摘要:
A system, method, and computer program product are provided for verifying an identification of program information as unwanted. In use, program information is identified as unwanted at a client. Furthermore, the identification of the program information as unwanted is verified, utilizing a communication between the client and a server.
摘要:
A system, method, and computer program product are provided for verifying an identification of program information as unwanted. In use, program information is identified as unwanted at a client. Furthermore, the identification of the program information as unwanted is verified, utilizing a communication between the client and a server.
摘要:
A system, method, and computer program product are provided for reacting based on a frequency in which a compromised source communicates unsolicited electronic messages. In use, a source of at least two unsolicited electronic messages is identified as compromised. Additionally, a frequency in which the source communicated the unsolicited electronic messages is calculated. Furthermore, a reaction is performed based on the calculated frequency.
摘要:
A method, apparatus, and computer program product for using debug streams to control the amount of trace outputs when debugging software. As debug streams extend on the use of regular output streams, debug streams are very easy to use and simple to implement, while providing a high level of control over the verbosity of traces. A debug stream is created that includes a debug level setting to control the verbosity of the trace outputs. A determination is made as to whether the debug level setting in the debug stream is greater than a specified threshold level. Responsive to a determination that the debug level setting is greater than the specified threshold level, trace outputs are emitted to the debug stream.
摘要:
A common infrastructure for performing a wide variety of loop optimization transformations, and providing a set of high-level loop optimization related “building blocks” that considerably reduce the amount of code required for implementing loop optimizations. Compile-time performance is improved due to reducing the need to rebuild the control flow, where previously it was unavoidable. In addition, a system and method for implementing a wide variety of different loop optimizations using these loop optimization transformation tools is provided.
摘要:
A method of using a non-wooden material to manufacture a shipping base is disclosed. Preferably, the shipping base is made from a plurality of non-wooden boards, such as those made from recycled siding materials or a plurality of particles secured together by a resin, and assembled into a shipping base. The boards are then glued, nailed, screwed or otherwise secured together in a desired shape. Additional features, such as styrofoam pieces and securing holes can be added as needed. By using non-wooden materials to make the shipping base, import restrictions, fines and bans on the importation of wood can be avoided to minimize the cost and burden of shipping non-wooden materials.
摘要:
A method and system for provides a user with an ability to capture a sample of an experiential environment and deliver that sample to an interactive service to trigger one or more predetermined events. In exemplary embodiments of the invention such triggered events include the delivery of information and services to the user, the execution of tasks and instructions by the service on the user's behalf, communication events, surveillance events and other control-oriented events that are responsive to the user's wishes. In other exemplary embodiments of the invention, the triggered events include transaction-oriented events, entertainment events, and events associated with enhancements to human ability or function.
摘要:
A malware detection system seeking to identify computer viruses, worms, Trojans, banned files and the like acts to determine from the file name, file size and storage location of a computer file being tested, whether that computer file potentially matches a specific known malware free computer file stored within a list of such specific known malware free computer files. If a match occurs indicating that the candidate computer file is potentially the specific known malware free computer file, then this is confirmed by calculating a checksum of the candidate computer file and comparing this against a stored corresponding checksum of the specific known malware free computer file. If these checksums match, then the candidate computer file can be passed as clean without requiring further time consuming malware detection scanning.
摘要:
A monitor can sense the difference in temperature between the inside and the outside of an enclosure containing electrical power equipment. The monitor has a case adapted for mounting at the enclosure. Also included is a first and a second sensor for producing a first signal and a second signal, respectively. The first sensor is mounted at the case and is adapted for insertion through an opening in the enclosure. The second sensor is adapted to sense temperature at a location remote from the first sensor. Specifically, the case is mounted so that one of the sensors is inside the enclosure and the other is outside. The monitor also includes an alarm system mounted at the case and coupled to the first and the second sensor for producing a warning signal in response to the first and the second signals from the first and the second sensor signifying a temperature difference exceeding a predetermined threshold.
摘要:
A chuck for use with a manual or powered driver having a housing and a rotatable drive shaft extending therefrom is provided. The chuck includes a generally cylindrical body member having a nose section and a tail section. Each of a plurality of jaws is slidably positioned in one of a plurality of angularly disposed passageways in the body. Each jaw has a jaw face formed on one side thereof and threads formed on the opposite side thereof. A nut is rotatably mounted on the body in engagement with the jaw threads so that rotation of the nut moves the jaws axially within the passageways. A locking member, in a first axial position, is rotatable with respect to the driver housing. In a second axial position, it operatively engages the housing and the nut so that the locking member is rotationally held to the housing and the nut so that the nut is rotationally held to the housing. The locking member is axially reciprocal between the first axial position and the second axial position.