Patent application number | Description | Published |
20100217924 | HYBRID MEMORY DEVICE WITH SINGLE INTERFACE - Described is a technology by which a memory controller is a component of a hybrid memory device having different types of memory therein (e.g., SDRAM and flash memory), in which the controller operates such that the memory device has only a single memory interface with respect to voltage and access protocols defined for one type of memory. For example, the controller allows a memory device with a standard SDRAM interface to provide access to both SDRAM and non-volatile memory with the non-volatile memory overlaid in one or more designated blocks of the volatile memory address space (or vice-versa). A command protocol maps memory pages to the volatile memory interface address space, for example, permitting a single pin compatible multi-chip package to replace an existing volatile memory device in any computing device that wants to provide non-volatile storage, while only requiring software changes to the device to access the flash. | 08-26-2010 |
20110202689 | ASSIGNMENT OF CONTROL OF PERIPHERALS OF A COMPUTING DEVICE - Techniques for enabling software-assisted assignment of control of peripherals (e.g., assigning ownership of or assigning access to the peripherals) by a computing device. In accordance with techniques described herein, assignment of control of peripherals is aided by input from software facilities that instruct a peripheral management facility regarding assignment of peripherals. Software facilities may instruct the peripheral management facility in different ways. In some cases, a software facility may instruct the peripheral management facility how to assign control of a peripheral in a particular way, while in other cases a software facility may instruct the peripheral management facility how to assign control of a group of peripherals. In other cases, a software facility may not instruct a peripheral management facility how to assign control of peripherals, but may identify one or more groups of peripherals for which control should be assigned as a group. | 08-18-2011 |
20110202750 | RULE-BASED ASSIGNMENT OF CONTROL OF PERIPHERALS OF A COMPUTING DEVICE - Described herein are various techniques and principles for determining how to assign control of peripherals and assigning control of peripherals. In some embodiments, determining how to assign control of peripherals comprises reviewing connections of peripherals to the computing device and evaluating rules to determine management points in the connections. In some cases, the connections of peripherals to the computing device may be organized into a hierarchy corresponding to a hierarchy of physical connections of the peripherals, including physical connections of peripherals located remote from the computing device and possibly connected through another computing device. When management points are identified among the connections, control of peripherals associated with the management points may be assigned in the same way. For example, access rights to each of the peripherals may be assigned to a same user session. | 08-18-2011 |
20110276723 | ASSIGNING INPUT DEVICES TO SPECIFIC SESSIONS - Architecture that allows programmatic association of devices to sessions and redirects input to the desired session. When the solution is active, input from the devices is not realized by the standard operating system input stack, thereby allowing even reserved key sequences such as Ctrl-Alt-Del to be intercepted and redirected to a desired session. Moreover, in addition to redirecting input to a specific session, the architecture facilitates the filtering of input from unwanted/unmapped devices, the interception and filtering or redirection of reserved key sequences such as Ctrl-Alt-Del, and the maintenance of input state for each session. | 11-10-2011 |
20110289596 | RESTRICTING ACCESS TO VOLUMES - Architecture that provides programmatic association of a device (e.g., removable) to a currently logged-in user, and restricts access to the drive only to that particular logged-in user. When active, the architecture detects when devices are added to the system, determines which logged-in user a given device (or devices) should be assigned, modifies the security settings for the device(s), and makes a per-user drive letter mapping to that device such that only the logged-in user can see the mapped device. In the context of serially attachable peripheral devices such as USB (universal serial bus) devices (and IEEE 1394 devices), for example, access can be restricted to a user based on the USB hub into which the device is connected. This prevents the operating system from assigning a global drive letter to a device or device volume (for drives) when the device is added. | 11-24-2011 |
20120105257 | Multimodal Input System - The subject disclosure relates to user input into a computer system, and a technology by which one or more users interact with a computer system via a combination of input modalities. When the input data of two or more input modalities are related, they are combined to interpret an intended meaning of the input. For example, speech when combined with one input gesture has one intended meaning, e.g., convert the speech to verbatim text for consumption by a program, while the exact speech when combined with a different input gesture has a different meaning, e.g., convert the speech to a command that controls the operation of that same program. | 05-03-2012 |
20120254788 | Dynamic Distribution of Client Windows on Multiple Monitors - A multi-user computer system may distribute user windows across multiple monitors, some of the user windows may span two or more monitors, and some user windows may share a monitor. Each user window may be associated with a set of user input devices for each user. The user window configuration may be changed on the fly by an administrative user, who may reposition, rotate, scale, or perform other changes to the windows. Some embodiments may include a rule stack that may apply different levels of rules in succession to allocate user windows. | 10-04-2012 |
20130042012 | Multi-Headed Thin Client - Images from web pages may be classified based on the text associated with the images. A system for identifying and classifying images may identify one or more web pages containing the image, determine topics from the text of the web pages, and develop a set of training phrases for a classifier. The classifier may be trained, then used to analyze the text in the web pages. The training set may include both positive examples and negative examples of text taken from the website. A positive example may include captions or other elements directly associated with the image, while negative examples may include text taken from the web page, but from a large distance from the web page. In some cases, the system may iterate on the classification process to refine the results. | 02-14-2013 |
20130185463 | ASSIGNMENT OF CONTROL OF PERIPHERALS OF A COMPUTING DEVICE - Techniques for enabling software-assisted assignment of control of peripherals (e.g., assigning ownership of or assigning access to the peripherals) by a computing device. In accordance with techniques described herein, assignment of control of peripherals is aided by input from software facilities that instruct a peripheral management facility regarding assignment of peripherals. Software facilities may instruct the peripheral management facility in different ways. In some cases, a software facility may instruct the peripheral management facility how to assign control of a peripheral in a particular way, while in other cases a software facility may instruct the peripheral management facility how to assign control of a group of peripherals. In other cases, a software facility may not instruct a peripheral management facility how to assign control of peripherals, but may identify one or more groups of peripherals for which control should be assigned as a group. | 07-18-2013 |