-
公开(公告)号:US10168776B2
公开(公告)日:2019-01-01
申请号:US15244672
申请日:2016-08-23
摘要: Embodiments relate to use of proximity sensors to control a digital interface. More specifically, proximity detection and analysis of the sensors, and translating the proximity into one or more commands is utilized to control the interface. In various embodiments, a system is provided with a set of sensors operatively coupled to a secondary surface. The sensors are in communication with a hub positioned proximal to the sensors. The hub is configured to be in communication with a remote interface. Similarly, the remote interface is configured operatively coupled to a remote physical device (e.g. digital interface). As changes in the sensor position data are measured, the remote interface device communicates an action based on a set of rules. The action is communicated from the interface to the remote physical device and functions to physically transform a functional aspect of the device.
-
公开(公告)号:US10168692B2
公开(公告)日:2019-01-01
申请号:US14872278
申请日:2015-10-01
发明人: Mark T. Lam , Ooi T. Ong
IPC分类号: G05B15/02 , G05B19/418
摘要: The embodiments described herein relate to methods, systems, and computer program products for improving the product quality of product lots produced on a production line. A quality value for each product lot is determined, and a quality benchmark is established. Each product lot is classified based on the quality benchmark. Product lots that have a quality value meeting the quality benchmark are classified as quality lots, and product lots having a quality value failing to meet the quality benchmark are classified as failing lots. Tools used in the production of the product lots are identified, which includes identifying a set of quality tools and a set of failing tools. Routing of additional product lots is directed by shifting production at least substantially to the set of quality tools.
-
公开(公告)号:US10146594B2
公开(公告)日:2018-12-04
申请号:US14976430
申请日:2015-12-21
发明人: Chih-Wen Chao , Cheng-Ta Lee , Wei-Shiau Suen , Ming Hsun Wu , Lun Pin Yuan
摘要: Embodiment pertain to facilitation of live migration of a virtual machine in a network system. The network system includes a first host, a second host, a first appliance for providing service to the first host, a second appliance for providing service to the second host, and a third appliance. At least one virtual machine is disposed on the first host and has an ongoing first network flow. The first appliance has generated state information about the first network flow. During the migration of the at least one virtual machine to the second host, the third appliance obtains a copy of the state information about the first network flow; and the third appliance takes over from the first appliance to serve the first network flow during the migration of the at least one virtual machine, until the first network flow is terminated.
-
公开(公告)号:US10140160B2
公开(公告)日:2018-11-27
申请号:US15081452
申请日:2016-03-25
摘要: Embodiments are provided for managing performance of a computer system. Both implicit and explicit recommendations for processing of tasks are provided. System performance is tracked and evaluation based upon the actions associated with the task. Future recommendations of the same or other tasks are provided based upon implicit feedback pertaining to system performance, and explicit feedback solicited from a system administrator.
-
公开(公告)号:US10108404B2
公开(公告)日:2018-10-23
申请号:US15332666
申请日:2016-10-24
摘要: Embodiments relate to using a local entry point with an indirect call function. More specifically, an indirect call function configuration comprises a first application module having a target function of the indirect function call, a second application module with a symbolic reference to the target function of the indirect function call, and a third application module to originate an indirect function call. A compiler is provided to determine and indicate in the program code that the function pointer value resulting from a non-call reference of a function symbol is solely used to perform indirect calls in the same module, e.g. local-use-only. A linker or loader can read the indication the compiler made in the program code. The linker or loader use the local entry point associated with the target function if the target function is defined in the same module as the reference and is local-use-only.
-
公开(公告)号:US10102594B2
公开(公告)日:2018-10-16
申请号:US13737453
申请日:2013-01-09
摘要: Mandatory and optional consumption points are identified to support management of power allocation. A mandatory consumption point is a consumption point required to function at a given time and an optional consumption point is a discretionary consumption point. The energy required for mandatory consumption points to complete their designated functions is calculated. An energy quota is designated for power allocation to the optional consumption points in response to the mandatory consumption point calculation, and the identification of available energy. Energy required for optional consumption points to complete their designated functions is calculated. The optional consumption points are dynamically prioritized and power is allocated to the optional consumption points responsive to this prioritization and with respect to the designated energy quota.
-
公开(公告)号:US10102074B2
公开(公告)日:2018-10-16
申请号:US14955766
申请日:2015-12-01
摘要: The embodiments relate to dynamically allocating lanes of a computer bus. A computer system is configured with a plurality of connectors in communication with a module, with each connector configured to receive a respective adapter. The module detects a presence of each primary and backup adapter present, and controls an initial allocation of lanes to each detected primary adapter for maximizing adapter functionality. After the initial allocation and in response to detecting a failure of at least one primary adapter, the module dynamically switches lanes from the failed adapter to at least one of the one or more remaining primary adapters and the backup adapter.
-
公开(公告)号:US10002062B2
公开(公告)日:2018-06-19
申请号:US14989890
申请日:2016-01-07
CPC分类号: G06F11/261 , G06F3/0604 , G06F3/0653 , G06F3/0664 , G06F3/0674 , G06F11/2221 , G06F11/3419 , G06F11/3485
摘要: Embodiments relate to diagnostic evaluation of hardware components of a computer machine. A conventional storage device is replaced with a modified storage device. Read and write operations are received by the modified storage device. Issuance of a response to the read and write operations is limited to an acknowledgement receipt, which is employed to evaluate performance and/or bandwidth of the machines with respect to hardware for data storage.
-
公开(公告)号:US09978706B2
公开(公告)日:2018-05-22
申请号:US15069435
申请日:2016-03-14
发明人: Eric V. Kline , Arvind K. Sinha
CPC分类号: H01L24/17 , B23K1/0016 , B23K1/018 , B23K2101/42 , H01L24/98 , H01L2224/16227 , H01L2224/1713 , H05K1/11 , H05K3/225 , H05K13/0486 , H05K2201/0308 , H05K2203/0195 , H05K2203/081 , H05K2203/1115 , H05K2203/176
摘要: Embodiments relate to a method and apparatus for rework of a BGA package. Memory shape material is placed adjacent to a plurality of solder joints of the package. Stimulation is applied to the material, with the stimulation causing the material to change from a non-stimulated shape to a stimulated shape. This stimulation causes an expansion of the material. As the material expands, it exerts a tensile force on the BGA package and an adjacently positioned carrier, causing a separation of the two components, while mitigating collateral heat of adjacently positioned components.
-
公开(公告)号:US09928375B2
公开(公告)日:2018-03-27
申请号:US13158893
申请日:2011-06-13
申请人: Hongxia Jin , Qihua Wang
发明人: Hongxia Jin , Qihua Wang
CPC分类号: G06F21/6218 , G06F17/30165
摘要: Embodiments of the invention relate to a method, system, and computer program product to dynamically mitigate data leakage in a file sharing environment. Mandatory access control policies are provided to address and maintain restrictions on file sharing both with respect to security rules of an organization and restrictions pertaining to discretionary sharing decisions. In addition, suggestions for potential recipients for file sharing are supported, as well as examination of abnormal recipients in response to the discretionary sharing decisions.
-
-
-
-
-
-
-
-
-