Abstract:
A germicidal apparatus for sterilizing at least one object, including at least one ultraviolet (UV) emitting unit which emits UV light onto at least one object; one or more spraying units which spray at least one chemical onto at least one object, wherein the UV light and at least one chemical sterilize the at least one object. There are disclosed methods for sterilizing at least one object, including a method including emitting ultraviolet (UV) light onto the at least one object; and applying at least one chemical to the at least one object.
Abstract:
The protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.
Abstract:
The present invention provides the use of analogues and derivatives of dinucleoside polyphosphates with formula (I) or a pharmaceutically acceptable salt thereof, in the manufacture of a medicament for use in one or more of: the treatment of ischemia, inducing ischemic tolerance, modulating cerebral ischemia, to delay the onset of a hypoxic depolarisation stage when ischemic events are initiated; as a neurological protection agent; as a tissue protection agent; the treatment of pain; and the treatment of inflammation, wherein X, is selected from wherein X1 and X2 are independently selected from H, Cl, Br and F; each Y is independently selected from S and O; each Z is independently selected from —CX3X4—,—NH—,—O—; wherein X3 and X4 are selected from H, Cl, Br and F; B1 and B2 are independently selected from adenine, guanine, xanthine, thymine, uracil, cytosine and inosine; S1 and S2 are independently selected from ribose, open chain ribose, 2′-deoxyribose, 3′deoxyribose and arabinofuranoside. V is selected from 0, 1, 2, 3, 4 and 5; W is selected from 0, 1, 2, 3, 4 and 5; and V plus W is an integer from 2 to 6.
Abstract:
The administration of protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.
Abstract:
A method for authenticating an element in a network environment is provided that includes receiving a request for one or more triplets. One or more of the triplets may be associated with an authentication communications protocol that may be executed in order to facilitate a communication session. The method further includes returning one or more of the triplets in response to the request and initiating the communication session in response to the triplets after proper authentication of an entity associated with the request.
Abstract:
The protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.
Abstract:
An integrated photosensitive device with a metal-insulator-semiconductor (MIS) photodiode constructed with one or more substantially continuous layers of semiconductor material and with a substantially continuous layer of dielectric material.
Abstract:
A vacuum cleaner has a suction nozzle, a housing connected to the suction nozzle and a suction fan and motor assembly mounted to the housing. A dirt collecting receptacle is mounted to the housing and is in communication with the suction nozzle and suction fan and motor assembly. A support plate is pivotally mounted to the housing and selectively holds a cleaning sheet for collecting dust and debris from a surface to be cleaned.
Abstract:
The invention relates to a digital control circuit for an electrical machine. The digital control circuit comprises a processor arranged to execute a control or protection algorithm for the electrical machine. The circuit has an output to enable a value of at least one digital parameter of the algorithm to be read externally. The circuit is arranged to output an analog signal whose value corresponds to the value of the digital parameter. This can allow the value of a digital parameter to be read by a device such as a multimeter.
Abstract:
A device to implant impurities into a semiconductor wafer has a process chamber having a wall, a pressure compensation unit, a disk to support a plurality of semiconductor wafers within the process chamber. The disk has a radially extending slot arranged among the wafers. A beam gun is positioned within the process chamber to shoot an ion beam at the semiconductor wafers. A cryo pump minimizes the pressure within the process chamber. A first ion gauge is positioned between the process chamber and the cryo pump. A second ion gauge extends through the wall of the process chamber. A switching device selectively connects the first or second ion gauge to the pressure compensation unit. A faraday receives ions from the ion gun filter after the ions travel through the slot in the disk. A current meter counts the number of electrons flowing to the disk faraday to neutralize the ions.