ic

DYNAMIC DATA DIFFERENCE GENERATION AND DISTRIBUTION

A method of updating data may include receiving an update request from a computing device, the update request including a profile of a current set of data stored on the computing device; determining, based at least in part on the profile of the current set of data, an updated set of data is available; determining if a delta set of data has previously been generated to transform the current set of data to the updated set of data; and based on determining that the delta set of data has not been previously generated: generating the delta set of data; and transmitting an address, to the computing device, for obtaining the delta set of data by the computing device.




ic

SYSTEMS AND METHODS FOR EXPORTING, PUBLISHING, BROWSING AND INSTALLING ON-DEMAND APPLICATIONS IN A MULTI-TENANT DATABASE ENVIRONMENT

In accordance with embodiments, there are provided mechanisms and methods for creating, exporting, viewing and testing, and importing custom applications in a multitenant database environment. These mechanisms and methods can enable embodiments to provide a vehicle for sharing applications across organizational boundaries. The ability to share applications across organizational boundaries can enable tenants in a multi-tenant database system, for example, to easily and efficiently import and export, and thus share, applications with other tenants in the multi-tenant environment.




ic

DYNAMIC SETUP OF DEVELOPMENT ENVIRONMENTS

A computer-implemented method includes receiving a request from a user at a local machine to access a project. One or more programming languages used in the project are identified. Resource availability at the local machine is analyzed. An integrated development environment (IDE) is selected for the project, based at least in part on the one or more programming languages and the resource availability of the local machine. The IDE is provisioned automatically, by a computer processor, for the user in response to the request to access the project.




ic

LOGICAL LEVEL DIFFERENCE DETECTION BETWEEN SOFTWARE REVISIONS

A comparison system includes a memory including a first compiled version and a second compiled version of a target application, at least one processor, and a comparison engine, executing on the at least one processor. The comparison engine is configured to identify a method in the first compiled version, locate the method in the second compiled version, compare the method in the first compiled version to the method in the second compiled version, and providing an indication that the method is an altered method from the first compiled version to the second compiled version of the target application.




ic

GENERATING AND MANAGING APPLICATIONS USING ANY NUMBER OF DIFFERENT PLATFORMS

At least one application is received from a user. The at least one application is stored on a communication platform. A catalog is received. The catalog includes at least one service. Each service of the at least one service is associated with a platform. An indication of a selection, from the user, is received. The selection comprises a first service associated with a first platform, and a second service associated with a second platform. The first service stores the at least one application from the user. The second service runs the at least one application from the user. Responsive to receiving the indication, the at least one application is deployed to the indicated first platform. Additionally, responsive to receiving the indication, a service bridge from the communication platform to the second platform is deployed. The at least one application is run, on the first platform utilizing the service bridge.




ic

DYNAMICALLY IDENTIFYING PERFORMANCE ANTI-PATTERNS

Dynamically identifying performance anti-patterns in a software system is based on a set of documented symptoms that are evaluated in real-time. The evaluation is based on the observed system behavior and its comparison against the documented symptoms of different types of performance issues.




ic

System and Method for Production Testing of an Application

A method includes receiving an updated application instance, a database instance, or any combination thereof, provisioning a first subset of application servers with the updated application instance or access to the updated database instance, and identifying a subset of users from a plurality of users to provide access to the updated instance for testing purposes. The method further includes authenticating users of the plurality of users, providing users of the subset of users with access to the updated instance and other users of the plurality of users with access to a production instance during a testing period, and, after the testing period, providing the other users with access to the updated instance.




ic

METHOD FOR VERIFYING THE FUNCTIONALITIES OF A SOFTWARE INTENDED TO BE INTEGRATED INTO A CRYPTOGRAPHIC COMPONENT, SYSTEM

The method for validating the status of a memory of a simulator of a cryptographic component able to save data generated by a cryptographic function, includes a step carried out in the simulator including a first execution of a first cryptographic function generating: a first status of the first memory, and a first result of the first command; a step carried out in a test bench including a second execution of a second simplified cryptographic function, with the first and the second functions carrying out the same operations generating: a second status of the memory, and a second result of the second command; a step of validating including comparisons: of the first status and of the second status and of the first result and of the second result.




