218 patents in CPC class H04W
Provided are a method and an apparatus for controlling device using Bluetooth technology. A method of controlling a first device by a control device using Bluetooth includes receiving an advertising message including service information indicating whether a device control service is supported from the first device, establishing a Bluetooth LE connection with the first device when the first device supports the device control service, transmitting a read request message to the first device to request feature information related to a controllable operation mode and procedure supported by the first device, receiving a read response message including the feature information in response to the read request message, transmitting a first write request message for requesting writing of a control characteristic for controlling a specific operation related to pairing and connection of the first device based on the supported feature information, and receiving a first write response message in response to the first write request message. Here, the write request message includes control information related to the specific operation.
Examples may include sleds for a rack in a data center including physical accelerator resources and memory for the accelerator resources. The memory can be shared between the accelerator resources. One or more memory controllers can be provided to couple the accelerator resources to the memory to provide memory access to all the accelerator resources. Each accelerator resource can include a memory controller to access a portion of the memory while the accelerator resources can be coupled via an out-of-band channel to provide memory access to the other portions of the memory.
Provided are a device-to-device (D2D) operation method performed by a terminal in a wireless communication system and a terminal using the method. The method comprises: determining whether the terminal is located within network coverage; and transmitting information notifying a result of the determination to another terminal. Using this information, said another terminal can know whether the terminal is located within the network coverage and perform the D2D operation on the basis thereof.