Abstract: A hair dryer in which the direction of a palm of a user gripping the hair dryer is same as the direction of wind blown from the hair dryer. A blowing pipe is coupled to a case and has an air outlet at one end. A heater for heating air is provided inside the case. A fan for blowing air toward the heater and the air outlet is provided inside the case. A grip part, which is designed to be gripped by a human hand, is coupled to a portion of the case opposite to the air outlet. A handle is mounted to the grip part so as to prevent the grip part from being released from the band.
Abstract: A method and apparatus for detecting, curing and remedying invasive software installation inadvertently, negligently, or intentionally marketed by a vendor. A party may procure a product that sends back invasive data to a source. A testing regimen may identify and defeat sources of any invasive executables found. Accordingly, a party may identify those software packages deemed invasive, and may optionally provide a solution to either defeat or monitor them, where practicable. An independent developer may obtain intellectual property rights in the testing, solution or both of the counter-invasive software system or product. An independent developer may become a supplier of testing or solution systems, motivating a supplier by one of several mechanisms. The developer or damaged party may obtain a legal status with respect to the vendor or of a host of software as a customer, user, clients, shareholder, etc.
Abstract: A system and method for a software override capability for enforcing a predetermined state for an otherwise hardware-programmable device. Software that may think it knows what it is doing may try to control a hardware device, but may not know about a hardware issue, such as another feature or defect requiring that the device stay in a certain state. The technique programmatically maintains a persistent hardware state independent of any other control software. To other software, the software layer of the invention is indistinguishable and inseparable from hardware. Nothing can slip in between. Any insertion attempt will be detected and disallowed. Features of the processor or system chips actually weld the software to the hardware, which feature disallows any software intervention between the welded software layer and the hardware.
Abstract: A trolley for traveling along a cable. The trolley may include a frame having a first end, a second end, and a rail positioned between the first and second ends. A brake pad may connect to the frame. A sheave mount may also connect to the frame and include a sheave for rolling along the cable. A carriage may connect to the frame and include a user mount for suspending a user. The carriage may selectively travel along the rail through a continuous range of motion to control a braking force generated by the trolley between the brake pad and the cable.
Abstract: A method for installing an electrical fixture such as a power switch or power receptacle. The method may include the steps of selecting an assembly comprising an a face plate, an electrical fixture, and at least one anchor, connecting a conductor to the electrical fixture, and securing the assemble to a connection box exclusively by directly manipulating the face plate. A connection box may include at least one receiver configured to substantially instantaneously engage the at least one anchor when inserted therewithin to a selected depth. Direct manipulation of the face plate may cause the at least one anchor to be inserted within at least one receiver.
Abstract: A programmatic time-gap defect correction apparatus and method corrects errors which may go undetected by a computer system. Buffer underruns or overruns, which may incur errors in data transfers, yet remain undetected and uncorrected in a computer system, are corrected by an error avoidance module in accordance with the invention. Bytes transferred to and from buffers, used by an I/O controllers to temporarily store data while being transferred between synchronous and asynchronous devices, are counted and an error condition is forced based on the count. If the count exceeds the capacity of the buffer, an error condition is forced, thereby reducing chances that errors are incurred into the data transfer.
Abstract: A flange design providing improved strength, fracture resistance, and the like using corrugations extending substantially radially from an arbor aperture toward a rim portion. A spool or reel may include a tubular member to receive a stranded material wrapped therearound. A first flange comprising a core portion and an outer portion may secure to one end of the first flange engaging the tubular member. A second flange may secure to the other end of the tubular member. The core portion of a flange may comprise an arbor wall defining the perimeter of an arbor aperture. The arbor wall may be directly contacted and supported by a plurality of corrugations extending radially therefrom. The outer portion of a flange may contact the core portion and extending radially away therefrom to an outer edge to restrain the stranded material in an axial direction.
Abstract: A method and apparatus for improvement of computer-related products to solve problems caused by artificially embedded locks, barriers, defects, and the like, that force a consumer to needlessly upgrade hardware or software on a computer. An independent developer may procure access to a product, develop a testing regimen for functionality of the product, and perform evaluations to identify sources of any operational defects found. Accordingly, the developer may then provide a generalized testing regimen to test instances of product provided by a supplier, identify those containing the flaw, and may optionally provide a solution to the flaw, where practicable. The independent developer may obtain intellectual property rights in the testing, solution or both for the product. Thus, by notifying a supplier, an independent developer may become a supplier of testing or solution systems, motivating a supplier by one of several mechanisms.
Abstract: A method for integrating the monitoring and control of multiple subsystems. The method may include receiving a plurality of display signals, generating a composite display signal defining a plurality of windows, and transmitting the composite display signal to a display. Typically, within the composite display signal, each display signal corresponds to at least one window. The method may further include receiving commands from a user, forming a layout by controlling, according to the commands, the relative size, position, etc. of each window, and saving the layout for recall and future use.