Patent application number | Description | Published |
20080244096 | DISKLESS CLIENT USING A HYPERVISOR - An arrangement for facilitating remote booting in diskless client systems as just described. To this end, there is broadly contemplated herein the employment of a hypervisor that can freely accommodate a variety of booting arrangements for a given OS. This then ensures that few if any modifications, especially costly ones, would need to be made to the OS to ensure greater versatility. | 10-02-2008 |
20080244553 | System and Method for Securely Updating Firmware Devices by Using a Hypervisor - A system, method, and program product is provided that receives and processes a firmware update at a computer system. The computer system is executing a hypervisor and one or more guest operating systems, and the firmware update corresponds to a hardware device accessible by the computer system. The hardware device is a type that is programmed using an updateable firmware. The hypervisor operating in the computer system processes the received firmware update by first inhibiting use of the device by each of the guest operating systems. After the guest operating systems have been inhibited from using the device, the firmware in the device is upgraded by the hypervisor using the received firmware update. After the firmware has been upgraded, each of the guest operating systems is allowed use of the device. | 10-02-2008 |
20090003292 | METHODS AND ARRANGEMENTS FOR TRACKING AND LOCATING LAPTOPS - An arrangement for employing a host of receivers that may already be present in a laptop, to enable the laptop to collect a significant amount of data about its location. Once the system then finds a readily available connection, it can then transmit information about its location as well as other information to help pinpoint the location of the laptop. | 01-01-2009 |
20090201164 | Techniques for Preventing Damage to a Portable Device - A technique for preventing damage to a portable device includes detecting movement of a portable device and determining whether a port of the portable device is attached to an external device. When the external device is attached to the port, a notification is provided to a user of the portable device that the external device requires detachment from the portable device (e.g., assuming that the notification is not masked). | 08-13-2009 |
20090245111 | APPARATUS, SYSTEM, AND METHOD FOR MANAGING NETWORK BANDWIDTH - An apparatus, system, and method are disclosed for managing network bandwidth. A monitor module monitors traffic of a plurality of peer computers over a Transmission Control Protocol/Internet Protocol (TCP/IP) network. A detection module detects traffic exceeding a traffic threshold for the network. A delay module delays issuing each TCP/IP acknowledge signal for a specified delay interval in response to detecting the traffic exceeding the traffic threshold. | 10-01-2009 |
20090248845 | NETWORK BANDWIDTH CONTROL FOR NETWORK STORAGE - Network bandwidth is allocated to storage access requests as a function of a client system activities. Client system activities that produce network access requests and remote storage access requests are monitored. The network bandwidth allocation between network access requests and storage access requests is modified as a function of the monitored client system activities. | 10-01-2009 |
20090249331 | APPARATUS, SYSTEM, AND METHOD FOR FILE SYSTEM SHARING - An apparatus, system, and method are disclosed for file system sharing. A Read-Only File System (ROFS) organization module organizes a single ROFS for a plurality of operating systems. Each operating system executes on a distinct virtual machine. Each virtual machine executes on a computer. A Read/Write File System (RWFS) organization module organizes an RWFS for each operating system. An access module accesses the RWFS and ROFS for each operating system. The RWFS and ROFS appear to each operating system as a single, private file system. Each RWFS comprises at least one pointer to the ROFS. | 10-01-2009 |
20090249485 | Techniques for Capturing Identifying Information on a Device User - A technique for identifying a user of a device includes receiving a tracking mechanism trigger and capturing (e.g., periodically) identifying information on the user of the device in response to the trigger. | 10-01-2009 |
20100058042 | Techniques for Booting a Stateless Client - A technique for booting a stateless client includes booting a virtual machine (VM) monitor on the client. The VM monitor is stored in a non-volatile memory area of a memory subsystem (of the client) and a first portion of an operating system (which does not include any state information for the operating system) is stored in the non-volatile memory area of the client. Booting of the operating system for the client is initiated and a remote storage (that stores a second portion of the operating system that includes state information for the operating system) is accessed via a communication link. Booting of the operating system for the client is completed using the second portion of the operating system. | 03-04-2010 |
