摘要:
A security agent monitoring and protection system is provided. A security agent on an end point computing device can be accompanied by or can load into the device's memory at startup one or more independent software processes whose primary function is to directly protect the security agent itself and take protective actions against the end point computing device should a security agent protecting the device become disabled. Protection of the security agent can be achieved in several ways, including installing the security agent with restricted permissions, making it difficult to shutdown, restarting the security agent automatically if it is halted without authorization, disabling network connectivity of the end point device if the security agent does not successfully start or restart, protecting executable and dynamic link library (DLL) files of the security agent, and controlling access to the security agent's Common Object Model (COM) interfaces. These protective aspects can also be used by the monitoring agent itself to protect it from unauthorized access or disabling, further providing protection to the device.
摘要:
Techniques are provided for automating allocation of resources based on business decisions. An impact of a business decision is quantified in terms of information technology (IT) metrics. The resources that may be needed to address the impact are estimated. The estimated resources are provisioned.
摘要:
The present invention is concerned with the development of novel 8-aminoquinoline analogs in the treatment and prevention of malaria and the said compound has broad spectrum of activity against the blood as well as tissue stages of the human malaria parasites makes these compounds very attractive in the cure and prevention of malaria caused by drug-sensitive and multidrug resistant strains and also it is expected that development of these compounds as ideal antimalarial agents may lead to suppression as well as radical cure of the malaria infection with single drug therapy.
摘要:
A system for communication network management of a utility grid includes a database configured to store a grid information data set, where the grid information data set includes network device information for the utility grid and a network management system executable by a processor to: receive an event message from one or more network devices indicative of one or more failures in a communication network of the utility grid; retrieve the grid information data set; identify one or more network device associated with the one or more failures based on the grid information data set; transmit a request for a response to the identified one or more network devices; determine a response pattern based on responses from the identified one or more network devices in order to identify a cause of the failure based on the response pattern.
摘要:
Data associated with an E.164 number mapping (ENUM) request can be received from an element of a telecommunications network. Logical trunk-group information and gateway information can be associated with the ENUM request. A call is managed by the computing element through a packet-based network based at least in part on the logical trunk-group information and the gateway information.
摘要:
Support for Session Initiation Protocol (SIP) devices is provided in an enterprise mobile network that provides wireless service within a coverage area associated with an enterprise using licensed radio frequency spectrum. In various embodiments, support SIP devices is provided by, for example, incorporating SIP user agent in a mobile switching subsystem or in a base station subsystem or by incorporating SIP server functionality into a mobile switching subsystem.
摘要:
A cloud extension agent can be provided on a customer premise for interfacing, via an outbound secure connection, cloud based services. The cloud extension agent can reach the cloud based services through existing firewall infrastructure, thereby providing simple, secure deployment. Furthermore, the secure connection can enable substantially real-time communication with a cloud service to provide web-based, substantially real time control or management of resources on the customer premises via the cloud extension agent.
摘要:
A network device operating in a cut-through mode receives a current packet of an unknown length and determines if there is a known length value of a previous packet in a processing cycle associated with the current packet. When there is no known length value of the previous packet, the network device applies, to the current packet, an estimated length value for the current packet. When there is a known length value of the previous packet, the network device applies, to the current packet, the known length value of the previous packet. The network device processes the current packet based on one of the estimated length value or the known length value of the previous packet.
摘要:
The present invention relates to Tumor Necrosis Factor-alpha (TNF-alpha or TNF-α) inhibiting peptides and process for the preparation thereof. The present invention further relates to a pharmaceutical composition comprising TNF-alpha inhibiting peptides of the present invention and uses thereof in treating TNF-alpha mediated inflammatory disorders.
摘要:
There are provided a method and system for optimizing of a long-term electricity resource plan. The system obtains a capital costs component value including capital costs for emission abatement retrofits at an existing power plant and a new power plant over a period of time. The system obtains a fuel costs component value including the sum of fuel utilization of all generating units in the existing power plant and new power plant over the period of time. The system obtains an emission costs component value including emission allowance costs and emission violation costs in the period of time. The system adds the capital costs component value, the fuel costs component value and the emission costs component value to compute a net present value that meets emission constraints.