ic

AUTOMATIC GENERATION OF VALIDATORS TO VALIDATE DEPLOYMENT CODE USED FOR CONFIGURING SERVERS

A validation system is configured to automatically generate validators for one or more target systems. The validation system includes: a memory storing a computer process, a network interface configured to interface with the one or more target systems over a computer network, and a processor executing the computer process. The computer process is configured to parse the deployment code to identify components in deployment code, generate validator code for each identified component, and use the network interface to transmit the validator codes to the one or more target systems.




ic

ANALYZING DEPLOYMENT PIPELINES USED TO UPDATE PRODUCTION COMPUTING SERVICES USING A LIVE PIPELINE TEMPLATE PROCESS

Techniques are presented for managing a deployment pipeline using an inheritable and extensible source code template—generally referred to as a live pipeline template (LPT). As described, live pipeline templates may be used to manage deployment pipelines which, in turn, are used to launch, maintain, and update the services and systems used to host and provide computing services.




ic

System and Method for Dynamically Composing an Integrated Open Source Stack

System and method for dynamically composing an integrated open source stack are disclosed. In one embodiment, the method comprises generating a stack specification. The method further comprises extracting a list of products from an open source product repository based on the stack specification and determining a product strength value for each product present in the list of product. The method further comprises generating one or more stack options comprising at least one of the products based on the product strength value and determining a stack strength value for each of the one or more stack options based on the product strength value and the user requirements. The method further comprises selecting a stack from the one or more stack options as the integrated open source stack and composing the integrated open source stack based on at least one of product metadata, adaptor metadata, or product scripts.




ic

GENERATION OF A DEVICE APPLICATION

Examples of the disclosure enable the recalculation of device chaining in a user interface. In some examples, a first element representing a first hardware device is received at a design surface of a computing device user interface. A second element representing a second hardware device is received at the design surface. A selection of an output associated with the first element is received. A function that binds a property of the second element to a property of the output associated with the first element is automatically generated. Aspects of the disclosure enable the automatically generated function to be displayed at the design surface.




ic

Adaptive Function-Based Dynamic Application Extension Framework

A mobile device includes a processor and a non-transitory computer-readable medium storing instructions. The instructions include, in response to a state of a first application being instantiated from a first state template of the first application, selecting a first function module identifier from a plurality of predetermined function module identifiers. Each predetermined function module identifier corresponds to a first function offered by the first state template. The instructions include transmitting a function module request to a developer exchange system using a wireless transceiver. The function module request includes the first function module identifier, which uniquely identifies a first function module. The instructions include receiving the first function module from the developer exchange system, storing and executing the first function module, and presenting display data generated by execution of the first function module. The display data is presented in an area reserved for the first function by the first state template.




ic

APPLICATION PROGRAM UNINSTALLATION METHOD AND APPARATUS

Embodiments of the present application provide an application program uninstallation method and apparatus. The method comprises: receiving an uninstallation instruction for a target application program (S101); deleting a specific directory in a local device to which the target application program corresponds, according to the received uninstallation instruction (S102); extracting an identifier of the target application program (S103); searching a local pre-set directory residual database to determine whether there exist any directory data that correspond to the identifier (S104), the directory data comprising at least a directory path; if such directory data exist, deleting a directory in the local device to which the directory path found corresponds, according to the search result (S105). By applying the embodiments of the present application, when the specific directory corresponding to the uninstalled application program is deleted, other directories, other than the specific directory, to which the uninstalled application program corresponds are also deleted, so that after the uninstall of the application program is completed, file residue is avoided, and the occupation of the device storage space is reduced.




ic

SOFTWARE UPGRADE METHOD AND APPARATUS, AND DEVICE

Embodiments of the present invention provide a software upgrade method and apparatus, and a device. The method is applied to a software upgrade of a digital television terminal and includes: obtaining a DSI table in an upgrade data stream according to location information of the upgrade data stream that is carried in an upgrade notification message, where the DSI table carries upgrade software description information; displaying the upgrade software description information and upgrade prompt information to a user if it is determined, according to the upgrade software description information, to upgrade local software; and after the user determines to upgrade software, obtaining an upgrade software mirror in the upgrade data stream, and updating the local software according to the upgrade software mirror.




