摘要:
Methods and systems for providing secure access to network resources are disclosed. A method includes defining in a provisioning utility one or more communities of interest, each community of interest including one or more users and associated with a key. The method includes providing a service key to a client computing device that is useable to establish a secure connection to a service enclave including an authorization server. The method also includes transmitting from the authorization server, for each community of interest including an identified user of the client computing device, an identity of a customer enclave and a key associated with a community of interest including the user of the client computing device, the community of interest including computing resources included in the customer enclave.
摘要:
In order to provide improved performance in a printed antenna, particularly for use in a Doppler navigation system, two pairs of linear arrays slanted at 45.degree. are utilized to obtain a beam shape which exhibits a degree of independence from over-water shift with the two sets of arrays constructed respectively as forward and backward firing arrays in order to compensate for frequency changes.
摘要:
A synthesis technique for constructing curved wave guide arrays in spherical sections to provide a pencil or squinted beam in a desired direction in which a plurality of slotted wave guides are bent to a radius of curvature corresponding to circles cut through a sphere and interconnected to a cap conforming thereto with each of the wave guide radiating arrays constructed as anti-phase slotted arrays with variable slot spacings, the location of the slots being dependent upon the phase correction required to generate a pencil beam.
摘要:
Computer implemented techniques that involve captured, e.g., self-captured video for educational and other uses such as improving job performance of geographically distributed employees and incremental video optimizations and compressions are described.
摘要:
The present invention relates to a telephone configured as a programmable microcomputer (telephone-computer) which operates in most circumstances through a standard telephone 12-key keypad input. The telephone-computer includes telephone electronics and a microprocessor unit operated in conjunction with other computer elements, including memory devices, and a programmable gate array (PGA) chip and enhanced integrity features, and has the overall appearance of a telephone. The PGA has the capability of being reconfigured to accommodate various types of softwares which require different hardware configuration, but without actually reconfiguring the hardware. The telephone-computer delivers data processing capabilities and services through an ordinary telephone instrument via conventional telephone lines with a network host computer which communicates with a vast panoply of service bureaus. Specifically, operating software is downloaded to the telephone-computer by the network host computer to reconfigure the PGA to format the microcomputer necessary to conform to the software format used by the service bureaus.