Patent classifications
G06F9/223
Method, system for editing a command set and device applying the method
A device, and a method and a system for editing command sets applied to the device are provided. The system includes an editor installed in a computer device for initiating an editing interface used to edit one or more command sets applied to the device and a writer used to convert the command sets into profiles with a format specified to the device. The command sets are used to form the profiles configured to be written to the device via the writer. The command sets including a set of scripts of commands and input codes specified to the device can be edited through the editor. The device is a computer mouse with multiple keys. The keys can be used to switch the profiles stored in the device, and the command set of the profile being activated is applied to the device for operating the device.
REAL-TIME FINE-GRAINED CONCURRENT PRODUCTION OPERATION WORKGROUP SYSTEMS
A method of utilizing 3-level wHCSs created in the first generation to accommodate 3-level conveyer-integrated workgroups in a production facility to make these workgroups work collaboratively as one Task crew-entity is disclosed. By installing the 3-level 3-link-typed TeamProcessors in a 3-level wHCS with Task feedback-control operation-oriented OSs, Task operation programs and Task-operation and management libraries, a 3-level Task operation workgroup-computing Entity-oriented system, can be established to support the Task crew-entity as a whole and provide fine-grained-proactive closed-loop-problem-solving (PS) operations for external users, collaborators and supervisors in a real-time concurrent and secure manner, abiding by the self-improving solution-domain PS-principle.
Systems and methods for distributed business processmanagement
Systems and methods for distributed business process management are disclosed. In one embodiment, in an information processing apparatus comprising at least one computer processor, a method for configuration-driven distributed orchestration using different software components to execute a complex business process may include: (1) receiving a request for a runtime flow from a flow management adapter; (2) reading a flow configuration from the request; (3) creating an instance of the runtime flow; (4) initiating a service call to each component in the runtime flow; (5) creating a runtime instance in a database along with a state of each dependency in the runtime flow; and in response to external dependencies being met: (6) building and sending message to the components using a message builder; (7) initiating flow actions via an event-driven scheduler; and (8) making a service call to at least one of the components using the message builders.
Gateway Fabric Ports
A gateway for interfacing a host with a subsystem for acting as a work accelerator to the host. The gateway enables the transfer of batches of data to the subsystem at precompiled data exchange synchronisation points. The gateway acts to route data between accelerators which are connected in a scaled system of multiple gateways and accelerators using a global address space set up at compile time of an application to run on the computer system.
METHOD FOR EXECUTING A MACHINE CODE BY MEANS OF A MICROPROCESSOR
A method for executing a machine code using a microprocessor includes, after an operation of decoding a current loaded instruction, constructing a mask from the signals generated by an instruction decoder in response to decoding of the current loaded instruction by the decoder. The constructed mask varies as a function of the current loaded instruction. Subsequently, before an operation of decoding a next loaded instruction, the next loaded instruction is unmasked using the constructed mask.
PROCESSOR WITH AN ELLIPTIC CURVE CRYPTOGRAPHIC ALGORITHM AND A DATA PROCESSING METHOD THEREOF
A processor with an elliptic curve cryptographic algorithm and a data processing method thereof are shown. The processor has a first register, storing a private key pointer pointing to a private key. In response to a single elliptic curve cryptographic instruction of an instruction set architecture, the processor reads a ciphertext input from a first storage space within a system memory, performing a decryption procedure using the elliptic curve cryptographic algorithm on the ciphertext input based on the private key obtained by referring to the first register to decrypt the ciphertext input and generate a plaintext output, and programming the plaintext output into a second storage space within the system memory.
Gateway fabric ports
A gateway for interfacing a host with a subsystem for acting as a work accelerator to the host. The gateway enables the transfer of batches of data to the subsystem at precompiled data exchange synchronisation points. The gateway acts to route data between accelerators which are connected in a scaled system of multiple gateways and accelerators using a global address space set up at compile time of an application to run on the computer system.
MULTI-MACHINE AND PERFORMANCE BASED CONTINUOUS PRODUCTION PLANNING GLOBAL OPTIMIZATION SCHEDULING METHOD AND DEVICE
A multi-machine and performance based continuous production planning global optimization scheduling method and device are disclosed. The device for multi-machine and performance-based continuous production planning global optimization scheduling may include a data pre-processing module configured to generate a multi-machine list on performable multiple machines through pre-processing scheduling target data, a scheduling module configured to generate a scheduling result by setting a processing time for a machine related to a single machine list, wherein the single machine list is selected from the multi-machine list, and a data post-processing module configured to store the scheduling result in a database.
Apparatus, Device, Method, and Computer Program for Monitoring a Processing Device from a Trusted Domain
Examples of the present disclosure relate to an apparatus, device, method, and computer program for monitoring a processing device from a trusted domain. The apparatus comprises interface circuitry, machine-readable instructions, and processing circuitry to execute the machine-readable instructions to receive a request for monitoring the processing device from the trusted domain; authenticate the request; obtain information on a failure report related to a component of the processing device, with a possible failure having occurred at runtime of the processing device; and provide the information on the failure report in the trusted domain.
Device and method for a frequency modulated signal
A method executes instructions, each corresponding to switching a signal, a delay, and a condition selected among first, second, or third conditions. Each execution includes performing, after the delay, switching the signal if the condition is the first condition, if the condition is the second condition and a flag is in an active state, or if the condition is the third condition and the flag is in an inactive state, or not switching the signal if the condition is the second condition and the flag is in the inactive state, or if the condition is the third condition and the flag is in the active state. A first instruction represents a first switching of a first signal, a first delay, and the second condition, and is immediately followed by a second instruction representing the first switching of the first signal, a second delay, and the third condition.