ic

DYNAMIC RECONNECT OF WORK PROCESSES IN A ZERO DOWNTIME MAINTENANCE PROCEDURE

The disclosure generally describes methods, software, and systems, including a method for updating an application. At least one application instance of an application is managed. Each application instance is associated with a plurality of executing work processes connected with a first database schema. A bridge database schema is generated that is related to the first database schema. The bridge database schema represents a copy of the first database schema and is generated in response to initiation of an update to the application. In response to determining that the generation of the bridge database schema is complete, for each of the plurality of work processes, a commit work action performed by the particular work process is determined. In response to determining performance of the commit work action, the particular work process is connected to the bridge database schema.




ic

DEVELOPMENT, DELIVERY, DEPLOYMENT AND OPERATION OF AN APPLICATION

A system for development, deliver, deployment and operation of an application includes at least one memory including instructions on a computing device and at least one processor on the computing device. The processor is operably coupled to the at least one memory and is arranged and configured to execute the instructions that, when executed, cause the processor to implement an application within a platform associated with a namespace for the platform, where the platform is one platform of a plurality of platforms. The processor implements a descriptor having an identifier that uniquely associates the descriptor with the application, where the descriptor comprises a single file that is platform independent and that includes a plurality of namespaces and application-specific attributes for each of the namespaces to enable the application to operate on multiple different platforms using the same descriptor.




ic

ASSOCIATED INFORMATION GENERATION DEVICE, ASSOCIATED INFORMATION GENERATION METHOD, AND RECORDING MEDIUM STORING ASSOCIATED INFORMATION GENERATION PROGRAM

Provided is an associated information generation device and the like that facilitated estimates relating to a project. The associated information generation device (101) has an associated information generation unit (102) that on the basis of project information including a task identifier is associated with a change causes are associate with the proportion at which the change causes occur identifies the change cause associated with a specific task identifier contained in project information, identifies the proportion associated with the identified change cause, and generates associated information in which the identified proportion and the identified task identifier are associated.




ic

BOOTLOADER CONTROL VIA DEVICE IDENTIFIER

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for placing a device in a bootloader state. One of the methods includes determining, during a boot process of the apparatus, whether a device of a particular type is connected to the apparatus, in response to determining that a device of the particular type is connected to the apparatus, determining a device identifier for the device, comparing the device identifier for the device with a predetermined identifier that indicates a device to which the apparatus should provide control of the boot process to determine whether the device identifier is the same as the predetermined identifier, and in response to determining that the device identifier is the same as the predetermined identifier, maintaining the apparatus in a bootloader state to provide control of the boot process of the apparatus to the device.




ic

Scalable points-to analysis via multiple slicing

A method for analyzing software with pointer analysis may include obtaining a software program, and determining a first independent program slice of the software program describing a first code segment of the software program. The method may further include determining, using a first pointer analysis objective, a first result from performing a first pointer analysis on the first independent program slice, and determining, using the first result, a first dependent program slice of the software program. The method may further include determining, using a second pointer analysis objective, a second result from performing a second pointer analysis on the first dependent program slice. The method may further include generating a report, using these results, indicating whether the software program satisfies a predetermined criterion.




ic

PROCESSING SPECIAL REQUESTS AT DEDICATED APPLICATION CONTAINERS

Various embodiments of systems and methods to provide processing of special requests at dedicated application containers are described herein. In one aspect, an application instance is downloaded and deployed in an application runtime, at a dedicated application container, to process service requests. In another aspect, the dedicated application container starts a proxy process, independently from the application runtime to intercept incoming service requests. The regular service requests are passed by the proxy process to the application runtime for processing by the executing application instance. In yet another aspect, the proxy process executes special service requests directly to access the dedicated container landscape.




ic

CODELESS SYSTEM AND TOOL FOR TESTING APPLICATIONS

The application code testing computing device may receive a set of instructions for testing one or more user interface pages of an application under test. The computing device may determine that the set of instructions is written in a first format, and parse the set of instructions to determine an action to perform and to determine data to use for the action to perform in response to determining that the set of instructions is written in the first format. Systems described herein may convert the determined action to perform to a second format to generate a converted action to perform and/or convert the determined data to use for the action to perform to the second format to generate converted data. The application code testing computing device may send, to an application framework, the converted action to perform and the converted data.




