Abstract: A method and apparatus for presenting a plurality of link devices as separate nodes within a single serial bus module by generating individual or a distinct configuration ROM image for each link device in the module. Each configuration ROM includes an entry for a distinct identifier representing the corresponding link device thereby creating a one to one mapping of link device to node via the distinct configuration ROM.
Abstract: Methods and systems for prioritizing use of resources (e.g., network resources) at a client machine (e.g., computer) are disclosed. By prioritizing use of resources, user satisfaction is enhanced. The client machine typically executes a software program that permits a user of the client machine to browse, preview, purchase, or download media. The media can, for example, be audio, video, or image data. More particularly, in the case of a client machine that operates at least one application program that provides media-based actions, the methods and systems manage the use of limited network resources (e.g., network connection bandwidth) at the client machine so that different media-based actions are performed at different priority levels. For example, at the client machine, a second type of media-based action can be issued while a first type of media-based action is being processed.
Abstract: Method and apparatus for accessing media across networks. The present invention generally allows for media to be provided across a network. A client requests media information from a server so the client can create a local representation of the server's database. The client is then able to manage the media information locally. When the client selects the desired media, it requests the selection from across the network. The server then delivers the selected media.
Type:
Application
Filed:
March 12, 2004
Publication date:
October 28, 2004
Applicant:
Apple Computer, Inc.
Inventors:
Amandeep Jawa, Jeffrey L. Robbin, David Heller
Abstract: Methods and systems for network-based allowance control are disclosed. A user creates an allowance in association with a recipient account such that funds are available in the recipient account for use by a recipient for the purchase of goods over a network (e.g., Internet). Specifically, by creating an allowance, a user initiates a periodic (recurring) transfer (i.e., credit) of an amount of money (i.e., funds) to the recipient account. This money may then be used by the recipient for the purchase of goods over the network. The recipient account may be related to a parent account as a sub-account, enabling the user of the parent account to monitor purchases made by the recipient, as well as limit the items that can be purchased by the recipient.
Type:
Application
Filed:
October 15, 2003
Publication date:
October 28, 2004
Applicant:
Apple Computer, Inc.
Inventors:
Patrice Gautier, Thomas Burkholder, Payam Mirrashidi
Abstract: Graphics resources are virtualized through an interface between graphics hardware and graphics clients. The interface allocates the graphics resources across multiple graphics clients, processes commands for access to the graphics resources from the graphics clients, and resolves conflicts for the graphics resources among the clients.
Abstract: Graphics resources are virtualized through an interface between graphics hardware and graphics clients. The interface allocates the graphics resources across multiple graphics clients, processes commands for access to the graphics resources from the graphics clients, and resolves conflicts for the graphics resources among the clients.
Abstract: A control element for use in a graphical user interface, which combines the display features of the list box element and the pop-up menu element into a single GUI control element. The combined menu list control element is capable of displaying data in multiple states thereby allowing to it to optimally use the available display space for presenting data to the user. By allowing menu list control element to display data as either a list or a menu, it combines the advantages of lists and menus while avoiding their disadvantages.
Abstract: A method for providing security in a networked multimedia computing system is provided wherein an administrative workstation is challenged by a network workstation when the administrative workstation is attempting to manipulate or query the network workstation. The administrative workstation responds in an automatic fashion to supply a series of logically acceptable password candidates to the challenging workstation in an attempt to validate itself to the challenging network workstation without interrupting a user. If none of the series of passwords is successful, an administrator, or user, operating the administrative workstation is prompted to manually enter a password. The system allows for an administrative workstation to automatically and transparently validate itself to a challenging network workstation, in most situations, without requiring input from the administrator.
Type:
Application
Filed:
May 7, 2004
Publication date:
October 21, 2004
Applicant:
Apple Computer Inc.
Inventors:
Michael Victor Stein, Paul Richard Wenker
Abstract: A method and apparatus for performing actions while selecting objects on a user interface display. A user may select a first item in an area of a display controlled by a first process and drag that item to a second area on a display controlled by a second process. The second process may negotiate with the first process to provide certain data types, and based upon those data types, the second process will determine a list of actions in hierarchical fashion which may be performed upon the data. Such actions may include, but are not limited to, printing, sending electronic mail, and performing other actions in the computer system. Alternative and primary actions may also be specified by a user, such as by selecting various keys on a keyboard or other input device. Further, a user may specify that the second process display a list of actions which may be performed upon the selected item and allow the user to select an action from a list.
Type:
Grant
Filed:
December 19, 2002
Date of Patent:
October 19, 2004
Assignee:
Apple Computer, Inc.
