摘要:
A system has a local area network, and software to automatically evaluate a network layer address, a lower layer address, a network port identifier, and/or a domain name of an equipment interface that is to be connected to the network. The software is to determine whether one of these matches an expected value for the network. The software is to provide a credential for each equipment interface that is authorized to connect to the network and that has been authenticated by the software. The credential contains a lower layer address, a network layer address, a domain name, and a network port identifier. Other embodiments are also described and claimed.
摘要:
A system has a local area network, and software to automatically evaluate a network layer address, a lower layer address, a network port identifier, and/or a domain name of an equipment interface that is to be connected to the network. The software is to determine whether one of these matches an expected value for the network. The software is to provide a credential for each equipment interface that is authorized to connect to the network and that has been authenticated by the software. The credential contains a lower layer address, a network layer address, a domain name, and a network port identifier. Other embodiments are also described and claimed.
摘要:
A method and apparatus for an integrated security framework. An embodiment of a method comprises identifying network paths for a system; identifying products and platforms for the system; applying application security for the system; analyzing security status for the system; and, based at least in part on the analysis of the security status, automatically identifying changes for the network paths for the system or the products and platforms for the system.
摘要:
An embodiment of an electronic processing apparatus may include a database constructor to construct a dependency database of deployed components in an environment, a vulnerability tracer to trace a vulnerability against the dependency database and to determine one or more affected deployed components based on the trace, and a vulnerability resolver to retrieve environment-specific rules based on the determined one or more affected deployed components and to prioritize mitigation of the vulnerability for the one or more affected deployed components based at least in part on the retrieved environment-specific rules.
摘要:
A method and apparatus for an integrated security framework. An embodiment of a method comprises identifying network paths for a system; identifying products and platforms for the system; applying application security for the system; analyzing security status for the system; and, based at least in part on the analysis of the security status, automatically identifying changes for the network paths for the system or the products and platforms for the system.
摘要:
A method for determining a networking capability index (NCI), which is representative of the load a computer applies to a computer network. The method includes selecting a group of packet sizes, measuring the capability of the computer to transmit packets of each of the selected sizes from the process application to the input/output kernel as a function of time, and determining a probability distribution for the selected packet sizes, wherein the probability distribution for a selected packet size is representative of the percentage of total traffic corresponding to the selected packet size. The method then determines the NCI by summing the product of each selected packet size times each corresponding throughput value times each corresponding probability distribution value. Also a method for load balancing a plurality of networked computers arranged in segments by determining the NCI for each of the networked computers, and selectively connecting the computers to have approximately equal combined NCI values for all segments.
摘要:
A method for translating complex process flow networks into plans or schedules for the manufacturing of products or the performance of other organizational activities is disclosed. The method maintains a time-valued list of existing commitments to resources. Allocations of these resources are made to lots during a simulation procedure which calculates a resulting plan's timing data. The method simulates higher priority lots before it simulates lower priority lots. A simulation evaluates the process flow description to obtain the relative order of consuming and releasing resources, resource attributes and related capabilities, initial minimum timing requests, and process control rules. The simulation uses the list to determine when resources may be used without impacting prior commitments of the resources. In addition, the simulation forces the allocations to conform to the process control rules. The resulting timing data is merged into the processing plan, and resource commitments are then made to the simulated resource. When lower priority lots are simulated, commitments have already been made to higher priority lots. Thus, the lower priority lots cannot receive resource allocations which impact the higher priority lots. However, the lower priority lots may receive allocations which occur prior to contending allocations to higher priority lots.