bl

Polymerizable compositions

The invention relates to the use of triazenes of formula (I) wherein Q is a direct bond or a bivalent radical —(CR8R9)—, Z1 is —O—, —NR10—, —CH2—, —(CR11R12)— or —C(═O)— and R1 to R12 are optionally substituted hydrocarbon residues, as precursors for radicals useful in reactions triggered by free radicals, such as polymerization of unsaturated monomers and degradation of polyolefins. Most of the triazenes of formula (I) are novel and claimed, too, as well as the preparation of triazenes of formula (I) and polymerizable compositions comprising them.




bl

Semi-cured product, cured product and method of manufacturing these, optical component, curable resin composition

A heat-resistant cured product is efficiently produced by obtaining a semi-cured product where a curable resin composition containing a (meth)acrylate monomer, a non-conjugated vinylidene group-containing compound and a thermal radical-polymerization initiator is processed by at least one of photoirradiation and heating to give a semi-cured product having a complex viscosity of from 105 to 108 mPa·s at 25° C. and at a frequency of 10 Hz; and putting the semi-cured product in a forming die for pressure formation therein, and heating it therein for thermal polymerization to give a cured product.




bl

UV-curable coating compositions with self-healing capabilities, coating films, and methods of producing coating films

The present invention is directed to a coating composition including a (meth)acrylate binder resin, a UV initiator, an organic solvent, and silica particles surface-treated with a (meth)acrylate compound, a coating film including a cured product of the coating composition, and a method of producing the coating film. The present invention makes it possible to provide a coating material having high transmittance and a low level of haze, and excellent scratch resistance and self-healing capabilities.




bl

Scalable network security with fast response protocol

This disclosure provides a network security architecture that permits installation of different software security products as virtual machines (VMs). By relying on a standardized data format and communication structure, a general architecture can be created and used to dynamically build and reconfigure interaction between both similar and dissimilar security products. Use of an integration scheme having defined message types and specified query response framework provides for real-time response and easy adaptation for cross-vendor communication. Examples are provided where an intrusion detection system (IDS) can be used to detect network threats based on distributed threat analytics, passing detected threats to other security products (e.g., products with different capabilities from different vendors) to trigger automatic, dynamically configured communication and reaction. A network security provider using this infrastructure can provide hosted or managed boundary security to a diverse set of clients, each on a customized basis.




bl

Portable computing device as control mechanism

A portable or mobile computing device, such as a smart phone or portable media player, can be used to control one or more electronic devices over an appropriate wireless channel. In one example, a user can utilize a smart phone as a mouse for a notebook computer or Internet-capable television. The user can move the portable device on a surface and press appropriate selectable elements on the portable device, as if the user is using a wireless mouse. The portable device can send the commands over the wireless channel to the electronic device, which can provide inputs and/or control signals to the electronic device. In some embodiments, the user can take advantage of the processing capability of the portable device to work directly with elements such as a wireless keyboard and wireless monitor, without the need for a notebook or other such computing element therebetween.




bl

Apparatuses enabling concurrent communication between an interface die and a plurality of dice stacks, interleaved conductive paths in stacked devices, and methods for forming and operating the same

Various embodiments include apparatuses, stacked devices and methods of forming dice stacks on an interface die. In one such apparatus, a dice stack includes at least a first die and a second die, and conductive paths coupling the first die and the second die to the common control die. In some embodiments, the conductive paths may be arranged to connect with circuitry on alternating dice of the stack. In other embodiments, a plurality of dice stacks may be arranged on a single interface die, and some or all of the dice may have interleaving conductive paths.




bl

Resource abstraction via enabler and metadata

Embodiments of the invention provide systems and methods for managing an enabler and dependencies of the enabler. According to one embodiment, a method of managing an enabler can comprise requesting a management function via a management interface of the enabler. The management interface can provide an abstraction of one or more management functions for managing the enabler and/or dependencies of the enabler. In some cases, prior to requesting the management function metadata associated with the management interface can be read and a determination can be made as to whether the management function is available or unavailable. Requesting the management function via the management interface of the enabler can be performed in response to determining the management function is available. In response to determining the management function is unavailable, one or more alternative functions can be identified based on the metadata and the one or more alternative functions can be requested.




