away from the first set.
摘要:
A system and method in one embodiment includes modules for detecting an access request by an application to access information in a mobile device, determining that the application is a potential threat according to at least one policy filter, and blocking a send request by the application to send the information from the mobile device without a user's consent. More specific embodiments include user selecting the information through a selection menu on a graphical user interface that includes information categories pre-populated by an operating system of the mobile device, and keywords that can be input by the user. Other embodiments include queuing the send request in a queue with other requests, and presenting an outbox comprising the queue to the user to choose to consent to the requests. The outbox includes graphical elements configured to permit the user to selectively consent to any requests in the queue.