Abstract:
Embodiments disclosed can provide a simple, singular programmatic interface for application developers to access and manipulate ASCII and non-ASCII file specifications in a cross-platform development environment regardless of operating system encoding capabilities or of the nature of the original file specification encoding. An application development environment is configured on a computer system such that a magic class file string object is instantiated when a bit string of a first encoding is received. The bit string represents a file specification of a file containing application code written by an application developer. The magic class file string object automatically determines what target operating system is being called by a function call in the application code, automatically transcodes the bit string from the first encoding into a second encoding of the target operating system, and automatically makes a correct file system API call specific to the target operating system.
Abstract:
One embodiment of the present invention creates a model of the traffic through a network firewall and uses that model to dynamically manipulate the network firewall based on human intervention or based on the automatic invocations of processes and protocols that implement firewall policy. Another embodiment of the invention creates a model of the physical and virtual network interfaces that a firewall system controls and presents abstracted entities representing both the interface abstractions and the processing nodes (network segments or network client devices) to and through which network traffic flows.
Abstract:
An exercise apparatus to simulate climbing is described that includes such features as arm handles that move in synchronism with the motion of foot pedals to provide a total body workout; side handrails; a mounting step; linear foot movement at a simulated climbing angle; a three point support structure using a vertical support column; pedal track covers; a mechanism to provide constant resistance to pedal motion; and pedal impact absorption.
Abstract:
In the course of forming a resistor in the back end of an integrated circuit, an intermediate dielectric layer is deposited and a trench etched through it and into a lower dielectric layer by a controllable amount, so that the top of a resistor layer deposited in the trench is close in height to the top of the lower dielectric layer; the trench is filled and the resistor layer outside the trench is removed, after which a second dielectric layer is deposited. Vias passing through the second dielectric layer to contact the resistor then have the same depth as vias contacting metal interconnects in the lower dielectric layer. A tri-layer resistor structure is employed in which the resistive film is sandwiched between two protective layers that block diffusion between the resistor and BEOL ILD layers.
Abstract:
A method and system are provided for native-byte form handling, one embodiment comprising a method for encoding user-submitted native-byte form data in a client-server computer network. A user, at a client computer, can select a Uniform Resource Locator (“URL”) with his or her web browser for access to a content provider's website. When accessing the content provider's web server, the client computer can transmit client computer specific information to the web server that can be used by the web server to determine the user's locale. The web server can determine the user's (client computer's) locale using, for example, an automatic locale detection algorithm, and forward the user's locale information to a back-end server. The content provider's back-end server can generate a locale-specific form having a pre-populated, uniquely-named field, using, for example, a dynamic page generation program. The locale-specific form can be served to the user's web browser for display to the user. The user can enter, on the locale-specific form, information that he or she wishes to submit to the content provider (e.g., a request for content). The user can transmit the form-entered data, including the pre-populated, uniquely-named field, to the content provider's web server. The web server can process the user form data, and an encoding object can be created, based on the value of the pre-populated field. The user form data can then be transcoded from its original encoding to a new encoding (e.g., the content provider's scripting environment encoding) and forwarded to the content provider's scripting environment.
Abstract:
A method and system are provided for native-byte form handling, one embodiment comprising a method for encoding user-submitted native-byte form data in a client-server computer network. A user, at a client computer, can select a Uniform Resource Locator (“URL”) with his or her web browser for access to a content provider's website. When accessing the content provider's web server, the client computer can transmit client computer specific information to the web server that can be used by the web server to determine the user's locale. The web server can determine the user's (client computer's) locale using, for example, an automatic locale detection algorithm, and forward the user's locale information to a back-end server. The content provider's back-end server can generate a locale-specific form having a pre-populated, uniquely-named field, using, for example, a dynamic page generation program. The locale-specific form can be served to the user's web browser for display to the user. The user can enter, on the locale-specific form, information that he or she wishes to submit to the content provider (e.g., a request for content). The user can transmit the form-entered data, including the pre-populated, uniquely-named field, to the content provider's web server. The web server can process the user form data, and an encoding object can be created, based on the value of the pre-populated field. The user form data can then be transcoded from its original encoding to a new encoding (e.g., the content provider's scripting environment encoding) and forwarded to the content provider's scripting environment.
Abstract:
A light weight, strong and flexible, braided electrical fence rope, for fences to contain livestock and keep unwanted animals out, combines in its outer braided jacket electrically conductive elements with high strength non-conductive elements in a double helix configuration. The outer braided jacket will preferably surround an inner core of non-conductive high strength elements. The high strength non-conductive elements and the physical properties of the braided rope construction provide inherent strength and flexibility properties to the fence rope. The conductive elements in the outer braided jacket are selected to provide an effective electric shock when contacted by an animal. This electric fence rope combines barrier strength and psychological deterrence to both domestic and wild animals.
Abstract:
Embodiments disclosed herein provide a system, method, and computer program product for providing network access control for a shared network. One embodiment of a network access controller may intercept a request to access a network resource from a browser application running on a client device associated with an anonymous user and determine whether the network resource is in a set of network destinations in the shared network. If the network resource is in the set of network destinations, the network access controller may direct the browser application to the network resource. If the network resource is not in the set of network destinations, the network access controller may redirect the browser application to a pre-authentication capture destination in the shared network. From the pre-authentication capture destination the anonymous user is free to visit any of the set of network destinations in the shared network without authentication.
Abstract:
Embodiments disclosed herein provide a system, method, and computer program product for obtaining secure connectivity between networked computing devices. The invention comprises utilizing a network protocol inherent to an operating system on a client device to automatically set up and establish a transient secure network connection endpoint on the client device. The act of utilizing can be a result of a server device responding to a connection request from the client device. The act of establishing the transient secure network connection endpoint on the client device creates a transient secure network connection between the server device and the transient secure network connection endpoint on the client device without manual intervention or configuration by a user at the client device. Secured access by the client device to one or more network devices is permitted until the transient secure network connection between the server device and the client device is severed.