20100070715 | APPARATUS, SYSTEM AND METHOD FOR STORAGE CACHE DEDUPLICATION - An apparatus, system, and method are disclosed for deduplicating storage cache data. A storage cache partition table has at least one entry associating a specified storage address range with one or more specified storage partitions. A deduplication module creates an entry in the storage cache partition table wherein the specified storage partitions contain identical data to one another within the specified storage address range thus requiring only one copy of the identical data to be cached in a storage cache. A read module accepts a storage address within a storage partition of a storage subsystem, to locate an entry wherein the specified storage address range contains the storage address, and to determine whether the storage partition is among the one or more specified storage partitions if such an entry is found. | 03-18-2010 |
20100094825 | APPARATUS, SYSTEM AND METHOD FOR CACHING WRITES BY MULTIPLE CLIENTS TO A VIRTUALIZED COMMON DISK IMAGE - An apparatus, system, and method are disclosed for storage write caching. A storage address translation table is used to overlay a user image and a common image. A storage driver stack module receives a storage access call and generates a storage access request with a requested file path and a requested storage address. A storage mapper module receives the storage access request, accesses the storage address translation table, and looks up a matching entry in the storage address translation table where the requested file path matches a saved file path and the requested storage address matches a saved common storage address, and maps a saved user storage address from the matching entry if a match exists. | 04-15-2010 |
20100122250 | Apparatus, System, and Method for Granting Hypervisor Privileges - An apparatus, system, and method are disclosed for granting hypervisor privileges. An installation module installs a monitor hypervisor wherein only the monitor hypervisor is granted the hypervisor privileges by the computer. An authentication module authenticates a second hypervisor. An eviction module evicts the monitor hypervisor if the second hypervisor is authenticated. The installation module further installs the second hypervisor after the monitor hypervisor is evicted so that only the second hypervisor is granted hypervisor privileges by the computer | 05-13-2010 |
20100174894 | Method, Apparatus, and System for Configuring an Operating System on a Target Computer - A method, apparatus, and system are disclosed for configuring an operating system on a target computer. A configuration module configures a target computer as a diskless client. A boot module boots the target computer to a setup state. A communication module establishes communications between the target computer, a donor storage device of a donor computer, and a virtual disk. A copy module copies a configuration image from the donor storage device to the virtual disk. The configuration image comprises an operating system and a software configuration installed on the donor computer. A modification module modifies the configuration image on the virtual disk to conform to a hardware configuration of the target computer. | 07-08-2010 |
20100191946 | APPARATUS, SYSTEM, AND METHOD FOR IMPROVING USER BOOT VIA A STORAGE AREA NETWORK - An apparatus, system, and method are disclosed for remotely booting a client from a storage area network (“SAN”). A connection module enables a client, such as a diskless client, to connect to two or more storage area networks (“SANs”), the SANs belonging to a group of redundant SANs, each SAN in the group redundantly storing at least a portion of substantially identical operating system data for the client. The boot module enables the client to remotely boot an operating system from the two or more redundant SANs. The boot module makes at least one read request to each of the two or more connected SANs, each read request configured to retrieve a disparate portion of the operating system data for loading the operating system onto the client. The boot module loads the operating system onto the client using a combination of data retrieved from the two or more connected SANs. | 07-29-2010 |
20100205375 | METHOD, APPARATUS, AND SYSTEM OF FORWARD CACHING FOR A MANAGED CLIENT - A method, apparatus, and system are disclosed of forward caching for a managed client. A storage module stores a software image on a storage device of a backend server. The backend server provides virtual disk storage on the storage device through a first intermediate network point for a plurality of diskless data processing devices. Each diskless data processing device communicates directly with the first intermediate network point. The storage module caches an image instance of the software image at the first intermediate network point. A tracking module detects an update to the software image on the storage device. The storage module copies the updated software image to the first intermediate network point as an updated image instance. | 08-12-2010 |
20100251172 | HIGH-SPEED RECOVERY FOR COMPUTING SYSTEMS - The invention broadly contemplates a computing system that offers high-speed recovery. The system is configured to offer such a high-speed solution via an instant roll back scheme. The system utilizes a virtualization to handle the system state and provide a rescue and recovery like solution without requiring a full system reboot. The system is configured to utilize virtualization, e.g. through the use of a hypervisor to track the fundamental system components. This enables the system to very quickly back the system up on a rolling basis via tracking atomic changes and offering the instant rollback at essentially any point following an atomic change, should common system difficulties be encountered. | 09-30-2010 |
