摘要:
A plurality of elements is identified by a user for input to the computing system by at least one of sequential and simultaneous selection of elements presented on a display of a computing system. Based on the elements thus identified, which may include at least one operator and at least one operand, the computing system recognizes a function to be performed by the computing system and causes a visual indication to be presented on the display. The computing system thus may present a visual indication showing a connection between, for example, the operator and an operand, or an operand and a functional area of the display associated with the function to be performed as a result of the elements identified. The visual indication thus confirms to the user the elements that the user has identified, and the resulting function that will be initiated.
摘要:
A user is able to access additional functions not represented in a current image displayed by a graphical user interface. At least one function not presented on the current image is represented by a symbol on an underlying image that is at least partially covered by the current image. When the user performs a predetermined user input (e.g., selecting a corner of the current image), the underlying image and the at least one function represented thereby become accessible. When the user input is performed, a visual effect depicts the current image being at least partially removed from over the underlying image, thereby revealing and permitting access to the at least one additional function. The user input is made by the user performing an action with the user's hand or another object adjacent to a responsive display, or by using a pointing device to manipulate a displayed image.
摘要:
Installing software using the configuration manager so that the rollback and security features of the configuration manager may be used during the installation process. A mobile computing device accesses files that are to be installed on the mobile computing device, and well as computer-executable instructions that define how the files are to be installed on the mobile computing device. The configuration manager then causes the computer-executable instructions to be executed (e.g., using configuration service providers), and causes a mirroring rollback document to be constructed. If the installation fails, the installation process is reversed by executing the rollback document. The configuration manager may also be used to implement security when executing the installation instructions by checking to determine whether or not execution of each installation instruction is authorized.