Abstract:
A configurable flip-flop circuit has modifiable connections between its circuit elements that allow it to be modified for primary and secondary uses. For example, the flip-flop circuit can be modified to provide secondary functions of NOR and NAND gates during an implementation of an ECO. At other times, the flip-flop circuit can be used to deliver normal flip-flop functionality. A configurable latch circuit is provided that can be modified to provide an output signal or an inverted output signal. A scan circuit is provided that can provide the functionality of a multiplexer.
Abstract:
Access to a privileged account is managed by first requiring authentication of a user logging into the account and then performing a policy evaluation to determine whether the identified user is allowed to log in using the privileged identity. Preferably, the authentication is a two factor authentication. The policy evaluation preferably enforces a policy, such as a role-based access control, and a context-based access control, a combination of such access controls, or the like. Thus, according to this approach, the entity is provided access to the privileged account if the user's identity is verified and a policy is met. In the alternative, the entity is denied access to the privileged account if either the authentication fails, or (assuming authentication does not fail) policy criteria for the user is not met.
Abstract:
A method of text-based authentication that accounts for positional variability of biometric features between captured biometric data samples includes capturing biometric data for a desired biometric type from an individual, and processing the captured biometric data to generate a biometric image and a biometric feature template. A selected conversion algorithm is executed by superimposing a positional relationship medium on the biometric image. The positional relationship medium includes a plurality of cells textually describable with words derivable from the positional relationship medium. The positions of biometric features are permitted to vary in overlapping border regions within the positional relationship medium. The method also includes identifying the position of at least one biometric feature within the overlapping border regions and generating a plurality of words for the at least one biometric feature.
Abstract:
An improved plug connector (100) is disclosed. It includes: a generally U-shaped contact (102) including a first vertical leg (104), a second vertical leg (106) and a horizontal leg (108) connecting the first vertical leg (104) and the second vertical leg (106), the first vertical leg (104) being longer than the second vertical leg (106); and a retention block 110 connected to both sides (112) and (114) of the horizontal leg (108) configured to support the U-shaped contact (102). This design can stand up to the harsh environment that it will be exposed to and will provide improved resistance to failure.
Abstract:
A method of authentication is provided that includes capturing biometric data for a desired biometric type from an individual, determining an algorithm for converting the biometric data into authentication words, converting the captured biometric data into authentication words in accordance with the determined algorithm, including the authentication words in a probe, and comparing the probe against identity records stored in a server system. Each of the identity records includes enrollment biometric words of an individual obtained during enrollment. Moreover, the method includes identifying at least one of the identity records as a potential matching identity record when at least one of the authentication words included in the probe matches at least one of the enrollment biometric words included in the at least one identity record, and generating a list of potential matching identity records.
Abstract:
A system and method for performing echo suppression on a server in browser-based online audio conferences without downloading or installing software on a participant's computing device is disclosed. Streams of audio communication data from the participants in an audio conference are received at the server. An echo suppression application determines the first party that speaks by analyzing the streams to locate speech data, and assigns that party as the “owner” of the audio channel. The speech data is sent to the other participants in the conference. The application then determines whether newly received audio from the owner of the channel is new speech; if so, then the party remains the owner of the channel, and the new speech data is also sent to the other parties in the conference. The channel is surrendered if no new speech is received from the owner in a defined period, and the next party that speaks becomes the new owner of the channel. The other audio data from the participants is replaced by silence.
Abstract:
The instant invention provides methods and compositions for the treatment of. atherosclerotic disease. Specifically, the invention provides methods and compositions for modulating the activity of Arginase II, the production of Arginase II or the amount of free Arginase II for the treatment of atherosclerotic disease.
Abstract:
A system and method for performing policy-based storage management using data related to access frequency and file attribute accumulation. A switch device provides transparency for transactions between a client and a storage network. The transparency allows objects (e.g., files or directories) to be moved (e.g., migrated) on the storage network without affecting a reference to the object used by the client (e.g., a file handle). A monitoring module generates accumulation data associated with the transactions for use in policy-based management. The accumulation data can describe uses of the file such as how often certain files are accessed, modifications to files such as creations of new directories or files, and other uses.
Abstract:
A system and method for parallel file system traversal using multiple job executors is disclosed. The system includes a pool of job executors, a job queue, and a trigger tracker. An object, representative of a node in the filesystem, is added (i.e., pushed) to the job queue for processing by an job executor. The job queue assigns (i.e., pops) objects to job executors in accordance to a LIFO (Last In First Out) ordering. Then the job executor performs an action such as copy. In one embodiment, the trigger tracker follows the processing of a child nodes to a particular child node. Thus, the filesystem is being traversed by several job executors at the same time.
Abstract:
Goal state indicators can be communicated from a fabric controller of a computer cluster to each of multiple compute instances in the computer cluster managed by the fabric controller. The goal state indicators can be formatted according to a structured protocol that defines multiple possible goal states. Additionally, status reports can be received from the compute instances. Each of the status reports can indicate a current state of one of the compute instances relative to a goal state previously indicated in a goal state indicator communicated to that one of the compute instances.