Abstract:
Policy enforcement is disclosed. An identity notification is received from a network device. The identity notification is usable to determine a user identifier associated with the network device. The identity notification is also usable to determine an IP address associated with the network device. A policy is updated based on the received identity notification.
Abstract:
Techniques for configuring and managing remote security devices are disclosed. In some embodiments, configuring and managing remote security devices includes receiving a registration request for a remote security device at a device for configuring and managing a plurality of remote security devices; verifying the registration request to determine that the remote security device is an authorized remote security device for an external network; and sending a response identifying one or more security gateways to the remote security device, in which the remote security device is automatically configured to connect to each of the one or more security gateways using a distinct Layer 3 protocol tunnel (e.g., a virtual private network (VPN)).
Abstract:
Provided are methods and compositions for treatment of cancer. In particular, these methods and compositions may include an inhibitor of a deubiquitinating enzyme. In certain aspects, these methods and compositions may include a modulator of glucose metabolism. Also provided are methods of assaying the glucose content of cells and tissues using detection of uH2B.
Abstract:
Enforcing a policy based at least in part on URL information is disclosed. A uniform resource locator (URL) is received. A portion of the URL, or a transformation thereof, is matched against a bloom filter. Based on a result of the match, a first query is performed. A policy is enforced based at least in part on a category received as a result of a second query. In some cases, the first and second query are the same.
Abstract:
Methods, systems, and apparatus, including computer program products, featuring receiving at a first security device a packet. The first security device determines that the packet is associated with a flow assigned to a distinct second security device. The first security device sends the packet to the second security device. After the second security device performs security processing using the packet, the first security device receives from the second security device a message regarding the packet. The first security device transmits the packet.
Abstract:
Disclosed herein is a method of determining whether a first protein is capable of physically interacting with a second protein, involving: (a) providing a host cell which contains (i) a reporter gene operably linked to a protein binding site; (ii) a first fusion gene which expresses a first fusion protein, the first fusion protein including the first protein covalently bonded to a binding moiety which is capable of specifically binding to the protein binding site; and (iii) a second fusion gene which expresses a second fusion protein, the second fusion protein including the second protein covalently bonded to a gene activating moiety and being conformationally-constrained; and (b) measuring expression of the reporter gene as a measure of an interaction between the first and the second proteins. Also disclosed are methods for assaying protein interactions, and identifying antagonists and agonists of protein interactions. Proteins isolated by these methods are also discussed. Finally, populations of eukaryotic cells are disclosed, each cell having a recombinant DNA molecule encoding a conformationally-constrained intracellular peptide.
Abstract:
Disclosed herein is a method of determining whether a first protein is capable of physically interacting with a second protein, involving: (a) providing a host cell which contains (i) a reporter gene operably linked to a protein binding site; (ii) a first fusion gene which expresses a first fusion protein, the first fusion protein including the first protein covalently bonded to a binding moiety which is capable of specifically binding to the protein binding site; and (iii) a second fusion gene which expresses a second fusion protein, the second fusion protein including the second protein covalently bonded to a gene activating moiety and being conformationally-constrained; and (b) measuring expression of the reporter gene as a measure of an interaction between the first and the second proteins. Also disclosed are methods for assaying protein interactions, and identifying antagonists and agonists of protein interactions.
Abstract:
Policy enforcement in an environment that includes virtualized systems is disclosed. Virtual machine information associated with a first virtual machine instance executing on a host machine is received. The information can be received from a variety of sources, including an agent, a log server, and a management infrastructure associated with the host machine. A policy is applied based at least in part on the received virtual machine information.
Abstract:
Disclosed herein are methods for detecting complex protein interactions and protein functional relationships, and reagents for carrying out those methods.
Abstract:
Enforcing a policy is described. A mapping between an IP address of a device and a user identity is identified, at least in part by correlating event information. A policy is applied to the device based at least in part on the user identity. One example of an event is an access to a mail server, such as an access to a Microsoft Exchange server.