Abstract:
While cloud services can offer processing from personal devices or synthesized data from multiple sources, many users prefer their data to remain private. According to some embodiments, private user data may be processed in the cloud without revealing the user identity to the cloud service provider. Only the user or an authorized agent of the user and the service's hardware platform have access to certain keys. The service application software and operating system only have access to encrypted data.
Abstract:
The present invention relates generally to 3′-OH unblocked, labeled and unlabeled nucleotides and nucleosides with 5-methoxy-substituted nitrobenzyl-based photocleavable terminating groups for use in methods and systems related to DNA and RNA sequencing and analysis. These compounds, which may be represented by the following formulas: wherein the variables are defined herein, may be used as reversible terminators as they exhibit fast nucleotide incorporation kinetics, single-base termination, high nucleotide selectivity, and rapid terminating group cleavage that results in a naturally occurring nucleotide.
Abstract:
A device for communicating via a network includes a processor, a memory containing persona instructions to cause the processor to obtain one of multiple persona profiles for use while communicating via the network, each persona profile controlling access to personal information of a user tailored to the type of communications being performed. A communication mechanism couples the network to perform communications between the device and the network using the obtained persona profile to share limited personal information.
Abstract:
Methods and apparatuses associated with cloud computing are disclosed herein. In embodiments, a method may include receiving, by a service monitor operating on a computing device, performance information associated with services provided by an application service with instances operating on a plurality of virtual machines deployed on a plurality of servers of a computing cloud. The service monitor, in response, may identify one or more requests of the computing cloud to attempt to improve performance of the services provided by the application service. Other embodiments may be disclosed and claimed.
Abstract:
Generally, this disclosure describes a method and system for authenticating to a network via a device-specific one-time password. A method in an embodiment may include generating a first one-time password (OTP) based at least in part on a plurality of client device attributes; and providing the first OTP to an authenticator associated with a private network during a first session, wherein the authenticator is configured to authenticate the client device to at least one of the private network and protected content included in the private network for a second session following the first session based on the provided first OTPP.
Abstract:
An embodiment of the invention includes a network-accessible compute node, which includes a local storage storing reference images. Each reference image can depict one or more preferences, which can include a quality, a feature, a characteristic, an attribute, a type, and/or a form. Each preference can be associated with a distinctive pattern and a preference criterion. An embodiment includes an optimization module. The optimization module can learn the distinctive patterns from the reference images. The optimization module can also access a remote storage storing images of commodities and use pattern recognition to identify, from the remote storage, one or more images of commodities meeting the preference criterion selected by a user. Other embodiments are described and claimed.
Abstract:
In some embodiments, a filter may filter web graphics library code executing on the graphics processing unit. As a result the web graphics library code may be prevented from accessing memory or other resources that are not allocated specifically for the web graphics library module. Likewise web graphics library code may not access any shared resources that have been explicitly assigned to the process specific web graphics library module.
Abstract:
Disclosed is a high molecular weight polylactic acid synthesized by using a method for synthesizing and catalytically-polycondensing bionic creatinine-guanidinium chloride. Creatinine is used as the material in a reaction with aqueous hydrochloric acid to synthesize a bionic creatinine-guanidinium salt catalyst, creatinine-guanidinium chloride (CR.Cl). The creatinine-guanidinium chloride synthesized is used as a catalyst, an industrial grade lactic acid (LA, 85% to 90%, aqueous solution) is used as a monomer, a solvent-free two-step polycondensation method is used to synthesize and afford metal-free and toxic residue-free polylactic acid featuring high biological safety and high molecular weight.
Abstract:
Glass compositions are provided that are useful in a variety of applications including, for example, electronics applications, reinforcement applications, and others. Some embodiments of glass compositions can provide desirable dielectric constants, desirable dissipation factors, and/or desirable mechanical properties while also having desirable fiber forming properties.
Abstract:
A method, device, and system for browser-based application security verification is disclosed. A client device requests a browser-based application from a web server. An application security module of the client device intervenes and transmits an application verification request to a cloud service system. The cloud service system retrieves data regarding the security of the application and source from cloud resources and a local database of the cloud server. The cloud service system then uses the data to authenticate the source and verify the security of the browser-based application. The cloud service system provides the client device with a recommendation regarding the security of the browser-based application and updates its local database. The client device may then consider the recommendation in determining whether to download or execute the browser-based application and provide feedback to the cloud service system. The client device may also perform a local security analysis after receiving the cloud service system's recommendation.