bl

Verification of controls in information technology infrastructure via obligation assertion

A processing device comprises a processor coupled to a memory and implements an obligation management system for information technology infrastructure, with the obligation management system being configured to process a plurality of obligations on behalf of a relying party to verify implementation of corresponding controls in information technology infrastructure of a claimant. A given one of the obligations has an associated obligation fulfiller that is inserted or otherwise deployed as a component within the information technology infrastructure of the claimant and is configured to provide evidence of the implementation of one or more of the controls responsive to an obligation assertion so as to establish an associated trust aspect of the claimant. The information technology infrastructure may comprise distributed virtual infrastructure of a cloud service provider. The claimant may comprise the cloud service provider and the relying party may comprise a tenant of the cloud service provider.




bl

Scalable group synthesis

An illustrative embodiment of a computer-implemented process for scalable group synthesis receives a group definition, applies a sub-set of conditions to the group definition to form a conditioned group definition, receives a set of entities and populates group membership using the received set of entities and the conditioned group definition, wherein each member responds in the affirmative to the sub-set of conditions.




bl

Reconfigurable processor and method

Disclosed are a reconfigurable processor and processing method, a reconfiguration control apparatus and method, and a thread modeler and modeling method. A memory area of a reconfigurable processor may be divided into a plurality of areas, and a context enabling a thread process may be stored in respective divided areas, in advance. Accordingly, when a context switching is performed from one thread to another thread, the other thread may be executed by using information stored in an area corresponding to the other thread.




bl

Switchable hydrophilicity solvents and methods of use thereof

A solvent that reversibly converts from a hydrophobic liquid form to hydrophilic liquid form upon contact with water and a selected trigger, e.g., contact with CO2, is described. The hydrophilic liquid form is readily converted back to the hydrophobic liquid form and water. The hydrophobic liquid is an amidine or amine. The hydrophilic liquid form comprises an amidinium salt or an ammonium salt.




bl

Ultrastable particle-stabilized foams and emulsions

Described is a method to prepare wet foams exhibiting long-term stability wherein colloidal particles are used to stabilize the gas-liquid interface, said particles being initially inherently partially lyophobic particles or partially lyophobized particles having mean particle sizes from 1 nm to 20 μm. In one aspect, the partially lyophobized particles are prepared in-situ by treating initially hydrophilic particles with amphiphilic molecules of specific solubility in the liquid phase of the suspension.




bl

Metal nanoparticle dispersion usable for ejection in the form of fine droplets to be applied in the layered shape

According to the present invention, a metal nanoparticle dispersion suitable to multiple layered coating by jetting in the form of fine droplets is prepared by dispersing metal nanoparticles having an average particle size of 1 to 100 nm in a dispersion solvent having a boiling point of 80° C. or higher in such a manner that the volume percentage of the dispersion solvent is selected in the range of 55 to 80% by volume and the fluid viscosity (20° C.) of the dispersion is chosen in the range of 2 mPa·s to 30 mPa·s, and then when the dispersion is discharged in the form of fine droplets by inkjet method or the like, the dispersion is concentrated by evaporation of the dispersion solvent in the droplets in the course of flight, coming to be a viscous dispersion which can be applicable to multi-layered coating.




bl

Low latency variable transfer network communicating variable written to source processing core variable register allocated to destination thread to destination processing core variable register allocated to source thread

A method and circuit arrangement utilize a low latency variable transfer network between the register files of multiple processing cores in a multi-core processor chip to support fine grained parallelism of virtual threads across multiple hardware threads. The communication of a variable over the variable transfer network may be initiated by a move from a local register in a register file of a source processing core to a variable register that is allocated to a destination hardware thread in a destination processing core, so that the destination hardware thread can then move the variable from the variable register to a local register in the destination processing core.




