Abstract:
The present invention is directed to apparatus, systems, and methods for incorporating a master cylinder into a hydraulic brake system. An embodiment of the present invention includes a housing, a bore extending through the housing, a cover, and a groove formed in the cover. The housing includes a fluid reservoir formed therein. The bore is capable of supporting a movable piston to actuate the hydraulic braking system. The cover is secured to the housing and the groove in the cover descends away from the center of the cover such that the groove is capable of directing fluid away from the center of the cover.
Abstract:
A technique for determining utilization of a computing system resource. A trace of requests in a computing system is collected. The trace is run while a time-basis of the requests of the trace is altered by issuing each request at a time that is based on timing of one or more prior requests. A first time-based statistic associated with collecting the trace is compared to a second time-based statistic associated with running the trace to determine the utilization.
Abstract:
A method and system are provided for rapid categorization of digital images. Aspects of an exemplary embodiment include arranging a plurality of image objects representing respective image files in a source stack within a presentation space of a display; arranging a first set of category objects representing respective image categories along a perimeter of the source stack of image objects; arranging a second set of category objects representing respective image categories along the perimeter of the source stack of image objects; visually indicating within the presentation space of the display which one of the first and second category sets is a primary set and which one is a secondary set; associating a primary key input with a category object in the one of the first and second category sets indicated as the primary set, and associating a secondary key input with a category object in the one of the first and second category sets indicated as the secondary set; and in response to receiving one of the primary and secondary key input, associating an image file corresponding to a top image object in the source stack with the image category represented by the category object associated with the received key input.
Abstract:
A vehicle is disclosed having a hydraulic system. The hydraulic system includes first and second user inputs. The hydraulic system in configured to give priority to the first input over the second input.
Abstract:
A method and system for integrating web photo-services for a browser-enabled device is disclosed. The method and system include providing a server that communicates with the device over a network, and associating images stored on at least one photo-service site with a user account. Thereafter, an inventory of images stored on the device is received from the device, and an image-related web application is provided to the device over the network, where the web application requires access to the user's images. The method and system further include providing a list of the images associated with a user's account to the web application, wherein the list of images includes an image reference for each image and an indication of whether each image is stored on the device or on the photo-service site, such that the web application may perform at least one function on the user's images regardless of where the images are stored.
Abstract:
According to one embodiment, a system comprises a file stored to a data storage device that is accessible to user space, and a kernel-level data capture tool, such as a kernel-level network tracing tool, that is operable to capture data and directly write the captured data to the file. According to another embodiment, a method comprises providing, by a user-space object, identification of a trace file to a kernel-level network tracing tool. The method further comprises capturing, by the kernel-level network tracing tool, data communicated over a communication network; and writing, by the kernel-level network tracing tool, at least a portion of the captured data directly to the trace file.
Abstract:
A method for anti-piracy protection of a software application by obfuscation of the execution of portions of the applications code is described. The method includes providing a language specification and library to implement the functions of the language, providing a compiler to translate the language into byte codes, and providing an interpreter to execute the byte codes using the library. The method further includes providing the language specifications, library, compiler, interpreter, and instructions to a software publisher, where the software publisher embeds the library and interpreter in the application to be protected, and selects and prepares application code segments for processing into byte codes by the compiler. The application is then executed using the embedded library and interpreter, where the execution of the application is obfuscated by the use of byte codes.
Abstract:
A customized installation, e.g. of Linux software, is created by allowing a user to select packages that the user is interested in installing. During the process, the user is informed if two of the packages that were selected will not be interoperable at run-time. The user is then given an opportunity to resolve the conflict. The user is also informed if selected packages depend on other packages that were not selected in order to run properly, and given the opportunity to include those needed packages in the installation. Once the selected packages have been validated that they will interoperate and all dependencies are satisfied, the system can install the installation.
Abstract:
A customized distribution, e.g. of Linux software, is built using only packages that satisfy a customer's individual requirements. The packages are verified, at build time, to be interoperable at run-time. Also, the distribution is verified to ensure all package dependencies are included. In cases where no package already exists that meets a user requirements, a new package can be created for this purpose. The packages in the distribution customized for the user can be tracked, so that as updates to the packages are released, the customer can be notified about those updates (without being notified about packages not in the customer's customized distribution). Finally, once the distribution has been built for the user, it can then be offered as a general-purpose distribution for future customers.
Abstract:
In a method of modeling a target system, a data structure is populated with points, where each point includes at least one target value associated with at least one system parameter value of the target system. The data structure is searched with at least one inquiry parameter value. A return value is interpolated for at least one inquiry parameter value based on the points.