ic

SYSTEM AND METHOD FOR PREDICTING ESTIMATION OF PROJECT FACTORS IN SOFTWARE DEVELOPMENT ENVIRONMENT

The present disclosure relates to a method for predicting estimations of project factors in software development environment. The method comprises receiving first input data including at least one type of first software development model and associated one or more first project data from a user. The method further comprises identifying one or more first software agents based on the at least one type of the first software development model. The method further comprises processing the one or more first project data using the identified one or more first software agents to identify one or more first intermediate data required for project factors estimation. The method further comprises calculating estimations of the project factors using the identified one or more first intermediate data.




ic

ELECTRONIC DEVICE HAVING FLEXIBLE DISPLAY AND METHOD FOR OPERATING THE ELECTRONIC DEVICE

An electronic device having a flexible display and a method for operating the same are provided. The method includes displaying a first graphic user interface (GUI) for character input on a flexible display and detecting a change in a bending state of the flexible display. Changing the first GUI to a second GUI based on the detected change of the bending state of the flexible display, and then displaying the second GUI. In some embodiments, the method may include determining a moved area among the first area and the second area and displaying the second GUI based on the determined moved area and the angle between the first area and the second area. Determining the moved area may include detecting a first pressure corresponding to the first area and a second pressure corresponding to the second area, and then determining the moved area based on the first and second pressures.




ic

ELECTRONIC APPARATUS AND METHOD

According to one embodiment, an electronic apparatus includes an input device configured to accept a user's operation and a hardware processor. The hardware processor is configured to receive a virtual desktop image transmitted by the server apparatus, display the received virtual desktop image on a screen, transmit, in a case where a second operation other than a first operation is accepted while the virtual desktop image has been displayed, operation information indicative of the second operation to the server apparatus, and display on the screen an indicator forward of the virtual desktop image, in a case where the first operation is accepted while the virtual desktop image has been displayed, the indicator being provided to change setting of hardware of the electronic apparatus.




ic

METHOD AND DEVICE FOR INPUTTING INFORMATION

The present disclosure relates to a method and device for inputting information. The method includes: establishing a network connection with a relay device; obtaining input information from the relay device, wherein the input information is received at an auxiliary input terminal and is sent from the auxiliary input terminal to the relay device; and displaying the input information at an input position on a main input terminal.




ic

USER TERMINAL DEVICE, AND MODE CONVERSION METHOD AND SOUND SYSTEM FOR CONTROLLING VOLUME OF SPEAKER THEREOF

A user terminal apparatus is disclosed. The user terminal apparatus includes a touch screen which senses a multi gesture that is performed by using at least two fingers or other input tools, and a controller which provides an individual volume control mode by which a volume of one speaker apparatus is independently controllable with respect to a volume of the remainder of a plurality of speaker apparatuses, and which is convertible into a group volume control mode in order to combine a plurality of speaker apparatuses into a group such that volumes of the plurality of speaker apparatuses can be jointly controlled in response to the multi gesture sensed via the touch screen while the individual volume control mode is provided.




ic

CONTROLLERS, OUTPUT DEVICES, OR TELEVISIONS SUPPORTING VOICE ACTIVATED COMMANDS

An output device or controller supporting voice activated commands by using a portable electronic device is herein disclosed and enabled. The output device may be a television, a controller connectable to a television, a printer, a sound output device, or a projector. The portable electronic device for wirelessly managing or driving the output device may include a microphone to receive voice activated commands. The output device includes wireless circuitry to establish a direct wireless connection (e.g., Bluetooth, etc.) with the portable electronic device, and subsequently, the output device, using the established direct wireless connection, is operable to: wirelessly receive first information from the portable electronic device; wirelessly send to the portable electronic device second information in response to receiving the first information; and wirelessly receive from the portable electronic device data related to voice activated commands from a user.




