摘要:
A low optical loss and high efficiency grating is placed within a broad-area high-power laser diode or single spatial mode laser diode to narrow the spectral width and stabilize the emission wavelength. Several embodiments of grating configurations are presented, together with the measured results of a reduction to practice of a particular embodiment.
摘要:
A digital clock placement engine has circuitry that adjusts a duty cycle of a clock signal and adjusts the locations of the rising/falling edges of the clock signal for purposes of data sampling or other operations. In a forwarded-clock interface implementation, a clock signal is received along with a data signal, and the received clock signal may be distorted to due various factors. To enable the received data signal to be sampled correctly, the clock placement engine generates a recovered clock signal having rising and falling edges that are placed/timed between the rising and falling edges of the received clock signal.
摘要:
A digital clock placement engine has circuitry that adjusts a duty cycle of a clock signal and adjusts the locations of the rising/falling edges of the clock signal for purposes of data sampling or other operations. In a forwarded-clock interface implementation, a clock signal is received along with a data signal, and the received clock signal may be distorted to due various factors. To enable the received data signal to be sampled correctly, the clock placement engine generates a recovered clock signal having rising and falling edges that are placed/timed between the rising and falling edges of the received clock signal.
摘要:
According to one aspect, the subject matter described herein includes a method for communicating an encrypted data packet. The method includes steps occurring at a first gateway node. The method also includes receiving a data packet from a first host. The method further includes determining that a first security association (SA) instance associated with the data packet is in an inactive state. The method further includes identifying a second SA instance that is both associated with the data packet and in an active state. The method further includes forwarding the data packet to the second SA instance.
摘要:
The present invention is directed to recombinant microorganisms comprising one or more dihydroxyacid dehydratase (DHAD)-requiring biosynthetic pathways and methods of using said recombinant microorganisms to produce beneficial metabolites derived from said DHAD-requiring biosynthetic pathways. In various aspects of the invention, the recombinant microorganisms may be engineered to overexpress one or more polynucleotides encoding one or more Aft proteins or homologs thereof. In some embodiments, the recombinant microorganisms may comprise a cytosolically localized DHAD enzyme. In additional embodiments, the recombinant microorganisms may comprise a mitochondrially localized DHAD enzyme. In various embodiments described herein, the recombinant microorganisms may be microorganisms of the Saccharomyces clade, Crabtree-negative yeast microorganisms, Crabtree-positive yeast microorganisms, post-WGD (whole genome duplication) yeast microorganisms, pre-WGD (whole genome duplication) yeast microorganisms, and non-fermenting yeast microorganisms.
摘要:
The present invention relates to recombinant microorganisms comprising biosynthetic pathways and methods of using said recombinant microorganisms to produce various beneficial metabolites. In various aspects of the invention, the recombinant microorganisms may further comprise one or more modifications resulting in the reduction or elimination of 3 keto-acid (e.g., acetolactate and 2-aceto-2-hydroxybutyrate) and/or aldehyde-derived by-products. In various embodiments described herein, the recombinant microorganisms may be microorganisms of the Saccharomyces clade, Crabtree-negative yeast microorganisms, Crabtree-positive yeast microorganisms, post-WGD (whole genome duplication) yeast microorganisms, pre-WGD (whole genome duplication) yeast microorganisms, and non-fermenting yeast microorganisms.
摘要:
Methods, systems, and computer readable media for offloading IPsec processing from application hosts using an IPsec proxy mechanism are disclosed. According to one method, at least one of unencrypted, IPsec, and Internet key exchange (IKE) packets transmitted between a first application host and a second application host are intercepted by a network gateway. The network gateway performs all IKE and IPsec-related processing for the at least one unencrypted, IPsec, and IKE packets on behalf of the first application host such that the second application host is unaware that IPsec processing is being performed by the network gateway.
摘要:
The present invention provides recombinant microorganisms comprising isobutanol producing metabolic pathway with at least one isobutanol pathway enzyme localized in the cytosol, wherein said recombinant microorganism is selected to produce isobutanol from a carbon source. Methods of using said recombinant microorganisms to produce isobutanol are also provided. In various aspects of the invention, the recombinant microorganisms may comprise a cytosolically active isobutanol pathway enzymes. In some embodiments, the invention provides mutated, modified, and/or chimeric isobutanol pathway enzymes with cytosolic activity. In various embodiments described herein, the recombinant microorganisms may be microorganisms of the Saccharomyces clade, Crabtree-negative yeast microorganisms, Crabtree-positive yeast microorganisms, post-WGD (whole genome duplication) yeast microorganisms, pre-WGD (whole genome duplication) yeast microorganisms, and non-fermenting yeast microorganisms.
摘要:
This invention relates to modified hydroxylases. The invention further relates to cells expressing such modified hydroxylases and methods of producing hydroxylated alkanes by contacting a suitable substrate with such cells.
摘要:
According to one aspect, the subject matter described herein includes a method for communicating an encrypted data packet. The method includes steps occurring at a first gateway node. The method also includes receiving a data packet from a first host. The method further includes determining that a first security association (SA) instance associated with the data packet is in an inactive state. The method further includes identifying a second SA instance that is both associated with the data packet and in an active state. The method further includes forwarding the data packet to the second SA instance.