摘要:
A method and apparatus for validating the integrity of computer software installer files prior to installation of computer software comprising: generating at least one signature file for at least one corresponding installer file, the at least one signature file comprising a file name, a file size and a checksum, wherein the checksum is calculated for the corresponding installer file; and packaging the at least one signature file with the corresponding installer file, wherein the checksum in the signature file is used to validate the integrity of the installer file prior to installation of the installer file.
摘要:
A method and apparatus for validating the integrity of computer software installer files prior to installation of computer software comprising: generating at least one signature file for at least one corresponding installer file, the at least one signature file comprising a file name, a file size and a checksum, wherein the checksum is calculated for the corresponding installer file; and packaging the at least one signature file with the corresponding installer file, wherein the checksum in the signature file is used to validate the integrity of the installer file prior to installation of the installer file.
摘要:
A method and apparatus for securely executing a plurality of actions requiring elevated privilege using less than a corresponding plurality of prompts for privilege elevation, and in some embodiments, only a single prompt for privilege elevation, comprising: receiving a request to perform a first action requiring an elevated privilege; acquiring the elevated privilege to perform the first action; executing the first action, wherein the first action is executed based on the elevated privilege; receiving a request to perform a second action requiring an elevated privilege; and executing the second action using the elevated privilege acquired for the first action.
摘要:
A method and apparatus for securely executing a plurality of actions requiring elevated privilege using less than a corresponding plurality of prompts for privilege elevation, and in some embodiments, only a single prompt for privilege elevation, comprising: receiving a request to perform a first action requiring an elevated privilege; acquiring the elevated privilege to perform the first action; executing the first action, wherein the first action is executed based on the elevated privilege; receiving a request to perform a second action requiring an elevated privilege; and executing the second action using the elevated privilege acquired for the first action.
摘要:
Systems described herein operate to improve network performance in a multi-tenant cloud computing environment. Systems can include communication circuitry and processing circuitry to generate a phase sequence matrix that indicates the identity and number of phases of a workload by measuring resources of the compute node during execution of the workload throughout a lifetime of the workload. The processing circuitry can generate a workload fingerprint that includes the phase sequence matrix and a phrase residency matrix. The phase residency matrix can indicate the fraction of execution time of the workload spent in each phase identified in the phase sequence matrix. A cloud controller can access the workload fingerprint for multiple workloads operating on multiple compute nodes in the cloud cluster to adjust workload allocations based at least on these workload fingerprints and on whether service level objectives (SLOs) are being met.
摘要:
QoS aware multi radio access point for operation in TV whitespaces is disclosed. The present invention relates to operation of access points and, particularly, to operation of access points in TV whitespaces. The AP is configured to intelligently choose the radios, determine available whitespaces in the spectrum and allocate radios to the available whitespaces in the spectrum. The method determines clients that need to be serviced by the AP and assigns each client associated with AP to one of the radios. In addition, the method also takes care of QoS requirements for different services and hence every service is addressed to satisfy its QoS requirements. The method ensures that there is maximum utilization of available whitespace spectrum by accounting for the spectrum specific characteristics. The method considers bands for operation are spread across the spectrum and allocates the clients based on the availability of bands throughout the spectrum.
摘要:
A pickup location that includes a control station and one or more storage compartment modules provides the ability for items to be ordered and delivered for pickup by a user without having to pack those items in a shipping package prior to shipping from a materials handling facility. Delivering items for pickup by a user without having to package the items prior to shipping, may provide a better experience for the customer, reduce waste in packaging material and a lower cost of delivering the ordered items to the customer.
摘要:
A system in a package comprising a flip chip semiconductor die on a package substrate, a spacer on the package substrate, and a wire bond semiconductor die supported by the spacer and the flip chip semiconductor die.
摘要:
The invention relates to methods for identifying compounds and compositions that target cancer stem cells. In some aspects, the invention relates to treatment methods that use compounds and compositions that specifically target cancer stem cells for inhibiting the growth and/or survival of cancer stem cells in a subject in need thereof. Other aspects of the invention relate to the use of cancer stem cell biomarkers in the selection of a treatment for inhibiting the growth and/or survival of cancer stem cells in a subject in need thereof.
摘要:
A technique for controlling a packet data network to maintain network stability and efficiently utilize network resources through mechanisms involving per-destination queues and urgency weights for medium access control. The technique jointly controls congestion, scheduling, and contention resolution on hop-by-hop basis, such that the length of queues of packets at a node does not become arbitrarily large. In one embodiment, queue lengths and urgency weights may be transmitted and received via medium access control messages.