ic

Mnemonic Support of Users in Guided Activity Floorplans

Methods and systems that facilitate the generation, presentation, and adaptation of an anchored information bar, associated with a guided activity floorplan or wizard, in support of assisting users as they complete the different steps of a complex task as the user employs software applications (and associated user interfaces) on their devices to go about their different activities.




ic

SYSTEMS AND METHODS FOR ASYMMETRICAL FORMATTING OF WORD SPACES ACCORDING TO THE UNCERTAINTY BETWEEN WORDS

Asymmetrical formatting of word spaces according to the uncertainty between words includes an initial filtering process and subsequent text formatting process. An equivocation filter generates a mapping of keys and values (output) from a corpus or word sequence frequency data (input). Text formatting process for asymmetrically adjusts the width of spaces adjacent to keys using the values. The filtering process, which generates a mapping of keys and values can be performed once to analyze a corpus and once generated, the key-value mapping can be used multiple times by a subsequent text processing process.




ic

USER INTERFACE CONTROL LAYOUT METHOD AND ELECTRONIC DEVICE

Embodiments of this disclosure relate to the field of multimedia technologies, and disclose a user interface control layout method and an electronic devices. The user interface control layout method includes the following steps: creating a relative layout container, where the relative layout container is used to contain child controls, and the child controls are a relative layout container or a normal control; specifying an attribute of a child control for the relative layout container; generating the child control; and if the child control is a relative layout container, repeating the foregoing steps, until all the child controls in the relative layout container are normal controls. In some embodiments of this disclosure, multiple UI controls of different sizes or types may be generated one by one through layout and arrangement, and the UI controls of different sizes or types may be nested with each other, and thereby UI interfaces based on different rules can be quickly implemented to meet different requirements of various products for UI control arrangement.




ic

SYMBOLIC REFERENTIAL THIRD-PARTY NOTIFICATION

User input including a social network notification symbol followed by a social network tag is detected in association with a social network user interface. The social network tag includes a text keyword that identifies a social network topic within the social network. A referential third-party social network user notification subset within the social network is defined as a subset of social network users within the social network that follow the social network topic. A referential third-party social network notification is published to the defined referential third-party social network user notification subset within the social network. The referential third-party social network notification includes the detected user input that includes the social network notification symbol followed by the social network tag.




ic

MEMORY CONSERVING VERSIONING OF AN ELECTRONIC DOCUMENT

Memory conserving versioning of an electronic document is provided. Client versioning factors are analyzed by a client versioning engine and server versioning factors are analyzed by a server versioning engine for determining when an electronic document should be stored as a new version. Accordingly, new versions of an electronic document are only created when determined to be sufficiently important, thus reducing the amount of memory required for increased version payload.




ic

METHOD AND DEVICE FOR EXTENDING A LAYOUT TEMPLATE OF AN APPLICATION COMPONENT

The present application provides a method and a device for extending a layout template of a component. The method includes determining an inheritance relationship between a component to be extended and an existing component, generating extension information of the component to be extended according to the inheritance relationship, where the extension information includes identification (ID) information of the existing component, the inheritance relationship, and content to be extended. The method further includes acquiring a layout template object of the existing component according to the ID information of the existing component, where the layout template object is configured with at least one element item of the corresponding component, and updating the element item in the layout template object according to the inheritance relationship and the content to be extended to obtain a layout template object. A layout template is extended using an inheritance relationship between objects to simplify the management of the layout templates and the complexity of maintenance and updates.




ic

EMOJI INPUT METHOD AND DEVICE THEREOF

The present disclosure describes an emoji input method and a device thereof. The emoji input method may include: detecting a user operation that starts an emoji conversion function; receiving a plurality of user input words; segmenting the plurality of user input words to obtain a keyword candidate; searching for an emoji corresponding to the keyword candidate based on a mapping relationship between the keyword and emojis; and displaying the emoji.




ic

SYSTEMS AND METHODS FOR ANALYZING ELECTRONIC COMMUNICATIONS TO DYNAMICALLY IMPROVE EFFICIENCY AND VISUALIZATION OF COLLABORATIVE WORK ENVIRONMENTS

