Abstract:
The protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.
Abstract:
The invention provides a method for the preparation of a foamed drink comprising the steps of: providing a capsule containing a foamable ingredient; providing a receptacle positioned to collect fluid escaping from the capsule; injecting liquid into the capsule to mix with the foamable ingredient; allowing the foamable ingredient mixed with the liquid to escape from the capsule into the receptacle; followed by injecting further liquid into the receptacle in a jet having a diameter of from about 0.5 to about 2 mm to produce foamed liquid in the receptacle. The invention also provides capsules, apparatus and systems specifically adapted for use in the method. Preferably, the food ingredient is a milk powder, and the method produces a hot foamed beverage such as a cappuccino coffee.
Abstract:
Short messages are formatted as control messages in a communication network but do not control the communication network. Techniques for dynamically distributing short messages include remotely reprogramming a control node that processes control messages for the communications network to change processing of short messages without further involvement by a vendor of the control node. In some embodiments, this involves sending provider data that includes a special parameter set, a special value set, and a special action set. The special parameter set includes at least one parameter among multiple parameters in multiple network protocol headers for a data packet that includes a short message. The special value set includes at least one value for each parameter in the special parameter set. The special action set includes at least one action of multiple actions for forwarding a short message.
Abstract:
A controlled stent-graft deployment delivery system (10 50 or 900) includes a stent-graft (30 or 63), a retractable primary sheath (40) containing the stent-graft in a first constrained diameter configuration, an outer tube (18) within the retractable primary sheath and within the stent-graft, and an inner tube (20) within the outer tube, where the inner tube and the outer tube both axially move relative to the retractable primary sheath and to each other. The system further includes a cap (15) coupled to a distal end of the inner tube and configured to retain at least a portion of a proximal area of the stent-graft in a radially compressed configuration. A distal assembly (100) provides controlled relative axial movement between the outer tube and the inner tube enabling the release of the proximal end (65, 67, 68, and 69) of the stent-graft from the cap and from the radially compressed configuration.
Abstract:
Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card.The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.
Abstract:
The present invention provides for a breathing device comprising a reservoir bag, oxygen source, scrubber, and activation device. The oxygen source and an exit from the scrubber may be fluidly connected to the reservoir bag. The reservoir bag may be attached to a mouthpiece to provide inhalation air. Expired air may be exhaled through the mouthpiece and directed to an inlet for the scrubber. As a user breaths normally, expired air is scrubbed of undesired components, such as excess CO2. The scrubbed expired air is then mixed with generated oxygen, and delivered back to the user for inhalation. Additionally, the oxygen source and the scrubber may be replaced and/or replenished without interrupting or compromising a breathing cycle.
Abstract:
A beverage making system that includes a plurality of packs containing different beverage making ingredients and having different infrared reflectance spectra in a region thereof. A beverage making apparatus includes a station for receiving at least one of the packs; a source of liquid adapted to supply liquid into the at least one pack while the pack is located at the station; a system controller for controlling the supply of liquid from the source according to a beverage making program; and an infrared pack recognition system comprising an infrared light source for illuminating the region of the pack while it is located at the station. The apparatus also includes a detector for measuring an intensity of infrared light reflected from the region and for supplying an output signal to the system controller, whereby the beverage-making program is selected by the system controller in response to the output of the infrared pack recognition system.
Abstract:
Short messages are formatted as control messages in a communication network but do not control the communication network. Techniques for dynamically distributing short messages include remotely reprogramming a control node that processes control messages for the communications network to change processing of short messages without further involvement by a vendor of the control node. In some embodiments, this involves sending provider data that includes a special parameter set, a special value set, and a special action set. The special parameter set includes at least one parameter among multiple parameters in multiple network protocol headers for a data packet that includes a short message. The special value set includes at least one value for each parameter in the special parameter set. The special action set includes at least one action of multiple actions for forwarding a short message.
Abstract:
A system for providing a user interface includes an XML-based scene file that includes an element tag that specifies an element of the user interface. The system also includes an XML-based animation tag and an XML-based state tag. The animation tag includes an animator element for applying an animation to an attribute of the element. The state tag specifies a state of the element and references the animation tag such that the animation is applied to the attribute in response to the element entering the state. In addition, the system includes a parser to parse the scene file, the animation tag, and the state tag and to generate an object model that includes an element object corresponding to the element of the user interface. The system further includes a layout engine to determine a layout of the user interface and a rendering engine to render the user interface.
Abstract:
An engine is disclosed including at least one piston which is positioned within a toroidal piston chamber. A method of operating an engine is disclosed wherein a piston is advanced in a toroidal piston chamber past a first valve and the first valve is closed to form a first ignition chamber area located within the piston chamber between the first valve and the rear side of the piston. A second valve is closed ahead of the piston to form a first exhaust removal chamber area located within the piston chamber between the second valve and the front side of the piston, the exhaust removal chamber including exhaust gases from a preceding ignition which occurred in the first ignition chamber area. A fuel mixture is introduced into the first ignition chamber area and ignited thereby advancing the piston further along the toroidal piston chamber.