摘要:
Described herein are optical agents, including compositions, preparations and formulations, for monitoring the pH of a fluid. Optical agents described herein include photonic nanostructures and nanoassemblies including supramolecular structures, such as shell cross-linked micelles, that incorporate at least one linking group comprising one or more photoactive moieties that provide functionality as exogenous agents for a range of pH monitoring applications. Optical agents described herein comprise supramolecular structures having linking groups imparting useful optical and structural functionality. In an embodiment, for example, the presence of linking groups function to covalently cross link polymer components to provide a cross-linked shell stabilized supramolecular structure, and also impart useful optical functionality, for example by functioning as a fluorophore.
摘要:
A multi-stage switch system includes a line card chassis (LCC) and a fabric card chassis (FCC). The LCC is configured with multiple line cards (LCs) and the FCC is configured with a stage-2 switch element (S2). The multi-stage switch system further includes a first switch combination and a second switch combination. The first switch combination and the second switch combination are configured on the LCC and the FCC respectively, and multiple LCs establish cross communication through the first switch combination, the second switch combination, and the S2. The first switch combination includes a stage-1 switch element (S1) and a first buffer area and the second switch combination includes a stage-3 switch element (S3) and a second buffer area. The multi-stage switch system can forward packets within the chassis by means of buffering the packets when guaranteeing the three-stage packet forwarding, and thus reducing the bandwidth occupancy of the FCC.
摘要:
Methods, apparatus, and computer-accessible storage media for shadowing data stored on a local store to a remote store provided by a service provider. A gateway may be configured as a shadowing gateway on a customer network in response to receiving configuration information. The shadowing gateway may receive reads and writes to the local store. The gateway passes the requests to the local store, and also uploads write data indicated by the writes to the service provider to update a snapshot of the local store maintained by the service provider on the remote store. The write data may be buffered to a write log for uploading, and may be uploaded as blocks according to a block storage format used by the service provider. The shadowing process may be transparent to processes on the customer network. The shadowed data may be used to recover data on the local store.
摘要:
A URL reputation system may have a reputation server and a client device with a cache of reputation information. A URL reputation query from the client to the server may return reputation data along with probabilistic set membership information for several variants of the requested URL. The client may use the probabilistic set membership information to determine if the reputation server has additional information for another related URL as well as whether the classifications are inheritable from one of the variants. If the probabilistic set membership determines that the reputation server may have additional information, a query may be made to the reputation server, otherwise the reputation may be inferred from the data stored in the cache.
摘要:
A multi-stage switch fabric (SF) is provided. The multi-stage SF includes a line card chassis (LCC) and a fabric card chassis (FCC). The FCC includes a stage-1 switch element (S1), a stage-2 switch element (S2), and a stage-3 switch element (S3), where the S3 corresponds to the S1, and the S2 is coupled to the S1 and S3 respectively. The LCC includes an interface component and a line card (LC) coupled to the interface component, where the interface component is coupled to the S1 and S3 in the FCC respectively. Through the technical solution under the present invention, when a switch element generates flow control information and requires another switch element or an LC to respond to the flow control information, a timely response can be received.
摘要:
Techniques for buffering and resending data in order to reduce data loss during handover are described. A network controller may determine whether or not to buffer data for a user equipment (UE). The network controller may continuously buffer a predetermined amount of latest data sent to a serving Node B if a decision is made to buffer the data for the UE. In one design, the network controller may send data for the UE to a source Node B, perform handover of the UE from the source Node B to a target Node B, resend to the target Node B a portion of the data sent previously to the source Node B, and send new data for the UE to the target Node B. e.g., after the resent data. The buffer and resend feature may be selectively enabled or disabled for each data flow for the UE.
摘要:
The invention provides a system and method for managing cached objects using notification bonds. A server is configured to manage original objects. A client creates cached objects from the original objects and establishes notification bonds with the server. Each notification bond enables the client to obtain a notification from the server in response to an object related event associated with an original object. The client uses the data in the notification to update the cache object corresponding to the original object without synchronizing other cache objects.
摘要:
A method, apparatus, and computer readable medium are provided by aspects of the present invention to determine whether a malware is resident on a host computer. In one embodiment, a method determines whether data that is characteristic of malware is loaded in the system memory of a host computer. More specifically, the method includes causing a device communicatively connected to a host computer to issue a request to obtain data loaded in the system memory. Then, when the requested data is received, a determination is made regarding whether the data is characteristic of malware. Since, the method causes data to be obtained directly from system memory without relying on software services on the host computer, malware that employs certain stealth techniques will be identified.
摘要:
A method and system for distributing and enforcing security policies is provided. A firewall agent executing at a host computer system that is to be protected receives security policies for the enforcement engines responsible for enforcing the security policies on the host computer system. A security policy has rules that each provide a condition and action to be performed when the condition is satisfied. A rule also has a rule type that is used by the distribution system to identify the security components that are responsible for enforcing the rules. To distribute the security policies that have been received at a host computer system, the firewall agent identifies to which enforcement engine a rule applies based in part on rule type. The firewall agent then distributes the rule to the identified enforcement engine, which then enforces the rule.
摘要:
Methods, apparatus, and computer-accessible storage media for optimizing block storage I/O operations in a storage gateway. A write log may be implemented in a block store as a one-dimensional queue. A read cache may also be implemented in the block store. When non-ordered writes are received, sequential writes may be performed to the write log and the data may be written to contiguous locations on the storage. A metadata store may store metadata for the write log and the read cache. Reads may be satisfied from the write log if possible, or from the read cache or backend store if not. If blocks are read from the read cache or backend store to satisfy a read, the blocks may be mutated with data from the write log before being sent to the requesting process. The mutated blocks may be stored to the read cache.