摘要:
A firearm cartridge magazine system comprises one or more sidewalls extending between a base and an upper opening, wherein a hollow interior is defined by the base and the one or more sidewalls, wherein the upper opening opens into the hollow interior. An aperture is positioned on at least one of the one or more sidewalls between the opening and the base. A spring extends between a block and the base, wherein the spring and block are within the hollow interior.
摘要:
A method, computer program product, and device for detecting a reconnaissance of a network through the identification of the information flowing from the network to external sources are provided. The method may include monitoring the information flowing from the network to external sources in order to identify what properties may have been revealed to a potential attacker. The method may include monitoring a response of the network to an inquiry from an external source, determining potential properties of the network that may have been revealed from the response, storing the potential properties in a data repository, and determining a possible reconnaissance of the network based on the properties stored in the data repository. Determining the potential properties of the network revealed by the response may include comparing the response to one or more information templates. Each information template may be associated with one or more properties of the network.
摘要:
An approach is provided for distributing video signals. A digital video feed is received at a media distributor that includes a plurality of decoders and a corresponding plurality of modulators, wherein the digital video feed includes a plurality of video channels. The decoders decode the digital video feed to output analog video signals. The modulators modulate the analog video signals; and a combiner combines the outputs of the modulators to generate a channelized video signal.
摘要:
An approach for tracking documents using image processing is disclosed. Auxiliary information corresponding to compressed digital information is extracted. The auxiliary information is used to output text lines, which undergo a hash function (e.g., checksum operation). In this manner, individual hash values are generated, as well as an overall hash value of the entire file of text lines. A reference set of hash values are maintained to identify other compressed digital information.
摘要:
An approach is provided for distributing video signals. A digital video feed is received at a media distributor that includes a plurality of decoders and a corresponding plurality of modulators, wherein the digital video feed includes a plurality of video channels. The decoders decode the digital video feed to output analog video signals. The modulators modulate the analog video signals; and a combiner combines the outputs of the modulators to generate a channelized video signal.
摘要:
A method, computer program product, and device for detecting a reconnaissance of a network through the identification of the information flowing from the network to external sources are provided. The method may include monitoring the information flowing from the network to external sources in order to identify what properties may have been revealed to a potential attacker. The method may include monitoring a response of the network to an inquiry from an external source, determining potential properties of the network that may have been revealed from the response, storing the potential properties in a data repository, and determining a possible reconnaissance of the network based on the properties stored in the data repository. Determining the potential properties of the network revealed by the response may include comparing the response to one or more information templates. Each information template may be associated with one or more properties of the network.
摘要:
An approach for tracking documents using image processing is disclosed. Auxiliary information corresponding to compressed digital information is extracted. The auxiliary information is used to output text lines, which undergo a hash function (e.g., checksum operation). In this manner, individual hash values are generated, as well as an overall hash value of the entire file of text lines. A reference set of hash values are maintained to identify other compressed digital information.
摘要:
A system and method is disclosed for providing a reward-based digital mobile coupon environment, where the digital coupons may be shared among peers. Consumers utilize mobile digital coupon carriers having digital representations of coupons. Sharing of coupons among peers may be rewarded with additional discounts or points. The digital coupon carriers communicate with electronic coupon terminals at retail locations for automatic coupon redemption. A coupon may correspond to a globally unique identifier in order to track usage, sharing and redemption. Coupon use and sharing may be dependent upon stored user profiles, merchant profiles and policies, or programs embedded in the coupon.
摘要:
A method, apparatus, and system are provided for reducing register file bandwidth using bypass logic control. According to one embodiment, a source code is translated into an intermediate code, which is then to be translated into an executable code. A bypass control logic description file is accessed to perform a lookup of description information at the description file. The description information is then used to compile the intermediate code into the executable.
摘要:
A cryptographically scrubbable disk performs erasure of a cryptographic key covering a body of data to render the body of data unintelligible. A scrub controller interfaced between a computing appliance and a storage volume generates a scrub key and encrypts each block of data written to the storage volume using the scrub key. Data read commands decrypt using the same key. The scrub controller is an electronically separate conduit having independent memory and power, thus the scrub key remains within the scrub controller and unexposed, and is thus inaccessible via the processor of the computing appliance. The scrub key remains in the scrub controller such that the scrub key never leaves the scrub controller and is also inaccessible to retrieval since the scrub controller does not share memory or access with the computer and is thus electronically separate from the supported computing appliance.