Abstract:
One embodiment provides a method. The method includes receiving, with a computing system, stylus orientation data representing an orientation of a stylus. The method includes receiving, with a computing system, grip characteristics data representing a grip on the stylus by a user. The method includes identifying, with the computing system, a stylus mode for use by the computing system, at least partially based on the stylus orientation data and the grip characteristics data. The method includes applying the stylus mode to the computing system to interpret interaction data representing interactions of the stylus with the computing system.
Abstract:
In an embodiment, a host controller is configured to control communication with a plurality of universal serial bus (USB) devices, and to couple to a management controller and a host processor. The host controller includes a filter logic to filter information from a management control transmission protocol (MCTP) endpoint of a first USB device from being communicated to the host processor and to provide the MCTP endpoint information to the management controller. Other embodiments are described and claimed.
Abstract:
Particular embodiments described herein provide for a stylus that includes a body, a plurality of conductive traces, a resonance circuit, and a tip, wherein the tip can be used to interact with both an electromagnetic resonance touchscreen and a capacitive touchscreen. The conductive traces can be spaced such that the conductive traces do not substantially block a resonance frequency of the resonance circuit.
Abstract:
Methods and apparatus relating to processor extensions for execution of secure embedded containers are described. In an embodiment, a scalable solution for manageability function is provided, e.g., for UMPC environments or otherwise where utilizing a dedicated processor or microcontroller for manageability is inappropriate or impractical. For example, in an embodiment, an OS (Operating System) or VMM (Virtual Machine Manager) Independent (generally referred to herein as “OI”) architecture involves creating one or more containers on a processor by dynamically partitioning resources (such as processor cycles, memory, devices) between the HOST OS/VMM and the OI container. Other embodiments are also described and claimed.
Abstract:
Methods and apparatus relating to processor extensions for execution of secure embedded containers are described. In an embodiment, a scalable solution for manageability function is provided, e.g., for UMPC environments or otherwise where utilizing a dedicated processor or microcontroller for manageability is inappropriate or impractical. For example, in an embodiment, an OS (Operating System) or VMM (Virtual Machine Manager) Independent (generally referred to herein as “OI”) architecture involves creating one or more containers on a processor by dynamically partitioning resources (such as processor cycles, memory, devices) between the HOST OS/VMM and the OI container. Other embodiments are also described and claimed.
Abstract translation:描述与用于执行安全嵌入式容器的处理器扩展有关的方法和装置。 在一个实施例中,提供了用于可管理性功能的可扩展解决方案,例如对于UMPC环境,或者其他利用专用处理器或微控制器进行可管理性是不合适或不切实际的。 例如,在一个实施例中,OS(操作系统)或VMM(虚拟机管理器)独立(本文通常称为“OI”)架构涉及通过动态地划分资源(例如处理器周期)来在处理器上创建一个或多个容器 ,内存,设备)在HOST OS / VMM和OI容器之间。 还描述和要求保护其他实施例。
Abstract:
In one embodiment, a processor includes a microcode storage including processor instructions to create and execute a hidden resource manager (HRM) to execute in a hidden environment that is not visible to system software. The processor may further include an extend register to store security information including a measurement of at least one kernel code module of the hidden environment and a status of a verification of the at least one kernel code module. Other embodiments are described and claimed.
Abstract:
Systems and methods for multi-modal user device authentication are disclosed. An example electronic device includes a first sensor, a microphone, a first camera, and a confidence analyzer to authenticate a subject as the authorized user in response to a user presence detection analyzer detecting a presence of the subject and one or more of (a) an audio data analyzer detecting a voice of an authorized user or (b) an image data analyzer detecting a feature of the authorized user. The example electronic device includes a processor to cause the electronic device to move from a first power state to a second power state in response to the confidence analyzer authenticating the user as the authorized user. The electronic device is to consume a greater amount of power in the second power state than the first power state.
Abstract:
FIG. 1 is a perspective view of a computer notebook, showing our new design; FIG. 2 is a top view of the computer notebook in FIG. 1; FIG. 3 is a bottom view of the computer notebook in FIG. 1; FIG. 4 is a front view of the computer notebook in FIG. 1; FIG. 5 is a back view of the computer notebook in FIG. 1; FIG. 6 is a side view of the computer notebook in FIG. 1; and, FIG. 7 is another side view of the computer notebook in FIG. 1. The broken lines shown in the drawings illustrate portions of the computer notebook that form no part of the claimed design.
Abstract:
In a memory system an interface circuit includes an interface to a memory array, and to a data signal. The circuit includes loopback circuitry to enable loopback of received data signals without having to access the data from the memory array. The circuit can be part of a memory device, a register device, or a data buffer. The circuit interfaces to a memory array of a memory device, and performs loopback functions for a host controller that can test the operation of the interface.
Abstract:
Methods, apparatus, systems, and articles of manufacture to service workloads locally at a computing device are disclosed. An example apparatus includes processor circuitry to instantiate application circuitry to, after determining that the container is locally available to execute the workload, transmit an application programming interface (API) call to local API gateway circuitry using a system local network stack Internet protocol (IP) address; the local API gateway circuitry to identify service container circuitry to execute the workload based on the API call; and the service container circuitry to utilize the container to execute the workload to generate an output; and the local API gateway circuitry to forward the output to the application circuitry.