Abstract:
Enabling users to edit data encoded in extended markup language (XML). In one embodiment, an XML data to be edited is received and preprocessed to generate a tabular data corresponding to the XML data. The generated tabular data is stored in the form of a staging table in a database. On receiving a request indicating that a portion of the XML data is to be replaced by a new portion, a query corresponding to the request is generated. The query is directed to the staging table in the database and is designed to cause the portion to be replaced by the new portion in the tabular data. The query is then performed on the database to replace the portion with the new portion in the tabular data. Once the edits are completed, new XML data containing the edits is constructed from the modified tabular data.
Abstract:
A computer implemented method comprising: identifying an API function call directed to a broker process, wherein a plurality of information requested by an originator is directly relevant to a sandbox process; trapping an API function call directed to a broker process using a computer, wherein the API function call references the broker process, wherein the broker process is a process that executes one or more operations on the behalf of a sandbox process, and wherein the sandbox process has an insufficient permission level to execute the one or more operations; passing the trapped API function call to the sandbox process using the computer; executing the trapped API function call within the sandbox process to generate a result in reference to the sandbox process using the computer; passing the result from the sandbox process to the broker process using the computer; and passing the result from the broker process to an originator using the computer.
Abstract:
Embodiments are directed towards a system and method for a cloud-based front end that may abstract and enable access to the underlying cloud-hosted elements and objects that may be part of a multi-tenant application, such as a search application. Search objects may be employed to access indexed objects. An amount of indexed data accessible to a user may be based on an index storage limit selected by the user, such that data that exceeds the index storage limit may continue to be indexed. Also, one or more projects can be elastically scaled for a user to provide resources that may meet the specific needs of each project.
Abstract:
An orthopedic screw system. The screw system comprises an outer member and an inner screw. The outer member has a longitudinal inner channel that defines an interior sidewall and is provided with screw threads on its exterior and interior sidewalls. An inner screw has threads constructed and arranged to engage with those on the interior sidewall, such that the inner screw may be secured within the inner channel. When secured within the inner channel, at least a portion of the length of the inner screw extends beyond the outer member. Methods of installing the orthopedic screw system into osteoporotic or otherwise weakened bone are also disclosed.
Abstract:
A system and method for performing policy-based storage management using data related to access frequency and file attribute accumulation. A switch device provides transparency for transactions between a client and a storage network. The transparency allows objects (e.g., files or directories) to be moved (e.g., migrated) on the storage network without affecting a reference to the object used by the client (e.g., a file handle). A monitoring module generates accumulation data associated with the transactions for use in policy-based management. The accumulation data can describe uses of the file such as how often certain files are accessed, modifications to files such as creations of new directories or files, and other uses.
Abstract:
A method of text-based authentication that accounts for positional variability of biometric features between captured biometric data samples includes capturing biometric data for a desired biometric type from an individual, and processing the captured biometric data to generate a biometric image and a biometric feature template. A selected conversion algorithm is executed by superimposing a positional relationship medium on the biometric image. The positional relationship medium includes a plurality of cells textually describable with words derivable from the positional relationship medium. The positions of biometric features are permitted to vary in overlapping border regions within the positional relationship medium. The method also includes identifying the position of at least one biometric feature within the overlapping border regions and generating a plurality of words for the at least one biometric feature.
Abstract:
An embodiment of a sports vehicle seat. The seat has lateral restraints for laterally retaining an occupant of the seat, and an actuating device for adapting the shape and/or size of the lateral restraints as a function of vehicle driving mode. Each lateral restraint incorporates at least one shape-memory member, which changes shape when subjected to physical external stress. And the actuating device subjects each shape-memory member to physical external stress to change the shape of the shape-memory member.
Abstract:
An embodiment of a sports vehicle seat. The seat has lateral restraints for laterally retaining an occupant of the seat, and an actuating device for adapting the shape and/or size of the lateral restraints as a function of vehicle driving mode. Each lateral restraint incorporates at least one shape-memory member, which changes shape when subjected to physical external stress. And the actuating device subjects each shape-memory member to physical external stress to change the shape of the shape-memory member.
Abstract:
The present invention provides selective migration in a storage network in accordance with a policy. The policy can include rules that establish which objects are migrated from a source file server to a destination file server based on file attributes (e.g., file type, file size, last access time, frequency of access). For example, large multimedia files that consume I/O bandwidth on expensive or critical file servers, without adding much value to enterprise productivity, can be migrated to a commodity or less critical file server.
Abstract:
Access to a privileged account is managed by first requiring authentication of a user logging into the account and then performing a policy evaluation to determine whether the identified user is allowed to log in using the privileged identity. Preferably, the authentication is a two factor authentication. The policy evaluation preferably enforces a policy, such as a role-based access control, and a context-based access control, a combination of such access controls, or the like. Thus, according to this approach, the entity is provided access to the privileged account if the user's identity is verified and a policy is met. In the alternative, the entity is denied access to the privileged account if either the authentication fails, or (assuming authentication does not fail) policy criteria for the user is not met.