摘要:
Technologies are generally described herein for handling interrupts within a multi-core processor. A core specific interrupt mask (“CIM”) can be adapted to influence the assignment of interrupts to particular processor cores in the multi-core processor. Available processor cores can be identified by evaluating the CIM. An interrupt with an interrupt service routine (“ISR”) that is received by the multi-core processor can be assigned to one or more of the available processor cores identified by the CIM.
摘要:
Methods, systems, and computer-readable media for ensuring data integrity during data synchronization are provided. According to one method, a number of originating requests from a plurality of user endpoints are monitored across a network. A determination is made whether the number of originating requests is below a first threshold. Responsive to determining that the number of originating requests is below the first threshold, probe messages are transmitted to at least a portion of the plurality of user endpoints across the network. A number of the user endpoints that return probe replies in response to the probe messages are monitored. A determination is made whether the number of the user endpoints is below a second threshold. Responsive to determining that the number of the user endpoints is below the second threshold, a report is made to a database that the network is unavailable, thereby causing the database to stop updating time stamps.
摘要:
Methods and systems are provided for exchanging information between companies in a partnership. One method embodiment includes operatively associating a first company with a transaction directory through a directory management portal. The transaction directory is configured to permit establishment of at least one connection to a translation engine for permitting at least one transaction to occur through the connection. The method also includes connecting at least a second company to the translation engine to permit the transaction to occur between at least the first and second companies. The transaction includes an exchange of information between at least the first and second companies.
摘要:
An audio signal is received that might include keyboard noise and speech. The audio signal is digitized and transformed from a time domain to a frequency domain. The transformed audio is analyzed to determine whether there is likelihood that keystroke noise is present. If it is determined there is high likelihood that the audio signal contains keystroke noise, a determination is made as to whether a keyboard event occurred around the time of the likely keystroke noise. If it is determined that a keyboard event occurred around the time of the likely keystroke noise, a determination is made as to whether speech is present in the audio signal around the time of the likely keystroke noise. If no speech is present, the keystroke noise is suppressed in the audio signal. If speech is detected in the audio signal or if the keystroke noise abates, the suppression gain is removed from the audio signal.
摘要:
A method and an apparatus for providing audio information to a user. The method and apparatus provide information in multiple modes that represent various pieces of information and/or alternatives. In various embodiments, the form of a prompt played is dependent on what previously played prompts were given to the user during that session.
摘要:
Concepts and technologies described herein provide for securing a connector shell to a circuit board using a separate connector hat with elongated mounting posts. According to one aspect of the disclosure provided herein, a connector hat includes a one-piece body with a top surface and a pair of mounting posts. The mounting posts extend downwards from opposing side edges of the top surface. The posts are of sufficient length to extend beyond a bottom surface of a connector shell to which the connector hat is configured to attach, and through a bottom surface of an associated circuit board. The two-piece connector assembly design utilizing the connector hat with mounting posts allows the mounting posts to be manufactured at any desirable length to facilitate installation of the connector assembly to a circuit board.
摘要:
Technologies are described herein for managing database snapshots. One user interface is provided for managing the automated creation and deletion of database snapshots. Parameters are received through the user interface that define how the database snapshots should be created and deleted. Once the parameters are defined, a timer job is executed that causes a DBMS to create and delete the database snapshots according to the specified parameters. A user interface is also provided for manually managing the creation, deletion, and restoration of database snapshots. A request may be received through this user interface to recover data from a database snapshot. In response to such a request, another user interface is provided for specifying the data that should be recovered. Once the data to be recovered has been specified, the desired data is recovered from the database snapshot.
摘要:
A location and mapping application takes device information and produces location information for display on a communication-enabled computing device (e.g., a personal digital assistant or wireless phone). A current location of a wireless device may be provided with an announcement of an incoming call or message and may be in the form of a street address or a map. Location information for a wired (or fixed-location) device may be provided in the form of a map. Location information for nearby wireless and wired devices may also be provided. Location information may be updated for wireless devices that are moving.
摘要:
Methods and systems for providing information regarding monitored computer systems to wireless devices are provided. Information may be requested by a wireless device and displayed on the wireless device in a browser. The web server application may detect the wireless device, and may also then specially format the response, including the requested information formatted for optimized delivery and/or display on a wireless device. The web server application may also send a message to a wireless device about events associated with the monitored computer systems.
摘要:
A non-volatile memory device stores configuration variables for use by a computer firmware. The variable is initially stored in the memory device in a manner that minimizes the number of bits used to store the variable that are in the updated state. When a request is received to change the initial value of the variable to an updated value, the value is changed in place by changing only the bits used to store the variable from an erased state to an updated state, by only setting the invert flag, by setting the invert flag and by changing one or more of the bits of the variable from the erased state to the updated state, or by storing the updated value of the variable in a new location in the memory device.