摘要:
In one example, a customizable nonlinear electrical device includes a first conductive layer, a second conductive layer, and a thin film metal-oxide layer sandwiched between the first conductive layer and the second conductive layer to form a first rectifying interface between the metal-oxide layer and the first conductive layer and a second rectifying interface between the metal-oxide layer and the second conductive layer. The metal-oxide layer includes an electrically conductive mixture of co-existing metal and metal oxides. A method forming a nonlinear electrical device is also provided.
摘要:
A BIOS controlled peripheral device port power device is described. The device includes a processor and at least one peripheral device port. The processor powers up a host controller in preparation for the processor to enter a sleep state. The processor also places the processor in the sleep state after the host controller is powered up. The processor also selectively powers the at least one peripheral device port by the host controller when the processor is in the sleep state according to at least one setting stored in the processor.
摘要:
In carrying out a task that consumes data from a one-time pad, task inputs comprising at least first data and second data from the pad, are combined together to form an output from which the data used from the pad cannot be recovered without knowledge of at least one of the first and second data. The task concerned can be, for example, the encrypting of a message or the creating of an attribute verifier.
摘要:
A device includes a hermetically sealed case with electronic circuitry housed within. One surface of the hermetically sealed case includes a metallic plate and a co-fired ceramic electrical feedthrough with a number of vias. The co-fired ceramic electrical feedthrough is hermetically joined to the metallic plate and a hybrid circuit is connected to the feedthrough.
摘要:
A method for providing a dynamic web portal page in a web portal environment by modifying the web portal page, the method comprising, with a server, providing a content with one or more portlets of the web portal page to a user; entering code from the server for identifying user-interface elements in the content of the web portal page; entering code from the server into the provided content of the web portal page for monitoring user actions related to the identified user-interface elements in the content of the web portal page; re-configuring automatically the content of the web portal page according to a user-specific preference extracted from the monitored user actions for the user at a later stage.
摘要:
An active agent combination of (a) at least one water-soluble polymer comprising at least one *—Si(OR)x(R′)3-x residue, in which R and R′, independently of one another, denote a (C1 to C4)alkyl group, and x denotes 1, 2 or 3, and (b) at least one polar alkoxysilane compound of formula (SI), in which G denotes a (C1 to C3)alkylene group, K″ denotes a connectivity selected from a covalent bond or from a molecular fragment having two free valences, R1 denotes a molecular fragment comprising at least one polar substituent selected from the group consisting of quaternized nitrogen atoms, amino groups, anionic residues, and combinations thereof, x denotes 1, 2 or 3, R and R′, independently of one another, denote a (C1 to C4)alkyl group, is suitable for improving synthetic colorings of coloring compounds on keratin-containing fibers.
摘要:
A method for executing a plurality of processing requests performed by a physical computing system that is programmed to execute the processing requests for clients includes, with the physical computing system, assigning an identification number to a new processing request; with the physical computing system, placing the new processing request into a process eligible group if the identification number of the new processing request meets a criterion; and with the physical computing system, placing the processing request into a queued group if the identification number of the processing request does not meet the criterion.
摘要:
In one example, a long endurance airship system includes a payload airship and a first logistics airship mechanically joined to the payload airship to form a first combined airship, the payload airship and the logistics airship having design capabilities differing by at least a factor of two with regard to at least one of: power generation capability, propulsion capability, endurance capability, and lift capability, in which the first combined airship is free flying, lighter-than-air, and configured to maintain aloft for greater than 30 days without physical connection to the ground. Illustrative methods for long endurance airship operations are also provided.
摘要:
A security method for in-flight entertainment device (IFED) rentals having self-contained, audiovisual presentations is disclosed. A self-contained IFED has internal storage configured to contain current releases of movies and other audiovisual presentations. The method provides layers of security including unique bit stream encoding format, watermarking, camera artifacts, file encryption, hard drive encryption, input-output encryption and physically unique connectors, and tamper resistant casing the self-contained IFEDs.
摘要:
A system for monitoring and mitigating client-side exploitation of application flaws, the system comprising a client device operating an application, a server communicatively coupled to the client device, and an application flaw service module communicatively coupled to the client device and server in which the application flaw service module receives a request from the client device comprising transactional metadata and inspecting the transactional metadata for malicious content within the request. A method of monitoring and mitigating client-side exploitation of application flaws by adding computer usable program code to the response to a first request from a client, receiving a second request from the client, determining that transactional metadata within the response contains an attack vector, and returning a response to the browser including attack vector countermeasures embedded in the response.