Abstract:
In one embodiment, the present invention relates to a method and system for combating phishing. A computer receives an email comprising a sender email address and a link. The computer determines a sender domain name from the sender email address and ascertains a Uniform Resource Locator (URL) corresponding to the link. The computer then determines a link domain name from the URL. The computer then determines whether the sender domain name is different than the link domain name, so as to classify the URL as a potential phishing URL.
Abstract:
The present invention relates to treating a hematologic cancer using a Hypoxia- Inducible Factor (HIF inhibitor). The invention also relates to inducing acute myeloid leukemia remission using the HIF inhibitor. The invention further relates to inhibiting a maintenance or survival function of a cancer stem cell (CSC) using the HIF inhibitor.
Abstract:
An electronic device with a battery cover waterproof structure includes a body having a first end and a second end, a battery compartment disposed in the body, a waterproof gasket disposed in the battery compartment, and a battery cover coupled to the body. The waterproof gasket includes an oblique engage surface, and one end of the oblique engage surface near the first end is elevated higher than the other end of the oblique engage surface near the second end. The battery cover has an oblique rib arranged corresponding to in the oblique engage surface. One end of the oblique rib near the first end is elevated higher than the other end of the oblique rib near the second end. The oblique rib will interfere with the oblique engage surface for sealing the battery compartment when the battery cover is pushed towards one end of the battery compartment near the first end.
Abstract:
Management of a planner through use of a middleware layer. A computer system is configured with the middleware layer in communication with both a planner and a data repository. One or more modules are provided in the middleware layer to support the functionality of the planner. Application program interface calls are employed to call the modules, thereby mitigating duplication of the functionality in separate planners.
Abstract:
A cavitational ultrasound (e.g., Histotripsy) gel phantom and cavitational ultrasound testing system are provided that may include any of a number of features. One feature of the phantom and system is that it can allow for instant visual feedback on the efficacy and dosage of a Histotripsy transducer. The changes in the gel phantom can be visualized with the naked eye without having to wait for histology. The changes in the gel phantom can also be visualized with a camera, with ultrasound imaging, or with microscopy. In various embodiments, the phantom includes indicators such as carbon particles, dye-encapsulated beads, and red blood cells. Methods associated with use of the cavitational ultrasound gel phantom and testing system are also covered.
Abstract:
A terminal module includes at least two terminals (2, 3) for transmitting electrical power, each terminal having a retention portion (21) defining two positioning cavities therein, a mating portion (25) extending forward from the retention portion and a tail portion (23) extending rearward from the retention portion; and an insulative main portion (1) including a base portion (11) and two retaining portions (12) laterally extending outward from the base portion, each retaining portion having two locking arm portions (121) spaced apart from one another and locked into the two positioning cavities of the retention portion of the corresponding terminal.
Abstract:
One embodiment of the present invention provides a method comprising assigning a first weight to a first consumer and a second weight to a second consumer. The method further comprises receiving at a first scheduler a request for service by a first resource to the first consumer; receiving at a second scheduler a request for service by a second resource to the first consumer; and receiving at the first scheduler a request for service by the first resource to the second consumer. The method further comprises scheduling, by the first and second schedulers, service from the first and second resources to the first and second consumers, wherein the scheduling maintains total service provided by the first and second resources to the first and second consumers in proportion to the respective weights of the first and second consumers without requiring the first and second schedulers to communicate with each other.
Abstract:
A usage control mechanism is disclosed for use in deterring automated “bot” access. When implemented within an email or messaging system, the mechanism and system prevents generation of spam by the bots, while also minimizing collateral deterrence of desirable human usage. In a disclosed embodiment, a reference image is part of a message composition screen, and a message may be composed but not sent unless a user selects, from a plurality of screening images, an image containing an alphanumeric string or other object that matches that of the reference image.
Abstract:
A cable assembly for mounting to a panel, comprises a housing comprising a mating portion and a retaining portion extending rearward and outward from a rear end of the mating portion, the retaining portion has a receiving hole therein and a cutout communicated with the receiving hole. At least one key is formed on each of an upper surface and a lower surface of the mating portion. A plurality of conductive contacts are disposed in the housing. A positioning member mounted to the retaining portion of the housing defines an inner arm, an outer arm and a connecting portion connecting with the inner arm and the outer arm. The inner arm is disposed in the receiving hole and having a front end extending out of the receiving hole. The outer arm is located on a lateral side of the retaining portion and has a front end extending into the receiving hole via the cutout and is capable of moving the inner arm rearward to make the front end of the inner arm retracted into the receiving hole.
Abstract:
A system and method for authenticating a user seeking access to a resource via a computer is described herein. In accordance with one embodiment, a person authorized to control access to the resource selects a personalized combination of non-text elements, a collection of non-text elements from which the combination must be selected, and an arrangement in which the collection of non-text elements is presented to the user. When the user attempts to access the resource, the system presents the collection of non-text elements to the user and requires the user to select a combination of non-text elements from among the collection of non-text elements that matches the personalized combination previously selected by the person authorized to control access to the resource.