摘要:
A method of combining businesses by creating a target component map based on the business strategy of the resulting company, and using that target map to generate a component map for each constituent company in the combination. The constituent component map describes the current state of each component instantiated in the constituent company. Where there is no overlap between constituent companies with respect to components in the target map, those component instantiations are carried over to the resulting company. Where there is overlap, a comparative analysis is done and a ‘best fit’ component is recommended for inclusion in the resulting company. A transformation plan is developed to build the resulting company from those component instances selected for inclusion, in accordance with the target component map. Where the business strategy for building the resulting company includes a divestiture, the transformation plan provides alignment of the components to be divested in order to optimize the divestiture.
摘要:
The invention provides a method and device for limiting unwanted network traffic, including unwanted emails. The method proceeds by assigning at least one network address to a category of network addresses based on a level of trust of the network address. Connection resources are allocated to the category. When a connection is received from a network address to which the category has been assigned, a portion of the allocated resources in the category are provided to the network address.
摘要:
A computer-implemented method for managing personal information. The method includes (a) electronically receiving personal information of a monitored individual and a unique identifier of the monitored individual; (b) electronically receiving mortality information based on a mortality database having one or more records; and (c) electronically searching the mortality database records for the unique identifier of the monitored individual to obtain a mortality search result.
摘要:
The present invention relates to a method for preparing olefin comonomers from ethylene. The comonomer generated can be used in a subsequent process, such as a polyethylene polymerization reactor. The comonomer generated can be transported, optionally without isolation or storage, to a polyethylene polymerization reactor. One method includes the steps of: feeding ethylene and a catalyst in a solvent/diluent to one or more comonomer synthesis reactors; reacting the ethylene and the catalyst under reaction conditions sufficient to produce an effluent comprising a desired comonomer; forming a gas stream comprising unreacted ethylene, and a liquid/bottoms stream comprising the comonomer, optionally by passing the effluent to one or more downstream gas/liquid phase separators; and purifying at least a portion of said liquid/bottoms stream by removing at least one of solid polymer, catalyst, and undesirable olefins therefrom.
摘要:
A method of combining businesses by creating a target component map based on the business strategy of the resulting company, and using that target map to generate a component map for each constituent company in the combination. The constituent component map describes the current state of each component instantiated in the constituent company. Where there is no overlap between constituent companies with respect to components in the target map, those component instantiations are carried over to the resulting company. Where there is overlap, a comparative analysis is done and a ‘best fit’ component is recommended for inclusion in the resulting company. A transformation plan is developed to build the resulting company from those component instances selected for inclusion, in accordance with the target component map. Where the business strategy for building the resulting company includes a divestiture, the transformation plan provides alignment of the components to be divested in order to optimize the divestiture.
摘要:
A system for verifying the authenticity of data contained in a magnetic medium using the remanent noise characteristics of the magnetic medium. In one embodiment, the invention includes a sensing unit configured to generate a signal indicative of the magnetic field of the magnetic medium, an analog-to-digital converter (ADC) in communication with the sensing unit and configured to digitize the analog signal, a filter in communication with the ADC configured to enhance the component of the signal associated with the remanent noise characteristic, a data extraction unit, in communication with the ADC and the filter configured to measure at least bit duration and peak location and an authentication extraction unit, in communication with the filter and the data extraction unit configured to extract a set of scaled samples from the output of the filter representative of the remanent noise characteristic.
摘要:
A repeater node for a serial bus system is provided. The repeater node comprises an optic receiver adapted to receive an optic signal supplied thereto. An optic-to-electrical conversion circuit converts the optic signal into a corresponding electrical signal that is output from a transmitter. A switching mechanism is coupled with the transmitter and is adapted to electrically decouple the transmitter from an electrical transmission medium in the absence of the optic signal. A cable serial bus system including a first node comprising a physical layer and a port adapted to receive an electrical signal supplied thereto is provided. A switching mechanism is adapted to couple a transmitter and the port. A transmission medium couples the switching mechanism and the port. The system is adapted to decouple the transmitter from the port in absence of an optic signal at a receiver.
摘要:
A method is disclosed including passing a plurality of e-mails through a spam filter and classifying at least of the plurality of e-mails as not spam. Thereafter, the plurality of e-mails are received at each of a plurality of user computers. The method may further include receiving a plurality of reports, the plurality of reports including one report from each of the plurality of user computers that one or more of the plurality of e-mails are spam that was not classified as spam by the spam filter. Based on the plurality of reports, one or more of the plurality of e-mails is reclassified as spam and/or the spam filter is modified.
摘要:
The invention provides a method and device for limiting unwanted network traffic, including unwanted emails. The method proceeds by assigning at least one network address to a category of network addresses based on a level of trust of the network address. Connection resources are allocated to the category. When a connection is received from a network address to which the category has been assigned, a portion of the allocated resources in the category are provided to the network address.
摘要:
The invention provides a method and device for limiting unwanted network traffic, including unwanted emails. The method proceeds by assigning at least one network address to a category of network addresses based on a level of trust of the network address. Connection resources are allocated to the category. When a connection is received from a network address to which the category has been assigned, a portion of the allocated resources in the category are provided to the network address.