Abstract:
For increased security, a source is determined for software to be installed on a computing device. In one approach, an application identifier is received from the computing device for an application to be installed. A source identifier of the application is determined. The application identifier and the source identifier are sent over a network to a server. A first state designation for the first application is received from the server. The first state designation represents a trusted state or an untrusted state. In response to receiving the first state designation, a second state designation is set. The second state designation is sent to the computing device.
Abstract:
For increased security, a source is determined for software to be installed on a computing device. In one approach, an application identifier is received from the computing device for an application to be installed. A source identifier of the application is determined. The application identifier and the source identifier are sent over a network to a server. A first state designation for the first application is received from the server. The first state designation represents a trusted state or an untrusted state. In response to receiving the first state designation, a second state designation is set. The second state designation is sent to the computing device.
Abstract:
170,343. Briscoe, H. V. A., Richardson, D., and District Chemical Co., Ltd. July 10, 1920. Fluxes.-A flux for the autogenous welding of aluminium comprises one or more alkali halides and an activating agent which reacts with them only in the presence of aluminium oxide. An alkali pyrosulphate or pyrophosphate is employed as activating-agent, a suitable mixture being potassium chloride 45 per cent, sodium chloride 30 per cent, potassium ' fluoride 7 per cent, lithium chloride 15 per cent, and the pyrosulphate or pyrophosphate 1 to 10 per cent. The materials are all melted together in a vessel free from metallic oxide soluble in the flux, and on solidifying a homogeneous mass remains, which is powdered.
Abstract:
For increased security, a source is determined for software to be installed on a computing device. In one approach, an application identifier is received from the computing device for an application to be installed. A source identifier of the application is determined. The application identifier and the source identifier are sent over a network to a server. A first state designation for the first application is received from the server. The first state designation represents a trusted state or an untrusted state. In response to receiving the first state designation, a second state designation is set. The second state designation is sent to the computing device.
Abstract:
For increased security, a source is determined for software to be installed on a computing device. In one approach, an application identifier is received from the computing device for an application to be installed. A source identifier of the application is determined. The application identifier and the source identifier are sent over a network to a server. A first state designation for the first application is received from the server. The first state designation represents a trusted state or an untrusted state. In response to receiving the first state designation, a second state designation is set. The second state designation is sent to the computing device.
Abstract:
In many cases, it is desirable to remotely install a software application on a mobile device that performs a function without requiring user intervention on the device, such as in the case where a device is lost or stolen. In one embodiment, a method implemented on the mobile device after installation of the software includes: determining an identifier for a computing device associated with the user; performing a function of the mobile device to obtain information regarding the mobile device; and sending the information for delivery to the computing device using the identifier. In one embodiment, software can be remotely installed on a device that, when installed, locates the device and transmits the location to an email address associated with the device so that a user can recover the device if it is lost or stolen.
Abstract:
Methods are provided for repairing an existing structure to cover at least a portion of the existing structure with a repair structure. Such methods comprise mounting one or more standoff retainers to the existing structure; coupling one or more standoffs to the standoff retainers such that the standoffs extend away from the existing structure; coupling one or more cladding panels to the standoffs such that the panels are spaced apart from the structure to provide a space therebetween; and introducing a curable material to the space between the panels and the existing structure, the panels acting as at least a portion of a formwork for containing the curable material until the curable material cures to provide a repair structure cladded, at least in part, by the panels. Corresponding apparatus for effecting such methods are also provided.