bl

Combined branch target and predicate prediction for instruction blocks

Embodiments provide methods, apparatus, systems, and computer readable media associated with predicting predicates and branch targets during execution of programs using combined branch target and predicate predictions. The predictions may be made using one or more prediction control flow graphs which represent predicates in instruction blocks and branches between blocks in a program. The prediction control flow graphs may be structured as trees such that each node in the graphs is associated with a predicate instruction, and each leaf associated with a branch target which jumps to another block. During execution of a block, a prediction generator may take a control point history and generate a prediction. Following the path suggested by the prediction through the tree, both predicate values and branch targets may be predicted. Other embodiments may be described and claimed.




bl

Client-allocatable bandwidth pools

Methods and apparatus for client-allocatable bandwidth pools are disclosed. A system includes a plurality of resources of a provider network and a resource manager. In response to a determination to accept a bandwidth pool creation request from a client for a resource group, where the resource group comprises a plurality of resources allocated to the client, the resource manager stores an indication of a total network traffic rate limit of the resource group. In response to a bandwidth allocation request from the client to allocate a specified portion of the total network traffic rate limit to a particular resource of the resource group, the resource manager initiates one or more configuration changes to allow network transmissions within one or more network links of the provider network accessible from the particular resource at a rate up to the specified portion.




bl

Virtualization support for branch prediction logic enable / disable at hypervisor and guest operating system levels

A hypervisor and one or more guest operating systems resident in a data processing system and hosted by the hypervisor are configured to selectively enable or disable branch prediction logic through separate hypervisor-mode and guest-mode instructions. By doing so, different branch prediction strategies may be employed for different operating systems and user applications hosted thereby to provide finer grained optimization of the branch prediction logic for different operating scenarios.




bl

Efficient parallel computation of dependency problems

A computing method includes accepting a definition of a computing task, which includes multiple Processing Elements (PEs) having execution dependencies. The computing task is compiled for concurrent execution on a multiprocessor device, by arranging the PEs in a series of two or more invocations of the multiprocessor device, including assigning the PEs to the invocations depending on the execution dependencies. The multiprocessor device is invoked to run software code that executes the series of the invocations, so as to produce a result of the computing task.




bl

Enhanced instruction scheduling during compilation of high level source code for improved executable code

Systems and methods for static code scheduling are disclosed. A method can include receiving an intermediate representation of source code, building a directed acyclic graph (DAG) for the intermediate representation, and creating chains of dependent instructions from the DAG for cluster formation. The chains are merged into clusters and each node in the DAG is marked with an identifier of a cluster it is part of to generate a marked instruction DAG. Instruction DAG scheduling is then performed using information about the clusters to generate an ordered intermediate representation of the source code.




bl

Unified and extensible asynchronous and synchronous cancelation

A cancelation registry provides a cancelation interface whose implementation registers cancelable items such as synchronous operations, asynchronous operations, type instances, and transactions. Items may be implicitly or explicitly registered with the cancelation registry. A consistent cancelation interface unifies cancelation management for heterogeneous items, and allows cancelation of a group of items with a single invocation of a cancel-registered-items procedure.




bl

System for generating readable and meaningful descriptions of stream processing source code

An information processing system, computer readable storage medium, and method for automatically generating human readable and meaningful documentation for one or more source code files. A processor of the information processing system receives one or more source code files containing source code artifacts (SCA) and infers semantics therefrom based on predefined rules. The processor, based on the inferred semantics, extracts documentation from another source code file. The extracted documentation and the inferred semantics are used to generate new human readable and meaningful documentation for the SCA, such new documentation being previously missing from the SCA. The generated new documentation is included with the SCA in one or more source code files.




bl

Method for identifying problematic loops in an application and devices thereof

This invention relates to a method, computer readable medium, and apparatus for identifying one or more problematic loops in an application. This invention provides a Directed Acyclic Graph or DAG representation of structure of one or more loops in the application by performing a static and a dynamic analysis of the application source code and depicts the loop information as LoopID, loop weight, total loop iteration, average loop iteration, total loop iteration time, average loop iteration time and embedded vector size. This aids a programmer to concentrate on problematic loops in the application and analyze them further for potential parallelism.




bl

Blueprint-driven environment template creation in a virtual infrastructure

A system for blueprint-driven environment template creation in a virtual infrastructure comprises a processor and a memory. The processor is configured to receive a blueprint, receive an environment template configuration, and build an environment template using the blueprint and the environment template configuration. The environment template is for provisioning an environment. The environment is for deploying an application. The memory is coupled to the processor and is configured to provide the processor with instructions.




