Month of July 2014 - Page Number 3

Showing 21 - 30 of 404 from July 2014
Browse Prior Art Database
  1. 21.
    Race conditions are the cause of subtle functional bugs in multithreaded software systems. Beyond functional problems, race conditions can also potentially lead to security vulnerabilities. In a case of multiple possible interleavings, the decision which of the interleavings to execute is made nondeterministically...
    IPCOM000238065D | 2014-Jul-30
  2. 22.
    Current dynamic analysis tools do not model, as part of the security assessment they produce, the likelihood of exploiting a given problem. This leaves the developer to either organize the remediation process in some ad-hoc way, e.g. based on the types of reported vulnerabilities or manually review the entire ...
    IPCOM000238064D | 2014-Jul-30
  3. 23.
    The crux of this invention is to apply speciazliation of the testing system according to coding trends pertaining to the underlying software system. Intuitively, a piece of code that the developer spent more time and effort on is likely more relevant from a testing standpoint (e.g., reflecting core business logic...
    IPCOM000238063D | 2014-Jul-30
  4. 24.
    In post-silicon functional validation, memory access component generates accesses through out all available virtual memory space. In modern systems virtual memory space is extremely large (at least 48 bits in the current designs). Straightforward allocation of radix translation tables for all available virtual...
    IPCOM000238062D | 2014-Jul-30
  5. 25.
    The core idea of this invention, which is also the point of novelty, is the idea of residual checking. That is, given an existing series of failed authentication attempts, the idea is to compute a residual authentication challenge to present to the user. This is orthogonal and complementary to both biometrics and...
    IPCOM000238057D | 2014-Jul-30
  6. 26.
    Disclosed is a method to optimize the file transfer performance based on the rules related to time zone or geographic location of the users involved in the file transfer.
    IPCOM000238056D | 2014-Jul-30
  7. 27.
    The idea described herein is to automatically delete a corporate account after a specified period of time to avoid corporate data landing in the wrong hands. That is if a device is not on the internet for a predetermined number of days, an application will automatically wipe the corporate account from the device. This...
    IPCOM000238053D | 2014-Jul-29
  8. 28.
    Disclosed is a design for a floating alignment tube with captive spring and screw assemblies located in the air moving and power supply chassis. This enables access to load screws in electronic board packaging so that a user can properly torque the screws.
    IPCOM000238052D | 2014-Jul-29
  9. 29.
    Standard wrenches used to turn a nut in close proximity of another nut or on a semi-rigid cable have limited range of motion. Typically, a wrench may be manipulated by a technician less than one revolution of rotation before it has to be repositioned. In applications with numerous connections, such repositioning...
    IPCOM000238051D | 2014-Jul-29
  10. 30.
    Circuit-breaker come with either a front connect or a rear connect point. Depending on which circuit-breaker will be installed at an installation, the rack mount and wiring is designed accordingly. This might cause problems to customers at one point or the other due to fact that the connection points are provided...
    IPCOM000238050D | 2014-Jul-29