Abstract:
Transfer component monitoring methods, image forming devices, data signals, and articles of manufacture are described. According to one aspect, a transfer component monitoring method includes counting a plurality of imaging operations performed by an image forming device to form a plurality of hard images and adjusting a result of the counting to determine wear of a transfer component of the image forming device, wherein the transfer component is configured to assist with a transfer of a developing material to form the hard images.
Abstract:
The use of lycopene has been demonstrated to be effective in decreasing risk factors associated with cardiovascular disease, skin cancer and prostate cancer in mammals. Lycopene is difficult to solubilize in its native trans-lycopene form. Cis-lycopene, formed by applying thermal energy generated by excitation of polar molecules through microwave-assisted processing, appears in several isomeric forms. The cis isomers are effective in improving lycopene micellularization, bioaccessibility and mammalian absorption. The cis isomers are effective in improving vascular circulation of lycopene by way transport vesicle low density lipo-protein (LDL). Lycopene-based ingredients, end products, functional foods, medical foods and nutraceuticals, containing isomerized cis-lycopene can be used in place of ingredients with more naturally abundant trans-lycopene as phytonutrient, micronutrient and antioxidant delivery vehicles through dietary consumption to improve the outcomes of a variety of conditions, including hypertension, cardiovascular disease, skin cancer, prostate cancer, macular degeneration and related proinflammatory conditions.
Abstract:
Methods and apparatuses for communicating data within measurement traffic are described. Embodiments that send, receive and both send and receive are described. Some embodiments are described that compute statistics based at least partly on measurement traffic. Some embodiments are described that communicate computed statistics within measurement traffic. Some embodiments are described that rank and select paths based at least in part on computed statistics.
Abstract:
A computer system method includes receiving a network topology and associated configuration data, wherein the network topology indicates a host location and a threat location, determining a vulnerability associated with the host location, determining a security exposure for the host location with respect to the threat location from the configuration data, the network topology, and to incomplete configuration data for the host location, determining a first vulnerability certainty for the host location with respect the vulnerability in response to incomplete configuration data, thereafter receiving updated network data selected from a group consisting of: updated configuration data, updated network topology, determining an updated security exposure for the host location with respect to the threat location from the updated network data, and to the incomplete configuration data, and displaying a difference between of the first security exposure and the second security exposure on the display.
Abstract:
A method for a computer system including a display includes determining a plurality of security metrics associated with a plurality of servers within a network, displaying a tree map on the display representing at least a portion of the network, wherein the tree map comprises a plurality of shapes associated with servers from the plurality of servers, wherein a size of shapes in the plurality of shapes are determined in response to a first security metric from the plurality of security metric associated with the servers, and wherein an appearance of the shapes are determined in response to a second security metric from the plurality of security metrics associated with the servers.
Abstract:
A system for the assessment of network performance criteria, and applying this criteria to the classification of network addresses into appropriate ranges, using these ranges to consolidate performance measurements for the associated addresses, and applying these metrics toward the optimization of the network towards performance or policy objectives.
Abstract:
A method for the automatic sharp separation and removal of layers of fluids from a container through a headspace in the container comprises the use of two separate and simultaneous flow streams to draw fluid from the upper layer as the apparatus descends in the fluids. The entry of the lower fluid into the apparatus is detected as a result of the different physical properties of the lower fluid by which the apparatus is caused to stop its descent into the fluid and to interrupt the flow of fluid through one of the flowsteams. The flow of the flowstream is interrupted by the entry of a gas into that stream. The apparatus is subsequently lowered into the remaining fluid and the withdrawal of the fluid through the apparatus is begun again.
Abstract:
A solar light bar includes a battery isolator adapted to be connected between a bus and a vehicle charging system for isolating a vehicle battery from the bus and for selectively connecting the bus to the charging system. A light source switch connects the light source and the bus for selectively electrically connecting the light source to the bus. When the light source switch is closed, the light source is energized by electricity from at least one of the solar panel, the charging system and the auxiliary battery. When the light source switch is open, the light source is isolated from the bus. The auxiliary battery is adapted to be selectively charged by electricity from at least one of the solar panel and the charging system.
Abstract:
A method for a computer system includes receiving configuration data from a network device in a network, determining a topology for a portion of the network from the configuration data, wherein the topology indicates a server location and a threat server at a threat server location in the network, determining a vulnerability including vulnerability attributes for the first server location, and when configuration data for the first server location is incomplete, the method includes determining a security exposure of the first server location with respect to the threat server in response to the configuration data, the topology, and to the configuration data associated the host server location, determining a vulnerability certainty for the first server location with respect the vulnerability in response to the configuration data associated the host server location, and outputting a visual representation of the security exposure and the vulnerability certainty on a display.