摘要:
Techniques to facilitate security for a software application are disclosed herein. In at least one implementation, static analysis is performed on code resources associated with the software application to generate static analysis results. Dynamic analysis is performed on a running instance of the software application to generate dynamic analysis results. An application information model of the software application is generated based on the static analysis results and the dynamic analysis results. Security policies for the software application are determined based on the application information model.
摘要:
An apparatus may include a virtual flash device configured to emulate a flash memory device. The virtual flash device may include a flash interface configured to communicate with a flash controller, an address translation module configured to translate memory addresses from a flash based memory space to another memory space of another memory, a metadata and control module configured to manage metadata from the emulation of the flash memory device, and a non-flash memory controller configured to communicate with the other memory.
摘要:
An apparatus may include a circuit configured to generate, by an analog to digital converter (ADC), one or more ADC samples based on an input signal. The circuit may be further configured to generate a first estimated signal using a first channel pulse response estimation with a gain constraint based on the one or more ADC samples and generate a second estimated signal using a second channel pulse response estimation with a phase constraint based on the one or more ADC samples.
摘要:
In embodiments of the present invention improved capabilities are described for developing, training, validating and deploying discovery avatars embodying mathematical models that may be used for document and data discovery and deployed within large data repositories. For example, an avatar may be constructed by machine learning processes, including by processing information related to what types of information analysts find useful in large data sets. Once constructed, an avatar may be deployed as an aid to human intuition in a wide range of analytical processes, such as related to national security, enterprise management (e.g., programs related to sales, marketing, product, promotions, placement, pricing and the like), dispute resolution (including litigation), forensic analysis, criminal, administrative, civil and private investigations, scientific investigations, research and development, and a wide range of others.
摘要:
Systems, methods, apparatuses, and software for data storage systems are provided herein. In one example, a data storage assembly is provided. The data storage assembly includes a plurality of storage drives each comprising a PCIe host interface and solid state storage media, with each of the storage drives configured to store and retrieve data responsive to storage operations received over an associated PCIe host interface. The data storage assembly includes a PCIe switch circuit coupled to the PCIe host interfaces of the storage drives and configured to receive the storage operations issued by one or more host systems over a shared PCIe interface and transfer the storage operations for delivery to the storage drives over selected ones of the PCIe host interfaces. The data storage assembly includes holdup circuitry configured to provide power to at least the storage drives after input power is lost to the data storage assembly.
摘要:
A system and method for peer-to-peer gaming is described. One embodiment includes a system for peer-to-peer gaming, the system comprising an at least one gaming client, wherein the at least one gaming client is configured to accept a selection of an at least one gaming option from a player, and allow the player to play a game based on the selection of the at least one gaming option; an administration server, wherein the administration server is configured to receive the selection of the at least one gaming option from the at least one gaming client, and initiate the game for the player based on the selection of the at least one gaming option; and an at least one gaming server, wherein the at least one gaming sever is configured to run the game and transmit data about the game to the administration server.
摘要:
The invention relates to a cosmetics applicator having a handle section, an applicator element and a shaft section connecting the applicator element and the handle section, wherein the applicator element includes a core element of a first material and a bristle element which at least partially envelops the core element and includes a second material preferably different from the first material with regard to its hardness and/or flexibility.
摘要:
The invention relates to an applicator device comprising a carrier having an application element covering, which includes a plurality of application elements. At least one application element has, along its longitudinal extent, at least one first section closer to the carrier and at least one second section more distant from the carrier, and at least one section of the application element has a curved central longitudinal axis. Central longitudinal axes or their end tangents of the first and second sections, in a transitional zone from the first to the second section, converge in at least one projection onto a sectional plane through the application element so as to form a bend.
摘要:
The invention relates to a method for continuously determining the concentration of at least one CN compound in an aqueous solution, wherein a carrier gas, for example compressed air, is introduced into the aqueous solution and the introduced carrier gas is fed at least partially to a gas analyzer, for example an HCN gas analyzer, the analysis data of which are considered in the determination of the concentration of the CN compound in the aqueous solution. In order to create advantageous method conditions, the temperature of the aqueous solution exposed to carrier gas is considered in the determination of the concentration of the CN compound.
摘要:
The invention relates to a wiper for wiping off a cosmetics applicator, in particular a wiper for mascara mass applicators, that includes a retaining section for fixing the wiper on a cosmetics storage container. The wiper includes a number of wiper lamellas that shift in a more than just insubstantial extent in a circumferential direction solely under the influence of forces produced by withdrawal of the applicator.