Patent application number | Description | Published |
20080244079 | COMPUTER PATCH MANAGEMENT IN "ROAD WARRIOR" CONTEXTS - Methods and arrangements for facilitating and streamlining patch management in “road warrior” and analogous contexts. Particularly, there are broadly contemplated herein, in accordance with at least one presently preferred embodiment of the present invention, methods and arrangements for facilitating determinations of suitable times for enabling system updates and/or downloads. | 10-02-2008 |
20080244096 | DISKLESS CLIENT USING A HYPERVISOR - An arrangement for facilitating remote booting in diskless client systems as just described. To this end, there is broadly contemplated herein the employment of a hypervisor that can freely accommodate a variety of booting arrangements for a given OS. This then ensures that few if any modifications, especially costly ones, would need to be made to the OS to ensure greater versatility. | 10-02-2008 |
20080244254 | MULTI-MODE COMPUTER OPERATION - A mobile device, such as a laptop or notebook computer, capable of booting from at least two environments. If a remote environment is present, the mobile device may boot from the remote environment. The mobile device may also boot from the local environment. | 10-02-2008 |
20090083534 | REMOTE PC BOOTUP VIA A HANDHELD COMMUNICATION DEVICE - A method computer usable medium and computer system circuitry are disclosed for starting or “booting up” a computer from a remote location using a remote command device such as a cellular telephone. The method and system includes a secure means for remotely storing and transmitting security passwords. | 03-26-2009 |
20090083555 | REMOTE COMPUTER LOCKDOWN - A method and system are disclosed for placing a computer in a safe and secure lock down state from a remote location using a remote command device such as a cellular telephone. The method and system includes optional security provisions before restarting the computer. | 03-26-2009 |
20090089590 | MERGING EXTERNAL NVRAM WITH FULL DISK ENCRYPTION - Methods and arrangements for managing a flash drive, hard disk, or connection between the two, in a manner to ensure that sensitive data is not decrypted at any time when it would be vulnerable. Accordingly, in a first implementation, the data may preferably be encrypted as it first goes into a flash drive and decrypted when it comes out of the flash drive. In another implementation, the flash drive may be logically bound to the hard disk, so that they would both use the same encryption key. In yet another implementation, if a hard disk is moved to another system, then the flash drive may also preferably be simultaneously moved. | 04-02-2009 |
20090089808 | METHODS AND ARRANGEMENTS FOR EFFECTING SUPPLEMENTARY MAIL TRANSFER OR MANAGEMENT - Arrangements for permitting incoming mail to be transferred from a WAN Drive to a notebook computer hard drive under conditions that are not stressful to the hard drive. Preferably, a WAN card is configured to wake a notebook when mail capacity is full or close to full. Mail is then preferably moved from the flash drive to the hard drive, subject to verification that this will not overly stress the hard drive. In a variant embodiment, the WAN card may preferably be configured to wake a notebook when mail is received at all. Again, mail is then preferably moved from the flash drive to the hard drive, subject to verification that this will not overly stress the hard drive. Once mail is moved to the hard drive, the system preferably runs an embedded email program that allows the user to employ an existing VPN infrastructure. | 04-02-2009 |
20090089875 | LOCAL VERIFICATION OF TRUSTED DISPLAY BASED ON REMOTE SERVER VERIFICATION - In a system with a main memory, a network adapter, and a display, a transaction security module in communication with the network adapter. The transaction security module acts to: establish a secure identification item with an entity which positively identifies the entity; accept an application OS of the entity; and initiate a guest OS with the entity; the network adapter acting to connect with the entity subsequent to initiation of a guest OS; and the display acting to display the secure identification item subsequent to connection with the entity. | 04-02-2009 |
20090119785 | System and Method for Secure Usage of Peripheral Devices Using Shared Secrets - A system, method, and program product is provided that establishes a shared secret between a computer system and a peripheral device such as a removable nonvolatile storage device or a printer. After establishing the shared secret, the peripheral device is locked. After the peripheral device is locked, an unlock request is received and the shared secret is sent to the peripheral device. The peripheral device then attempts to verify the shared secret. If the shared secret is successfully verified, then the peripheral device is unlocked allowing use of the device by using an encryption key that is made available by the verified shared secret. On the other hand, if the shared secret is not verified, then the peripheral device remains locked and use of the device is prevented. | 05-07-2009 |
