Patent application number | Description | Published |
20090019436 | Augmenting a Virtual Machine Hosting Environment from within a Virtual Machine - Systems and methods augment a virtual machine (computer) hosting environment from within a virtual machine. A communication channel between the virtual machine and the player is used to send instructions to the player to load and execute requested software modules. Requests to load and execute the modules may originate in the corporate network and may be issued by the corporate network administrator. If a requested module is not stored on the host computer, the virtual machine may upload the module, via the communication channel, to the player. The uploaded module may, for example: (a) install a required upgrade in the host operating system; (b) execute virus checking software on the host computer; or (c) install a corporate network-provided secure printing module that enables software being executed by the host computer to print on devices connected to the host computer. | 01-15-2009 |
20090307311 | METHODS AND APPARATUS FOR PERFORMING CONTEXT MANAGEMENT IN A NETWORKED ENVIRONMENT - Methods and apparatus related to context management in a networked environment are provided. According to one aspect, a technique is provided for facilitating communication between a client and a context management (CM) server, comprising establishing a network connection between the client and the CM server to enable communication, and maintaining the connection for the period of time during which the context is maintained. According to another aspect, a requested change in at least one aspect of a context is facilitated by publishing a change decision from the context management server to the participant applications. In another aspect, a technique is employed to verify that a remote application is emulated on the same client as at least one other application in a context by receiving from the client and the remote application server information that uniquely identifies the client. In a further aspect, a technique is employed for verifying that two remote applications are emulated on a same client by receiving information from the remote applications that uniquely identifies the client on which they are emulated. | 12-10-2009 |
20100100956 | METHODS AND APPARATUS FOR MANAGING USER ACCESS TO A COMPUTING ENVIRONMENT - Methods and apparatus for controlling user access to a computing environment are provided. In one embodiment, a method performed by a user is provided for gaining access to at least one computing device. The method comprises gaining access to the at least one computing device at a first time by providing credential information to the at least one computing device to authenticate the user's identity to the at least one computing device; presenting to the at least one computing device a physical device comprising identifying information to associate the physical device with the user authenticated by the credential information; and gaining access to the at least one 10 computing device at a subsequent time by presenting the physical device to the at least one computing device without providing the credential information. | 04-22-2010 |
20100114960 | METHODS AND APPARATUS FOR PROCESSING A CONTEXT CHANGE REQUEST - A method and apparatus for use in a computer system comprising at least two software applications sharing context, wherein a context change may be requested by a user of at least one of the at least two software applications. In response to the user requesting a change from a first context to a second context, at least one business rule is applied to at least a portion of the first context and/or to at least a portion of the second context to obtain at least one result from the application of the business rule. In response to the at least one result, at least one act is performed selected from the group consisting of: denying the request to change from the first context to the second context; requesting the user to provide information relating to the requested change; and requesting the user to affirm information relating to the requested change. | 05-06-2010 |
20100146046 | METHODS AND APPARATUS FOR VERIFYING CONTEXT PARTICIPANTS IN A CONTEXT MANAGEMENT SYSTEM IN A NETWORKED ENVIRONMENT - Methods and apparatus related to context management in a networked environment are provided. According to one aspect, technique is employed to verify that a remote application is emulated on the same client as at least one other application in a context by receiving from the client and the remote application server information that uniquely identifies the client. | 06-10-2010 |
20110055912 | METHODS AND APPARATUS FOR ENABLING CONTEXT SHARING - Some embodiments relate to processing a web page requested by a web browser. The requested web page is received, and additional code is inserted into the web page that alters and/or augments the functionality of the web page. The web page is then forwarded to the web browser that requested it. The browser executes the code inserted into the web page, thereby augmenting the functionality of the web page. | 03-03-2011 |
20110154486 | METHODS AND APPARATUS FOR MANAGING USER ACCESS TO A COMPUTING ENVIRONMENT - Methods and apparatus for controlling user access to a computing environment are provided. In one embodiment, a method performed by a user is provided for gaining access to at least one computing device. The method comprises gaining access to the at least one computing device at a first time by providing credential information to the at least one computing device to authenticate the user's identity to the at least one computing device; presenting to the at least one computing device a physical device comprising identifying information to associate the physical device with the user authenticated by the credential information; and gaining access to the at least one computing device at a subsequent time by presenting the physical device to the at least one computing device without providing the credential information. | 06-23-2011 |
20130219413 | CONTEXTUALLY INTERACTING WITH APPLICATIONS - The present discussion relates to contextually interacting with applications. One example can include a computer that has a set of applications installed thereon. This example can also include a URI manager configured to receive a context-defining URI, the URI manager can be configured to run a sub-set of the applications specified by the context-defining URI and to set a common context for the sub-set of the applications as specified by the context-defining URI. | 08-22-2013 |
Patent application number | Description | Published |
20140358385 | BICYCLE ELECTRONIC SYSTEM - The present invention relates to a bicycle electronic system, comprising:
| 12-04-2014 |
20150137591 | BICYCLE ELECTRONIC SYSTEM - A bicycle electronic system comprising a battery unit, at least one operating unit and a power supply and communication bus, each of said units being connected to said bus is provided. The system comprises first means or controller for switching-off/(re)switching-on able to be activated/deactivated by a user and second means or controller for switching-off/(re)switching-on suitable for disconnecting/connecting said battery unit from/to said power supply and communication bus in response to the activation/deactivation of said first means or controller for switching-off/(re)switching-on. A battery unit and a method for switching-off/(re)switching-on a bicycle electronic system are also described. | 05-21-2015 |
20160096570 | BICYCLE CONTROL LEVER AND METHOD FOR MANUFACTURING IT - A bicycle control lever includes a luminous indicator arranged between an inner half-shell and an outer half-shell, and the outer half-shell has at least one transparent region at the luminous indicator. | 04-07-2016 |
20160096571 | BICYCLE CONTROL DEVICE - A bicycle control device that includes a control member with at least one transparent portion, and a luminous indicator. The luminous indicator includes a light source and a light guide that guides the light, through the phenomenon of total internal reflection, from the light source to the at least one transparent portion of the control member. | 04-07-2016 |