Abstract:
Information is managed by receiving at a data source device, from an application running on a data source device, an instruction associated with a file system object. It is determined at the data source device if the instruction is able to be satisfied by a file system running on the data source device. If it is determined that the instruction is not able to be satisfied by the file system, the instruction is performed without the services of the file system; the application is unaware that the file system object is managed by an entity other than the file system running on the data source device.
Abstract:
Provided is a method of identifying a compound which modulates miRNA activity comprising (i) determining the ability of a test compound to alter the polyuridylation activity of a ZCCHC polypeptide wherein a test compound which alters the polyuridylation activity is useful in modulating miRNA activity; or (ii) determining the ability of a test compound to alter the binding of a ZCCHC polypeptide to a LIN28 polypeptide, wherein a test compound which alters said binding may be useful in modulating miRNA activity; or (iii) determining the ability of a test compound to bind to a ZCCHC polypeptide, wherein a test compound which binds to the ZCCHC polypeptide may be useful in modulating miRNA activity.
Abstract:
Disclosed are nanocomposite materials comprising multiple layers of biomolecules bound to aligned carbon nanotubes. The thickness of each of the layers may be precisely controlled using a layer-by-layer assembly technique.
Abstract:
Disclosed herein are engineered zinc finger proteins which bind to telomeric structures; methods for their design, synthesis and use; and cells comprising a telomere-binding zinc finger protein. Methods for modulating telomerase activity using telomere-binding zinc finger proteins are also provided.
Abstract:
A method and apparatus for securing networks, focusing on application in Fibre Channel networks. A combination of unique security techniques are combined to provide overall network security. Responsibility for security in the network is assigned to one or more designated entities. The designated entities deploy management information throughout the network to enhance security by modifying the capabilities and operational permissions of the devices participating in the network. For example, through network control: logical management access or physical I/O access may be limited on a per device or per I/O basis; and all devices and ports in the network operate only with other approved devices and ports. These designated entities can better manage network security by exploiting a unique link authentication system as well as a unique push-model secure distributed time service. The link authentication involves a multi-phase nonce exchange exploiting various derivations of the nonce and other information such as hashes and encryptions. The push-model secure time distribution departs from the traditional Fibre Channel pull mode time distribution and provides for secure and reliable distributed time so that various security attacks may be defeated.
Abstract:
Techniques, systems, devices and materials are disclosed for capturing, isolating and transporting target biomolecules and living organisms. In one aspect, a device includes a tube structured to include a large opening and a small opening that are on opposite ends of the tube, and a tube body connecting the openings and having a cross section spatially reducing in size from the large opening to the small opening, in which the tube includes a layered wall including an inner layer having a catalyst material that is reactive with a fuel fluid to produce bubbles exiting the tube from the large opening to propel the tube to move in the fuel fluid and an external layer formed of a material capable of being functionalized, and a molecular layer functionalized onto the external layer of the tube and structured to attach to a targeted molecule in the fuel fluid.
Abstract:
A method, article of manufacture, and apparatus for protecting data. In some embodiments, this includes identifying a parent virtual container, identifying a linked child virtual container, creating a fast copy of the parent virtual container and the linked child virtual container, and consolidating the copy of the parent virtual container and the copy of the linked child virtual container based on the format of the parent virtual container.