Abstract:
Integrated circuits including a ferroelectric memory cell and methods for manufacturing the same. One embodiment of the memory cells include three main layers: a first oxide ferroelectric layer, a second oxide anti-ferroelectric layer, and a covering layer. The ferroelectric material of the first and second oxides include as main components oxygen and any of the group containing Hf, Zr, and (Hf, Zr).
Abstract:
A method and apparatus for evolving a shared to-do list into a business process is disclosed. A business process includes one or more business steps and zero or more action rules related to the business steps. Members of a workgroup participate in the business process and are able to view, modify, add and delete business steps and action rules as needed. An action rule is comprised of one or more business actions and one or more events that trigger the actions to be executed. A computer program keeps track of the business steps, interprets the set of rules, and updates states of the business process, notifies the members and validates and accepts modifications by the members to the action rules of a business steps.
Abstract:
A method includes generating a first table having a set of attributes for each file in a first set of files associated with a first computer user. The set of attributes for each file in the first set of files have a plurality of attribute types. The method further includes generating a second table having a set of attributes for each file in a second set of files associated with a second computer user. The set of attributes for each file in the second set of files have the plurality of attribute types. The method further includes generating a similarity table by comparing each set of attributes in the first table with each set of attributes in the second table, utilizing a predetermined similarity metric, and determining whether the first and second computer users have at least one file with common attributes, based on data in the similarity table.
Abstract:
Compounds having formula (I), and enantiomers, and diastereomers, stereoisomers, pharmaceutically-acceptable salts thereof, formula (I) are useful as kinase modulators, including Btk modulation.
Abstract:
A system and method for identifying anomalies in information requests. The information requests are modeled into a plurality of basic elements and association among the basic elements are tracked. The association of one information request is compared with a plurality of bitmap tables and counters representing a baseline information from a historical behavior information. If the association of this information request differs from the baseline information, an alert is issued. The system responds dynamically to changing baselines in assessment of which behaviors constitute an anomaly.
Abstract:
A phytoestrogen blend was developed using a pharmaceutical platform technology to identify the time course of active components and effect time course of these components in the biophase after administration of a red clover extract. This phytoestrogen blend consists of biochanin A, daidzein, equol and genistein. The recommended daily dosage ranges from 5 to 200 mg of total isoflavone.
Abstract:
The present invention provides a system and method for evaluating risk associated with information access requests. The information access requests are collected, assigned a risk level according to user defined policies, a total risk is calculated and presented to user. The user can select a high risk event for further analysis. The system will break down the event into basic elements, so the user can ascertain the risk. The system allows a user to customize a report and the customized report can be saved as a template for future use.
Abstract:
A method for generating an auto-adaptive baseline model for profiling individual and collective behavior of a plurality of network users. The method comprises the steps of creating a model, defining a plurality of members and a plurality of collective variables, each member corresponding to a user, and including a plurality of individual variables, defining conditions for each collective variable and individual variable, upon detecting an activity by a user, updating corresponding individual variables and collective variables, and comparing updated individual variables and collective variables against corresponding conditions. If a condition is met, an alert event is issued to notify designated personnel; otherwise, returning to the step of upon detecting activity. Finally, upon receiving an alert event, the designated personnel decides whether to manually redefine the conditions or to ignore the alert event. If the alert event is ignored, said conditions are automatically redefined in accordance with system defined mechanisms.
Abstract:
A system and method are provided to couple tunnel servers to tunnel clients executing host applications for use in a virtual private network (VPN) environment. A receiver receives requests from host applications executing on the tunnel clients. The requests are addressed to the tunnel coupling system to establish a VPN tunnel. A processor processes the requests and an indication of loads on the tunnel servers to establish the VPN tunnels by designating at least one of the tunnel servers to each requested tunnel. A tunnel traffic distributor distributes tunnel traffic to the tunnel servers based at least part on the designations. In additional aspects, an evaluation processor evaluates the tunnel traffic before the tunnel traffic distributor distributes the tunnel traffic to the tunnel servers. For example, the evaluation performed by the evaluation processor includes at least performing security functions on the tunnel traffic. In yet another aspect, the request processor establishes the VPN tunnel by, in part, associating each VPN tunnel with characteristics of tunnel traffic for that VPN tunnel, and the tunnel traffic distributor operates in part based on the associations, without involvement of the host applications.
Abstract:
Access to system and user defined entities (objects, data items, or the like) is managed by a content manager. A privilege grants a user an ability to access system such controlled entities. An item is an atomic user data entity stored in the CM library server. A privileges table is used to store system and user defined privileges. A privilege is represented by a row in the table. Each privilege has a unique privilege code, with codes 0 to 999 reserved to store system-defined privileges and codes beyond 999 open for user-defined privileges thus allowing application specific privileges to be added without limit.