20110050639 | APPARATUS, METHOD, AND SYSTEM FOR TOUCH AND GESTURE DETECTION - An apparatus, method and system are disclosed for touch and gesture detection. A light source array comprises a plurality of light sources. Each light source of the light source array transmits a light beam across a face of a display in response to being activated. A light sensor array comprises a plurality of light sensors. Each light sensor of the light sensor array detects an intensity of each light beam transmitted across the face of the display in response to being activated. A controller concurrently activates each light source of the light source array with each light sensor of the light sensor array as a source/sensor pair during a detection cycle while other light sources of the light source array and other light sensors of the light sensor array are inactive. The controller further determines a location of a pointer relative to the display from a pattern of light beam intensities for each source/sensor pair. | 03-03-2011 |
20110088082 | HOME IMAGE CONTENT SECURELY ISOLATED FROM CORPORATE IT - An exemplary apparatus includes one or more processors, volatile memory, a storage drive and circuitry configured to establish a network connection and to attempt to send credentials via an established network connection. Such an apparatus further includes circuitry configured, responsive to authentication failure after an attempt to send credentials, to release an implemented security policy and load an operating system stored on the storage drive, and, responsive to an attempt to send credentials, to maintain an implemented security policy and to use an operating system exposed via an established network connection and associated with the sent credentials Such an apparatus optionally includes circuitry configured to implement a security policy that isolates at least a portion of a local storage drive. Various other apparatuses, systems, methods, etc., are also disclosed. | 04-14-2011 |
20110154010 | SECURITY TO EXTEND TRUST - An exemplary apparatus includes one or more processors; memory; circuitry configured to hash a value associated with core root of trust measurement code and system management code; store the hash in a secure register; load an operating system; validate a certificate associated with the core root of trust measurement code and validate a certificate associated with the system management code; based on the validated certificates, provide an expected hash associated with the core root of trust measurement code and the system management code; decide if the expected hash matches the hash stored in the register; and, if the expected hash matches the hash stored in the register, commence a dynamic root of trust measurement session. Various other apparatuses, systems, methods, etc., are also disclosed. | 06-23-2011 |
20110196520 | SYSTEMS AND METHODS FOR APPLICATION SOUND MANAGEMENT - Embodiments of the invention provide systems, methods, apparatuses and program products configured to intelligently manage sound options for applications of a computer system based on display device characteristics. Various embodiments of the invention are particularly well suited for optimizing the sound options of two or more applications running on two or more display screens of the computer system simultaneously. | 08-11-2011 |
20110243123 | Noise Reduction During Voice Over IP Sessions - An approach is provided that, upon receiving a keyboard event, reduces a volume of an audio input channel from a first volume level to a lower volume level. After the volume of the audio input channel is reduced, the approach waits until a system event occurs, with the system event based at least in part on the occurrence of a nondeterministic event. The volume of the audio input channel is then increased from the lower volume level to a higher volume level when the system event occurs | 10-06-2011 |
20110246556 | OPTIMIZING SCHEDULING OF CLIENT APPLICATIONS IN DISKLESS ENVIRONMENTS - Methods and arrangements where clients, in a diskless environment involving a storage area network, communicate to more optimally distribute the amount of disk input/output the individual clients are creating for the shared disk array. | 10-06-2011 |
20110246613 | STREAMING CLIENT SYSTEM BASE IMAGES - Embodiments provide systems, methods, apparatuses and computer program products configured to provide alternative desktop computing solutions. Embodiments generally provide client devices configured to utilize one of a local base image and a base image stored remotely, with a user-specific overlay image remotely storing user specific data. The clients are configured to download and store the base image locally. | 10-06-2011 |
20110246626 | LOCAL AND REMOTE CLIENT COMPUTER SYSTEM BOOTING - Alternative desktop computing solutions provide client devices configured with a local boot image and a connection to a remote storage device having a boot image. The clients are configured to boot either locally or remotely, and furthermore to determine from which image (local or remote) they have booted. | 10-06-2011 |
