摘要:
Simulating latency in a network environment. A first device receives a latency request. The first device sends a latency support confirmation. The first device receives an I/O frame. The I/O frame comprising a latency simulating bit and a latency duration. Based on the latency simulating bit and the latency duration, holding, by the first device, the I/O frame. The first device sends the I/O frame on.
摘要:
Simulating latency in a network environment. A device sends a latency request. The device receives a latency support confirmation. The device builds an I/O frame. The I/O frame comprises a latency simulating bit and a latency duration. Based on the latency simulating bit and the latency duration, the device holds the I/O frame. The device sends the I/O frame.
摘要:
For authorizing removable medium access, a reassembly module retrieves a medium portion of an encryption key from a removable medium. The encryption key encrypts encrypted data stored on the removable medium and includes a plurality of portions. The reassembly module further retrieves the user portion of the encryption key assigned to a user requesting the removable medium. The reassembly module reassembles the encryption key using at least the medium portion and the user portion of the plurality of portions. The decryption module decrypts the encrypted data with the reassembled encryption key.
摘要:
In one embodiment, a method for testing a cable includes receiving a read-signal profile read at a receiving-end of a cable upon an initial test signal being input to a sending end of the cable, calculating a cross-correlation function between the read-signal profile and a matched filter output, and determining a peak value of the cross-correlation function. In another embodiment, a system includes a device, the device including logic for receiving a read-signal profile read at a receiving-end of the cable upon an initial test signal being input to a sending end of the cable, logic for calculating a cross-correlation function between the read-signal profile and a matched filter output, logic for determining a peak value of the cross-correlation function, and logic for storing the peak value to a computer readable medium. Other methods, systems, and computer program products are also described according to various embodiments.
摘要:
Systems, computer-implemented methods, and computer program products that can facilitate elevator analytics and/or elevator optimization components are provided. According to an embodiment, a system can comprise a memory that stores computer executable components and a processor that executes the computer executable components stored in the memory. The computer executable components can comprise a prediction component that can predict a current destination of an elevator passenger based on historical elevator usage data of the elevator passenger. The computer executable components can further comprise an assignment component that can assign the elevator passenger to an elevator based on the current destination.
摘要:
An ultrasound probe is guided to an optimal position on a patient's body by illuminating the patient's body with a laser, by displaying icons of the probe position and the optimal position on a 3-D model of the patient's body, or by playing an audio signal that varies according to distance of the probe position from the optimal position. In certain embodiments, the probe is guided to a series of optimal positions for conducting a vascular exam, responsive to a database of human anatomy and vasculature and responsive to a database of vascular exam procedures.
摘要:
Systems and techniques that facilitate automated generation of relevant and adequate test datasets based on guarded commands are provided. In various embodiments, a query generation component can generate a query language query based on a first guarded command. In various aspects, an execution component can execute the query language query on a data table to return one or more datasets for testing the first guarded command. In various embodiments, the query generation component can comprise an initialization component that can initialize conditions of a WHERE clause of the query language query based on the first guarded command. In various instances, the query generation component can further comprise a transformation component that can transform the conditions of the WHERE clause of the query language query based on a sequence of guarded commands on which the first guarded command depends. In various cases, the query generation component can further comprise a translation component that can convert the transformed conditions of the WHERE clause of the query language query into query language syntax.
摘要:
Systems, devices, computer-implemented methods, and/or computer program products that facilitate software vulnerability analysis using relationship data extracted from disparate package-related sources. In one example, a system can comprise a processor that executes computer executable components stored in memory. The computer executable components can comprise a knowledge induction component and a vulnerability component. The knowledge induction component can populate a package ontology for a range of packages with relationship data extracted from a plurality of disparate package-related sources. The vulnerability component can identify an implicit vulnerability impacting the range of packages using the package ontology and a vulnerability record regarding an explicit vulnerability for a package within the range of packages.
摘要:
A computer implemented method for testing rules by a computing device including selecting a current version of a rule and prior version of the rule, comparing the prior version of the rule and the current version of the rule to each other to identify a type of change made in the current version of the rule with respect to the prior version of the rule, and testing the prior version of a rule and the current version of the rule using a common data set, the testing being based on the identified type of change. The test result is provided to a user.
摘要:
Methods, systems, and computer program products for data entry device security are provided. Aspects include receiving an indication of a user presence at a data entry device, wherein the data entry device includes a surface with apertures, and wherein the apertures include a material with a reflection coefficient. A presence of a fraud device is determined by emitting, from beneath the surface, security light from a set of one or more emitters, wherein the security light has a security light luminous power. A reflection of the security light off the material is collected by a first set of one or more sensors, wherein the reflection has a reflection luminous power. A luminous power range is determined based on the security light luminous power and the reflection coefficient and based on the reflection luminous power being outside the luminous power range, security measures are engaged at the data entry device.