G06F9/04

Controlling applications by an application control system in a computer device
11537452 · 2022-12-27 · ·

A computing device can intercept a request to launch a requested application. The request can be intercepted by a calling process executed by the computing device. The request can include information identifying the requested application. The computing device can determine that a user interaction is required before launching the requested application by consulting a set of application policies based on the information identifying the requested application. The computing device can establish that the calling process is associated with a controlling terminal provided by an operating system in response to determining that the user interaction is required. A process session group containing processes launched within a user session can be selectively associated with the controlling terminal by the operating system. The computing device can perform the user interaction using the controlling terminal in response to establishing that the calling process is associated with the controlling terminal.

MANAGING DEVICE GROUP CONFIGURATIONS ACROSS WORKSPACES BASED ON CONTEXT

Device group configurations can be managed across workspaces based on context. A service can be employed on each client computing device that a user may use in his or her workspaces. The service can be configured to determine when a profile applies to a workspace and can automatically apply a device group configuration to the workspace. The service can also monitor for context changes while a device group configuration is applied and can adjust the device group configuration based on the context changes.

Managing device group configurations across workspaces based on context

Device group configurations can be managed across workspaces based on context. A service can be employed on each client computing device that a user may use in his or her workspaces. The service can be configured to determine when a profile applies to a workspace and can automatically apply a device group configuration to the workspace. The service can also monitor for context changes while a device group configuration is applied and can adjust the device group configuration based on the context changes.

Technologies for secure and efficient native code invocation for firmware services

Technologies for secure native code invocation include a computing device having an operating system and a firmware environment. The operating system executes a firmware method in an operating system context using a virtual machine. In response to invoking the firmware method, the operating system invokes a callback to a bridge driver in the operating system context. In response to the callback, the bridge driver invokes a firmware runtime service in the operating system context. The firmware environment executes a native code handler in the operating system context in response to invoking the firmware runtime service. The native code handler may be executed in a de-privileged container. The firmware method may process results data stored in a firmware mailbox by the native code handler, which may include accessing a hardware resource using a firmware operation region.

BINDERS FOR MILLING TOOLS USING WURTZITE BORON NITRIDE (W-BN) SUPERHARD MATERIAL

Systems and methods include a computer-implemented method for manufacturing a binder for spraying onto tools. A binder is manufactured for binding compacts onto a tool substrate. The binder is designed to provide a coating strength on the tool substrate. The binder includes: a metal selected from iron (Fe), cobalt (Co), and nickel (Ni); an alloy including the metal selected from Fe, Co, and Ni; or a refractory alloy selected from tungsten, tantalum (Ta), molybdenum (Mo), and niobium (Nb). An ultra-high-pressure, high-temperature operation is performed on pure wurtzite boron nitride (w-BN) powder to synthesize w-BN and cubic boron nitride (c-BN) compact. A binder-compact mixture is produced by turbulently mixing the binder with the compact in a mixer within a vacuum. The binder-compact mixture is thermally sprayed onto a tool substrate to coat the tool.

BINDERS FOR MILLING TOOLS USING WURTZITE BORON NITRIDE (W-BN) SUPERHARD MATERIAL

Systems and methods include a computer-implemented method for manufacturing a binder for spraying onto tools. A binder is manufactured for binding compacts onto a tool substrate. The binder is designed to provide a coating strength on the tool substrate. The binder includes: a metal selected from iron (Fe), cobalt (Co), and nickel (Ni); an alloy including the metal selected from Fe, Co, and Ni; or a refractory alloy selected from tungsten, tantalum (Ta), molybdenum (Mo), and niobium (Nb). An ultra-high-pressure, high-temperature operation is performed on pure wurtzite boron nitride (w-BN) powder to synthesize w-BN and cubic boron nitride (c-BN) compact. A binder-compact mixture is produced by turbulently mixing the binder with the compact in a mixer within a vacuum. The binder-compact mixture is thermally sprayed onto a tool substrate to coat the tool.

Method and system for providing security features in a smart phone

The present disclosure addresses the technical problems faced by a basic user or an emergent user while using a smart phone. For the basic users it is difficult to identify the threat on the smartphone. A system and method for enhancing the security features of a smartphone has been provided. Initially, the system classify the user of the smartphone as the basic user or non-basic user using a series of questions. The proposed method is only applicable to the basic user archetype. The present disclosure further describes the method for simplification of an information architecture and multimodal communication of the threats on the smartphone for a basic user archetype or emergent users. Specifically, this disclosure bridges the information communication gaps between the basic archetype user and the information system by surfacing the risks and optimizing their information hierarchy.

Method for controlling interrupt in inverter
10275374 · 2019-04-30 · ·

Disclosed herein is a method for controlling interrupts in an inverter. If a control unit checks that an interrupt is issued in main software while an inverter is operating, the control unit analyzes the type of the interrupt. The interrupt is converted into an interrupt ID sorted by functionality. If the interrupt ID is a previously registered interrupt ID, an interrupt function corresponding to the registered interrupt ID is executed.

Portable lighting device

A portable lighting device comprises at least one light source arranged to emit light to illuminate an environment of the portable lighting device; at least one sensor arranged to provide a sensor output signal; and a control module arranged to receive the sensor output signal from the at least one sensor. The control module is configured to: detect user manipulation of the portable lighting device; control the light emitted based on the detected user manipulation; detect translational movement of the portable lighting device; and control the light emitted from the at least one light source based on the translational movement.

PORTABLE LIGHTING DEVICE

A portable lighting device (100) comprising: at least one light source (106) arranged to emit light to illuminate an environment of the portable lighting device (100); at least one sensor (108), each of the at least one sensor (108) arranged to provide a sensor output signal; and a control module (110) arranged to receive the sensor output signal from each of the at least one sensor (108), wherein the control module (110) is configured to: detect user manipulation of the portable lighting device (100) relative to a support surface (200) on which the portable lighting device (100) is supported based on one or more of the at least one sensor output signal; and control the light emitted from the at least one light source (106) based on the detected user manipulation.