Abstract:
A method for determining the optimal design of a gain equalization filter (GEF) used in optical fiber amplifiers. The method is suitable for erbium-doped fiber amplifiers (EDFA) that are widely used in wavelength-division-multiplexed (WDM) optical communication systems and networks.
Abstract:
An optical amplifier that receives an optical signal at an input of the optical amplifier is arranged so that it amplifies the signal and then adjusts the level of the amplified input signal to a predetermined level. The optical amplifier, which includes a filter to substantially decrease the wavelength dependence of the optical amplifier, then amplifies the adjusted signal and supplies the resulting signal to an output.
Abstract:
Disclosed is a method and a system for using techniques to stitch cybersecurity, generate network risks and predictive mitigations. The method includes collecting data from several data sources and labeling events. The method includes creating a profile for each entity observed in the data with the behavior of the profile determined through the analytical analysis of the events in which the entity participates including the transference of labels from events to the entity. One or more profiles of an organization are identified that have changed and the change is processed using specific attack sequence detection to identify one or more risks associated with each profile. The method further includes notifying one or more users associated with the one or more profiles based on the one or more risks.
Abstract:
Disclosed is a method and a system a method and a system for auto learning, artificial intelligence (AI) applications development, and execution. Various applications or operations may be associated with training environment-agnostic AI models, automated AI app application performance monitoring, fault, quality and performance remediation through prediction of failures or suboptimal performance, privacy and secure AI training and inference mechanism for data and AI model sharing between untrusted parties, and building auto learning applications that can automatically learn and improve.
Abstract:
In one embodiment, a host controller is to couple to an interconnect to which a plurality of devices may be coupled. The host controller may include: a first driver to drive first information onto the interconnect; and a first receiver to receive second information comprising parameter information of at least one of the plurality of devices from the interconnect. The host controller may further include an integrity control circuit to receive the parameter information of the at least one of the plurality of devices and dynamically update at least one capability of the host controller based at least in part on the parameter information. Other embodiments are described and claimed.
Abstract:
The present invention relates to a method for manufacturing slurry for coating of electrodes for use in lithium ion batteries, wherein the method comprises mixing active materials with a binder into a binder solution, and adding an organic carbonate to the binder solution to generate the slurry. The present invention also relates to a method for manufacturing electrodes for a lithium battery cell, wherein the method comprises mixing active materials with a binder into a binder solution, adding an organic carbonate to the binder solution to generate slurry, wherein the above adding step is carried out at temperature above melting temperature of the organic carbonate, coating electrode material with the slurry, drying the coating on the electrode material by drying the organic carbonate, and surface treatment of the slurry so that the electrode is prepared for use in a lithium ion battery cell. Further, the invention also relates to a method for manufacturing a lithium ion battery cell.
Abstract:
Methods and systems for detecting social engineering attacks comprise: extracting one or more non-semantic data items from an incoming email; determining whether the one or more non-semantic data items match information stored in a data store of previously collected information; performing behavioral analysis on the one or more non-semantic data items; analyzing semantic data associated with the email to determine whether the non-semantic data matches one or more patterns associated with malicious emails; and based on the determining, performing, and analyzing, identifying the email as potentially malicious or non-malicious. The system also includes processes for collecting relevant information for storage within the data store and processes for harvesting information from detected social engineering attacks for entry into the data store and seeding of the collection processes.
Abstract:
Techniques are provided for offering a deal to a group of users, and for determining differential discounts for the users of the group that participate in the deal. A deal is offered to users of a group of users formed in association with a corresponding topic. Each user of the group is enabled to selectively accept the deal. The deal is confirmed with a plurality of users of the group that accepted the deal. Discounts for the deal are differentially assigned to the plurality of users based on at least one parameter such that at least two users that accepted the deal have discounts that are different from each other.
Abstract:
A request to print a file at a printer is received at a first computer system over a public network. Responsive to receiving the request, an indication of the request is exposed to the printer to enable fulfillment, by the printer, of the request to print the file.
Abstract:
Methods and systems for efficient file replication are provided. In some embodiments, one or more coarse signatures for blocks in a base file are compared with those coarse signatures for blocks of a revised file, until a match is found. A fine signature is then generated for the matching block of the revised file and compared to a fine signature of the base file. Thus, fine signatures are not computed unless a coarse signature match has been found, thereby minimizing unneeded time-consuming fine signature calculations. Methods are also provided for determining whether to initiate a delta file generation algorithm, or whether to utilize a more efficient replication method, based upon system and/or file parameters. In accordance with additional embodiments, the lengths of valid data on physical blocks are obtained from physical block mappings for the files, and these lengths and mappings are utilized for delta file generation, to minimize unnecessary signature computations.