摘要:
Embodiments of the invention provide techniques for basing access control decisions at the network layer at least in part on information provided in claims, which may describe attributes of a computer requesting access, one or more resources to which access is requested, the user, the circumstances surrounding the requested access, and/or other information. The information may be evaluated based on one or more access control policies, which may be pre-set or dynamically generated, and used in making a decision whether to grant or deny the computer access to the specified resource(s).
摘要:
Devices, kits and/or methods for, or related to, creating a plurality of openings in a skin graft or skin substitute are described. The devices can have a plurality of perforating elements extending from a perforation component that can be safely held and manipulated by a user. The user can apply sufficient force to the perforating elements against the skin graft or skin substitute to enable the extended ends of the perforating elements to pass through the skin graft or skin substitute as to create openings therethrough.
摘要:
Systems and methods are provided for identifying pages that can be authoritatively, to some confidence level or another, associated with a geographic location, and systems and methods for grouping documents such that authoritative location associations can be propagated from pages with higher location confidence to pages with lower location confidence. Pages might be identified with authoritative indicators, groups of pages identified including at least one addressed page and at least one unaddressed page, wherein an addressed page is a page having a higher confidence level than an unaddressed page, and at least one processing step performed that is location specific. The confidence level assigned to a page as part of the process represents the confidence that the page is associated with an identifiable geographic location, with documents having a high confidence level being determined to be strongly associated with a particular geographic location while documents having a low confidence level being determined to be weakly associated with a particular geographic location or not associated at all with a geographic location.
摘要:
Dynamically suggested information helps users navigate collections of information and the underlying reference items in the collections with a reduced need to perform search queries. For example, a user browsing an Internet sports site might be shown dynamically generated links to fantasy sports websites, sports and team message boards, and other sports-related sites. Clicking on a dynamically generated link, such as a fantasy sports website link, redirects the user to a new site. When the user arrives at the new site, the dynamically generated links and any other suggested information are automatically updated.
摘要:
A method for creating a specific POSIX style locale source file, on demand, suitable for compilation in a computer is provided the method comprising, receiving a request submitted for the specific POSIX style locale, and obtaining a plurality of localization values related to the specific POSIX style locale. Next, determining a category within the plurality of localization values and selecting process routines dependent upon the category, and then selectively extracting the category information. After extracting the category information is stored into a memory of the computer. A determination is made regarding more categories to process, which might result in processing the remaining categories, otherwise assembling the extracted information into the POSIX style locale source file. Assembling may entail addition of no files or files such as LC-CTYPE and LC_COLLATE to form a locale source suitable for compilation.
摘要:
A method, system, program product and signal bearing medium are provided for creating a specific Java style locale source file on demand in a computer suitable for application use. In particular the method comprises receiving a request submitted for the specific Java style locale and obtaining a plurality of localization values related to the specific Java style locale. Next operation determines a category containing elements therein within the plurality of localization values and selecting process routines dependent upon the category and the element therein. The method continues by selectively extracting the localization values pertaining to the category by the selected routines and storing the extracted localization values into a memory of the computer. The method completes with assembling the extracted information into the Java style locale source file for application use. The method further comprises determining additional categories, for each additional category, selecting process routines dependent upon the additional category containing elements therein, and selectively extracting the localization values pertaining to the additional category and the elements therein by the selected process routines; and the storing of the extracted localization values into a memory of the computer.
摘要:
A computer implemented method for preparing a plurality of stream oriented locale files for verification is provided. In an embodiment there is a method comprising obtaining at least one of the plurality of stream oriented locale files as input, determining more than one of a plurality of stream oriented locale files, merging the plurality of stream oriented locale files into a stream oriented locale file, otherwise; locating a respective portion of the stream oriented locale file, creating an output portion from the respective portion by selectively invoking a process based on the respective portion, storing the output portion in a memory and formatting the output portion, stored in the memory, into a formatted string. The formatted string may then be viewed by a user verifier or programmatically verified using reference strings. This form of verification is performed using typical system utilities and scripting services.
摘要:
A single file, such as an HTML document, is logically divided into multiple articles that can be individually recognized and ranked by search engines. The segmentation of a document into separate articles is based upon tokens that are used in document mark-up languages. In addition to the tokens which delineate articles from one another, additional tokens, or tags, are used to create a named location for each article, so that a browser can immediately display an article within a document that is relevant to a search query.
摘要:
A method of aiding in the reduction of the incidence of tobacco smoking which comprises, in one embodiment, the application of a nicotine containing dermally applicable patch such that the nicotine in the patch is allowed to transdermally migrate into the bloodstream at a rate sufficient to correspond to the nicotine level in the blood achieved by tobacco smoking. Simultaneously therewith, the method involves the oral application of a low concentration nicotine aerosol spray having a selected droplet size and selected concentration of nicotine. In another embodiment, the invention resides in the use of the transdermal application of nicotine alone and in a further embodiment, the method resides in the use of the low concentration nicotine aerosol spray alone. Further, a device for applying the low dose nicotine aerosol spray is also provided.
摘要:
A policy enforcement system may use device location as a parameter for granting or denying access to a resource. An access policy may include location parameters that may permit or deny access to the resource based on the physical location of the device. In some cases, the location may be authenticated by a server that may verify the device's location. The access policy may grant or deny full or partial access to the resource, which may be a data resource, such as a file, database, URL, or other information, an application resource, or a physical resource such as a network or a peripheral device. The policy enforcement system may use the device location for regulatory compliance, restricting access to sensitive information, or as a primary or secondary condition for limiting access to a resource.