-
公开(公告)号:DE69131470T2
公开(公告)日:2000-03-02
申请号:DE69131470
申请日:1991-01-25
Applicant: IBM
Inventor: AGARAWAL HARISH CHANDER , VERBURG RICHARD LEE
Abstract: A method is provided for shifting focus between multiple program applications in a virtual terminal environment such that next successive application will always become visible and capable of interaction with a user upon a single hot key operation. In the system of the present invention multiple applications are provided, at lease one of which is capable of writing directly onto multiple hardware display devices. Also, a plurality of virtual terminals are opened, each being associated with a particular program application and corresponding to a hardware display device. All but one of the virtual terminals associated with a single application are designated as "non participating" in any hot keying operation. Therefore, upon implementation of a hot key operation these non participating virtual terminals are ignored and the next participating virtual terminal will be activated. In this manner, since there is only one participating virtual terminal per application, each hot key operation guarantees that the next successive program application will become capable of user interaction and visible on the hardware display devices.
-
公开(公告)号:BR8804885A
公开(公告)日:1989-04-25
申请号:BR8804885
申请日:1988-09-21
Applicant: IBM
Inventor: LEONARD ANNE GREGORY , VERBURG RICHARD LEE
Abstract: A data processing system processes a data stream based on the structure of a font file which can be varied by a user or application of the processing system. The font file not only contains the pel patterns for a range of graphical symbols, but it also contains the rules for interpreting a data stream having a particular syntax. The rules for interpreting a data stream are referred to as the processing model for the data stream. The structure of the font file contains an index array to the range of graphical symbols. Each byte in the data stream is used to generate an index into the index array. In each element of the index array there is a value and control bits. The control bits indicate whether the value is an offset to a graphical symbol or whether the value is a modifier. If the value is a modifier, it is used to increment the next sequential data byte in the data stream through the range of graphical symbols. The modifiers can be use recursively to access an unlimited number of graphical symbols.
-
公开(公告)号:DE3855063T2
公开(公告)日:1996-10-02
申请号:DE3855063
申请日:1988-08-11
Applicant: IBM
Inventor: LEONARD ANNE GREGORY , VERBURG RICHARD LEE
Abstract: A data processing system processes a data stream based on the structure of a font file which can be varied by a user or application of the processing system. The font file not only contains the pel patterns for a range of graphical symbols, but it also contains the rules for interpreting a data stream having a particular syntax. The rules for interpreting a data stream are referred to as the processing model for the data stream. The structure of the font file contains an index array to the range of graphical symbols. Each byte in the data stream is used to generate an index into the index array. In each element of the index array there is a value and control bits. The control bits indicate whether the value is an offset to a graphical symbol or whether the value is a modifier. If the value is a modifier, it is used to increment the next sequential data byte in the data stream through the range of graphical symbols. The modifiers can be use recursively to access an unlimited number of graphical symbols.
-
公开(公告)号:GB2358560A
公开(公告)日:2001-07-25
申请号:GB0024218
申请日:2000-10-04
Applicant: IBM
Inventor: KRAFT IV GEORGE , VERBURG RICHARD LEE
IPC: H04L9/00
Abstract: A method, system, and computer program product for dynamically adjusting an encryption level based on the geographic location of a software program is disclosed. The geographic location associated with the software program is determined 202, for example, through use of a Global Positioning System (GPS) of a computer system (fig. 1) on which the software is running. A suitable encryption level is then selected 204 and the software program executed 210. In one embodiment, the selected encryption level may be overridden by a smart card (122, fig. 1) or other secure device connected to the computer system. The encryption levels may include a US encryption level, non-French European encryption level and a French encryption level. The invention allows a single piece of software to conform to various encryption regulations.
-
公开(公告)号:DE69131470D1
公开(公告)日:1999-09-02
申请号:DE69131470
申请日:1991-01-25
Applicant: IBM
Inventor: AGARAWAL HARISH CHANDER , VERBURG RICHARD LEE
Abstract: A method is provided for shifting focus between multiple program applications in a virtual terminal environment such that next successive application will always become visible and capable of interaction with a user upon a single hot key operation. In the system of the present invention multiple applications are provided, at lease one of which is capable of writing directly onto multiple hardware display devices. Also, a plurality of virtual terminals are opened, each being associated with a particular program application and corresponding to a hardware display device. All but one of the virtual terminals associated with a single application are designated as "non participating" in any hot keying operation. Therefore, upon implementation of a hot key operation these non participating virtual terminals are ignored and the next participating virtual terminal will be activated. In this manner, since there is only one participating virtual terminal per application, each hot key operation guarantees that the next successive program application will become capable of user interaction and visible on the hardware display devices.
-
公开(公告)号:DE3855063D1
公开(公告)日:1996-04-11
申请号:DE3855063
申请日:1988-08-11
Applicant: IBM
Inventor: LEONARD ANNE GREGORY , VERBURG RICHARD LEE
Abstract: A data processing system processes a data stream based on the structure of a font file which can be varied by a user or application of the processing system. The font file not only contains the pel patterns for a range of graphical symbols, but it also contains the rules for interpreting a data stream having a particular syntax. The rules for interpreting a data stream are referred to as the processing model for the data stream. The structure of the font file contains an index array to the range of graphical symbols. Each byte in the data stream is used to generate an index into the index array. In each element of the index array there is a value and control bits. The control bits indicate whether the value is an offset to a graphical symbol or whether the value is a modifier. If the value is a modifier, it is used to increment the next sequential data byte in the data stream through the range of graphical symbols. The modifiers can be use recursively to access an unlimited number of graphical symbols.
-
-
-
-
-