摘要:
Embodiments disclose a system and method for the integration of data and events to and from physical access control and security monitoring systems that is normalized to standardized definition for enforcement of standardized rules, created through a visual policy editor, affecting persistence, propagation of data and generation of alerts and notifications for physical security, network and IT systems. Data from disparate physical security systems is normalized for visual rule creation by rule object shapes representing normalized security systems, data and processes. A rules-based policy engine enforces security policies and generates actionable events. The overall system provides an integration platform, methods and processes for normalizing data from physical security systems, representation of physical security systems, data and processes for visual creation of rules using defined stencil objects, generating formatted rules, and enforcing these rules in real-time on security systems data and events.
摘要:
Embodiments are directed to systems and methods for integration and normalization of physical security data, states and events to and from disparate physical security systems to maintain in real-time rules based policy state information to enforce physical security policies uniformly across network and information technology (IT) systems. Moreover it pertains specifically to such apparatus for providing an integration platform, methods and processes for normalizing data from physical security systems, to maintain physical security states, mapping to network access and either directly affecting the network equipment through standard programming commands or providing interfaces for network equipment and IT applications to query and determine physical security access states thus enforcing rules in real-time based on security systems data and events.
摘要:
Provided are reagents and methods for administering an attenuated bacterium for use in treating a cancerous or infectious condition. Reagents and methods for administering an attenuated bacterium for use in inducing an immune response against a tumor, cancer cell, or infective agent are further provided. Also provided are methods of diagnosis and kits.
摘要:
A method including forming a photoimageable material on a substrate; developing the photoimageable material over an opening area, the photoimageable material over a first portion of the opening area developed to a first extent and the photoimageable material over a second portion of the opening area developed to a different second extent; removing developed photoimageable material from the opening area; and forming an opening in the substrate in the opening area.
摘要:
A method for making a semiconductor device is described. That method comprises forming a copper containing layer on a substrate, then forming a tantalum containing layer on the copper containing layer. After the tantalum containing layer is oxidized, an etch stop layer may be formed on the oxidized tantalum layer.
摘要:
A method for enabling targeted marketing of users on the Internet maintains the privacy of the users. The present invention takes advantage of the unique customer knowledge of an Internet Service Provider (ISP) with respect to both the customers identity and their likes and dislikes, while preserving the privacy of those customers. Data mining is performed on customers, including the sites that they visit. For example, customers with children are identified by visits to the Disney site. The availability of this list is then used to attract businesses with interest in this customer base. An offer, perhaps with enticements such as coupons or contests, is prepared on a Web site. The ISP then makes the customer aware of that offer via an E-mail with short text describing that offer and a Hypertext link to that page. The customer is informed that they may take advantage of the offer and as a convenience and service to the customer and the advertiser, the ISP will provide their identity to the advertiser. Only when the customer selects the embedded URL is their identity disclosed. The ISP will then identify the customer to the advertiser by associating the customer's temporary IP address with their true identity as a service to the advertiser. Billing will be determined by both the total number of E-mails delivered and the number of responses generated.
摘要:
A method for forming a copper interconnect (54) begins by depositing a barrier layer (48). An intermediate layer (50) is formed over the barrier layer (48) by exposing the barrier layer (48) to a plasma silane environment. The layer (50) is conductive when deposited so that contact resistance is not affected. The layer (50) is insitu covered with a copper seed layer (52). The layer (52) is not formed in an edge exclusion region (20) thereby exposing a portion (50a) of the layer (50). This portion (50a) will natively oxidize in a room ambient to form a copper electroplating prevention barrier whereby copper will not electroplate in the region (20). Therefore, the region (50a) prevents barrier-to-copper interfaces to avoid delamination of the copper while preserving the edge exclusion region desired for copper electroplating.