bl

Adjustment of threads for execution based on over-utilization of a domain in a multi-processor system by destroying parallizable group of threads in sub-domains

Embodiments provide various techniques for dynamic adjustment of a number of threads for execution in any domain based on domain utilizations. In a multiprocessor system, the utilization for each domain is monitored. If a utilization of any of these domains changes, then the number of threads for each of the domains determined for execution may also be adjusted to adapt to the change.




bl

Particles comprising a releasable dopant therein

A process for making particles comprising a hydrophobic dopant for subsequent release therefrom is disclosed. The process comprises providing an emulsion comprising a hydrophilic phase and a hydrophobic phase dispersed in the hydrophilic phase, and reacting the precursor material to form the particles comprising the dopant therein. The hydrophobic phase comprises a precursor material and the dopant.




bl

Process for the in situ production of polyether polyols based on renewable materials and their use in the production of flexible polyurethane foams

A polyether polyol based on renewable materials is obtained by the in situ production of a polyether from a hydroxyl group-containing vegetable oil, at least one alkylene oxide and a low molecular weight polyol having at least 2 hydroxyl groups. The polyol is produced by introducing the hydroxyl group-containing vegetable oil, a catalyst and an alkylene oxide to a reactor and initiating the alkoxylation reaction. After the alkoxylation reaction has begun but before the reaction has been 20% completed, the low molecular weight polyol having at least 2 hydroxyl groups is continuously introduced into the reactor. After the in situ made polyether polyol product having the desired molecular weight has been formed, the in situ made polyether polyol is removed from the reactor. These polyether polyols are particularly suitable for the production of flexible polyurethane foams.




bl

Data mining in a digital map database to identify blind intersections along roads and enabling precautionary actions in a vehicle

Disclosed is a feature for a vehicle that enables taking precautionary actions in response to conditions on the road network around or ahead of the vehicle, in particular, a blind intersection along a section of road. A database that represents the road network is used to determine locations where a blind intersection is located along a section of road. Then, precautionary action data is added to the database to indicate a location at which a precautionary action is to be taken about the blind intersection located along the section of road. A precautionary action system installed in a vehicle uses this database, or a database derived therefrom, in combination with a positioning system to determine when the vehicle is at a location that corresponds to the location of a precautionary action. When the vehicle is at such a location, a precautionary action is taken by a vehicle system as the vehicle is approaching a blind intersection.




bl

Systems and methods for tracking location of movable target object

An automated process uses a local positioning system to acquire location (i.e., position and orientation) data for one or more movable target objects. In cases where the target objects have the capability to move under computer control, this automated process can use the measured location data to control the position and orientation of such target objects. The system leverages the measurement and image capture capability of the local positioning system, and integrates controllable marker lights, image processing, and coordinate transformation computation to provide tracking information for vehicle location control. The resulting system enables position and orientation tracking of objects in a reference coordinate system.




bl

System and method for integrated transformer synthesis and optimization using constrained optimization problem

A method for designing a transformer in an integrated circuit includes receiving one or more desired characteristics of the transformer from user input and iteratively determining a design solution for the transformer through one or more simulations and modifications using a rule-set. The method combines the one or more desired characteristics with other preset characteristics of the transformer or the integrated circuit. A first model of the transformer is defined with typical load impedances and simulated having the combined characteristics to determine performance. Results of the simulation are processed to calculate performance with the load impedances specified by the user. The results are further processed to obtain a mathematical model that includes tuning capacitors. The first and subsequent models are modified by drawing on a rule-set of expert knowledge relating to general dependency of at least one design criterion, such as a physical, geometrical or performance characteristic, with another design criterion.




bl

Programmable clock spreading

An integrated circuit having a programmable clock spreader configured to generate a plurality of controllably skewed clock signals, each applied to a corresponding region within the integrated circuit with circuitry configured to be triggered off the applied clock signal. The programmable clock spreader is designed to enable customization of the current-demand characteristics exhibited by the integrated circuit, e.g., based on the circuit's spectral impedance profile, to cause transient voltage droops in the power-supply network of the integrated circuit to be sufficiently small to ensure proper and reliable operation of the integrated circuit.




