摘要:
A method, computer program product and system for determining ownership of containers. An installer program may edit stored information, such as ownership, about software component(s) it installed in a container. Upon a subsequent installer program planning to install a software component in that container, software, referred to as a “collector,” may identify the owners of the software components stored in that container. The collector may then search the rules in a rules database to determine the ownership of the container based on the ownership of the software components in the container. By mapping the software components stored in a container with their respective owners, the ownership of a container may be determined.
摘要:
A method, computer program product and system for protecting the location of an installed middleware application. An installer program may generate a private/public key pair at build time of a middleware application. Upon the installer program installing the middleware application, the installation location of the middleware application may be encrypted using the generated private key and then discarding the private key. The encrypted installation location of the middleware application may be decrypted by a subsequent installer program upon receiving a public key from the developer of the middleware application. Since the public key was not shipped with the middleware application, an illegitimate program, such as a Trojan horse, may not be able to decrypt the installation location of the middleware application. Since the public key may only be obtained from the developer of the middleware application, only legitimate programs may be able to decrypt the location of the installed middleware application.
摘要:
A method, computer program product and system for detecting previously installed applications on a system. An installer program may invoke an application programming interface to call a software component, referred to as a “manager”, to detect previously installed applications on the system. The manager may be configured to query detection mechanisms, referred to as “collectors”, to perform their own detection techniques to detect applications installed on the system. Since each collector may perform its own unique detection technique, the collectors may be used together to detect more applications installed on the system than if the installer program attempted to detect the applications installed on the system by itself.
摘要:
A method, computer program product and system for allowing multiple decisions to be made by multiple decision makers during software installation. A developer of an installer program may select the decisions to be made during the installation process. The developer may further designate the decision makers to handle each of these decisions in a configuration file. The configuration file may be compiled into executable code where the executable code may be embedded in the installer program. By the developer designating multiple decision makers to handle multiple decisions, multiple decision makers may now be able to be involved during the software installation process.
摘要:
A method, computer program product and system for displaying images during the execution of an application. A developer of an application inserts application hooks at particular locations in the code of the application to be executed. An application hook could be a call to a function in a utility code where the call includes the passing of a “key name”. The called function may retrieve an image located at an image file name in a configuration file associated with the key name if such an image file exists. Presentations that demonstrate the execution of the application may be easily modified by adding, deleting or replacing images at these file names. These modifications may be made without modifying the code of the application being executed. In this manner, different images used in different presentations may be displayed to different targeted audiences without modifying the code of the executed application.
摘要:
A fastener for fastening pipes or electrical conduit can be installed with the optional use of nails or screws. The fastener includes sharp teeth or spikes which can be hammered into an external surface, such as wood or masonry. The teeth or spikes are positioned, oriented, and otherwise configured to best suit the intended application. Installation can be accomplished using only the fastener itself and force exceeding a minimal threshold.
摘要:
In various embodiments, training objects are classified by human annotators, psychometric data characterizing the annotation of the training objects is acquired, a human-weighted loss function based at least in part on the classification data and the psychometric data is computationally derived, and one or more features of a query object are computationally classified based at least its part on the human-weighted loss function.
摘要:
Various embodiments of the teachings relate to a system or method for sample preparation or analysis in biochemical or molecular biology procedures. The sample preparation can involve small volume processed in discrete portions or segments or slugs, herein referred to as discrete volumes. A molecular biology procedure can be nucleic acid analysis. Nucleic acid analysis can be an integrated DNA amplification/DNA sequencing procedure.
摘要:
Systems and methods for reactively authorizing publication of information by a third party are coordinated through the use of a presence server. The presence server communicates with other communication nodes/devices to determine and relay publication information. Publication requests that are initially unauthorized, from the perspective of the presence server, are resolved.
摘要:
Locating devices and systems providing haptic tactile feedback are disclosed. In one embodiment, a locator includes a haptic handle configured to provide directional signals through an operator's sense of touch to aid in locating and tracing a buried conductor or other object such as a pipe or cable.