Abstract:
A method of combining businesses by creating a target component map based on the business strategy of the resulting company, and using that target map to generate a component map for each constituent company in the combination. The constituent component map describes the current state of each component instantiated in the constituent company. Where there is no overlap between constituent companies with respect to components in the target map, those component instantiations are carried over to the resulting company. Where there is overlap, a comparative analysis is done and a ‘best fit’ component is recommended for inclusion in the resulting company. A transformation plan is developed to build the resulting company from those component instances selected for inclusion, in accordance with the target component map. Where the business strategy for building the resulting company includes a divestiture, the transformation plan provides alignment of the components to be divested in order to optimize the divestiture.
Abstract:
The present invention relates to a method for preparing linear alpha olefin comonomers, such as 1-butene, 1-hexene or 1-octene, from ethylene monomer. The comonomer generated is stored on site for use in a subsequent process, such as a polyethylene polymerization reactor. The method includes the steps of feeding an ethylene monomer, and a catalyst in a solvent to one or more comonomer synthesis reactors; reacting the ethylene monomer and the catalyst in solvent under reaction conditions to produce an effluent stream comprising unreacted ethylene monomer, a catalyst in a solvent, and comonomer; passing the effluent stream to one or more downstream gas/liquid phase separators to form a gas stream of unreacted ethylene monomer, and a liquid stream of comonomer, and catalyst in a solvent; recycling to the one or more comonomer synthesis reactors the unreacted ethylene monomer and a portion of the liquid stream; and storing a remaining portion of said liquid stream for subsequent processing of the comonomer. Some of the benefits of the method include process simplification and reduced capital and operating costs from, inter alia, not having to recover ethylene in high purity nor separate catalyst from comonomer.
Abstract:
The present disclosure relates to mitigating email spam attacks. A gateway is configured to receive mail from one or more mail systems. If mail is intended for delivery to an invalid address, the gateway can generate status messages for delivery to the mail systems or determine if a threshold for delivery attempts to the invalid address has been met. If the threshold has been met, the gateway can request creation of a honeypot email address, and future mail intended for delivery to the invalid address are delivered to a mailbox associated with the honeypot email address. Various actions can be taken with respect to the mail delivered to the honeypot email address including analysis, blacklisting of senders, and/or other actions.
Abstract:
The invention provides a method and device for limiting unwanted network traffic, including unwanted emails. The method proceeds by assigning at least one network address to a category of network addresses based on a level of trust of the network address. Connection resources are allocated to the category. When a connection is received from a network address to which the category has been assigned, a portion of the allocated resources in the category are provided to the network address.
Abstract:
Techniques and systems for modifying a virtual machine functionality. Archive files each including at least a class files are received. The archive files are stored within the virtual machine. The virtual machine runs on a host system and neither the virtual machine nor the host system are restarted in response to the receiving or storing of the archive files. Files of the host system are scanned to find class files that are not included in a class path for the virtual machine. The class files are copied to a class path for the virtual machine. Neither the virtual machine nor the host system are restarted in response to the copying of the class files. The classes corresponding to the class files are registered in the virtual machine in response to the copying of the class files to the class path. Neither the virtual machine nor the host system are restarted in response to the registration of the classes.
Abstract:
A method is disclosed including passing a plurality of e-mails through a spam filter and classifying at least of the plurality of e-mails as not spam. Thereafter, the plurality of e-mails are received at each of a plurality of user computers. The method may further include receiving a plurality of reports, the plurality of reports including one report from each of the plurality of user computers that one or more of the plurality of e-mails are spam that was not classified as spam by the spam filter. Based on the plurality of reports, one or more of the plurality of e-mails is reclassified as spam and/or the spam filter is modified.
Abstract:
In providing a fuel tank cap assembly for a fuel tank for an off-road motor vehicle, a vent assembly is first attached to the fuel tank. Second, a fuel supply port is constructed in the fuel tank. Next, a sleeve portion is secured to the fuel supply port. Finally, a cap portion is inserted into the sleeve portion. The fuel tank cap assembly comprises a vent assembly attached to the fuel tank, a fuel supply port constructed in the fuel tank, a sleeve portion secured to the fuel supply port, and a cap portion inserted into the sleeve portion. Alternatively, a fuel tank contains the fuel tank cap assembly.
Abstract:
Techniques and systems for modifying a virtual machine functionality. Archive files each including at least a class files are received. The archive files are stored within the virtual machine. The virtual machine runs on a host system and neither the virtual machine nor the host system are restarted in response to the receiving or storing of the archive files. Files of the host system are scanned to find class files that are not included in a class path for the virtual machine. The class files are copied to a class path for the virtual machine. Neither the virtual machine nor the host system are restarted in response to the copying of the class files. The classes corresponding to the class files are registered in the virtual machine in response to the copying of the class files to the class path. Neither the virtual machine nor the host system are restarted in response to the registration of the classes.
Abstract:
In accordance with embodiments, there are provided mechanisms and methods for facilitating dynamic generating of visual workflow and corresponding tasks in an on-demand services environment. In one embodiment and by way of example, a method includes receiving a request to perform a business process at a computing system. The performing of the business process may include creating a new business process relating to workings of an organization. The method may further include interpreting content of the request, and dynamically generating a visual workflow in response to the interpretation of the content of the request. The visual workflow may be used to perform the business process.
Abstract:
The present disclosure relates to mitigating email spam attacks. A gateway is configured to receive mail from one or more mail systems. If mail is intended for delivery to an invalid address, the gateway can generate status messages for delivery to the mail systems or determine if a threshold for delivery attempts to the invalid address has been met. If the threshold has been met, the gateway can request creation of a honeypot email address, and future mail intended for delivery to the invalid address are delivered to a mailbox associated with the honeypot email address. Various actions can be taken with respect to the mail delivered to the honeypot email address including analysis, blacklisting of senders, and/or other actions.