Abstract:
Information is managed by receiving at a data source device, from an application running on a data source device, an instruction associated with a file system object. It is determined at the data source device if the instruction is able to be satisfied by a file system running on the data source device. If it is determined that the instruction is not able to be satisfied by the file system, the instruction is performed without the services of the file system; the application is unaware that the file system object is managed by an entity other than the file system running on the data source device.
Abstract:
Provided is a method of identifying a compound which modulates miRNA activity comprising (i) determining the ability of a test compound to alter the polyuridylation activity of a ZCCHC polypeptide wherein a test compound which alters the polyuridylation activity is useful in modulating miRNA activity; or (ii) determining the ability of a test compound to alter the binding of a ZCCHC polypeptide to a LIN28 polypeptide, wherein a test compound which alters said binding may be useful in modulating miRNA activity; or (iii) determining the ability of a test compound to bind to a ZCCHC polypeptide, wherein a test compound which binds to the ZCCHC polypeptide may be useful in modulating miRNA activity.
Abstract:
Disclosed are nanocomposite materials comprising multiple layers of biomolecules bound to aligned carbon nanotubes. The thickness of each of the layers may be precisely controlled using a layer-by-layer assembly technique.
Abstract:
The snapshot capability moving into the SAN fabric and being provided as a snapshot service. A well-known address is utilized to receive snapshot commands. Each switch in the fabric connected to a host contains a front end or service interface to receive the snapshot command. Each switch of the fabric connected to a storage device used in the snapshot process contains a write interceptor module which cooperates with hardware in the switch to capture any write operations which would occur to the snapshot data area. The write interceptor then holds these particular write operations until the original blocks are transferred to a snapshot or separate area so that the original read data is maintained. Should a read operation occur to the snapshot device and the original data from requested location has been relocated, a snapshot server captures these commands and redirects the read operation to occur from the snapshot area. If, however, the read operation is directed to the original drive, the read is provided from the original data areas, even if the data had been replaced. The snapshot server determines the existence of particular snapshot devices, allocates their storage locations, provides this information to both the service interfaces and the write interceptors and handles read and write operations to the snapshot device.
Abstract:
Disclosed herein are engineered zinc finger proteins which bind to telomeric structures; methods for their design, synthesis and use; and cells comprising a telomere-binding zinc finger protein. Methods for modulating telomerase activity using telomere-binding zinc finger proteins are also provided.
Abstract:
A method and apparatus for securing networks, focusing on application in Fibre Channel networks. A combination of unique security techniques are combined to provide overall network security. Responsibility for security in the network is assigned to one or more designated entities. The designated entities deploy management information throughout the network to enhance security by modifying the capabilities and operational permissions of the devices participating in the network. For example, through network control: logical management access or physical I/O access may be limited on a per device or per I/O basis; and all devices and ports in the network operate only with other approved devices and ports. These designated entities can better manage network security by exploiting a unique link authentication system as well as a unique push-model secure distributed time service. The link authentication involves a multi-phase nonce exchange exploiting various derivations of the nonce and other information such as hashes and encryptions. The push-model secure time distribution departs from the traditional Fibre Channel pull mode time distribution and provides for secure and reliable distributed time so that various security attacks may be defeated.