Patent application number | Description | Published |
20110052558 | MATERIALS AND METHODS FOR PREVENTION AND TREATMENT OF RNA VIRAL DISEASES - The subject invention concerns a method of inhibiting an RNA virus infection within a patient by increasing the amount of 2-5 oligoadenylate synthetase (2-5 AS) activity within the patient. Preferably, the preventative and therapeutic methods of the present invention involve administering a nucleotide encoding 2-5 AS, or at least one catalytically active fragment thereof, such as the p40, p69, p100 subunits, to a patient in need thereof. The present inventors have determined that overexpression of 2-5AS causes a reduction in epithelial cell damage, reduction in infiltration of mononuclear cells in the peribronchiolar and perivascular regions, and reduction in thickening of the septa in the lungs. Levels of chemokines, such as MIP1-α, are also reduced upon overexpression of 2-5AS. The subject invention also pertains to pharmaceutical compositions containing a nucleotide sequence encoding 2-5 AS and a pharmaceutically acceptable carrier, as well as vectors for delivery of the 2-5 AS nucleotide sequence. | 03-03-2011 |
20130129702 | MATERIALS AND METHODS FOR PREVENTION AND TREATMENT OF RNA VIRAL DISEASES - The subject invention concerns a method of inhibiting an RNA virus infection within a patient by increasing the amount of 2-5 oligoadenylate synthetase (2-5 AS) activity within the patient. Preferably, the preventative and therapeutic methods of the present invention involve administering a nucleotide encoding 2-5 AS, or at least one catalytically active fragment thereof, such as the p40, p69, p100 subunits, to a patient in need thereof. The present inventors have determined that overexpression of 2-5AS causes a reduction in epithelial cell damage, reduction in infiltration of mononuclear cells in the peribronchiolar and perivascular regions, and reduction in thickening of the septa in the lungs. Levels of chemokines, such as MIP1-α, are also reduced upon overexpression of 2-5AS. The subject invention also pertains to pharmaceutical compositions containing a nucleotide sequence encoding 2-5 AS and a pharmaceutically acceptable carrier, as well as vectors for delivery of the 2-5 AS nucleotide sequence. | 05-23-2013 |
Patent application number | Description | Published |
20110267144 | NOISE-CANCELING FOR DIFFERENTIAL AMPLIFIERS REQUIRING NO EXTERNAL MATCHING - A differential Low Noise Amplifier (LNA) includes a first stage of resistive feedback amplifiers and second stage of complementary amplifiers, where the outputs of the first stage are coupled to the inputs of the second stage in a cross-coupled fashion. An inductive load, such as a transformer, combines signals output from the complementary amplifiers of the second stage. In one example, the LNA has an input impedance of less than 75 ohms, a noise factor of less than 2 dB, and a gain of more than 20 dB. Due to the low input impedance, the LNA is usable to amplify a signal received from a source having a similar low impedance without the use of an impedance matching network between the output of the source and the input of the LNA. | 11-03-2011 |
20110273197 | SIGNAL GENERATOR FOR A BUILT-IN SELF TEST - An integrated circuit with Built-in Self Test (BiST) is described. The integrated circuit includes a signal generator used to perform a BiST on the integrated circuit. The integrated circuit also includes a local oscillator used by the signal generator to generate one or more test signals used to perform the BiST on the integrated circuit. | 11-10-2011 |
20110306300 | HARMONIC SUPPRESSION AND/OR REJECTION - Disclosed are circuits, techniques and methods for removing one or more harmonics from a waveform that has been mixed with a local oscillator. In one particular example, such a waveform may also be mixed with a second local oscillator at a different frequency and combined with the first mixed waveform to suppress and/or substantially remove the one or more harmonics. | 12-15-2011 |
20120017131 | METHODS AND APPARATUS FOR PROVIDING A BUILT-IN SELF TEST - A built-in self test (BiST) system is described. The BiST system includes a circuit-under-test. The BiST system also includes one or more embedded sensors. Each of the embedded sensors includes one or more switches connected to one or more nodes within the circuit-under-test. The BiST system further includes a signal generator. The BiST system also includes a bus interface. The bus interface provides for external access of the BiST system. | 01-19-2012 |
Patent application number | Description | Published |
20100192204 | Application Identity Design - Methods and apparatus, including computer program products, implementing and using techniques for providing user credentials over a network to a remote computer application. User credentials for the remote computer application are stored in a central repository that is accessible through the network. A request is sent to a service to perform, on behalf of a user, a particular task involving the remote computer application. It is determined whether the service has been granted permission to act on behalf of the user with respect to the remote computer application. When the service has permission to act on behalf of the user, the service is used to retrieve the user's credentials for the remote computer application from the central repository and to supply the retrieved user credentials to the remote computer application. | 07-29-2010 |
20120096533 | Application Identity Design - Methods and apparatus, including computer program products, implementing and using techniques for providing user credentials over a network to a remote computer application. User credentials for the remote computer application are stored in a central repository that is accessible through the network. A request is sent to a service to perform, on behalf of a user, a particular task involving the remote computer application. It is determined whether the service has been granted permission to act on behalf of the user with respect to the remote computer application. When the service has permission to act on behalf of the user, the service is used to retrieve the user's credentials for the remote computer application from the central repository and to supply the retrieved user credentials to the remote computer application. | 04-19-2012 |
20120096534 | Application Identity Design - Methods and apparatus, including computer program products, implementing and using techniques for providing user credentials over a network to a remote computer application. User credentials for the remote computer application are stored in a central repository that is accessible through the network. A request is sent to a service to perform, on behalf of a user, a particular task involving the remote computer application. It is determined whether the service has been granted permission to act on behalf of the user with respect to the remote computer application. When the service has permission to act on behalf of the user, the service is used to retrieve the user's credentials for the remote computer application from the central repository and to supply the retrieved user credentials to the remote computer application. | 04-19-2012 |