20110246714 | MIGRATING CLIENT OPERATING SYSTEMS TO REMOTE STORAGE - Embodiments generally provide a utility for migrating an existing user operating system to a remote storage device. A utility for migrating user operating systems according to embodiments automatically detects and fixes inconsistent partition interdependencies resulting from the migration process. | 10-06-2011 |
20110246719 | PROVISIONING A DISK OF A CLIENT FOR LOCAL CACHE - Embodiments provide systems, methods, apparatuses and computer program products configured to provide alternative desktop computing solutions. Embodiments generally provide client devices configured with a local cache storing a common base image, with access to a user overlay on a remote storage device. Embodiments provide methods for provisioning a local disk of a client for use as the local cache with minimal IT administrator input. | 10-06-2011 |
20110246815 | RECOVERING FROM LOST RESOURCES IN A DISTRIBUTED SERVER ENVIRONMENT - An apparatus, method, and computer readable storage medium are disclosed to recover from lost resources in a distributed server environment. A status monitor module receives, at a first computer, periodic status messages from a peer computer. Each periodic status message indicates that the peer computer is providing a service for which the first computer serves as a backup service provider. A failure detection module determines, based on the periodic status messages, that the peer computer has stopped providing the service. An advancement module provides the service, at the first computer, in response to determining that the peer computer has stopped providing the service. | 10-06-2011 |
20110246985 | SYSTEMS AND METHODS FOR MINIMIZING CLIENT COMPUTER SYSTEM SET-UP TIME - Systems, methods, apparatuses and computer program products provide alternative desktop computing solutions and generally provide client devices configured to utilize one of a local common base image and a common base image stored remotely, with a user-specific overlay image remotely storing user specific data. The clients can be configured to store the common base image locally. | 10-06-2011 |
20120084355 | METHOD AND APPARATUS FOR MAINTAINING OPERABILITY WITH A CLOUD COMPUTING ENVIRONMENT - A method and apparatus for maintaining operability with a cloud computing environment. The apparatus includes a storage module and a local environment module. The storage module may store cloud computing data from a cloud computing environment onto a local storage device. The storage module may communicate with the cloud computing environment through a remote connection. The local environment module may operate a local cloud computing environment from the local storage device while the remote connection to the cloud computing environment is unavailable. The local cloud environment may replicate at least a portion of the cloud computing environment and may be operated from the stored cloud computing data. | 04-05-2012 |
20120176587 | DYNAMIC KEYSTONE CORRECTION - An apparatus and method are disclosed for dynamic keystone correction. A measurement module measures distances from a projector to each of at least three projected points of a first projected image projected on a first surface with projection angles between each projected point. The at least three projected points are endpoints for at least two vectors with a target ratio of vector lengths. An adjustment module calculates an actual ratio of actual vector lengths of the at least two vectors. The adjustment module further adjusts a first aspect ratio of first projected image until the actual ratio is equivalent to the target ratio. | 07-12-2012 |
20120176946 | Power Management On Portable Devices - A computing apparatus receives data that corresponds to a wireless network connection established with an access point. The computing apparatus determines whether the access point corresponds to a predetermined access point type, and also determines that a device is to transition to a reduced power state. When the access point corresponds to the predetermined access point type and the determines that the device is to transition to the reduced power state, the computing apparatus transitions the device from a first power state to a reduced power state, and maintains the wireless network connection by using at least a subset of wireless functionality operatively coupled to the device. | 07-12-2012 |
20120311498 | DOCK FOR FAVORITE APPLICATIONS - Systems, methods and products are described that provide a dock for favorite applications. One aspect includes providing a dock point on a display device of an information handling device; responsive to user input associated with said dock point, launching a utility organizing a sub-set of user applications installed on said information handling device in a predetermined arrangement of launch points; providing an animated movement of said launch points in said utility responsive to user input; and responsive to user input selecting a launch point in said utility, launching an application associated with said launch point on the information handling device. Other embodiments are described. | 12-06-2012 |