20090138868 | Techniques for Providing Software Patches to a Computer System - A technique for providing a software patch to an associated computer system includes receiving, at a wireless communication device, a communication. Next, it is determined, at the wireless communication device, whether the communication is associated with a software patch available for the associated computer system. When the communication is associated with the software patch, a notification is sent from the wireless communication device to the associated computer system that the software patch is available. | 05-28-2009 |
20090222651 | S3 BIOS OPERATING SYSTEM SWITCH - Arrangements for employing a system BIOS (basic input/output system) to handle email during a suspended state (such as an “S3” state as will be better understood herebelow). Preferably, the BIOS is employed to “jump” between two suspended images such that, e.g., two more powerful OS's can be employed to manage the mail function. | 09-03-2009 |
20100039064 | Slate Wireless Keyboard Charging and Connection - An approach is provided that determines whether keyboard power connection points included in a wireless keyboard are connected to system power connection points in a computer system. Power is sent from the computer system to the wireless keyboard. The power is transmitted through the system power connection points to the keyboard power connection points. Keyboard components included in the wireless keyboard are also powered using the power sent from the computer system. If the keyboard power connection points are not connected to the system power connection points, the keyboard components are powered included in the wireless keyboard by using a keyboard battery that is included in the wireless keyboard. One of the keyboard components that receives power is a wireless interface that connects the wireless keyboard to the computer system. | 02-18-2010 |
20100039764 | Transformer Case for Notebook Slate Computer with Wireless Keyboard - An approach is provided that uses a foldable transformable display case that includes two panels. The two panels are attached using a hinge. Two components are attachable to at least one of the panels. One of the two components is an integrated display screen. Another component is a keyboard unit. At least one of the components can be removed from the panels. | 02-18-2010 |
20100079113 | BATTERY MANAGEMENT FOR OPTIMIZING BATTERY AND SERVICE LIFE - The provision of a mode in silver zinc batteries where a user can access extra capacity as an emergency reserve for times when extra capacity is needed. While this temporarily increases capacity, it does not detrimentally affect cycle life over the longer term, and it permits a silver zinc battery to essentially mimic the long term capacity and cycle life characteristics of a lithium ion battery while still affording inherent advantages associated with silver zinc batteries. In a variant embodiment, this ability to temporarily increase capacity is optimally employed at the end of a battery life cycle in a controlled “roll-off” that accords additional cycles of battery service life. In another variant embodiment, the general capability to control capacity is employed to gradually decrease the available capacity of a battery over the life of the battery, to thereby extend the battery service life. | 04-01-2010 |
20100081037 | BATTERY MANAGEMENT FOR OPTIMIZING BATTERY AND SERVICE LIFE - The provision of a mode in silver zinc batteries where a user can access extra capacity as an emergency reserve for times when extra capacity is needed. While this temporarily increases capacity, it does not detrimentally affect cycle life over the longer term, and it permits a silver zinc battery to essentially mimic the long term capacity and cycle life characteristics of a lithium ion battery while still affording inherent advantages associated with silver zinc batteries. In a variant embodiment, this ability to temporarily increase capacity is optimally employed at the end of a battery life cycle in a controlled “roll-off” that accords additional cycles of battery service life. In another variant embodiment, the general capability to control capacity is employed to gradually decrease the available capacity of a battery over the life of the battery, to thereby extend the battery service life. | 04-01-2010 |
20100146317 | Apparatus, System, and Method for Power Management Utilizing Multiple Processor Types - An apparatus, system, and method are disclosed for computer system power management. A control module | 06-10-2010 |
20100244759 | SAFETY FEATURES FOR MOVING COMPONENTS OF ELECTRONIC DEVICES - The invention broadly contemplates a safety arrangement that transitions a moving component, for example a cooling fan housed within a chassis of an electronic device, between a first operating mode or condition and a second operating mode or condition. The first operating mode is a normal operating mode, allowing the component (fan) to operate (rotate) at full speed. The second operating mode is a safety or service mode, allowing the component (fan) to operate (rotate) at a reduced speed such that it is compliant with applicable safety regulations. | 09-30-2010 |
20100250197 | APPARATUS, SYSTEM, AND METHOD FOR MEMORY CONFIGURATION ANALYSIS - An apparatus, system, and method are disclosed for memory configuration analysis. A classification module | 09-30-2010 |