Systems and methods for managing a collaborative environment are provided. A plurality of sheets is stored in a collaboration system. The collaboration system tracks user interactions with the plurality of sheets and generates a collaboration graph based on the interactions. The collaboration graph is analyzed to determine similarities between the sheets and/or the users. One or more visualizations are generated based on the collaboration graph and the determined similarities. In some embodiments, the collaboration system is able to provide project management information even for dynamic workflows that are not explicitly defined.




ic

DYNAMICALLY DESIGNING WEB PAGES

Various embodiments of systems, computer program products, and methods for dynamically designing webpages are described herein. In an aspect, a request for designing a webpage may be received. Based upon the request, a metadata related to the webpage may be identified. Based upon the identified metadata, one or more widgets for designing the webpage may be rendered. A selection of a widget from the one or more widgets may be received from a user. Multiple sections of the webpage and the widgets positioned in corresponding sections may be identified. The identified widgets of the webpage may be integrated with one or more security rules.




ic

SYSTEMS AND METHODS FOR PROCESSING REAL-TIME AND HISTORICAL DATA AND GENERATING PREDICTIVE GRAPHICAL USER INTERFACES

Computer implemented systems and methods are provided for generating a predictive graphical user interface. In some embodiments, a system for generating a predictive graphical user interface may comprise at least one processor configured to receive real-time and historical data associated with utilization of a facility. The at least one processor may be configured to generate, based on the real-time and historical data, instructions to display a user interface depicting a first representation of utilization of the facility at a first time. The at least one processor may be configured to receive a request to display a second representation of utilization of the facility, the request including a selection of a second time, and generate, based on the real-time and historical data, instructions to display, within the interface, a second representation of utilization of the facility, the second representation reflecting utilization at the second time, wherein the second time is a future time relative to the first time.




ic

METHOD AND APPARATUS FOR CAPTURING SCREEN ON MOBILE DEVICE

Embodiments of the disclosure provide a method and an apparatus for capturing a screen on a mobile device, the method including: receiving, at the mobile device, a screen-capturing request for a current interface, where the current interface includes first data, and the first data includes personal information; and generating, according to screen-capturing request, a screen capture image for the current interface, where the first data in the current interface is replaced in the screen capture image with second data which is predefined. These embodiments avoid the need to manually mask an image by starting a dedicated image editing tool to anonymize a screen capture image, thereby significantly lowering the relatively high technical threshold of anonymization processing, reducing the error rate, and improving the modification quality of anonymization. Moreover, the replacement is directly made to the image while the screen is captured without interfering with normal use of reading.




ic

SIMULTANEOUS INPUT SYSTEM FOR WEB BROWSERS AND OTHER APPLICATIONS

In a computing environment having a multiple input detection system including a detector that detects and transmits multiple simultaneous user inputs from different users at a same time, a method for processing inputs from different users across multiple application windows of one or more applications displayed on a single display of a user interface, resulting in a multi-user graphical user interface (GUI), the computing environment running an operating system (OS) designed to run with a single user GUI, the method including determining, in a primary application, separate from the OS, that a first user input corresponds to a first window and a second user input corresponds to a second window, the primary application sending the first and second user inputs to first and second secondary applications that run in parallel with the primary application, the first and second secondary applications being designed to run with the OS.




ic

Methods and Systems for Managing Multiple Communication Sessions from a Single On-Screen User Interface

An exemplary communication session management system concurrently presents a plurality of session icons within a single on-screen user interface, each session icon representative of a respective communication session and configured to visually indicate a session status of the respective communication session. The communication session management system further detects a user action performed by a user with respect to one of the plurality of session icons, modifies a communication session in response to the user action, and graphically indicates the modification of the session status of the communication session. Corresponding systems and methods are also described.




ic

Locator diagnostic system for emergency dispatch

Systems and methods are provided to guide an emergency dispatcher in responding to emergency calls where the incident location is not known. The systems and methods can include a locator diagnostic tool configured to facilitate thorough and consistent information gathering for calls where the incident location is not known. The locator diagnostic tool may traverse a logical tree configured to gather information that can aid in identifying the incident location and/or provide instructions to the caller that may allow the incident location to be identified. For example, the locator diagnostic tool may aid callers in locating devices designed to transmit their location. The locator diagnostic tool may traverse different logical paths depending on if the caller can speak freely or not, depending on if the caller or a third party is missing, and/or depending on the type of caller location (e.g., inside, outside, or underground).