bl

Generating guiding patterns for directed self-assembly

Aspects of the invention relate to techniques of generating guiding patterns for via-type feature groups. A guiding pattern may be constructed for a via-type feature group that comprises two or more via-type features in a layout design. A backbone structure may then be determined for the guiding pattern. Based on the backbone structure and a self-assembly model, simulated locations of the two or more via-type features are computed. The simulated locations are compared with targeted locations. If the simulated locations do not match the targeted locations based on a predetermined criterion, the simulated locations adjusted to derive modified locations. Using the modified locations, the above operations may be repeated until the simulated locations match the targeted location based on a predetermined criterion or for a predetermined number of times.




bl

Synthesis of fast squarer functional blocks

In one embodiment of the invention, an integrated circuit (IC) design tool is provided for synthesizing logic, including one or more software modules to synthesize a gate-level netlist of a squarer functional block. The software modules include a bitvector generator, a bitvector reducer, and a hybrid multibit adder generator. The bitvector generator multiplies bits of a vector together to generate partial products for a plurality of bitvectors and then optimizes a plurality of least significant bitvectors. The bitvector reducer reduces the partial products in the bitvectors of the squarer functional block down to a pair of final vectors. The hybrid multibit adder generator generates a hybrid multibit adder including a first adder and a second adder coupled together by a carry bit with bit widths being responsive to a dividerbit. The hybrid multibit adder adds the pair of final vectors together to generate a final result for the squarer functional block.




bl

Intercalated bleach compositions, related methods of manufacture and use

The invention relates to compositions, methods of use, and methods of manufacture for an intercalated bleach compound and compositions thereof. The intercalated bleach compound has the formula Mx(OCl)y(O)m(OH)n where M is an alkaline earth metal such as magnesium, calcium or mixture thereof. The values of x and y independently equal any number greater than or equal to 1 (e.g., 1, 2, 3, 4, etc.), and m and n independently equal any number greater than or equal to 0 (e.g., 0, 1, 2, 3, 4, etc.), but m and n are not both 0. In addition, the molar ratio of the alkaline earth metal (e.g., magnesium or calcium) to hypochlorite is at least 3:1. In other words, x is ≧3y. The compounds exhibit excellent stability, little or no chlorine bleach odor, exhibit excellent pH buffering characteristics, and less reactivity with organic materials as compared to alternative chlorine bleach products.




bl

Transmission system with a superconducting cable

A transmission system is provided with a superconductive cable having three phase conductors and a cryostat, surrounding the phase conductors, and encasing a hollow space, for conducting a cooling agent. For the three phase conductors, a common neutral conductor is provided, being made of electrically normally conducting material, carried out as insulating round conductor and placed outside the cryostat and next to it. The cryostat is made of a circumferentially enclosed, thermally insulated sheath.




bl

Superconducting direct-current electrical cable

A superconductive electrical direct current cable with at least two conductors insulated relative to each other is indicated, where the cable is placed with at least two conductors insulated relative to each other, where the conductors are arranged in a cryostat suitable for guidance of the cooling agent, wherein the cryostat is composed of at least one metal pipe which is surrounded by a circumferentially closed layer with thermally insulating properties. In the cryostat is arranged a strand-shaped carrier composed of insulating material, where the carrier has at least two diametrically oppositely located outwardly open grooves in each of which is arranged one of the conductors. Each conductor is composed of a plurality of superconductive elements.




bl

Oxide superconductor cabling and method of manufacturing oxide superconductor cabling

Disclosed are an oxide superconductor tape and a method of manufacturing the oxide superconductor tape capable of improving the length and characteristics of superconductor tape and obtaining stabilized characteristics across the entire length thereof. A Y-class superconductor tape (10), as an oxide superconductor tape, comprises a tape (13) further comprising a tape-shaped non-oriented metallic substrate (11), and a first buffer layer (sheet layer) (12) that is formed by IBAD upon the tape-shaped non-oriented metallic substrate (11); and a second buffer layer (gap layer) (14), further comprising a lateral face portion (14a) that is extended to the lateral faces of the first buffer layer (sheet layer) (12) upon the tape (13) by RTR RF-magnetron sputtering.