20130014211 | APPLICATION IDENTITY DESIGN - Methods and apparatus, including computer program products, implementing and using techniques for providing user credentials over a network to a remote computer application. User credentials for the remote computer application are stored in a central repository that is accessible through the network. A request is sent to a service to perform, on behalf of a user, a particular task involving the remote computer application. It is determined whether the service has been granted permission to act on behalf of the user with respect to the remote computer application. When the service has permission to act on behalf of the user, the service is used to retrieve the user's credentials for the remote computer application from the central repository and to supply the retrieved user credentials to the remote computer application. | 01-10-2013 |
20130014230 | APPLICATION IDENTITY DESIGN - Methods and apparatus, including computer program products, implementing and using techniques for providing user credentials over a network to a remote computer application. User credentials for the remote computer application are stored in a central repository that is accessible through the network. A request is sent to a service to perform, on behalf of a user, a particular task involving the remote computer application. It is determined whether the service has been granted permission to act on behalf of the user with respect to the remote computer application. When the service has permission to act on behalf of the user, the service is used to retrieve the user's credentials for the remote computer application from the central repository and to supply the retrieved user credentials to the remote computer application. | 01-10-2013 |
20130247139 | APPLICATION IDENTITY DESIGN - Methods and apparatus, including computer program products, implementing and using techniques for providing user credentials over a network to a remote computer application. User credentials for the remote computer application are stored in a central repository that is accessible through the network. A request is sent to a service to perform, on behalf of a user, a particular task involving the remote computer application. It is determined whether the service has been granted permission to act on behalf of the user with respect to the remote computer application. When the service has permission to act on behalf of the user, the service is used to retrieve the user's credentials for the remote computer application from the central repository and to supply the retrieved user credentials to the remote computer application, | 09-19-2013 |
20130247155 | APPLICATION IDENTITY DESIGN - Methods and apparatus, including computer program products, implementing and using techniques for providing user credentials over a network to a remote computer application. User credentials for the remote computer application are stored in a central repository that is accessible through the network. A request is sent to a service to perform, on behalf of a user, a particular task involving the remote computer application. It is determined whether the service has been granted permission to act on behalf of the user with respect to the remote computer application. When the service has permission to act on behalf of the user, the service is used to retrieve the user's credentials for the remote computer application from the central repository and to supply the retrieved user credentials to the remote computer application. | 09-19-2013 |
20150304308 | SECURE IDENTITY FEDERATION FOR NON-FEDERATED SYSTEMS - Methods and apparatus, including computer program products, implementing and using techniques for providing user credentials over a network to a remote computer application. User credentials for the remote computer application are stored in a central repository that is accessible through the network. A request is sent to a service to perform, on behalf of a user, a particular task involving the remote computer application. It is determined whether the service has been granted permission to act on behalf of the user with respect to the remote computer application. When the service has permission to act on behalf of the user, the service is used to retrieve the user's credentials for the remote computer application from the central repository and to supply the retrieved user credentials to the remote computer application. | 10-22-2015 |
Patent application number | Description | Published |
20120303923 | CAPACITY AND LOAD ANALYSIS USING STORAGE ATTRIBUTES - A method includes determining a capacity model that configures computing resource capacity for a capacity container. The computing resource capacity includes a first storage attribute for an amount of storage in a storage component. A load model is determined that configures load for the capacity container. The load includes a second storage attribute for a storage requirement for a virtual machine. A profile of a virtual machine unit is determined for estimating available capacity in a capacity container. The profile is determined using virtual machine attributes for a set of virtual machines, wherein the virtual machine unit includes a storage requirement based on storage requirements for the set of virtual machines. The profile of the virtual machine unit is fit into available capacity. A number of virtual machine units is determined based on the fitting, the number of virtual machine units being a measure of available capacity. | 11-29-2012 |
20140317618 | CAPACITY AND LOAD ANALYSIS USING STORAGE ATTRIBUTES - A method includes determining a capacity model that configures computing resource capacity for a capacity container. The computing resource capacity includes a first storage attribute for an amount of storage in a storage component. A load model is determined that configures load for the capacity container. The load includes a second storage attribute for a storage requirement for a virtual machine. A profile of a virtual machine unit is determined for estimating available capacity in a capacity container. The profile is determined using virtual machine attributes for a set of virtual machines, wherein the virtual machine unit includes a storage requirement based on storage requirements for the set of virtual machines. The profile of the virtual machine unit is fit into available capacity. A number of virtual machine units is determined based on the fitting, the number of virtual machine units being a measure of available capacity. | 10-23-2014 |
20150312117 | System for Aggregating Statistics Relating to a Logical Forwarding Element - Some embodiments provide a system that implements a set of tools to define a set of one or more logical forwarding elements from a number of physical forwarding elements and a scalable framework to retrieve statistics relating each logical forwarding element. In some embodiments, the statistics relate to the logical ports of a logical forwarding element. The system of some embodiments allows a network administrator to retrieve a total packet count and byte count for one or more logical ports of the logical forwarding element, even though the logical ports may be distributed across multiple physical forwarding elements. | 10-29-2015 |
20150312118 | Network Virtualization Operations Using a Scalable Statistics Collection Framework - Some embodiments provide a scalable framework to retrieve statistics relating different aggregated entities. In some embodiments, the aggregated entity is a pair of ports. The pair of ports can be physical ports of one or more physical forwarding elements. The pair of ports can be logical ports of one or more logical forwarding elements. In some embodiments, the aggregated entity is a machine or a group of machines. In some embodiments, the aggregated entity is an access control list (ACL). | 10-29-2015 |