ic

Lockout device

A lockout device for a handle assembly includes first and second lockout members each including an outward facing base wall and outward extending first and second projections. The first and second projections of the first base member are spaced apart to receive the handle therebetween, and the first and second projections of the second base member are spaced apart to receive the handle latch therebetween. The first and second lockout members are pivotable with respect to each other to a lockout position for engagement of the base walls of the first and second lockout members with facing surfaces of a handle and a handle latch of the handle assembly. When the first and second lockout members are secured between the handle and the handle latch in the lockout position, the first and second lockout members block movement of the handle latch to prevent rotational movement of the handle assembly.




ic

Opening apparatus for a door that has an outer panel, a motor vehicle and a motor vehicle door with such an opening apparatus

A door (200) of a motor vehicle has an outer panel (100) and an opening apparatus. The opening apparatus has a door handle (30) and a door lock (20) with a lock barrel (10). The lock barrel (10) and the door handle (30) are arranged completely on the inner side of the outer panel (100) of the door (200).




ic

Magnetically repelling lock assembly

A lock assembly (10) including a plug (12) having a keyway (14) for inserting therein a key (16), and a movable element (18) movingly disposed in the plug (12), the movable element (18) being divided into at least two separate magnetic portions (20, 22) arranged to move relative to one another and having identical magnetic polarity, wherein the magnetic portions (20, 22) are sufficiently near one another such that one of the magnetic portions (20, 22) applies a magnetic repelling force on the other magnetic portion (20, 22).




ic

Valve lockout device

A lockout device that can be used to lock a valve in a closed position, for use particularly with valves that include a stationary member, such as a body, and a rotating member, such as a handle or wheel, for activating and deactivating the valve is disclosed. The lockout device can also be used to provide a connection point for connecting various types of connectors to a hose clamp or other elongate connecting member mounted on and locked onto a body such as a pipe or valve.




ic

Electronic apparatus

Provided is a convertible type computer (PC) 1 comprising a second housing 3 including a display section 3a, and a first housing 2 including a palm rest 2b. A first antenna 6a is disposed on the palm rest 2b, and a second antenna 7a is disposed on a reverse surface 2e of the first housing 2 immediately beneath the first antenna 6a. An attitude sensor 8 detects whether the PC 1 has a clam shell form or a tablet form. In accordance with a detection result, a switch section 9 switches between the first antenna 6a and the second antenna 7a for establishing wireless communication with an external terminal to communicate information. Therefore, it is possible to switch between information signals through the first antenna 6a and information signals through the second antenna 7a depending on the attitude of the PC 1, and fine communication can be established.




ic

Protective device, particularly for a lock of a door or leaf

A protective device, particularly for a lock of a door or leaf, comprising a covering element which is associated slidingly with a plate that can be fixed to the door or leaf and can be positioned selectively so as to close an opening for access to the lock which is provided in the plate. Two pins are associated transversely with the plate and are adapted to block temporarily the sliding of the covering element with respect to the plate. The device has at least one cam, freely mounted rotatably within a cavity provided in the plate. At least one first recess and at least one second recess are provided in the lateral surface of the at least one cam, which have, in plan view, a mutually different shape and are adapted respectively to allow and prevent the sliding of the covering element.




ic

Security device

A security device for securing an item, the security device comprising a housing configured to house a circuit board comprising electronics configured to send a telecommunication signal to a receiver when the electronics is activated; a cable configured to establish a conductive path with the circuit board when the housing is closed, thereby activating the electronics; a lock assembly configured to be activated when the housing is closed; and a cover configured to close the housing, the cover having a first pin configured to engage a first end of the cable to prevent removal of a first end of the cable from the housing when housing is closed, and the cover having a second pin configured to activate the lock assembly to prevent removal of a second end of the cable from the housing when the housing is closed.




ic

Falling latch locking device

Falling latch locking device having a first locking device casing that includes a handle, a closing element and a lock, and having a second locking device casing that includes a cut-out for receiving the closing element in the closed state, wherein the lock comprises a stop that can be moved by locking and unlocking the lock and in the locked state the stop blocks the opening of the handle.