Abstract:
A locking system for a stop button employed in a mortise lock having a spindle for operating a latch utilizing a first spindle base and a second spindle base which are nested relative to one another. Each base includes an opening for the mortise lock spindle such that the spindle may enter the combined first and second bases from the left side or the right side. A locking hub overrides either the first or second base and is capable of selectively lying over either the first or second base. An abutment linked to the stop button interacts with the locking hub such that either the first or second base may not be turned by the spindle when this occurs. Locking hub selectively locks either the first or second base through its position relative to the same and allows the mortise lock to easily transform from a left-hand version to a right-hand version.
Abstract:
An apparatus and method for deploying vivid notice to a first responder, wherein the deploying event is triggered by the vehicle crash motion or by signal from the vehicle's own crash detection system, and the vivid notice is coded to the particular hazard present at the vehicle crash site and includes at least one visual notice, auditory notice, or olfactory notice, and may include a combination of any of the three notices, or all three at once.
Abstract:
The protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.
Abstract:
Techniques for routing a payload of a first network protocol, which includes header information for a second network protocol, include communicating a packet. In a circuit block, a first type for the first network protocol and a second type for the second network protocol are determined. The circuit block stores a classification that indicates a unique combination of the first type and the second type. A general purpose processor routes the packet based on the classification. Processor clock cycles are saved that would be consumed in determining the types. Furthermore, based on the classification, the processor can store an offset value for aligning the header relative to a cache line. The circuit block can store the packet shifted by the offset value. The processor can then retrieve from memory a single cache line to receive the header, thereby saving excess loading and ejecting of cache.
Abstract:
The administration of protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.
Abstract:
Techniques for dynamically distributing short messages include storing action data and parameter data. Action data indicates actions for forwarding a short message and includes an action to bypass a short message service center (SMSC). Parameter data indicates parameters in network protocol headers for a short message. Provider input data is received that indicates a special value set and a special action set. The special value set includes a value for a corresponding special parameter set that includes a parameter from the parameter data. The special action set includes an action to be performed if an actual value set matches the special value set. When a particular short message is received, it is determined whether an actual value set based on the particular short message matches the special value set. If so, then the short message is processed according to the special action set.
Abstract:
A system for providing a user interface includes a gadget definition, a style definition, and a scene file. The gadget definition includes one or more XML-based gadget definition tags defining a gadget element and the style definition includes one or more XML-based style definition tags defining one or more style attributes to be applied to the gadget element. The scene file is an XML-based document that includes a gadget element tag that specifies the gadget element. The system further includes a parser to parse the scene file, the style definition, and the gadget definition, and to generate an object that includes a gadget object corresponding to the gadget element. The system also includes a layout engine to determine, based on the object model, a layout of the user interface, and a rendering engine to render, based on the determined layout, the user interface including the gadget element.
Abstract:
An electronic lock includes a compression spring that stores energy to ensure that the electronic lock re-locked after unlocking. The spring is received between a lock bolt and a lock bolt housing. When the electronic lock is locked, the lock bolt is received in a notch of a locking portion. When the electronic lock is unlocked, a motor moves both the lock bolt and the lock bolt housing in a direction to remove the lock bolt from the notch. After a predetermined amount of time, the motor is reversed to move the lock bolt housing in an opposing direction. If the outside handle has not been released, the lock bolt does not re-enter the notch. The spring is compressed between the lock bolt housing and the lock bolt and stores energy. When the outside handle is released and the notch returns to the original position, and the spring pushes the lock bolt into the notch to ensure the electronic lock is re-locked.
Abstract:
A process uses pressure changes and a pressure compensation factor to estimate the rate at which neutral atoms are implanted. While implanting a first wafer using a first pressure compensation factor, the rate at which ions are implanted is determined. The first wafer is moved radially with respect to an ion beam while implanting ions into the first wafer so as to achieve a uniform total dose based on the rate at which ions are implanted and the estimated rate at which neutral atoms are implanted. The pressure is determined while implanting the first wafer, determining the pressure. A second pressure compensation factor is selected, that would have achieved a uniform rate of implanted ions plus implanted neutral atoms across a surface of the first wafer. The second pressure compensation factor is different from the first pressure compensation factor. The second pressure compensation factor is used to implant a second wafer. The second wafer is tested by forming a sheet resistance contour map. If the sheet resistant contour map shows uniform resistance across the wafer, the second pressure compensation factor is used to implant wafers subsequent to the second wafer.
Abstract:
A microfluidic device having durable ultraphobic fluid contact surfaces in the fluid flow channels of the device. The ultraphobic surface generally includes a substrate portion with a multiplicity of projecting regularly shaped microscale or nanoscale asperities disposed in a regular array so that the surface has a predetermined contact line density equal to or greater than a critical contact line density, and so that the ratio of the cross-sectional dimension of the asperities to the spacing dimension of the asperities is less than or equal to 0.1.