Patent application number | Description | Published |
20140281030 | Virtual Network Flow Monitoring - Embodiments perform end-to-end virtual network flow monitoring in a virtual datacenter and provide differentiated views to users based on user role. A target flow pattern describing data packets of interest is distributed to a plurality of applications managing VMs in the virtual datacenter, such as hosts, virtual gateways, and other virtual network applications. Each of the applications monitors data packets routed by the application by comparing the data packets to the flow pattern and selectively collecting context data describing the data packets. The context data collected by the applications is aggregated at a remote server for analysis and reporting. | 09-18-2014 |
20150058463 | PROXY METHODS FOR SUPPRESSING BROADCAST TRAFFIC IN A NETWORK - Some embodiments use proxies on host devices to suppress broadcast traffic in a network. Each host in some embodiments executes one or more virtual machines (VMs). In some embodiments, a proxy operates on each host between each VM and the underlying network. For instance, in some of these embodiments, a VM's proxy operates between the VM and a physical forwarding element executing on the VM's host. The proxy monitors the VM's traffic, and intercepts broadcast packets when it knows how to deal with them. The proxy connects to a set of one or more controllers that provides a directory service that collects and maintains global information of the network. By connecting to the controller cluster, the proxy can obtain information that it can use to resolve broadcast requests. In some embodiments, the connection between the proxy and the controller cluster is encrypted and authenticated, to enhance the security. Also, in some embodiments, the connection is an indirect connection through an agent that executes on the host device and connects the proxies of the host device with the controller cluster. | 02-26-2015 |
20150058968 | PROXY METHODS FOR SUPPRESSING BROADCAST TRAFFIC IN A NETWORK - Some embodiments use proxies on host devices to suppress broadcast traffic in a network. Each host in some embodiments executes one or more virtual machines (VMs). In some embodiments, a proxy operates on each host between each VM and the underlying network. For instance, in some of these embodiments, a VM's proxy operates between the VM and a physical forwarding element executing on the VM's host. The proxy monitors the VM's traffic, and intercepts broadcast packets when it knows how to deal with them. The proxy connects to a set of one or more controllers that provides a directory service that collects and maintains global information of the network. By connecting to the controller cluster, the proxy can obtain information that it can use to resolve broadcast requests. In some embodiments, the connection between the proxy and the controller cluster is encrypted and authenticated, to enhance the security. Also, in some embodiments, the connection is an indirect connection through an agent that executes on the host device and connects the proxies of the host device with the controller cluster. | 02-26-2015 |
Patent application number | Description | Published |
20090018062 | Malignant tumor-inhibiting preparation comprising des a fibrin - A malignant tumor-inhibiting preparation is provided which comprises Des A fibrin and therefore can inhibit the spreading and migration of malignant tumor cells and thereby can inhibit the malignant tumors. | 01-15-2009 |
20100041563 | METHODS FOR IDENTIFICATION OF ALLELES - The invention provides a method for identification of alleles. In this method, genomic DNA is used as target. Multiple allele-specific PCR amplification are carried out with a group of primers comprising one or more allele-specific primers for a target gene, a universal primer, and a common primer; and a DNA polymerase without 5′ to 3′ exonuclease activity. The PCR products are hybridized with tag probes immobilized on a DNA chip. Results are determined based on the signal intensity and the position of the probe immobilized on the array. Each allele-specific primer comprises a unique tag sequence at the 5′ end. Each tag probe immobilized on the DNA chip comprises a sequence identical to its corresponding tag sequence; and each tag probe hybridizes only with the complementary sequence in the PCR amplification product. | 02-18-2010 |
20100220371 | Security Functional Thin Film and Security Product Containing the Functional Thin Film - The present invention provides a security functional thin film and a security product containing such a thin film. The security functional thin film is of an amorphous structure, and possesses soft magnetic characteristics. Large Barkhausen effect can be detected along the in-plane preferred direction of magnetization; and the Large Barkhausen effect significantly attenuates, or no such signal can be detected, in a direction perpendicular to the in-plane preferred direction of magnetization. The thin film has a thickness of 20-300 nm, and the thin film also possesses element encoding characteristics that can be authenticated by experts. The security functional thin film of the present invention can be fabricated by magnetron sputtering web coating process. The security product provided by the present invention has a security information layer formed of the security functional thin film, and can be combined with other security characteristics for use in fabricating security materials such as security threads, security tapes, paper security strip-like inserts, or security labels, and others. Compared with conventional anti-counterfeiting technologies, the instant security functional thin film has more hidden security information, and facilitates enhancement of safety performance of security products. | 09-02-2010 |