Abstract:
The invention provides methods and systems for detecting exploits. A received file is examined to determine whether or not it corresponds to any of one or more predetermined models of normal file types. If the received file does not correspond to any of the one or more predetermined models of normal file types, it is flagged as a potential exploit.
Abstract:
The use of time-lapsed NMR diffusivity measurements in an observation well is disclosed. The observation well is cased in the zone of interest with non-magnetic and non-conductive casing that is invisible to the NMR tool. Second, because NMR measurements have a dead zone in front of the antenna depending on the spatial variation of the fixed magnet strength, for example about 2.7 inches, a distance between the casing and the formation is reduced to less than the dead zone length by drilling the observation well at small deviation of about 5° and running the casing without centralizers. Both the casing and the pad-type NMR tool will follow the low side of the borehole, ensuring the measurement volume of the NMR tool is inside the formation and beyond the annulus. With the appropriate observation well completion, time-lapse diffusivity measurements with pad-type NMR tools can address several shortcomings in the current practice of monitoring EOR processes that rely upon changes in density and hydrogen index (HI). Various uses of NMR imaging in wells cased with non-metallic casing are also disclosed.
Abstract:
A method and apparatus for operating a data storage system is disclosed. An original active file system holds incoming write transactions. Data is written at a selected time to blocks in a data storage device of the original active file system, the data written to blocks which do not hold old data of the data storage system. Pointers to data of the original active file system are written at the selected time to the data storage device, the pointers written to blocks which do not hold old data of the data storage system, the pointers and a previously saved data of the active file system forming a consistency point of the original active file system at the selected time. A new active file system is started using the consistency point of the original active file system at the selected time.
Abstract:
Automatically and repeatedly crawling multiple multimedia websites to identify and collect information about the multimedia content that is available for delivery over the Internet to a client device for playback on a media player operating on the client device. In one embodiment, the method normalizes the collected information by converting the different formats of the collected information into a common format and converting the different nomenclatures of the collected information into a common nomenclature. The method updates an index with the normalized information, and sends a data feed to the client device to populate the user interface on the client device with the normalized information of the index. The user interface allows the user to navigate and select the multimedia content that is available for delivery over the Internet for playback on the media player.
Abstract:
The invention provides an improved method and apparatus for creating a snapshot of a file system. A “copy-on-write” mechanism is used. The snapshot uses the same blocks as the active file system until the active file system is modified. Whenever a modification occurs, the modified data is copied to a new block and the old data is saved. In this way, the snapshot only uses space where it differs from the active file system, and the amount of work required to create the snapshot is small. A record of which blocks are being used by the snapshot is included in the snapshot itself, allowing effectively instantaneous snapshot creation and deletion. A snapshot can also be deleted instantaneously simply by discarding its root inode.
Abstract:
A method and system for reliably performing extra-long operations in a reliable state-full system (such as a file system). The file system includes a separate portion of the file system reserved for files having extra-long operations in progress, including file deletion and file truncation. This separate portion of the file system is called the zombie file space; it includes a separate name space from the regular (“live”) file system that is accessible to users, and is maintained as part of the file system when recording a consistency point.
Abstract:
The invention relates to methods and apparatus for determining a downhole parameter in an underbalanced drilling environment which include: selectively activating a first fluid flowing from the formation through a wellbore while under balanced drilled; detecting the activated first fluid; and determining a depth at which said fluid enters the wellbore.
Abstract:
The invention provides systems and methods for securely transmitting data between a roaming computer and a managed network service over a shared public network. A secure connection is created between the roaming computer and a server computer that hosts or acts as a secure gateway to the managed network service. The connection is set up and established by a client agent installed on the roaming computer and a connection component of the managed service on the server computer. The client agent and the connection component of the managed service operate, on an initial request from the roaming computer to the managed service to negotiate the secure connection using certificate-based client authentication. The client certificate preferably includes user-specific attributes that can be extracted by the connection component and made available to the managed service to apply processing rules specific to the user.
Abstract:
A method for driving a neutral point clamped three-level inverter is provided. In one exemplary embodiment, DC current is received at a neutral point-clamped three-level inverter. The inverter has a plurality of nodes including first, second and third output nodes. The inverter also has a plurality of switches. Faults are checked for in the inverter and predetermined switches are automatically activated responsive to a detected fault such that three-phase electrical power is provided at the output nodes.
Abstract:
A file system migrates a traditional volume to a virtual volume without data copying. In an embodiment, a traditional volume index node is selected for migration. The traditional volume index node is converted to a virtual volume index node. In one embodiment, the virtual volume index node provides both physical address information and virtual address information.