摘要:
A secure VPN connection is provided based on user identify and a hardware identifier. A client application may initiate the VPN connection. A client device user may provide identification information to the application, which then sends a VPN connection request to a remote VPN gateway. The VPN gateway may require an equipment identifier to establish the secure VPN gateway. If the hardware ID is registered, the secure VPN connection is established. If the hardware ID is not registered with the VPN gateway, the connection may be denied. In some instances, a connection may be established with an unregistered equipment ID based on settings at the VPN gateway.
摘要:
In one aspect, the invention relates to a probe. The probe includes a sheath, a flexible, bi-directionally rotatable, optical subsystem positioned within the sheath, the optical subsystem comprising a transmission fiber, the optical subsystem capable of transmitting and collecting light of a predetermined range of wavelengths along a first beam having a predetermined beam size. The probe also includes an ultrasound subsystem, the ultrasound subsystem positioned within the sheath and adapted to propagate energy of a predetermined range of frequencies along a second beam having a second predetermined beam size, wherein a portion of the first and second beams overlap a region during a scan.
摘要:
A dispenser for dispensing materials is provided including a container for holding the material to be dispensed, a plurality of frame portions for holding decorative items, locking apparatus for locking the frame portions to the container, and a dispensing means for dispensing materials from the container. The dispenser also includes a base for receiving the container and frame portions, a memory device for playing a sound when the dispenser is removed from the base, and a switch for activating the memory device when the container is removed from the base. The plurality of frames each contain an aperture and each aperture contains an inner edge operable to lock onto the container. The frames each contain clips to lock onto each other and hold the container. The dispenser includes a dispensing mechanism and the base includes an opening for receiving the dispensing mechanism. The dispenser may also include a cap for receiving the container and frame portions and a cover for covering the aperture may be included.
摘要:
A wheelchair frame member that includes a first metallic tube member, a second metallic tube member, and a tubular composite member. First and second end portions of the composite member extend into the first and second metallic tube members. The first and second end portions of the composite members are secured to inner surfaces of the first and second metallic tube members. The end portions of the tubular composite members may be connected to the inner surfaces of the metallic tube members in a variety of different ways. For example, the end portions may be forced radially outward into engagement with the inner surface of the tube members to secure the end portions to the inner surfaces of the tube members.
摘要:
Provided are methods and computer software applications for generating a stock portfolio, and/or enhanced stock index, through using a plurality of growth factors and a plurality of value factors to rank stocks, and for constructing investment vehicles based on the stock portfolio. The method, software application, or computer apparatus of the present technology employs a novel stock selection strategy to select stocks from a pre-selected universe of securities such as a commercially available stock market index in order to create a stock portfolio, and/or enhanced stock index, and a fund based thereon that can generate positive alpha as compared to a fund based on the pre-selected universe of securities.
摘要:
A computer-implemented method for evaluating the health of computing systems based on when operating-system changes occur is disclosed. In one example, this method may include: 1) identifying an operating-system change made to a computing system, 2) determining when the operating-system change occurred, and then 3) assessing the health of the computing system based at least in part on when the operating-system change occurred. Various other methods, systems, and computer-readable media are also disclosed.
摘要:
Unknown malicious code is heuristically detected on a host computer system. A virus signature for the malicious code is created locally on the host computer system. A blacklist on the host computer system is updated with the virus signature for the heuristically detected malicious code. Accordingly, the blacklist is updated with the virus signature of the heuristically detected malicious code without distribution of the virus signature to the general public. Further, the host computer system is scanned for other instances of the heuristically detected malicious code using the created virus signature. Accordingly, file based detection and remediation of the malicious code is achieved without requiring execution of the malicious code for detection and the associated risks.