摘要:
Described is a system and method that use the concept of channels by which computer users select an appropriate set of network settings maintained in the computer system for a particular network. Upon selection, the corresponding settings are automatically applied by the system. A channel manager manages sets of network settings for various networks, including ad hoc networks, wherein each set contains the information that is necessary to connect to a network. A user interface allows selection of a channel, e.g., via a friendly name. The network settings may be stored in files to allow users to easily copy settings. Complex channels are capable of connecting to different networks at different times in a priority ordering, depending on network availability. The channel manager is able to determine the current channel from current network settings. Metadata may be received and displayed in conjunction with the channel-related user interface.
摘要:
Described is a system and method that use the concept of channels by which computer users select an appropriate set of network settings maintained in the computer system for a particular network. Upon selection, the corresponding settings are automatically applied by the system. A channel manager manages sets of network settings for various networks, including ad hoc networks, wherein each set contains the information that is necessary to connect to a network. A user interface allows selection of a channel, e.g., via a friendly name. The network settings may be stored in files to allow users to easily copy settings. Complex channels are capable of connecting to different networks at different times in a priority ordering, depending on network availability. The channel manager is able to determine the current channel from current network settings. Metadata may be received and displayed in conjunction with the channel-related user interface.
摘要:
A portable rewritable medium and a method are provided for preventing unauthorized use of executable software stored on the portable rewritable medium. A portion of the software stored on the portable rewritable medium may include instructions for a processing device to determine whether execution of the executable software is permitted. If execution of the executable software is permitted, the processing device may execute the executable software directly from the portable rewritable medium. Characteristics of the portable rewritable medium may be checked to determine whether functionality of the executable software is to be limited.
摘要:
A portable rewritable medium and a method are provided for preventing unauthorized use of executable software stored on the portable rewritable medium. A portion of the software stored on the portable rewritable medium may include instructions for a processing device to determine whether execution of the executable software is permitted. If execution of the executable software is permitted, the processing device may execute the executable software directly from the portable rewritable medium. Characteristics of the portable rewritable medium may be checked to determine whether functionality of the executable software is to be limited.
摘要:
Multi-user multi-input desktop workspaces and applications are described. In one aspect, a single computing device presents multiple workspaces on a desktop area. The desktop area is designed for multiple users to provide in parallel inputs. Each workspace is configured for use by a particular set of users. Responsive to user direction, user access restrictions to a particular workspace of the multiple workspaces is suspended to allow a new user to interface within context of a particular workspace.
摘要:
Multi-user multi-input desktop workspaces and applications are described. In one aspect, a single computing device presents multiple workspaces on a desktop area. The desktop area is designed for multiple users to provide in parallel inputs. Each workspace is configured for use by a particular set of users. Responsive to user direction, user access restrictions to a particular workspace of the multiple workspaces is suspended to allow a new user to interface within context of a particular workspace.
摘要:
A search engine that resides on a local computer to enable query intent analysis, results ranking, and relevance processing over data of both local and remote data sources. The architecture also employs a global access component, which is a unified interface to disparate data discovery paradigms. The global access component provides access to corresponding disparate datasets of the paradigms for creating aggregation of information. A local search engine creates the aggregations of information from the disparate datasets via the global access component and processes a query against the aggregations of information to return search results.
摘要:
A BIOS may provide bad block and wear-leveling services to a flash memory during a boot cycle until a full-functioned memory controller, such as a software memory controller, is available. After the full-functioned memory controller is available, the controller may use data passed by the BIOS to determine what, if any, steps to take to account for write activity during the boot process. Alternatively, the BIOS may use a reserved portion of flash memory so that wear leveling for boot-related data, such as a shut-down flag, is not needed.
摘要:
An inter-network remote control system is described that enables remote control of computing devices via two or more disparate data communications networks. In various embodiments, the inter-network remote control system receives a message from a mobile device via a first network, transforms the received message so that it can be relayed via a second network, and forwards the transformed message via the second network to a target computing device to cause that device to be controlled remotely.
摘要:
A method for tailoring the installation of an operating system to a computer system receives information regarding the computer system. Information regarding a modular operating system is accessed. The modular operating system is comprised of a foundational base and a plurality of installable features. Desired performance characteristics of the computer system are determined. Portions of the modular operating system are installed such that the modular operating system is tailored to the computer system and the desired performance characteristics of the computer system.