摘要:
An encryption method encrypts a clear text twice using a first encryption engine to produce a first cipher text and a second encryption engine to produce a second cipher text. The method compares the first cipher text with the second cipher text, or compares a checksum of the first cipher text with a checksum of the second cipher text. If the comparison succeeds, the method transmits the data. In some embodiments, the method uses a first instance of an encryption key to produce the first cipher text and a second instance of the encryption key to produce the second cipher text.
摘要:
A method, computer program product, and data processing system for performing efficient communication between software entities residing in the same operating system using conventional network communications APIs are disclosed. According to a preferred embodiment, when a software entity (e.g., a process) attempts to communicate through a networking API, the operating system determines whether the other end of the communication refers to the same hardware node. If so, the operating system replaces the network protocol connection (socket connection) with a direct interprocess communication construct. The operating system provides additional code to simulate the appearance of an actual network (socket) connection at the API level while performing all actual I/O using the interprocess communication construct.
摘要:
A method of discovering a fault in a circuit is disclosed. The method comprises generating a first result of a selected function by performing the selected function on an operand, wherein the selected function employs a mask. Once the function is performed, an antimask of the mask is created, and the modulo of the antimask is calculated. A modulo function of the first result of the selected function is calculated to obtain a third result. A modulo of the operand is then calculated to obtain a fourth result, and a second function is then performed on the second result and the third result to obtain a fifth result. In response to comparing the fifth result to the fourth result, a signal is propagated to indicate a fault in the circuit.
摘要:
A method, system and computer program product are disclosed for simulating a storage area network including a set of correlated devices, each of the devices having a device agent. The method comprises the step of forming a set of simulation agents representing said device agents, including the steps of, (i) for each of the simulation agents, obtaining a set of agent profiles, and storing said agent profiles in a data store, and (ii) obtaining files describing class definitions for the simulation agents, and storing said files in the data store. With this information and data, a Visual Workbench is used to generate a display of said simulation agents. The preferred embodiment provides a framework and implementation that simulates the CIM agent of any SAN device. Each individual device CIM agent can be simulated in this framework based on the specification defined in an XML file and/or through snapshot mechanism.
摘要:
An Internet web application interfaces to a machine to give users information about the status of the machine. The information on the status of the machine is constantly changing. This design only dynamically builds a web page when the page is requested for viewing. Once built, the page is retained so that the next time it is requested, if the information it contains has not changed, the page can be served without having to be rebuilt. If the information has changed, the design will not update the page until the page has been requested. In addition, the page is only built in the human language requested.
摘要:
A method, system, and computer program product for sensing the presence and/or misplacement of mechanical sub assemblies (MSAs) within storage slots of automated storage libraries. Each MSA is tracked based on signed empty cell barcode labels. Signed empty cell barcode labels are utilized to uniquely identify the frame, column, and row coordinates of one or more MSAs. The storage library automatically scans all signed empty cell barcode labels utilizing a scanner mounted on a robotic device. The system provides a counter for each MSA, allowing the storage library to track the usage of the MSA. As usage of the MSA reaches a predefined lifecycle, the library automatically generates an alert to replace the MSA. When a MSA is rearranged within the storage library, the library automatically maps the new frame, column, and row coordinates of the MSA. The counter dynamically modifies the usage count of the MSA according to the unique cell barcode label, thereby tracking all current and previous cartridges, and/or other items that may be scanned during MSA activity.
摘要:
A method of displaying tab titles in a computer user interface receives a request to display a new tab in a tab area having a length. The new tab has a width and the new tab has a title having a length. The method determines a number of tabs to be displayed in the area and determines if the number of tabs to be displayed multiplied by the tab width is greater than the length of the tab area. If so, the method sets the tab width equal to the length of the tab area divided by the number of tabs. The method determines if the length of the title is greater than the tab width. If so, the method determines if the title has any words in common with any other titles of tabs. If so, the method deletes the common words from the titles, and displays the titles with the deleted common words in the tabs. The method may set a maximum number of tabs to be displayed in the tab area. The maximum number of tabs may be determined by the length of the tab area and a minimum tab width. If the number of tabs is greater than the maximum number of tabs is to be displayed, the method collapses some of the tabs in to a tab of tabs.
摘要:
A method and system for classifying small collections of hi-value entities with missing data. The invention includes: collecting measurement variables for a set of entity cases for which classifications are known; calibrating standard weights for each measurement variable based on historical data; computing compensating weights for each entity case that has missing data, computing case scores for each of one or more dimensions as a sum-product of compensating weights and variables associated with each dimension; executing an iterative process that finds a specific combination of compensation weights that best classify the entity cases in terms of distinct scores; and applying a resulting model, which is determined by the specific combination of compensation weights, to classify other entity cases for which the classifications are unknown.
摘要:
Data recorded in a recording medium is encrypted with an encryption/decryption key, and the encryption/decryption key is encrypted with an encryption-only key. The encrypted encryption/decryption key is embedded in encrypted data. A decryption-only key the encryption/decryption key is embedded in a program for reading. The data and the program for reading are recorded in the recording medium. The data cannot be read without the program for reading. The program for reading cannot be used for recording other data even if it is copied.
摘要:
A system and method for implementing non-lethal chemical warfare against rampage shooters. A sound detection module detects a sound of a gunshot from at least one of a collection of sensors within a building. A sound location module determines a location of the gunshot by analyzing the sound. At least one emitter releases non-lethal chemical countermeasures from at least one at the location of the gunshot.