Abstract:
A system including a host (102) coupled to a memory device (108) and a peripheral controller device (120). The host (102) is coupled to the peripheral controller device (120) via bus (124) having a plurality of general purpose signal lines to carry time-multiplexed address, data, and control information. The peripheral controller device (120) performs a direct memory access (DMA) transactions with the memory device (108) via the host (102) the bus (124).
Abstract:
Methods and systems may provide for a system having a flexible substrate, an ultrasonic transducer array coupled to the flexible substrate and a processor coupled to the ultrasonic transducer array. The processor may identify a fingerprint based on a signal from the ultrasonic transducer array. The system may also include an external component having a curved profile, wherein the ultrasonic transducer array is embedded in the external component and includes a read surface that conforms to the curved profile. In one example, the external component includes a button having a function that is separate from identification of the fingerprint.
Abstract:
A method of providing access to an input/output (I/O) mapped register (60) of a computer system (18) is described. The computer system (18) includes a processor (20) operable in a system management mode (SMM), in which the processor (20) accesses a dedicated system management memory space, a real mode, a protected mode and a virtual 8086 mode. The method includes the steps of firstly receiving an access request at the I/O mapped register (60). Logic circuitry (64) associated with the I/O mapped register (60) then determines whether the processor (20) is operating in SMM by examining the status of a system management interrupt acknowledge (SMIACT#) output of the processor (20). If the logic circuitry (64) determines that the processor (20) is operating in SMM, a first, unrestricted type of access by the processor (20) to the I/O mapped register (60) is provided. Alternatively, if the logic circuitry (64) determines that the processor (20) is not operating in SMM, a second, restricted type of access by the processor (20) to the I/O mapped register (60) is provided. If the first, unrestricted type of access is provided to the processor (20), it performs an operation, under the direction of code stored in the dedicated system management memory address space, on the contents of the I/O mapped register (60).
Abstract:
Systems and methods may provide for determining an amount of physical bend in an electronic device and comparing the amount of physical bend to a threshold. Additionally, a warning may be generated if the amount of physical bend exceeds the threshold. In one example, one or more values representing the amount of physical bend are stored to a nonvolatile memory on the device and retrieved in accordance with one or more of a diagnostic push event or a diagnostic pull event.
Abstract:
Described is a system which includes: a cable including: a first fiber optic interconnect to provide an input light; and a second fiber optic interconnect to provide an output light; and a first housing coupled to the cable, the first housing including: a first deflection circuit to deflect the input light received from the first fiber optic interconnect in response to a vibration or movement of the first housing; and a second housing coupled to the cable, the second housing including: a light source to generate the input light for transmission to the first deflection circuit via the first fiber optic interconnect; and a photo detector to receive the output light from the first deflection circuit via the second fiber optic interconnect.
Abstract:
Apparatuses, methods, and computer-readable media relating to an unauthorized wireless network device notification system (“WNS”) are described. The WNS may be configured to notify the presence of an authorized wireless network device. (“WND”) The WNS may include an unauthorized network device identification service (“UNIS”) as well as one or more detect/notify devices (“DNDs”). The DNDs may be placed in multiple locations around a monitored space and may be configured to detect wireless network signals from a WND in their vicinity. The DNDs may then send information identifying the WND to the UNIS to determine whether the WND is authorized. If the UNIS determines that the WND is unauthorized, it may determine a location for the WND and send commands to the DNDs to notify persons in the area. This notification may include use of lighting or sound. Other embodiments may be described and/or claimed.