bl

Superconducting cable

A superconducting cable is provided. The superconducting cable includes a core part including a former disposed at the center of the core part, one or more superconducting conductive layers with each electric phase disposed at the outside of the former in a radial directions, a insulating layer disposed at the outside of each the conductive layer in a radial direction and a shielding layer disposed at the outermost of the insulating layer; and a cryostat disposed at the outside of the core part in a radial direction with first space being interposed therebetween, having a vacuum part disposed therein and electrically wired to neutral pole (N pole).




bl

Superconducting cable

An AC superconducting cable with an insulating layer on the external circumference of a conductor, and wherein: the insulating layer includes a first insulating layer, a second insulating layer and a third insulating layer, from the inside layer to the outside layer; the insulating layer is impregnated with liquid nitrogen; the product of the dielectric constant ∈1 of the first insulating layer and the dielectric loss tangent tan δ1 and the product of the dielectric constant ∈2 of the second insulating layer and the dielectric loss tangent tan δ2 fulfilling the relationship ∈1×tan δ1>∈2×tan δ2; and the product of the dielectric constant ∈2 of the second insulating layer and the dielectric loss tangent tan δ2 and the product of the dielectric constant ∈3 of the third insulating layer and the dielectric loss tangent tan δ3 fulfilling the relationship ∈2×tan δ2




bl

System with a superconductive cable and a surrounding cryostat

A superconductive cable which has a cryostat with two concentric metal pipes where the cryostat has at least a first axial section with a first axial spring constant, and at least a second axial section which has a second axial spring constant which at most is 20%, more preferred at most 10%, of the axial spring constant of the first section.




bl

Terminal structure of superconducting cable conductor and terminal member used therein

In a terminal structure of a superconducting cable conductor, a terminal portion of the superconducting cable conductor is connected with a terminal member of a good conductor. The terminal portion includes a superconducting layer disposed on an outer periphery of a central support; and an insulating layer surrounding the superconducting layer. The insulating layer and the superconducting layer are partially removed to expose the central support and the superconducting layer in this order from an end of the superconducting cable conductor. The terminal member includes a metal sleeve which includes a first cylindrical portion whose inner surface is in close contact with an exposed portion of the central support; a second cylindrical portion which is soldered around an exposed portion of the superconducting layer; and a third cylindrical portion into which the insulating layer is inserted.




bl

3-coaxial superconducting power cable and cable's structure

Provided are a three-phase coaxial superconducting power cable and a structure thereof. A certain space is formed between adjacent superconducting wires of a superconducting layer (disposed at an outer portion) having more superconducting wires among a plurality of superconducting layers, and another wire is disposed in the space, or the superconducting wires of the respective superconducting layers are disposed to have different critical currents. Accordingly, a waste of superconducting wires is prevented, and the optimized three-phase coaxial superconducting power cable is provided.




bl

Intermediate connection unit of superconducting cables

In an intermediate connecting unit 50 of superconducting cables, by forming the connecting superconducting wires 101 in a trapezoid shape tapered in the direction of the electric insulating layer 113 (the superconducting shield layers 114) sides from the large radius section 213a side of the reinforcement insulating layer 213, the inclined surface sections 213b can be covered without spaces and without the plurality of connecting superconducting wires overlapping. The plurality of connecting superconducting wires 101 cover the inclined surface sections 213b of the reinforcement insulating layer 213 formed thicker than the radius of the cable cores 11 of the superconducting cables 10. The connecting superconducting wires 101 further connects the superconducting wires 10 arranged on the outer periphery of the large radius section 213a of the reinforcement insulating layer 213 and the superconducting wires 100 constituting the superconducting shield layers 114.




bl

Method, system, and computer readable medium for creating clusters of text in an electronic document

Disclosed herein are systems and methods for navigating electronic texts. According to an aspect, a method may include determining text subgroups within an electronic text. The method may also include selecting a text seed within one of the text subgroups. Further, the method may include determining a similarity relationship between the text seed and one or more adjacent text subgroups that do not include the selected text seed. The method may also include associating the text seed with the one or more adjacent text subgroups based on the similarity relationship to create a text cluster.




