Abstract:
Systems and methods for generating a custom application are disclosed. In one embodiment, a request to generate an application for modifying a database may be received. In response to the request, the application may be generated based on a previously defined view of another database, e.g. a repository containing metadata describing the database. Services (e.g. network services) may be validating and files (e.g. sample server pages, library files and instructional files) may be generated for customization.
Abstract:
Methods and compositions are provided for down regulation of target gene expression in vivo by RNA interference. The methods are useful for target discovery and validation of gene-based drug development, and for treatment of human diseases.
Abstract:
Examples provide an application program interface or manner of negotiating locking or pinning or unlocking or unpinning of a cache region by which an application, software, or hardware. A cache region can be part of a level-1, level-2, lower or last level cache (LLC), or translation lookaside buffer (TLB) are locked (e.g., pinned) or unlocked (e.g., unpinned). A cache lock controller can respond to a request to lock or unlock a region of cache or TLB by indicating that the request is successful or not successful. If a request is not successful, the controller can provide feedback indicating one or more aspects of the request that are not permitted. The application, software, or hardware can submit another request, a modified request, based on the feedback to attempt to lock a portion of the cache or TLB.
Abstract:
The present invention embodies a multi-disciplinary approach to validate or identify targets involved in any given biological process or pathway, such as an immune response, or progression or regression of disease. By introducing a target(s) with, e.g., gene delivery vector(s) or other foreign substance(s) to an in vivo system and by integrating, for example, pathological, pharmacological, bioassay, microarray and bioinformatics data obtained from the in vivo system, the present inventors are able to (1) identify one or more targets, e.g., genes, that are involved in a biological pathway of interest, (2) implement these identified targets for further analysis of the biological process or pathway and (3) provide a scalable approach in vivo for potential large quantities of target(s) discovery and validation. This process can be used in any number of applications, including the identification of agonists and antagonists to a biological process or pathway, which can lead to drugs and vaccine discovery.
Abstract:
It has been found that certain synthetic vectors and nucleic acid sequences that encode viral genomic sequences can, for example, be administered to a subject repeatedly as a vehicle for effectively delivering one or more therapeutic nucleic acid molecules or polypeptides to a cell or tissue. Accordingly, the disclosed nucleic acid delivery vehicles can be used, for instance, as part of a therapeutic regimen that involves an ongoing use of a therapeutic nucleic acid molecule or polypeptide.
Abstract:
In an embodiment, a processor includes a branch prediction circuit and a plurality of processing engines. The branch prediction circuit is to: detect a coherence operation associated with a first memory address; identify a first branch instruction associated with the first memory address; and predict a direction for the identified branch instruction based on the detected coherence operation. Other embodiments are described and claimed.
Abstract:
Non-inflammatory vector compositions are provided that are suitable for repeated transgene delivery and that result in persistent transgene expression. The compositions are non-inflammatory, the present compositions are suitable for readministration and do not induce expression-limiting immune or inflammatory responses. Thus, these compositions are useful in methods of repeated administration to achieve persistent transgene expression, and are especially suited to treating genetic, acquired and inflammation-associated conditions.
Abstract:
Technologies for providing network interface support for remote memory and storage failover protection include a compute node. The compute node includes a memory to store one or more protected resources and a network interface. The network interface is to receive, from a requestor node in communication with the compute node, a request to access one of the protected resources. The request identifies the protected resource by a memory address. Additionally, the network interface is to determine an identity of the requestor node and determine, as a function of the identity and permissions data associated with the memory address, whether the requestor node has permission to access the protected resource. Other embodiments are described and claimed.
Abstract:
The invention provides siRNA compositions that interfere with viral replication in respiratory viral infections, including respiratory syncytial virus and avian influenza A, including the H5N1 strain. The invention further provides uses of the siRNA compositions to inhibit expression of viral genes in respiratory virus-infected cells, and to uses in the treatment of respiratory virus infections in a subject. Generally the invention provides polynucleotide that includes a first nucleotide sequence of 15 to 30 bases that targets the genome of a respiratory syncytial virus or an influenza A virus, a complement thereof, a double stranded polynucleotide or a hairpin polynucleotide. Additionally the invention provides vectors, cells and pharmaceutical compositions containing siRNA sequences.
Abstract:
Systems and methods for generating a custom application are disclosed. In one embodiment, a request to generate an application for modifying a database may be received. In response to the request, the application may be generated based on a previously defined view of another database, e.g. a repository containing metadata describing the database. Services (e.g. network services) may be validated and files (e.g. sample server pages, library files and instructional files) may be generated for customization.