摘要:
Systems and methods are described for allowing the execution of authorized computer program code and for protecting computer systems and networks from unauthorized code execution. In one embodiment, a multi-level proactive whitelist approach is employed to secure a computer system by allowing only the execution of authorized computer program code thereby protecting the computer system against the execution of malicious code such as viruses, Trojan horses, spy-ware, and/or the like. Various embodiments use a kernel-level driver, which intercepts or “hooks” certain system Application Programming Interface (API) calls in order to monitor the creation of processes prior to code execution. The kernel-level driver may also intercept and monitor the loading of code modules by running processes, and the passing of non-executable code modules, such as script files, to approved or running code modules via command line options, for example. Once intercepted, a multi-level whitelist approach may be used to authorize the code execution.
摘要:
A weapon conditionally activates a cartridge. The cartridge has a projectile and a first mechanical feature. The weapon includes an activator and a station. The activator includes a second mechanical feature. The station positions the cartridge so that the first feature opposes the second feature. On condition that the first feature does not mechanically interfere with the second feature, the activator activates the cartridge to launch the projectile from the cartridge. On condition that the first feature mechanically interferes with the second feature resulting in an excess head space, the activator is inhibited by the excess head space from activating the cartridge.
摘要:
Embodiments include receiving into one or more computer databases a plurality of cost factors associated with supplying a commodity for vehicle manufacturing. A zero-based cost estimate for the commodity is calculated based on one or more of the plurality of cost factors. A current cost for the commodity is received into the one or more computer databases, and a cost variance between the current cost for the commodity and the zero-based cost estimate is calculated. One or more actions for reducing the cost variance may be received into one or more of the computer databases. The zero-based cost estimate for the commodity, the current cost for the commodity, the cost variance, and the one or more actions for reducing the cost variance may be displayed on one or more interactive user interfaces. A cross-functional team including representatives from engineering, purchasing and finance may implement the methodology.
摘要:
A weapon conditionally activates a cartridge. The cartridge has a projectile and a first mechanical feature. The weapon includes an activator and a station. The activator includes a second mechanical feature. The station positions the cartridge so that the first feature opposes the second feature. On condition that the first feature does not mechanically interfere with the second feature, the activator activates the cartridge to launch the projectile from the cartridge. On condition that the first feature mechanically interferes with the second feature resulting in an excess head space, the activator is inhibited by the excess head space from activating the cartridge.