20100250846 | ASYMETRIC LOAD BALANCING FOR RAID STORAGE SYSTEMS - The instant invention broadly contemplates balancing of asymmetric RAID arrays based on application usage patterns. The instantly claimed invention broadly contemplates balancing the type of workload and delivery of the work load in asymmetric RAID arrays by intelligently implementing different types of applications on disks strategically positioned to deliver workload to the RAID channel that is most capable of handling the work load. The invention makes use of the fact that some applications are more large block, sequential transfer dependant while other applications are more small block, high random, high IOP dependent, and places these applications accordingly within the asymmetric RAID array. | 09-30-2010 |
20100250888 | APPARATUS, SYSTEM, AND METHOD FOR MEMORY UPGRADE PATH OPTIMIZATION - An apparatus, system, and method are disclosed for memory upgrade optimization. A requirements module | 09-30-2010 |
20100250991 | VARIABLE POWER SYSTEMS FOR COMPUTERS - Arrangements which provide a degree of flexible power allocation among multiple power rails in computer systems, in a manner to permit the sharing and exchange of power across multiple rails. The rails involved in such sharing could be of similar or dissimilar voltage. By way of an advantageous refinement, a “shopping cart” approach for system configuration is permitted, based on subsystem or component power capability. | 09-30-2010 |
20110119443 | Apparatus and Method for Distributing Writes Asymmetrically Among Drives - An apparatus and method are disclosed for distributing writes asymmetrically. An asymmetric distribution module calculates an asymmetric distribution of writes for a plurality of drives. A write module writes data to each drive in accordance with the asymmetric distribution of writes. | 05-19-2011 |
20120038546 | GESTURE CONTROL - An apparatus includes sensor circuitry configured to sense spatial phenomena; application circuitry configured to respond to sensation of a spatial phenomenon by the sensor circuitry where a pre-existing relationship exists between the spatial phenomenon and the response of the application circuitry; and regulation circuitry configured to regulate the response of the application circuitry to the spatial phenomenon based at least in part on sensation of a different spatial phenomenon by the sensor circuitry. Various other apparatuses, systems, methods, etc., are also disclosed. | 02-16-2012 |
20120166184 | Selective Transmission of Voice Data - Systems and methods that provide for voice command devices that receive sound but do not transfer the voice data beyond the system unless certain voice-filtering criteria have been met are described herein. In addition, embodiments provide devices that support voice command operation while external voice data transmission is in mute operation mode. As such, devices according to embodiments may process voice data locally responsive to the voice data matching voice-filtering criteria. Furthermore, systems and methods are described herein involving voice command devices that capture sound and analyze it in real-time on a word-by-word basis and decide whether to handle the voice data locally, transmit it externally, or both. | 06-28-2012 |
20120324124 | SETTING A RATE OF DATA TRANSMISSION IN A PEER-TO-PEER MODE - An apparatus and method are presented for a maximum speed criterion for a velocity gesture. The apparatus includes a processor, a memory, a determination module and a transmission module. The determination module determines, through a wireless communication infrastructure mode, an amount of wireless network activity. The transmission module sets a rate of data transmission in a peer to peer mode based on the amount of wireless network activity. | 12-20-2012 |
20130138796 | DISTANCE-BASED NETWORK RESOURCE DISCOVERY - An apparatus for distance-based network resource discovery includes a storage device storing machine-readable code and a processor executing the machine-readable code. The machine-readable code includes a determination module determining a distance between an information handling device and a network resource capable of communication with the information handling device. The machine readable code also includes a policy module following a discovery policy according to the distance. The discovery policy is associated with discovery of the network resource. | 05-30-2013 |
20130138797 | CONTEXT AWARE DEVICE DISCONNECTION - Systems, methods and products directed toward context aware device disconnection are provided herein. One aspect includes obtaining one or more physical measurements of an information handling device connected to one or more external systems, the one or more physical measurements being measured using one or more physical characteristic measurement elements; analyzing the one or more physical measurements using one or more policy settings configured in one or more disconnection policies stored on the information handling device; and initiating one or more disconnection events responsive to the one or more physical measurements matching the one or more policy settings. Other embodiments are described herein. | 05-30-2013 |
