G06F13/102

Systems and methods for managing diabetes care data

A host-client data sharing system manages diabetes care data. A host database, preferably web or interne based, is implemented for storing diabetes care data relating to multiple diabetics. A client or local database stores the diabetes care data relating to multiple diabetics on a personal appliance such as a PC, or a portable or handheld microprocessor-based computing device. The host database uses multiple servers for handling client interactions with the system.

COMPUTER IMPLEMENTED METHOD AND SYSTEM FOR PROXY VOTING
20170346918 · 2017-11-30 ·

A computer implemented method and system for proxy voting are disclosed. The method includes accessing a proxy admin system for casting a plurality of votes, clicking on a delegate button in the proxy admin system for selecting at least one fund, searching for a plurality of vote meetings of the fund manager on a vote card list screen, clicking on a quick vote for selecting a plurality of appropriate policies; a plurality of meetings and a plurality of comments and clicking on a vote button for successful voting in the proxy admin system.

USB communications tunneling through USB printer device class
09830165 · 2017-11-28 · ·

A USB tunnel apparatus is disclosed herein. In various aspects, the USB tunnel apparatus may include a USB printer class interface operatively received by an application specific USB peripheral. The USB printer class interface is configured to identify the application specific USB peripheral as a printer class device to the host during Plug and Play enumeration, and the USB printer class interface is configured to generate a response during Plug and Play enumeration that alters the process of PnP enumeration to create a partially instantiated printer driver stack on the host when the application specific USB peripheral is in USB communication with the host, in various aspects. Related methods and compositions of matter are also disclosed. This Abstract is presented to meet requirements of 37 C.F.R. §1.72(b) only. This Abstract is not intended to identify key elements of the apparatus, methods, and compositions of matter disclosed herein or to delineate the scope thereof.

Systems and/or methods for enabling storage tier selection and usage at a granular level

Certain example embodiments relate to memory management techniques that enable users to “pin” elements to particular storage tiers (e.g., RAM, SSD, HDD, tape, or the like). Once pinned, elements are not moved from tier-to-tier during application execution. A memory manager, working with at least one processor, receives requests to store and retrieve data during application execution. Each request is handled using a non-transitory computer readable storage medium (rather than a transitory computer readable storage medium), if the associated data is part of a data cache that is pinned to the non-transitory computer readable storage medium, or if the associated data itself is pinned to the non-transitory computer readable storage medium. If neither condition applies, the memory manager determines which one of the non-transitory and the transitory computer readable storage mediums should be used in handling the respective received request, and handles the request accordingly.

ESTABLISHING A TRUSTED CONNECTION WITH A PERIPHERAL DEVICE

The present disclosure relates to systems, methods, and computer-readable media for establishing and managing a trusted connection between a peripheral device and a client device. For example, systems discussed herein include determining whether a peripheral device poses a security risk based on a combination of peripheral device data and a client profile including environmental data and historical usage data for the client device. Systems described herein may further grant a level of trust based on the determine security risk. The systems disclosed herein facilitate implementation of intelligent policies that are user friendly without exposing the client device to a variety of security threats.

Home control system
09832033 · 2017-11-28 · ·

A home control system has at least one peripheral device, a controlling device, and a mobile device. The mobile device determines whether the controlling device is connectable. When the mobile device determines that the controlling device is connectable, the mobile device is connected to the at least one peripheral device via the controlling device and transmits a control signal to the at least one peripheral device. When the mobile device determines that the controlling device is unconnectable, the mobile device is directly connected to the at least one peripheral device and transmits the control signal to the at least one peripheral device. Therefore, when the controlling device is broken, a user may still operate the mobile device to control the at least one peripheral device.

Automatic threshold adjustment for USB power delivery to work with cables out of specification

An apparatus includes a bi-phase mark coded (BMC) input port configured to receive BMC signals from a universal serial bus (USB) cable. The apparatus further includes a threshold adjustment circuit configured to generate a threshold, and a comparator configured to compare an input BMC signal from the BMC input port and the threshold and based on the comparison, generate an adjusted input BMC signal. The threshold adjustment circuit is further configured to adjust the threshold based upon the input BMC signal.

CREATING A COMPUTER MACRO
20230169018 · 2023-06-01 ·

A method for creating a computer macro, the computer macro being executed on a computer, the computer including a processor, a display screen, a peripheral device, and a memory accessible by the processor, peripheral device, the method comprising: detecting, by a computer driver being at least partially resident in the memory, a computer program being at least partially resident in the memory to be executed in the computer; assigning, by the computer driver, at least one computer macro relating to the detected computer program to a key and/or button on the peripheral device; assigning, by the computer driver, a computer macro symbol relating to the assigned computer macro; storing, in the memory, the computer macro, the key and/or button on the peripheral device assigned to the computer macro and/or the assigned computer macro symbol; displaying, on the display screen via the computer driver, an on-screen-display, OSD, wherein the OSD is configured to display the assigned stored computer macro symbol and a reference relating to the stored key and/or button on the peripheral device to which the assigned stored computer macro has been assigned; and executing, by the processor, the stored computer macro assigned to the stored computer macro in the computer program when the stored key and/or button on the peripheral device is actuated.

ELECTRONIC CONTROL APPARATUS
20230168637 · 2023-06-01 · ·

An electronic control apparatus according to the disclosure includes: a controller, controlling the peripheral machines at a time of a normal operation mode, and performing diagnosis on whether a failure occurs with respect to at least one of the peripheral machines at a time of a monitoring mode.

DYNAMIC SERVER REBALANCING
20230169017 · 2023-06-01 ·

Enhanced apparatuses, systems, and techniques are presented for coupling remote peripheral devices located at a host device, as local peripheral devices of a client device. A method includes receiving an indication of a peripheral device, located at a first computing device, that is available for data processing, and receiving a request from a second computing device to access the peripheral device. Based on the request, the method may include directing the second computing device to emulate the peripheral device as a local device installed into the second computing device, and routing data traffic from the second computing device to the first computing device for processing by the peripheral device.