Inventors:
Mark Ludwig Stern, Robert George Johnston, Jr., Elizabeth Ann Robinson Moller
Abstract: Internet location objects are created and displayed as icons in a graphical user interface (GUI) environment. Internet location objects may be manipulated by the user in similar fashion as other GUI objects, e.g., files, folders, aliases, etc. When an object is dragged from within an application into a system window, a drag object describing what is being dragged in passed from the application to the operating system. An application may be aware of Internet location objects and, when an object is dragged from within the application into the system window, may specify that the object being dragged is a URL. Alternatively, the application may be unaware of or not support Internet locations but support generic text drag-and-drop, in which case the application, instead of specifying a “URL drag flavor,” specifies a “text drag flavor” as part of the drag object.
Abstract: The invention is directed towards minimizing power consumption in computer systems. One embodiment of the invention is a power management system that is used for a computer system that has at least one device and one power domain. This embodiment uses two different power managers to manage the power consumption of the device and the power domain. Specifically, this embodiment has (1) a first power manager that determines when to change power state of the device, and (2) a second power manager that determines when to change power state of the power domain. Each of these power managers decides to change power state of its corresponding device or domain based on information from several different sources. These sources can include power-management clients and power managers of related domains or devices.
Abstract: A method of implementing a two-dimensional Inverse Discrete Cosine Transform on a block of input data. The method includes 1) generating a performance array for the columns of the input data; 2) performing a column-wise IDCT upon the input data, the IDCT performed in accordance with cases given for each of the columns by the performance array; (3) generating a row performance offset for rows of the input data; and 4) performing a row-wise IDCT upon the result data from the performing of the column-wise IDCT.
Abstract: Improved techniques for rendering a peripheral device removable (e.g., unpluggable) are disclosed. According to one aspect of the invention, the peripheral device is rendered removable from a host computer without preparatory user actions. In effect, the peripheral device can be automatically prepared for removal in the event that its user removes (unplugs) it from its host computer. According to another aspect of the invention, the peripheral device includes a data storage device that is mounted to a file system of the host computer when the host computer desires access to the data storage device. Otherwise, the data storage device is normally unmounted so that if the peripheral device were to be removed (e.g., unplugged) no harm or damage to data stored therein would occur. These aspects of the invention can be utilized alone or in combination with one another.
Type:
Grant
Filed:
October 21, 2002
Date of Patent:
September 28, 2004
Assignee:
Apple Computer, Inc.
Inventors:
Jeffrey L. Robbin, David Heller, Craig A. Marciniak
Abstract: A system and method using edge processing to remove blocking artifacts comprises an edge processor having an image converter for building an edge representation of a received image, a statistics analyzer for compiling a histogram containing edge intensities of the edge representation, a reference calculator for using the histogram to compute reference values corresponding to the blocking artifacts and an artifact remover for identifying and removing the blocking artifacts using the computed reference values.
Type:
Grant
Filed:
April 17, 2002
Date of Patent:
September 28, 2004
Assignee:
Apple Computer, Inc.
Inventors:
Ke-Chiang Chu, Jian Lu, Yu Tina Tian, Hsi-Jung Wu
Abstract: The elements of a file system contain information that provides language-specific views of the file system. An indicator in each element enables a quick determination to be made whether that element is localized. These indicators can take the form of a key-value pair in a properties list, a special file in the element, such as an empty file, or a special extension on the name of the file. If the element is localized, the localization information can be stored as part of the element, or in a central location for use with multiple different elements. A library of APIs associated with the file system performs methods to determine whether a requested file system element is localized, and to retrieve the localized name in that case.
Inventors:
Bartley K. Andre, Daniel J. Coster, Daniele De Iuliis, Richard P. Howarth, Jonathan P. Ive, Steve Jobs, Duncan Robert Kerr, Matthew Dean Rohrbach, Douglas B. Satzger, Calvin Q. Seid, Christopher J. Stringer, Eugene Anthony Whang
Inventors:
Bartley K. Andre, Daniel J. Coster, Daniele De Iuliis, Richard P. Howarth, Jonathan P. Ive, Duncan Robert Kerr, Matthew Dean Rohrbach, Douglas B. Satzger, Calvin Q. Seid, Christopher J. Stringer, Eugene Anthony Whang
Abstract: A computer system consists of a plurality of nodes, each with an associated local host, coupled together with a plurality of point-to-point links. An isochronous data channel is established within the computer system between a first subset of the plurality of nodes. The isochronous data channel includes a linked list of buffers which are used as temporary storage locations for data transmitted on the isochronous data channel. Each node which is part of the isochronous data channel is configured as a sender or a receiver and data transmissions are commenced. The presence of isochronous data in the channel generates an interrupt which signals a central processing unit (CPU) that data is available. The data is transferred to an associated location within the linked list of buffers and the CPU then moves on to other tasks. In other embodiments, data is transferred using DMA techniques rather than interrupt driven events. Buffers can also be used to transmit isochronous data.