摘要:
Methods and apparatus for implementing modes of operation of computing device are disclosed. An example apparatus includes a mode-selection input device having a first state and a second state. The example apparatus also includes firmware operably coupled with the mode-selection input device. In the example apparatus, when the mode-selection input device is in the first state, the firmware is configured to cause the computing device to operate in a first mode of operation, a user mode. In the example apparatus, when the mode-selection input device is in the second state, the firmware is configured to cause the computing device to operate in second mode of operation, a developer mode.
摘要:
Methods and apparatus for implementing modes of operation of computing device are disclosed. An example apparatus includes a mode-selection input device having a first state and a second state. The example apparatus also includes firmware operably coupled with the mode-selection input device. In the example apparatus, when the mode-selection input device is in the first state, the firmware is configured to cause the computing device to operate in a first mode of operation, a user mode. In the example apparatus, when the mode-selection input device is in the second state, the firmware is configured to cause the computing device to operate in second mode of operation, a developer mode.
摘要:
A computer-implemented method for controlling a developer mode of a computer is disclosed according to an aspect of the subject technology. The method comprises, during boot time of the computer, determining whether one or more keys on a keyboard corresponding to the developer mode are held down, and, if the one or more keys are held down, then setting a developer mode value within a lockable memory space to enable the developer mode.
摘要:
A system and method is disclosed for recovering a boot image from a secure location. Hardware instructions initiate a sequence of boot cycles to launch a computer operating system on a computer-enabled device. During the boot cycles, multiple levels of boot code are verified and a determination is made whether each level is usable by the device. If a level of boot code is determined to be unusable, a secure copy of the boot code is loaded from a secure read-only location to repair the unusable code to launch the computer operating system.
摘要:
According to another general aspect, a method for displaying the system resource usage of a computer may include identifying the number of open tabs in one or more tabbed based browsers running on the computer. The method may include determining the system resource usage of each tab. The method may further include displaying the system resource usage of each tab in a system resource meter.
摘要:
In one general aspect, a computer-readable storage medium can store instructions that when executed cause a computing device to perform a process. The instructions can include instructions to receive a cursor behavior representing an interaction with a user interface where the interaction is triggered via a cursor device. The instructions can include instructions to identify a deviation of the cursor behavior from an expected cursor behavior, and calculate a cursor value related to a responsiveness of the cursor device based on the deviation.
摘要:
In one general aspect, a computer-readable storage medium can store instructions that when executed cause a computing device to perform a process. The instructions can include instructions to receive a cursor behavior representing an interaction with a user interface where the interaction is triggered via a cursor device. The instructions can include instructions to identify a deviation of the cursor behavior from an expected cursor behavior, and calculate a cursor value related to a responsiveness of the cursor device based on the deviation.
摘要:
A non-transitory computer-readable storage medium may comprise instructions stored thereon for recognizing gestures on a tactile input device. The instructions may be configured to cause a computing system to at least receive, from a sensor of the tactile input device, a signal representing a first contact on the tactile input device and subsequent release of the first contact from the tactile input device, receive, from the sensor of the tactile input device, a signal representing a second contact on the tactile input device after the first contact is released, the second contact being maintained and changing location on the tactile input device, and recognize the first contact and the second contact as a single gesture if the second contact occurs within a re-tap threshold period of time after the first contact, and the second contact begins within a maximal threshold distance on the tactile input device from the first contact.
摘要:
A system and method is disclosed for adjusting power consumption of a computing device. The computing device is configured with one or more sensors to sense when a user moves away and returns to the computing device. Over a period of time, the computing device determines a pattern of activity related to how long the user is normally away from the computing device during particular times of the day. The computing device may then adjust power consumption of the device or associated components during times of the day for which a pattern of activity has been determined. For example, the computing device may adjust a duration that the computing device will remain idle before power to the computing device is limited.
摘要:
According to one general aspect, a method may include operating a computing device in a first power mode. The method may also include executing, by a processor of the computing device, at least one non-interactive task. The method may also include detecting, by a processor of the computing device, a request to place the computing device in a second power mode, wherein the second power mode consumes less system resources than the first power mode. The method may further include delaying the transition of the computing device to the second power mode until either the completion of the non-interactive task or an overriding triggering event.