Patent classifications
G06F9/44505
Method and control unit for configuring an addon interface
A method and control unit for configuring an add-on interface of a vehicle are presented. The vehicle comprises at least one vehicle internal system, at least one add-on system, the add-on system being arranged in the vehicle after the vehicle is produced by a manufacturer, and at least one internal communication unit arranged for communication with at least one vehicle external communication unit. The method comprises: receiving, using the at least one internal communication unit, configuration information related to at least one sensor of the vehicle from the at least one vehicle external communication unit; and configuring, based on the configuration information, how at least one sensor signal S.sub.sensor from the at least one sensor is to be processed by an add-on interface, the add-on interface being arranged in the vehicle as an interface between the at least one vehicle internal system and the at least one add-on system.
Unified operating system for distributed computing
In some embodiments, a real-time event is detected and context is determined based on the real-time event. An application model is fetched based on the context and meta-data associated with the real-time event, the application model referencing a micro-function and including pre-condition and post-condition descriptors. A graph is constructed based on the micro-function. The micro-function is transformed into micro-capabilities by determining a computing resource for execution of a micro-capability by matching pre-conditions and post-conditions of the micro-capability, and enabling execution and configuration of the micro-capability on the computing resource by providing access in a target environment to an API capable of calling the micro-capability to configure and execute the micro-capability. A request is received from the target environment to execute and configure the micro-capability on the computing resource. The micro-capability is executed and configured on the computing resource, and an output of the micro-capability is provided to the target environment.
Managing performance optimization of applications in an information handling system (IHS)
Embodiments of systems and methods for managing performance optimization of applications executed by an Information Handling System (IHS) are described. In an illustrative, non-limiting embodiment, a method may include: identifying, by an IHS, a first application; assigning a first score to the first application based upon: (i) a user's presence state, (ii) a foreground or background application state, (iii) a power adaptor state, and (iv) a hardware utilization state, detected during execution of the first application; identifying, by the IHS, a second application; assigning a second score to the second application based upon: (i) another user's presence state, (ii) another foreground or background application state, (iii) another power adaptor state, and (iv) another hardware utilization state, detected during execution of the second application; and prioritizing performance optimization of the first application over the second application in response to the first score being greater than the second score.
Method and apparatus for a power-efficient framework to maintain data synchronization of a mobile personal computer to simulate a connected scenario
An apparatus and method for a power-efficient framework to maintain data synchronization of a mobile personal computer (MPC) are described. In one embodiment, the method includes the detection of a data synchronization wakeup event while the MPC is operating according to a sleep state. Subsequent to wakeup event, at least one system resource is disabled to provide a minimum number of system resources required to re-establish a network connection. In one embodiment, user data from a network server is synchronized on the MPC without user intervention; the mobile platform system resumes operation according to the sleep state. In one embodiment, a wakeup alarm is programmed according to a user history profile regarding received e-mails. In a further embodiment, data synchronizing involves disabling a display, and throttling the system processor to operate at a reduced frequency. Other embodiments are described and claimed.
Model driven state machine transitions to configure an installation of a software program
Disclosed are embodiments of a installed software program that receive a model from a product management system. The model is trained to select one of a plurality of predefined states based on operational parameter values of the installation of the software program. Each of the plurality of predefined states define configuration values of the installation of the software program. The defined configuration values indicate, in some embodiments, updates to operational parameter values of the installation of the software program.
Edge computing system
A method of traffic reduction in a mesh computing system (400), the mesh computing system (400) comprising hosts located on edge nodes of the mesh computing system (400) and a central registry located outside the mesh computing system (400), the central registry holding the images. The method comprises, at a first host located at a first edge node, receiving (920) a request from a client for an image, sending (930) a request for the image to at least one other host of the mesh computing system (400). When the first host receives (940) notification that at least a second host holds the image, the first host downloads (960) the image from the second host to the first host. The first host creates (970) a container from the image. A host at a node (636; 700) and a mesh computing system (400) are also provided.
Systems and methods for record linkage
A record linking platform having a computer system with a processor, multiple databases each having records, such as private health information. Each of the multiple databases are not in direct communication with one another. A control center is in communication with the different entities, the control center configured to: generate a site configuration file, a key configuration file, and a broker configuration file. A keymaster configured to: receive the key configuration file, generate a hash key, and transmit the hash key to the databases. The databases configured to: receive the site configuration file and the hash key; process the records to generate evaluation records data that conform to a data model specified in the site configuration file; and encrypt the evaluation records using the hash key. An honest broker configured to: receive the broker configuration file and the encrypted evaluation records; and link the encrypted evaluation records without decrypting.
Configuring an API to provide customized access constraints
A computing system includes a processing device and a memory device configured to store an Application Programming Interface (API) and computer software. The computer software has a plurality of software components configured to enable the processing device to utilize internal data for performing a plurality of functions. The API is configured to define interactions between the software components and is further configured to define access constraints with respect to the computing system. The access constraints are configured to restrict access by an end user associated with the computing system with respect to the internal data and software components. Also, the computer software is configured to adjust the access constraints of the API.
Autonomously re-initializing applications based on detecting periodic changes in device state
Arrangements for autonomously re-initializing one or more applications after a detected change in device state are provided. In some examples, a configuration file may be received from one or more computing devices, such as a server, hosting one or more client-facing applications. In some examples, the configuration file may be modified. For instance, one or more properties or attributes may be modified or added to identify applications that have an always running status and identifying a custom class having automatic start enabled. A modified configuration file may be generated and transmitted to the one or more devices. Accordingly, upon detecting a change of device state (e.g., reboot, refresh, or the like) the modified configuration file may reboot and cause the identified applications to automatically or autonomously re-load, re-initialize and recompile prior to receiving a first request for access from a customer or user device.
Controlling operational state of an electronic apparatus based on user proximity and user input
An electronic apparatus includes processing unit configured to execute system processing, an object detection unit configured to detect an object present within a predetermined detection range, and an operation control unit configured to control the system processing according to a detection state detected by the object detection unit to make a transition to one of a first operating state and a second operating state in which at least part of the system processing is more limited than that in the first operating state. When a transition from the first operating state to the second operating state is made regardless of the detection state detected by the object detection unit, where the operation control unit prohibits the transition to the first operating state according to the detection state detected by the object detection unit.