摘要:
Systems and methods may provide for implementing a dynamic payment service. In one example, the method may generate a request communication including purchase detail information relating to an item to request credit from a vendor to conduct a transaction relating to the item, determine a scope of credit to be issued to conduct the transaction relating to the item based on the purchase detail information, and generate a payment communication including the transaction information to complete the transaction relating to the item.
摘要:
A mechanism is described for facilitating dynamic and trusted cloud-based extension upgrades for computing systems according to one embodiment of the invention. A method of embodiments of the invention includes detecting a computing device needing an upgrade. The upgrade may relate to a hardware component at the computing device needing an upgrade element for the upgrade. The method may further include calling a first cloud server to provide the upgrade over a network. The first cloud server may have first resources including the upgrade element. The method may further include facilitating the hardware component to access the upgrade element at the first cloud server without having to upgrade or replace the hardware component.
摘要:
Systems and methods of managing keystroke data in embedded keyboard environments may involve transferring a mode request from a management controller to an embedded controller of a keyboard via a dedicated communication channel. Keystroke activity can be detected at the keyboard, and keystroke data may be transferred from the embedded controller to the management controller via the dedicated communication channel in response to the keystroke activity and the mode request. In addition, the management controller may be used to encrypt the keystroke data, wherein the encrypted keystroke data can be transmitted from the management controller to an off-platform service via a network controller.
摘要:
Systems and methods may provide for implementing a dynamic payment service. In one example, the method may generate a request communication including purchase detail information relating to an item to request credit from a vendor to conduct a transaction relating to the item, determine a scope of credit to be issued to conduct the transaction relating to the item based on the purchase detail information, and generate a payment communication including the transaction information to complete the transaction relating to the item.
摘要:
Technologies for securely transferring whiteboard content data from a smart whiteboard device to another smart whiteboard device are disclosed. The smart whiteboard device may securely transfer the whiteboard content data to a mobile device. In response to receiving the whiteboard content data from the smart whiteboard device, the mobile device may transfer the received whiteboard content data to the other smart whiteboard device. The other smart whiteboard device may display the transferred whiteboard content data and enable manipulation thereof.
摘要:
In one embodiment a controller comprises logic configured to logic configured to define, on a region of a display device, a dialog box, lock the region of the display device on which the dialog box is defined to limit access to an input operation through the dialog box, receive a password from at least one input mechanism in the dialog box, and apply an authentication tag to an image when the password is confirmed. Other embodiments may be described.
摘要:
A mechanism is described for facilitating dynamic and trusted cloud-based extension upgrades for computing systems according to one embodiment of the invention. A method of embodiments of the invention includes detecting a computing device needing an upgrade. The upgrade may relate to a hardware component at the computing device needing an upgrade element for the upgrade. The method may further include calling a first cloud server to provide the upgrade over a network. The first cloud server may have first resources including the upgrade element. The method may further include facilitating the hardware component to access the upgrade element at the first cloud server without having to upgrade or replace the hardware component.
摘要:
An apparatus and system for enabling users to remotely manage their devices. Specifically, in one embodiment, in the event of a theft of a device or other such occurrence, a user may send a command to the device to execute a specified command. The command may include actions such as locking the device, shutting down the device, disabling logon's to the device and other such actions that may secure the device and the data on the device from unauthorized access. Upon receipt of an authorized unlock credential, the device may once again be made accessible.
摘要:
A method, system, and computer-readable storage medium for providing a unique identifier for a computer system and a message from a service external to the computer system, such as a laptop return service, for display when the computer system is powered on. The computer system is configured to restrict functionality until the service authorizes restoration of full functionality of the computer system. The message includes contact information for the laptop return service and, when the service is contacted, the service sends an instruction to return the computer system to full functionality. Other embodiments are described and claimed.
摘要:
Method and apparatus enabling a computing system to deter or thwart unauthorized boot-up from peripheral devices are disclosed herein. In various embodiments, a monitoring module and a managing module are employed cooperating with each other to authorize users in booting up the computing system from peripheral devices.