摘要:
A method, system and computer program product for progressive enhancement of content in a browser. The method includes receiving a document with content containing a plurality of elements and parsing the received content with at least one processor. The method also includes identifying a subset of the plurality of elements that are marked for enhancement and replacing each of the element in the identified subset with their respective enhancement to obtain the document with the enhanced elements.
摘要:
A storage manager provides data privacy, while preserving the benefits provided by existing hash based storage systems. Each file is assigned a unique identifying code. Hashes of the content-derived chunks of the file are calculated based on the content of the chunk and the code identifying the file. When a request to store a chunk of data is received, it is determined whether a chunk associated with the hash has already been stored. Because hashes are based on privacy-preserving codes as well as content, chunks of duplicate copies of a file need not be stored multiple times, and yet privacy is preserved for content at a file level. In other embodiments, hashes indicating whether a given file is public and/or indicating the identity of the requesting user are also sent with storage requests. These additional hashes enable more robust transmission and storage efficiency, while still preserving privacy.
摘要:
An original identifier of an application in a computer system is changed to a new identifier. An attempt is made, using the original identifier, to run the application. In response to the attempt, the application is then launched in a restricted user account on the computer system using the new identifier.
摘要:
Junction field effect transistors (JFETs) are shown to be a viable replacement for metal oxide semiconductor field effect transistors (MOSFETs) for gate lengths of less than about 40 nm, providing an alternative to the gate leakage problems presented by scaled down MOSFETs. Integrated circuit designs can have complementary JFET (CJFET) logic cells substituted for existing MOSFET-based logic cells to produce revised integrated circuit designs. Integrated circuits can include JFETS where the channel comprises a wide bandgap semiconductor material and the gate comprises a narrow bandgap semiconductor material. Mixtures of JFET and MOSFET transistors can be included on an integrated circuit design.
摘要:
A file sharing system includes authorization-based security to control access to shared files; and a synchronizer which uses the authorization-based security to monitor the shared files for changes and propagating the changes according to sharing relationships. A method for file sharing includes using authorization-based security to control access to a shared file; and monitoring the shared file for changes using a synchronizer which incorporates the authorization-based security to access the shared file.
摘要:
A sensor has an interferometer which measures a change in an applied environmental condition relative to a reference environmental condition. The interferometer is operated under the applied environmental condition to generate an interference spectrum. Intensities of the interference spectrum are measured at first and second wavelengths, respectively. The first and second wavelengths correspond to first and second reference intensities that are separated from one another by an odd number of extrema in the interference spectrum when the interferometer is operated under the reference condition. Measurement of the change in the applied environmental condition is based on the measured intensities and the first and second reference intensities.
摘要:
A distributed garbage collection system and method is disclosed that is compatible with local ref-count or full garbage collection and that ensures that no local object's storage is deleted by the local garbage collector unless it is certain that there are no actual or potential remote references to that local object. The disclosed system and method are implemented in the context of a transparent distributed object system in which communications between objects in different processes are enabled by dedicated proxy objects that are linked to corresponding remote objects via a pair of transport objects. Additional proxy holder objects and proxy holder proxies ensure that objects for which third-party object references are passed (i.e., where one object in a first process passes a remote object in a second process a reference to a third object in a third process) are not collected until a direct link is established between the remote object in the second process and the third object in the third object space. As appropriate, secret number table pointers maintained by a local registrar for each object that has been accessed via a third party message are deleted, allowing the objects to be collected when there are no other actual or pending remote references to that object. The transport managers encrypt all inter-process messages so as to provide full capability security within the distributed system. This enables the disclosed garbage collection system and methods to operate under attack from misbehaving participants.
摘要:
A system providing capability security for distributed object systems is disclosed. The basic tenet of capability security is that the right to do something to an object (e.g., invoke a particular object's methods) is represented solely by the holding of a reference to that object. In each of the preferred embodiments described herein, an object is presumed to hold legitimately a reference to a particular object only if the object knows some unpublicized (except under the conditions required by capability security) key associated with the particular object. That is, an object's key is required along with the object's reference. So that capability security is preserved when object references are passed between objects in different processes, the object references being passed are encrypted upon transmission and then decrypted upon arrival at their intended destination. This cryptography can be performed by objects or processes using a variety of techniques, including Diffie-Helman or public/private key cryptography. The cryptography performed in the various embodiments ensures that only the intended recipient of the message can decode the object reference and that a misbehaving object cannot convince another object that it possesses a capability it does not have. Some of the disclosed embodiments provide capability security for transparent distributed object systems, wherein a pair of matched transports handle and encrypt inter-process communications between objects in their respective processes.
摘要:
A process is disclosed for forming magnetic media, in which a protective overcoat of either partially stabilized zirconia or partially stabilized hafnia directly overlies a magnetic thin film recording layer. First, a chromium underlayer is sputter deposited onto a planar aluminum nickel phosphorous substrate. A crystalline magnetic recording layer is deposited onto the chromium underlayer, and substantially replicates the crystalline orientation of the underlayer. The substrate, underlayer and recording layer are passivated briefly in an oxygen atmosphere. Then, the hafnia or zirconia underlayer is applied by RF reactive sputtering in an atmosphere of argon and oxygen, with the argon partial pressure at least ten times the oxygen partial pressure. The passivation step improves the adhesion of the subsequently deposited cover layer, while the oxygen in the reactive sputtering process maintains a desired stoichiometric proportion of oxygen in the cover layer, for substantially improved media tribological properties.
摘要:
In accordance with the present invention, the meltability of processed cheese is controlled to provide a desired degree of meltability by incorporating whey proteins in the process cheese mix and processing the process cheese mix under conditions of temperature and time so as to denature the whey proteins sufficiently to provide a predeterminted level of cross-linked beta-lactoglobulin and provide the desired level of meltability. The whey protein provided in the process cheese blend is selected to limit the lactose in the final product to a predetermined level. The method of the present invention avoids the need for the use of sodium hexametaphosphate and consequently permits, in process cheese manufacture greater flexibility in handling holdover cheese.