Mundada
Gopal R. Mundada, Olympia, WA US
Patent application number | Description | Published |
---|---|---|
20120079306 | Memory Reconfiguration During System Run-Time - Memory reconfiguration during system run-time is described. In one example, a system includes a memory slot to carry a memory board and to connect the memory board to a memory controller for read and write operations, a logic device having a plurality of status registers to record the status of the memory slot and a plurality of control registers to control the operation of the memory slot, and a bus interface coupled through direct signal lines to the memory slot to communicate status and control signals with the memory slot and coupled through a serial bus to the logic device to communicate status and control signals with the logic device. | 03-29-2012 |
Ramswaroop Mundada, Mumbai IN
Patent application number | Description | Published |
---|---|---|
20120108627 | IMIDAZO [4,5-C]QUINOLINE DERIVATIVES AND THEIR USE IN THE TREATMENT OF TUMORS AND/OR INFLAMMATION - The present invention provides the compounds of formula (I): | 05-03-2012 |
Yogesh H. Mundada, Atlanta, GA US
Patent application number | Description | Published |
---|---|---|
20120137375 | SECURITY SYSTEMS AND METHODS TO REDUCE DATA LEAKS IN ENTERPRISE NETWORKS - Disclosed are embodiments of a security system for reducing data leaks by checking information flows between resources of a network. When an information flow is attempted between a sending resource, which can be anywhere in the network, and a receiving resource residing at a specific host within the network, a host labeler can determine whether information is allowed to flow from the sending resource to the receiving resource. The sending resource and the receiving resource can each have an applicable label, and each label can comprise zero, one, or more taints. For each taint having an active secrecy characteristic in a label of the sending resource, the host labeler can require that there be a matching taint with active secrecy characteristic in the receiving resource. If this condition is not met, the security system can block the information flow between the sending and receiving resources. | 05-31-2012 |