20130154957 | SNAP TO CENTER USER INTERFACE NAVIGATION - Systems, methods and products directed toward snap to center user interface navigation are presented herein. One aspect includes executing an ultra-mobile user interface displayed on a display device accessible by an information handling device, the ultra-mobile user interface being comprised of one or more landing zones; ascertaining a user selected position within the ultra-mobile user interface based on user input communicated through one or more input devices operatively coupled with the information handling device; and selecting one of the one or more landing zones determined to be in closest proximity to the user selected position. Other embodiments are described herein. | 06-20-2013 |
20130162514 | GESTURE MODE SELECTION - An apparatus, system, and method are disclosed for gesture mode selection. An apparatus for gesture mode selection includes a detection module, a gesture mode module, and a gesture recognition module. The detection module detects a triggering event. The gesture mode module sets a gesture mode from an idle mode to an enhanced mode based on the detection of the triggering event. The gesture recognition module processes data from a non-contact input device to detect gestures according to the gesture mode set by the gesture mode module. | 06-27-2013 |
20130249813 | APPARATUS, SYSTEM, AND METHOD FOR TOUCH INPUT - An apparatus, system, and method are disclosed for touch input. An apparatus for touch input includes a sensor module and a display module. The sensor module determines a site of an input object in relation to a touch-sensitive input surface when the input object is within a sensing range of the touch-sensitive input surface. The display module displays a cursor within a touch-optimized graphical user interface (GUI). The cursor is displayed on a display at a display location corresponding to the site of the input object. The touch-sensitive input surface is separate from the display. | 09-26-2013 |
20140194008 | COMBINATION POWER AND DATA CONNECTOR - An aspect provides a combination power and data connector, including: a dedicated power connector element; and a combination data connector element separate from the dedicated power connector element, the combination data connector element providing a combination of pins for two data transmission protocols. Other aspects are described and claimed. | 07-10-2014 |
20140292669 | INTUITIVE TOUCH GESTURE-BASED DATA TRANSFER BETWEEN DEVICES - An embodiment provides a method, including: receiving, at a network device, data from a source device and a user identification derived from a user device; storing, at the network device, the data from the source device; detecting, at the network device, a request from a destination device, the request from the destination device comprising a request for data derived from gesture input and associated with the user identification derived from the user device; and transferring, from the network device to the destination device, the data from source device. Other aspects are described and claimed. | 10-02-2014 |
20140372455 | SMART TAGS FOR CONTENT RETRIEVAL - An aspect provides a method, including: storing an object; obtaining data associated with the object; analyzing, using one or more processors, the data associated with the object to identify one or more key words in the data associated with the object to create one or more tags; and storing the one or more tags in a searchable format. Other aspects are described and claimed. | 12-18-2014 |
20140372467 | CONTEXTUAL SMART TAGS FOR CONTENT RETRIEVAL - An aspect provides a method, including: obtaining, at an information handling device, user input search data; accessing contextual data; refining, using one or more processors, the user input search data based on the contextual data; searching, using one or more processors, a repository of stored tag data with refined user input search data to identify one or more stored tags matching one or more stored objects; and returning, using one or more processors, one or more results of the searching, the one or more results indicating one or more stored objects associated with stored tag data. Other aspects are described and claimed. | 12-18-2014 |
20150022462 | INFORMATION HANDLING DEVICE HANDWRITING CLEAN-UP - An embodiment provides a method, including: accepting, at an input surface, handwriting input; identifying, using one or more processors, one or more characters included in the handwriting input; modifying one or more of the one or more characters included in the handwriting input to match penmanship; and rendering, on a display device, the handwriting input including one or more modified characters. Other aspects are described and claimed. | 01-22-2015 |
20150049009 | SYSTEM-WIDE HANDWRITTEN NOTES - An embodiment provides a method, including: ascertaining user input to a display screen forming a predetermined shape associated with system-wide note taking; determining, using one or more processors, user input note data associated with the predetermined shape; and providing, in a predetermined location, a note including the user input note data. Other aspects are described and claimed. | 02-19-2015 |