20130031376 | REMOVABLE STORAGE DEVICE DATA PROTECTION - Devices, methods and products are described that provide removable storage device data protection. One aspect provides a method comprising: ascertaining a protected removable storage device connected to an information handling device, said protected removable storage device having a first partition for storing data according to a first file system type, and a second partition for storing user data according to a second file system type; and responsive to said information handling device recognizing said second file system type, querying for user credentials to decrypt a data encryption key used to encrypt said user data of said second partition. Other embodiments are described. | 01-31-2013 |
20130031484 | FILE TRANSFER APPLICATIONS - Devices, methods and products are described that provide file transfer applications. One aspect provides a method including opening a file transfer application on an information handling device having an internal storage device; providing a source display area indicating a source storage device; providing a destination display area indicating a destination storage device; responsive to movement of one or more file icons a predetermined threshold amount beyond a boundary separating said source display area and said destination display area, change one or more indications to indicate to a user a destination storage device to which one or more files is to be transferred, said changing further comprising modifying screen brightness of the source display area; and responsive to movement of said one or more file icons a predetermined threshold amount beyond said boundary, transferring said one or more files to said destination storage device. Other embodiments are described. | 01-31-2013 |
20130031619 | REMOTE AUTHENTICATION SCREEN LOCKER FOR A MOBILE DEVICE - Devices, methods and products are described that provide for remote authentication of mobile information handling devices. One aspect provides a method comprising configuring an information handling device operating through a mobile operating system to allow communication with least one remote authentication architecture; denying access to a information handling device of the information handling device responsive to a device lock event; and granting access to the display device responsive to an unlock event comprising entry of logon credentials authenticated at the at least one remote authentication architecture. Other embodiments and aspects are also described herein. | 01-31-2013 |
20130031631 | DETECTION OF UNAUTHORIZED DEVICE ACCESS OR MODIFICATIONS - Devices, methods and products are described that provide for recording an unauthorized event, such as rooting, on an information handling device. One aspect provides a method comprising determining whether at least one unauthorized event has occurred on an information handling device; setting at least one unauthorized event flag stored on the information handling device responsive to an unauthorized event; and allowing external access to the at least one unauthorized event flag. Other embodiments and aspects are also described herein. | 01-31-2013 |
20130055377 | PROVIDING SELECTIVE SYSTEM PRIVILEGES ON AN INFORMATION HANDLING DEVICE - Devices, methods and products are described that provide for selective system or root level access for applications on an information handling device. One aspect provides a method comprising determining whether an application has system privileges on an information handling device; and executing privileged code from the application on said information handling device responsive to determining that the application has system privileges through one or more native services operating on said information handling device. Other aspects and embodiments are also described herein. | 02-28-2013 |
20130097171 | AUTOMATIC STORAGE MEDIA CONTENT CATALOGING - Described is a technology by which a user is able to determine the content of a storage device, including when the storage device is non-operational. A user may use a device and/or program to provide a wirelessly-read identifier to query a repository that maintains cataloged data for the user's storage device. The query to the repository returns the cataloged data for that storage device in response, which is output to the user and the user knows the storage device's contents. Alternatively, the user may obtain a list of storage devices from the repository, and select one to view its cataloged data. When the storage device is operational, the persistent repository is updated with any changes to keep the cataloged data synchronized with the stored content. | 04-18-2013 |
20130185492 | Memory Watch - A method can include receiving memory configuration information that specifies a memory configuration; receiving memory usage information for the memory configuration; analyzing the received memory usage information for a period of time; and, responsive to the analyzing, controlling notification circuitry configured to display a graphical user interface that presents information for physically altering a specified memory configuration. Various other apparatuses, systems, methods, etc., are also disclosed. | 07-18-2013 |
20130262846 | METHODS FOR CREATING DEVICE PRELOAD VIA MANUFACTURING AND CLOUD CONTENT - Systems, methods and products directed toward creating device preloads via employing base and additional image content. One aspect includes communicating an aspect of an information handling device, and assimilating additional image content at the information handling device responsive to communication of the aspect of the device, wherein a base image and the additional image content are combined to form a unitary device image. Other embodiments are described herein. | 10-03-2013 |
