Abstract:
Disclosed is a method and a system for detecting and managing phishing attack. The security product of the present invention enables a user to look at the activity of any other user and all of their owned devices before and after a phishing attack targeted at that user. The present invention also enables the user to look at the activity of the infrastructure and determine if an attack has occurred and what is the impact of that attack. The present invention also enables the user to view various attacks on their infrastructure.
Abstract:
An integrated circuit for monitoring components of the integrated circuit, comprising: a resource monitoring circuit configured to: track activity factors for a plurality of components of the integrated circuit; evaluate the activity factors for each of the plurality of components; determine whether an activity factor for a particular component of the plurality of components exceeds a threshold; and transmit, from the resource monitoring circuit, a signal to a software element, causing the software element to deactivate the particular component and activate an alternate component, when the activity factor for the particular component exceeds the threshold and the alternate component is available to substitute for the particular component.
Abstract:
In an embodiment, a host controller includes a clock control circuit to cause the host controller to communicate a clock signal on a clock line of an interconnect, the clock control circuit to receive an indication that a first device is to send information to the host controller and to dynamically release control of the clock line of the interconnect to enable the first device to drive a second clock signal onto the clock line of the interconnect for communication with the information. Other embodiments are described and claimed.
Abstract:
Some embodiments provide a method for defining a content relevance model for determining whether a content segment is relevant to a particular category. The method receives a first set of content segments that contain content relevant to the particular category and a second set of content segments that contain content not relevant to the particular category. The method identifies a set of key word sets more likely to appear in the first set of content segments than the second set of content segments. The method defines a content relevance model that comprises a set of groups of word sets and a score for each group, each of the groups of word sets comprising a key word set from the set of key word sets and at least one word set found in a context of the key word set in at least one of the received content segments.
Abstract:
A request to print a file at a printer is received at a first computer system over a public network. Responsive to receiving the request, an indication of the request is exposed to the printer to enable fulfillment, by the printer, of the request to print the file.
Abstract:
The present invention relates to a method for manufacturing slurry for coating of electrodes for use in lithium ion batteries, wherein the method comprises mixing active materials with a binder into a binder solution, and adding an organic carbonate to the binder solution to generate the slurry. The present invention also relates to a method for manufacturing electrodes for a lithium battery cell, wherein the method comprises mixing active materials with a binder into a binder solution, adding an organic carbonate to the binder solution to generate slurry, wherein the above adding step is carried out at temperature above melting temperature of the organic carbonate, coating electrode material with the slurry, drying the coating on the electrode material by drying the organic carbonate, and surface treatment of the slurry so that the electrode is prepared for use in a lithium ion battery cell. Further, the invention also relates to a method for manufacturing a lithium ion battery cell.
Abstract:
System, method, computer program product embodiments and combinations and sub-combinations thereof for elastic resource provisioning are provided. An embodiment includes grouping physical resources in an asymmetric distributed cluster of data processing nodes logically into one or more provisions. Further included are configuring access to the physical resources with the one or more provisions, and managing adjustment of operations among the data processing nodes in correspondence with adjustment to the physical resources through the one or more provisions and transparently to an application utilizing the physical resources.
Abstract:
Non-oxidizing plasma treatment devices for treating a semiconductor workpiece generally include a substantially non-oxidizing gas source; a plasma generating component in fluid communication with the non-oxidizing gas source; a process chamber in fluid communication with the plasma generating component, and an exhaust conduit centrally located in a bottom wall of the process chamber. In one embodiment, the process chamber is formed of an aluminum alloy containing less than 0.15% copper by weight; In other embodiments, the process chamber includes a coating of a non-copper containing material to prevent formation of copper hydride during processing with substantially non-oxidizing plasma. In still other embodiments, the process chamber walls are configured to be heated during plasma processing. Also disclosed are non-oxidizing plasma processes.
Abstract:
Provided herein is a name service that includes published data that is associated with one or more duration entities and one or more modification entities, enabling the name service to more efficiently manage access to published data. To publish data, a publishing client transmits a publication request to a name service. The publication request may specify a modification entity. The name service creates at least one name entry that associates the published data with the modification entity. There are several types of requests to modify data that a name service will honor only when they originate from a modification entity.
Abstract:
A tool can automate the process of downloading from a mainframe to a local area network (LAN). A back-end tool and a front-end tool can cooperate to accomplish the downloading process. Both tools can simplify the download process, avoiding complications and common errors. A user interface can provide features for simplifying the download process. Files can be downloaded from separate sub-areas on the mainframe to respective separate sub-areas on the LAN. Download settings can be saved and later retrieved via a name. Downloading for multiple software projects can be supported.