bl

Configurable viewcube controller

A method, apparatus, system, and computer program product provide the ability to display representative properties of a three-dimensional scene view. A 3D scene and a 3D representation of a coordinate system of the 3D scene are displayed. Different faces of the 3D representation represent and correspond to different viewpoints of the 3D scene. Different statistics for features of the 3D scene are reflected on the different faces of the 3D representation based on the viewpoint corresponding to each face. Manipulation of the 3D representation identifies and selects a different viewpoint of the 3D scene which is then reoriented accordingly.




bl

Data processing apparatus, data processing method of data processing apparatus, and computer-readable memory medium storing program therein

To freely establish a peripheral equipment selection operating environment of excellent operability which can remarkably reduce an operation burden which is applied until construction information of selectable peripheral equipment can be confirmed and can easily confirm the construction information of the selectable peripheral equipment by everyone by a simple operating instruction, a CPU obtains construction information of a printer that is being selected and default setting on the basis of a selection instructing state relative to a selectable printer candidate on a network and allows them to be caption-displayed at a position near the position indicated by a cursor on a printer selection picture plane displayed on a CRT.




bl

3D mobile user interface with configurable workspace management

Systems and methods of a 3D mobile user interface with configurable workspace management are disclosed. In one aspect, embodiments of the present disclosure include a method, which may be implemented on a system, of a three-dimensional, multi-layer user interface of a mobile device in a mobile network. User environment may include one or more layers or levels of applications, services, or accounts that are all easily accessible to and navigable by the user. For example, an indicator can be used to access a workspace in 3D representing a category or grouping of services or applications for the user. The user can customize or create a unique, non-mutually exclusive grouping, aggregation, or category of applications, services, accounts, or items. The grouping of indicators can be used to swiftly and efficiently navigate to a desired application, service, account or item, in a 3D-enabled user environment.




bl

Portable communication device for providing phone calling service

A portable communication device for phone calling is herein disclosed and enabled. The portable communication device includes a USB interface for connecting to an external USB port of a computing device for enabling phone calling services using the portable communication device. Upon connecting the portable communication device to the external USB port of the computing device, a phone calling software component or data stored in the portable communication device may execute for enabling phone calling services. The portable communication device may also include one or more ports, and may include an interface for Ethernet connection for connecting to the Internet and for making phone calls without the need for connecting the portable communication device to the external USB port. The portable communication device may further include a Wi-Fi wireless component for local wireless communication, and may be implemented as an adapter-sized dongle for providing phone calling services.




bl

Method to publish remote management services over link local network for zero-touch discovery, provisioning and management

A system, method, and computer-readable medium are disclosed for realizing server management functionalities in the absence of a routable Internet Protocol (IP) network address of a remote access controller (RAC). A first device, which is operatively coupled to a link-local network, generates a Multicast Domain Name System (mDNS) IP multicast query message, which it then sends to a second device on the link-local network. In response, the second device, which comprises a RAC, returns its link-local IP address to the first device.




bl

Systems and methods for dynamic development and deployment of computing applications using blueprints

Systems and methods for dynamic development and deployment of computing applications including a development framework, a visual design subsystem, and a deployment subsystem, where at runtime the deployment subsystem is operable to dynamically deploy a computing application realized by a blueprint by sending a request at runtime for graphs and components instantiated by the blueprint.




bl

System and method for identifying exploitable weak points in a network

The system and method described herein may leverage passive and active vulnerability discovery to identify network addresses and open ports associated with connections that one or more passive scanners observed in a network and current connections that one or more active scanners enumerated in the network. The observed and enumerated current connections may be used to model trust relationships and identify exploitable weak points in the network, wherein the exploitable weak points may include hosts that have exploitable services, exploitable client software, and/or exploitable trust relationships. Furthermore, an attack that uses the modeled trust relationships to target the exploitable weak points on a selected host in the network may be simulated to enumerate remote network addresses that could compromise the network and determine an exploitation path that the enumerated remote network addresses could use to compromise the network.