20130263105 | METHODS FOR FACILITATING UPDATES AT AN INFORMATION HANDLING DEVICE - Systems, methods and products directed toward facilitating updates at an information handling device. One aspect includes providing additional operating system content at an information handling device, partitioning a recovery list comprising at least one element of a base operating system, preparing at least one of the base operating system and the additional operating system content for an operating system update, accessing the recovery list and assimilating content from the recovery list in preparation for the operating system update, and undertaking the operating system update. Other embodiments are described herein | 10-03-2013 |
20130268743 | METHODS FOR CUSTOMIZING AN OPERATING SYSTEM AT AN INFORMATION HANDLING DEVICE - Systems, methods and products directed toward creating device preloads via employing base and additional operating system content. One aspect includes communicating an aspect of an information handling device, and assimilating additional operating system content at the information handling device responsive to communication of the aspect of the device, the additional operating system content deriving from a repository separate from the information handling device, wherein a base operating system and additional operating system content combine to form a unitary device operating system. Other embodiments are described herein. | 10-10-2013 |
20130314330 | TOUCH INPUT SETTINGS MANAGEMENT - In one aspect a method includes: detecting an initial input indicating a user selection disabling touch input for a touch input device of an information handling device; providing a dialog box to a user offering an opportunity to provide an appropriate input confirming the initial input; responsive to expiration of a predetermined time, reverting back to a default mode wherein touch input is enabled; and responsive to receiving a confirming input prior to the expiration of the predetermined time, disabling touch input on the touch input device of the information handling device. Other aspects are described and claimed. | 11-28-2013 |
20140075012 | MANAGING A DATA RATE BASED ON AN AMOUNT OF AVAILABLE DATA FOR A PREDETERMINED TIME PERIOD - An apparatus for managing a data rate based on an amount of available data for a predetermined time period includes a storage device storing machine-readable code and a processor executing the machine-readable code. The machine-readable code includes a determination module determining a target data rate for data communication over a network by a network device. The target data rate is based on an amount of available data for a predetermined time period and an amount of time remaining in the predetermined time period. The machine-readable code includes a data rate module maintaining the data rate at or below the target data rate in response to the determination module determining the target data rate. | 03-13-2014 |
20140101315 | INSERTING USER TARGETED WEB RESOURCES INTO BROWSER NAVIGATION MEMORY - An apparatus for inserting user targeted web resources into browser navigation memory includes a storage device storing machine-readable code and a processor executing the machine-readable code. The machine-readable code includes a determination module determining whether a web resource is a user targeted web resource. The web resource is loaded in a web browser. The machine-readable code includes an insertion module inserting a record of the web resource into navigation memory of the web browser in response to the determination module determining that the web resource is a user targeted web resource. | 04-10-2014 |
20140140500 | DEVICE CALL NOTIFICATION EXTENSIONS - An aspect provides a method, including: detecting an incoming voice call at an information handling device; detecting one or more external notification extension conditions at the information handling device, tracking user-device interactions to build a pattern of user behavior with respect to external conditions; updating the one or more external notification extension conditions based on the pattern of user behavior; and in response to detecting one or more updated external notification extension conditions at the information handling device, extending a notification of the incoming voice call at the information handling device. Other aspects are described and claimed. | 05-22-2014 |
20140267082 | ENLARGING TOUCH SCREEN PORTIONS - For enlarging touch screen portions, a detection module detects a selection object approaching a touch screen. The enlargement module enlarges a target portion of the touch screen in response to detecting the selection object. | 09-18-2014 |
20140281444 | Enabling Alternate Usage Modes in an Operating System - An embodiment provides an information handling device, including: a display panel and a base component connected by a hinge between the display panel and the base component, the hinge supporting a tent physical configuration and a stand physical configuration; one or more processors; an operating system; and instructions accessible to the one or more processors that when executed provide one or more actions comprising: determining via a first input regarding physical orientation of the information handling device that the operating system is to be operated in a first operational mode that is not supportive of the tent physical configuration or the stand physical configuration; operating the operating system in the first operational mode; and selectively altering a function of the first operational mode after receiving an additional input to support one or more of the tent physical configuration and the stand physical configuration. Other aspects are described and claimed. | 09-18-2014 |
