摘要:
In one embodiment, a processor includes a multiply-accumulate (MAC) unit having a first path to handle execution of an instruction if a difference between at least a portion of first and second operands and a third operand is less than a threshold value, and a second path to handle the instruction execution if the difference is greater than the threshold value. Based on the difference, at least part of the third operand is to be provided to a multiplier of the MAC unit or to a compressor of the second path. Other embodiments are described and claimed.
摘要:
Simplifying access to documents accessed recently on a remote system. In one embodiment, the list of documents accessed by a user using a first instance of an application in a first/remote system is maintained. The list of documents is provided/displayed to the same user when using a second instance of the same application on a second/local system, thereby facilitating the user to access the documents accessed recently on the remote system.
摘要:
Particular embodiments generally relate to allowing access of non-secure elements through a non-secure channel when a top-level page was accessed through a secure connection. In one embodiment, a webpage is accessed over a secure channel. The webpage includes secure and non-secure elements. When a non-secure element for the webpage is determined, a client may message with the server to open a non-secure channel for accessing the non-secure element. For example, the client may request port information in the request. The server then can respond with port information for a non-secure channel. The client then accesses data for the non-secure element through the non-secure channel using the port information.
摘要:
A system for identifying one or more resumes from a set of resumes matches a search query using a resume identifying tool is provided. The system includes a memory unit that stores a database and a set of modules, a display unit, and a processor. The set of modules includes (a) a keyword extraction module extracts at least one keyword from the search query, (b) a disambiguation module disambiguates the at least one keyword based on weighted formal concept analysis, and (c) and a resume identification module identifies the one or more resumes by matching (i) the at least one keyword associated with the search query, and (ii) at least one category associated with the at least one keyword with (i) at least one disambiguated keyword associated with each resume of the set of resumes, and (ii) at least one category associated with the at least one disambiguated keyword.
摘要:
Particular embodiments generally relate to allowing access of non-secure elements through a non-secure channel when a top-level page was accessed through a secure connection. In one embodiment, a webpage is accessed over a secure channel. The webpage includes secure and non-secure elements. When a non-secure element for the webpage is determined, a client may message with the server to open a non-secure channel for accessing the non-secure element. For example, the client may request port information in the request. The server then can respond with port information for a non-secure channel. The client then accesses data for the non-secure element through the non-secure channel using the port information.
摘要:
An aspect of the present invention facilitates a service application to operate with different frameworks executing in application servers. In one embodiment, the different interfaces according to which the different frameworks are designed to operate with service application are identified, including the interface implemented by the service application. Wrapper modules are then generated based on the differences between the identified interfaces and the interface implemented by the service application. The generated wrapper modules are then deployed along with the service application to facilitate the service application to operate with different frameworks.
摘要:
Some implementations disclosed herein provide techniques for caching memory data and for managing cache retention. Different cache retention policies may be applied to different cached data streams such as those of a graphics processing unit. Actual performance of the cache with respect to the data streams may be observed, and the cache retention policies may be varied based on the observed actual performance.
摘要:
A secure resource enforcer is configured to identify and provide selected secure resources. The secure resource enforcer includes a determining module configured to determine whether a resource of a web page that is requested in a first request by a client computer requires a secure connection based on a type of the resource that is requested. The secure resource enforcer also includes a redirecting module configured to redirect the client computer to a secure socket for the resource when the resource requires the secure connection. The secure resource enforcer further includes a receiving module configured to receive a second request from the client for the resource over the secure socket and a secure resource providing module configured to provide the requested resource to the client over the secure socket.
摘要:
Particular embodiments generally relate to allowing access of non-secure elements through a non-secure channel when a top-level page was accessed through a secure connection. In one embodiment, a webpage is accessed over a secure channel. The webpage includes secure and non-secure elements. When a non-secure element for the webpage is determined, a client may message with the server to open a non-secure channel for accessing the non-secure element. For example, the client may request port information in the request. The server then can respond with port information for a non-secure channel. The client then accesses data for the non-secure element through the non-secure channel using the port information.
摘要:
A communication system having a first communication device being in communication with a second communication device via a communication connectivity to a first communication network. The first communication device having a first handover module operable to handover communication connectivity from the first communication network to a second communication network. The second communication device having a second handover module cooperatively operable with the first handover module to maintain communication between the second communication device and the first communication device while the first handover module operates to handover communication connectivity from the first communication network to the second communication network.