Abstract:
The present invention provides a compound of formula I; wherein R1 is an alkyl pyrazole or an alkyl carboxamide, and R2 is a hydroxycycloalkyl; or a pharmaceutically acceptable salt thereof, and compositions containing these compounds, for use to treat a brain tumor, particularly glioblastoma. The invention provides effective treatment of a brain tumor and can be used by oral administration of a compound of Formula I as further described herein. The invention also provides a method to treat a subject having a brain tumor such as glioblastoma, wherein the method comprises administering to the subject an effective amount of a compound of Formula I. Gene signatures correlated with successful treatment using these methods are also disclosed.
Abstract:
The present invention provides a compound of Formula (I): and pharmaceutically acceptable salts thereof. Also provided is a method of using a compound of Formula I for treating a disease or condition mediated by a CDK inhibitor.
Abstract:
An apparatus for combines for the collection of threshed material discharged from the combine and automatically dumping the collected material when a predetermined weight of material is accumulated. The apparatus includes a threshed material collector attached to the combine for rotation about a horizontal axis that is closer to a forward end of the collector than a rearward end of the collector. The collector includes a plurality of horizontally spaced tines extending in a rearward direction and position to collect material discharged from the combine. A counter weight is attached to the collector for controlling the amount of material collected before the collector rotates under the weight of the collected material to a dumping position where the collected material is removed from the collector.
Abstract:
In one embodiment of the present invention, a method includes verifying an initiating logical processor of a system; validating a trusted agent with the initiating logical processor if the initiating logical processor is verified; and launching the trusted agent on a plurality of processors of the system if the trusted agent is validated. After execution of such a trusted agent, a secure kernel may then be launched, in certain embodiments. The system may be a multiprocessor server system having a partially or fully connected topology with arbitrary point-to-point interconnects, for example.
Abstract:
Software is download to a gaming device as a background operation while the gaming application runs in the foreground. An authorization operation may be completed before the download operation to prevent unauthorized installation of software. New games, software updates, and advertising content can be downloaded to the gaming machine in a background operation.
Abstract:
A method and apparatus is described herein for supporting direct memory accesses between peer I/O devices. It is determined whether a guest physical address (GPA) referenced by an access generated from an I/O device, is within a range of GPAs associated with local I/O devices based at least in part on a GPA base and a GPA window size. If the GPA is within the window, then the GPA is translated to an HPA based at least in part on a base HPA associated with a local device and then forwarded to that local device. However, if the GPA is not within the window, then the access is forwarded upstream.
Abstract:
A method and system of deadlock free bus protection of memory and I/O resources during secure execution. A bus cycle initiates entry of a bus agent into a secure execution mode. The chipset records an identifier of the secure mode processor. Thereafter, the chipset intercedes if another bus agent attempts a security sensitive bus cycle before the secure mode processor exits the secure mode.
Abstract:
A system and method for secure distribution of a video card public key. The method provides for loading an authentication code module into a processor, authenticating the authentication code module, and executing the authentication code module. Executing the authentication module causes the authentication code module to assert a hardware indicator to access at least one address in a special protected page on a chipset. Receipt of the hardware indicator by the chipset causes a specific reference to be sent via a dedicated port to a circuit card to retrieve a public key from the circuit card.
Abstract:
Secure storage and retrieval of a unique value associated with a device to/from a memory of a processing system. In at least one embodiment, the device needs to be able to access the unique value across processing system resets, and the device does not have sufficient non-volatile storage to store the unique value itself. Instead, the unique value is stored in the processing system memory in such a way that the stored unique value does not create a unique identifier for the processing system or the device. A pseudo-randomly or randomly generated initialization vector may be used to vary an encrypted data structure used to store the unique value in the memory.
Abstract:
Delivering a Direct Proof private key to a device installed in a client computer system in the field may be accomplished in a secure manner without requiring significant non-volatile storage in the device. A unique pseudo-random value is generated and stored in the device at manufacturing time. The pseudo-random value is used to generate a symmetric key for encrypting a data structure holding a Direct Proof private key and a private key digest associated with the device. The resulting encrypted data structure is stored on a protected on-liner server accessible by the client computer system. When the device is initialized on the client computer system, the system checks if a localized encrypted data structure is present in the system. If not, the system obtains the associated encrypted data structure from the protected on-line server using a secure protocol. The device decrypts the encrypted data structure using a symmetric key regenerated from its stored pseudo-random value to obtain the Direct Proof private key. If the private key is valid, it may be used for subsequent authentication processing by the device in the client computer system.