20140304753 | CONTEXTUAL QUERIES FOR AUGMENTING VIDEO DISPLAY - An embodiment provides a method, including: deriving text data from an input of audiovisual data; analyzing the text data to form one or more key words; selecting the one or more key words to obtain one or more relevant key words, wherein selecting comprises selection based on text data from user specific data sources; forming the one or more relevant key words into a query for obtaining relevant content; and issuing one or more queries to obtain related content from a network connected device. Other aspects are described and claimed. | 10-09-2014 |
20140372455 | SMART TAGS FOR CONTENT RETRIEVAL - An aspect provides a method, including: storing an object; obtaining data associated with the object; analyzing, using one or more processors, the data associated with the object to identify one or more key words in the data associated with the object to create one or more tags; and storing the one or more tags in a searchable format. Other aspects are described and claimed. | 12-18-2014 |
20140372467 | CONTEXTUAL SMART TAGS FOR CONTENT RETRIEVAL - An aspect provides a method, including: obtaining, at an information handling device, user input search data; accessing contextual data; refining, using one or more processors, the user input search data based on the contextual data; searching, using one or more processors, a repository of stored tag data with refined user input search data to identify one or more stored tags matching one or more stored objects; and returning, using one or more processors, one or more results of the searching, the one or more results indicating one or more stored objects associated with stored tag data. Other aspects are described and claimed. | 12-18-2014 |
20150067424 | PROCESSOR TAP SUPPORT FOR REMOTE SERVICES - An apparatus can include a circuit board; a processor chip mounted to the circuit board that includes a Test Access Port (TAP); a controller mounted to the circuit board that includes a port operatively coupled to the Test Access Port (TAP) of the processor chip; and a network interface operatively coupled to the controller. Various other apparatuses, systems, methods, etc., are also disclosed. | 03-05-2015 |
20150067760 | CONFORMING PASSWORDS TO A PASSWORD POLICY - An apparatus, program product, and method are disclosed for receiving a password entered by a user, the password not conforming to one or more requirements of a password policy, manipulating the password to create one or more compliant passwords conforming to the one or more requirements of the password policy, and presenting a list of the one or more compliant passwords to the user wherein a compliant password is selectable by the user. | 03-05-2015 |
20150074202 | PROCESSING ACTION ITEMS FROM MESSAGES - An aspect provides a method, including: receiving, at an information handling device, a message directed to a human recipient; processing, using one or more processors of the information handling device, the message to identify one or more action items contained in content of the message; and executing one or more additional actions based on the one or more action items identified from the content of the message. Other aspects are described and claimed. | 03-12-2015 |
20150082158 | INDICATING A WORD LENGTH USING AN INPUT DEVICE - A method, apparatus, and program product are disclosed for receiving an input from an input device, determining one or more characteristics of the received input, the one or more characteristics indicating a word length, and presenting a list of one or more words having word lengths determined according to the indicated word length. | 03-19-2015 |
20150087274 | MODIFYING A DEVICE NOTIFICATION - For modifying a device notification, an indication module detects a user awareness indication of a device notification for a device. A notification module modifies the device notification in response to detecting the user awareness indication and concurrently maintains a notification response option. | 03-26-2015 |
20150088515 | PRIMARY SPEAKER IDENTIFICATION FROM AUDIO AND VIDEO DATA - An aspect provides a method, including: receiving image data from a visual sensor of an information handling device; receiving audio data from one or more microphones of the information handling device; identifying, using one or more processors, human speech in the audio data; identifying, using the one or more processors, a pattern of visual features in the image data associated with speaking; matching, using the one or more processors, the human speech in the audio data with the pattern of visual features in the image data associated with speaking; selecting, using the one or more processors, a primary speaker from among matched human speech; assigning control to the primary speaker; and performing one or more actions based on audio input of the primary speaker. Other aspects are described and claimed. | 03-26-2015 |