摘要:
Mechanisms are provided for automatic address range detection for an IP network. Flow data is obtained comprising the source or destination IP addresses for the flow and one of: the other of the source or destination IP addresses; or direction data identifying the flow direction across the network boundary. A tree is generated representing IP addresses in the flow data. IP addresses with initial portions in common are represented in the tree with a node in common. Weights are assigned to nodes in the tree based on occurrences of the represented IP addresses in the flow data. The IP address range of the network is detected by identifying, based on the assigned weights, the node associated with the last initial address portion common to all IP addresses in the network. A device is automatically configured with the IP address range to differentiate IP addresses inside and outside the network.
摘要:
A method, article of manufacture, and system for indicating underutilized network devices that provide services in a data communications network. The method includes: receiving network traffic data; filtering the network traffic data to eliminate data for predefined connections; producing, from the filtered network traffic data, a graph representing a connection between a first device and a second device within the data communications network; analyzing the graph to identify a set of interconnected nodes that is outside the data communications network; and indicating an underutilized network device by producing an output dependent on traffic rate data associated with a link to the identified set of interconnected nodes that is outside the data communications network.
摘要:
Mechanisms are provided for automatic address range detection for an IP network. Flow data is obtained comprising one of the source and destination IP addresses for the flow and one of (a) the other of the source and destination IP addresses and (b) direction data indicative of the flow direction across the network boundary. A tree data structure is generated representing the IP addresses in the flow data. IP addresses with initial portions in common are represented in the tree with at least one node in common. Weights are assigned to nodes in the tree in dependence on occurrences of the represented IP addresses in at least a subset of the flow data. The IP address range of the network is then detected by identifying, in dependence on the assigned weights, the node associated with the last initial address portion common to all IP addresses in the network. A device is automatically configured with the IP address range to permit distinction between IP addresses inside and outside the network in operation of the device, e.g. for filtering or traffic classification.
摘要:
Cationic starch graft copolymer composed of the monomers a) to d) a) 20-80% by weight of acrylamide, methacrylamide or mixtures thereof, b) 3-20% by weight of at least one basic or cationic vinyl monomer, c) 0.005-1.5% by weight of at least one bifunctional or higher-functional crosslinking agent, d) 0-10% by weight of at least one nonionic or anionic vinyl monomer which differs from the monomers mentioned under a) to c) and a grafting base e) e) 15-70% by weight of at least one starch or one starch derivative, the sum of a) to e) being 100% by weight.
摘要:
A first virtualization layer is inserted between (i) an operating system of a computer system, and (ii) at least first and second hardware devices of the computer system. Data is communicated between the first hardware device and the second hardware device, via the first virtualization layer, without exposing the data to the operating system.
摘要:
A virtualization layer is inserted between (i) an operating system of a computer system, and (ii) at least one of a memory module and a storage module of the computer system. At least one of read access and write access to at least one portion of the at least one of a memory module and a storage module is controlled, with the virtualization layer. The insertion of the virtualization layer is accomplished in an on-the-fly manner (that is, without rebooting the computer system) An additional aspect includes controlling installation of a security program from the virtualization layer.
摘要:
A method for protecting the integrity of a set of memory pages to be accessed by an operating system of a data processing system, includes running the operating system in a virtual machine (VM) of the data processing system; verifying the integrity of the set of memory pages on loading of pages in the set to a memory of the data processing system for access by the operating system; in response to verification of the integrity, designating the set of memory pages as trusted pages and, in a page table to be used by the operating system during the access, marking non-trusted pages as paged; and in response to a subsequent page fault interrupt for a non-trusted page, remapping the set of pages to a region of the data processing system memory which is inaccessible to the virtual machine.
摘要:
The present invention relates to a specific process in which wool is initially subjected to a plasma treatment and then to a wet chemical treatment with a finishing agent, which provides nonfelting wool in a technically simple and easily handleable manner.
摘要:
The use of water-dispersible polyisocyanates with anionic and/or potentially anionic groups and cationic and/or potentially cationic compounds in paper finishing leads not only to higher retention but also to improved dry and wet strength and sizing.
摘要:
Liquid crystalline bis-chlorocarbonic acid esters are 4-hydroxybenzoic acid-(4'-hydroxyphenyl) esters corresponding to the following formula ##STR1## wherein R.sub.1, R.sub.2, R.sub.3 and R.sub.4 denote, independently of one another, hydrogen, a halogen atom or a C.sub.1 to C.sub.6 alkyl group. Preparation of (I) and liquid crystalline N-alkyl polyurethanes and polycarbonates prepared from (I) are other invention embodiments.