Abstract:
A system, method and software for isolating information handling system memory system devices are disclosed. In dual-channel double-data-rate memory system implementations, teachings of the present disclosure facilitate accurate identification of memory system devices that fail diagnostic testing or cause memory errors. A BIOS level application is provided which permits user or application selection and isolation of memory system devices or components, thereby eliminating the need for physical removal of such components during testing as well as permitting continued use of the information handling system with defective memory system devices isolated.
Abstract:
System(s), method(s), and device(s) that incorporate a current physical location value associated with a communication device as part of internet protocol (IP) are presented. An IP management component obtains current physical location information of a wireless communication device and modifies the IP address to incorporate the current physical location value corresponding to the current physical location of the communication device as part of the IP address of the communication device to prevent undesired intrusions by hackers, as communications associated with the communication device are routed to/from the communication device that is at the current physical location. If the communication device moves to a new location, the IP management component can perform a new IP address modification to modify the IP address to incorporate a new physical location value associated with the communication device.
Abstract:
Utilizing dynamic heuristic transitions between local and remote data for displaying electronic communications is provided. A computer may load one or more folders associated with the electronic communications. The computer may then determine an initial mode for viewing the electronic communications. The computer may then display the remote data upon determining that the initial mode for viewing the electronic communications is an online mode or display the local data upon determining that the initial mode is offline. The computer may then synchronize local data and the remote data to update the local data. The computer may then automatically transition from displaying the remote data to displaying the local data after the update of the local data. The computer may also automatically transition from displaying the local data to displaying the remote data after determining that the local data is out of date.
Abstract:
Consistent with the present disclosure, a method and apparatus for providing a uniform spectral gain of an optical amplifier is provided. Namely, a “balancing” step is carried out in which an optical channel having the lowest power level input to an optical circuit, such as an dynamic gain equalizer (DGE), is assigned a zero “attenuation error” and is substantially un-attenuated by the DGE. The lowest power level optical signal does not require further attenuation and effectively serves as a reference power level, which the power levels of the remaining optical signals are set to. For example, remaining optical signals are assigned either positive or negative attenuation errors relative to the zero attenuation error based on optical signal input powers to the DGE and accumulated DGE attenuations over time. Those optical signals having a negative attenuation error are substantially unattenuated by the DGE, because such optical signals are adequately attenuated and do not require further attenuation. On the other hand, the DGE is controlled to attenuate those optical signals having positive attenuation errors to thereby flatten the output spectrum of the amplifier. In one example, interpolation techniques may be employed to control those portions of the DGE (e.g., attenuators or pixels) that do not receive a channel, such that adjacent pixels that receive channels may impart a desired amount of attenuation. In addition, further interpolation may be provided to appropriately control the DGE pixels, if the number of channels supplied to the DGE is different than the number of pixels of the DGE.
Abstract:
A method is provided for identifying a calling party to a called party utilizing biometric information. Biometric information of first calling party is received. If stored, a calling party profile is retrieved based on first calling party biometric information. A call is placed to a called party. The first calling party profile is provided to called party. A biometric information change from first calling party biometric information to a second calling party biometric information is automatically detected, and it is determined whether the second party biometric information is stored. If stored, a second calling party profile of second calling party is retrieved and is provided to called party. Responsive to determining that the biometric information for second calling party is not stored, the called party is notified that the second calling party is communicating and the second calling party profile is automatically created based on second calling party biometric information.
Abstract:
In accordance with an aspect of the invention, a method and system are disclosed for constructing an embedded signature in order to facilitate post-facto detection of leakage of sensitive data. The leakage detection mechanism involves: 1) identifying at least one set of words in an electronic document containing sensitive data, the set of words having a low frequency of occurrence in a first collection of electronic documents; and, 2) transmitting a query to search a second collection of electronic documents for any electronic document that contains the set of words having a low frequency of occurrence. This leakage detection mechanism has at least the following advantages: a) it is tamper-resistant; b) it avoids the need to add a watermark to the sensitive data, c) it can be used to locate the sensitive data even if the leakage occurred before the embedded signature was ever identified; and, d) it can be used to detect an embedded signature regardless of whether the data is being presented statically or dynamically.
Abstract:
The combination of EGCG and a derivative of a basic amino acid has been found to be an effective anti-yeast agent in acidic food. The present invention relates to a method for controlling or preventing the growth of yeast in acidic food (i.e. with a pH between 2 and 6) including adding to the food a) epigallocatechin gallate (EGCG) and b) a derivative of a basic amino acid, and/or a salt thereof, as an anti-yeast agent. The present invention further relates to a composition for addition to food and to an acidic food including the composition, which includes a) epigallocatechin gallate and b) both lauric arginate and polylysine.
Abstract:
A method is provided for identifying a calling party to a called party utilizing biometric information. Biometric information of first calling party is received. If stored, a calling party profile is retrieved based on first calling party biometric information. A call is placed to a called party. The first calling party profile is provided to called party. A biometric information change from first calling party biometric information to a second calling party biometric information is automatically detected, and it is determined whether the second party biometric information is stored. If stored, a second calling party profile of second calling party is retrieved and is provided to called party. Responsive to determining that the biometric information for second calling party is not stored, the called party is notified that the second calling party is communicating and the second calling party profile is automatically created based on second calling party biometric information.
Abstract:
Consistent with the present disclosure, an optical amplifier is provided that is configurable in one of two modes. In both modes, the optical service channel (OSC) may be dropped and converted to an electrical signal. In the first mode, the electrical signal is subject to further processing and the monitoring and/or control information carried by the OSC may be updated with new data. Such updated monitoring and control information is then supplied to an OSC transmitter and modulated onto an OSC output from the optical amplifier. In a second mode of operation (“loop back” mode), however, the monitoring and/or control information bypasses the processing noted above is looped back to the OSC transmitter unchanged. Accordingly, OSC monitoring and control information or data can be rapidly passed through the optical amplifier with little delay. Moreover, the optical amplifier may be configured to operate in either the first or second modes by appropriately configuring a switch. Thus, a standard optical amplifier can be used as a both a line amplifier, in which OSC data is processed and updated, as well as a booster amplifier in which such updating does not occur, for example, but the OSC data may be propagated to other amplifiers with little delay.
Abstract:
In accordance with an aspect of the invention, leakage prevention is implemented by: a) associating—within a network—a unique identifier with a packet transmitted by a process which has previously accessed data containing sensitive information, and b) searching a packet before it exits a network for the unique identifier. This mechanism provides a strong guarantee against leakage of sensitive data out of a network by facilitating the monitoring of packets which potentially contain the sensitive information. The unique identifier may be located in the header of the packet, which is detectable without requiring a heavy investment of network resources. Additionally, a packet's movement within a network may be tracked by analyzing trapped system calls. Furthermore, an exiting packet may be analyzed by a network firewall, the firewall utilizing various policies to determine how to proceed when a packet containing a unique identifier is located.