COMPUTING SYSTEM OPERATIONAL METHODS AND APPARATUS (iEdison No. 0685901-17-0010)
Segmentation is a fundamental design principle enabling secure cyber system development. This invention enables a level of segmentation heretofore not possible. This invention leverages and integrates the techniques of host based containerization and network partitioning by creating features within host that attach network labels to communication leaving the host that provides context information including the application, user/role, and/or business process that generated the data. Network segmentation capabilities then utilize that labeling information to provide logical separation of traffic such that applications/business processes appear to be on independent networks. This invention is the technique and technology that integrates the host containers with the network segmentation by providing a mechanism to intercept and label traffic coming from containers to enable network segmentation tools work efficiently and effectively. This is done through software that runs on the host the is a shim between the container and the network interface (a driver in the hypervisor, another container with host based routing, software running in the hypervisor, etc). This software is configured with parameters of information about the container it is attached to so that it can properly generate the network labeling to enable a network segmentation topology to segment traffic between software running on hosts (Cisco ISE, Software defined networking/openflo, etc). Finally, this technology allows for dynamic actions to reduce security risk. If a risk is found, through any myriad of cyber or physical sensors, policies could be enabled that dynamically alter how the network segmentation behaves; i.e. blackhole some communication, send communication to a honeypot instead of real system, increase logging/sensoring on traffic, introduce latency/cost to traffic, etc.
COMPUTING SYSTEM OPERATIONAL METHODS AND APPARATUS (iEdison No. 0685901-17-0010)
Segmentation is a fundamental design principle enabling secure cyber system development. This invention enables a level of segmentation heretofore not possible. This invention leverages and integrates the techniques of host based containerization and network partitioning by creating features within host that attach network labels to communication leaving the host that provides context information including the application, user/role, and/or business process that generated the data. Network segmentation capabilities then utilize that labeling information to provide logical separation of traffic such that applications/business processes appear to be on independent networks. This invention is the technique and technology that integrates the host containers with the network segmentation by providing a mechanism to intercept and label traffic coming from containers to enable network segmentation tools work efficiently and effectively. This is done through software that runs on the host the is a shim between the container and the network interface (a driver in the hypervisor, another container with host based routing, software running in the hypervisor, etc). This software is configured with parameters of information about the container it is attached to so that it can properly generate the network labeling to enable a network segmentation topology to segment traffic between software running on hosts (Cisco ISE, Software defined networking/openflo, etc). Finally, this technology allows for dynamic actions to reduce security risk. If a risk is found, through any myriad of cyber or physical sensors, policies could be enabled that dynamically alter how the network segmentation behaves; i.e. blackhole some communication, send communication to a honeypot instead of real system, increase logging/sensoring on traffic, introduce latency/cost to traffic, etc.
Simulations of State for Biology
THe invention is the development of a simulation capability that allows the prediction of concentrations of chemical species, rates, and energy requirements of systems of coupled reactions that does not require the use of rate constants. The technology, often refered to as simulations of state or state simulations, is based on the concept of simulation states (outcomes of reactions) rather than reactions themselves. This approach has been widely used to model equilibrium states. We are adopting it to model non-equilibrium states. This technology is particularly attractive for the domain of biology because the determination of rate parameters for a simulation (rate constants) is incredibly difficult. Other approaches, specifically flux-based approaches, have limited predictive power and are actually more apporpriately described as high-end data analysis methods.
Hydroxymethyl Furfural Oxidation Methods
This inventionreport is prepared prior to a meeting with ADM staff to occur on Wednesday, June 29, 2005 in order to capture ideas that may be discussed in that discussion. The primary subject of this inventionreport is results and ideas regarding the conversation of HMF to oxidized derivatives.
Hydroxymethyl Furfural Oxidation Methods
This inventionreport is prepared prior to a meeting with ADM staff to occur on Wednesday, June 29, 2005 in order to capture ideas that may be discussed in that discussion. The primary subject of this inventionreport is results and ideas regarding the conversation of HMF to oxidized derivatives.
Flow Cell Systems, Flow Cell Batteries, and Hydrogen Production Processes
We propose a new paradigm for low-cost hydrogen generation though a hybrid electrolyzer/flow battery device, in which the oxygen electrode is replaced with a Fe2+/Fe3+ catholyte. In order for continuous operation, a regeneration cell will provide the replenishment of the Fe2+ ions through renewable resources, such as carbohydrate or photoreduction,.
LITHIUM-METAL COMPATIBLE SOLID ELECTROLYTES FOR ALL-SOLID-STATE BATTERY (iEdison No. 0685901-21-0135)
The objective of this invention is to develop an advanced sulfide-based solid electrolyte for lithium metal batteries. The developed solid electrolyte is capable of high performance in a lithium metal battery by providing a superior lithium-ion conductivity ( > 4 mS/cm), ultra-low areal resistances ( < 5 ?cm 2 ) at room temperature and
SYNTHETIC POLYMERS AND METHODS OF MAKING AND USING THE SAME
Disclosed herein are monomer embodiments that can be used to make polymers, such as homopolymers, heteropolymers, and that can be used in particular embodiments to make sequence-defined polymers. Also disclosed herein are methods of making polymers using such monomer embodiments. Methods of using the polymers disclosed herein also are described.
SYNTHETIC POLYMERS AND METHODS OF MAKING AND USING THE SAME
Disclosed herein are monomer embodiments that can be used to make polymers, such as homopolymers, heteropolymers, and that can be used in particular embodiments to make sequence-defined polymers. Also disclosed herein are methods of making polymers using such monomer embodiments. Methods of using the polymers disclosed herein also are described.
Locating Luna
Locating Luna is a STEM Education virtual reality game for grade 6-12 students. Users search for a lost dog in a dark swamp, calling out to the dog and lighting torches as they search. The app collects data on all user actions which are saved in a file for download. Teachers then have students use various tools to represent and analyze their data. This provides a common interactive experience for teachers to use in addressing computer science learning standards. Locations of key points of interest in the app (such as the dog) are randomly generated when the game is restarted; however, replay without a restart of the game allows users to try the same scenario again with a different search strategy. This allows users to compare strategies using data. A teacher's guide supports use by teachers in the classroom.