Abstract: An apparatus for testing the load bearing strength of an architectural structure includes a top holding assembly, a hydraulic cylinder, a bottom holding assembly, and a bracing member. The hydraulic cylinder is disposed below the top holding assembly, and has a top end. The bottom holding assembly is mounted on the top end of the hydraulic cylinder, and cooperates with the top holding assembly to hold the architectural structure therebetween. The bottom holding assembly includes a peripheral wall. The bracing member has a plurality of bracing rollers disposed around and slidably abutting against the peripheral wall of the bottom holding assembly so as to absorb lateral horizontal stress which may occur during the testing of the architectural structure under compression.
Type:
Grant
Filed:
June 21, 2005
Date of Patent:
September 8, 2009
Assignee:
Architecture and Building Research Institute, Ministry of the Interior
Abstract: Techniques are described for generating and actively verifying a boot code associated with a peripheral device of a computer system to prevent potential security threats the boot code may introduce into the computer system. The techniques for generating boot code entail generating the boot code from a high-level programming language using a verification application program interface (API). The API aids in generating a certificate, which is associated with the boot code in that the certificate describes operation of the boot code. After generating the boot code and associated certificate, the two are loaded onto a memory module of the peripheral device. Once the peripheral device is connected to the computer system, the computer system may retrieve the boot code and certificate. The computer system utilizes techniques to actively verify the boot code by performing a security check on the boot code in accordance with the associated certificate.
Type:
Application
Filed:
December 16, 2008
Publication date:
August 27, 2009
Applicant:
Architecture Technology Corporation
Inventors:
Matthew A. Stillerman, Dexter Kozen, Thomas J. Merritt
Abstract: This disclosure generally relates to automated execution and evaluation of computer network training exercises, such as in a virtual machine environment. An example environment includes a control and monitoring system, an attack system, and a target system. The control and monitoring system initiates a training scenario to cause the attack system to engage in an attack against the target system. The target system then performs an action in response to the attack. Monitor information associated with the attack against the target system is collected by continuously monitoring the training scenario. The attack system is then capable of sending dynamic response data to the target system, wherein the dynamic response data is generated according to the collected monitor information to adapt the training scenario to the action performed by the target system. The control and monitoring system then generates an automated evaluation based upon the collected monitor information.
Type:
Application
Filed:
February 18, 2009
Publication date:
August 20, 2009
Applicant:
Architecture Technology Corporation
Inventors:
Stephen Brueckner, Frank N. Adelstein, Haim Bar, Matthew Donovan
Abstract: An approach to performing graph-based computation uses one or both of an efficient startup approach and efficient control using process pools. Efficient startup of a graph-based computation involves precomputing data representing a runtime structure of a computation graph such that an instance of the computation graph is formed using the precomputed data for the required type of graph to form the runtime data structure for the instance of the computation graph. Pools of processes that are each suitable for performing computations associated with one or more vertices of the computation graphs are formed such that at runtime, members of these pools of processes are dynamically assigned to particular vertices of instances of computation graphs when inputs are available for processing at those vertices.
Abstract: A container and its use capable of containing liquid and at least one stern of a floral product having a first portion and a second portion, the container comprising an intermediate portion capable of collapsing around at least a portion of each stern between the first portion and the second portion and securing the floral product and maintaining a weight such as a liquid located in the second portion therein.
Abstract: A preloader works in conjunction with a web/app server and optionally a profile server to cache web page content elements or components for faster on-demand and anticipatory dynamic web page delivery. The preloader uses a cache manager to manage requests for retrievals, insertions, and removal of web page components in a component cache. The preloader uses a cache replacement manager to manage the replacement of components in the cache. While the cache replacement manager may utilize any cache replacement policy, a particularly effective replacement policy utilizes predictive information to make replacement decisions. Such a policy uses a profile server, which predicts a user's next content request. The components that can be cached are identified by tagging them within the dynamic scripts that generate them. The preloader caches components that are likely to be accessed next, thus improving a web site's scalability.
Abstract: The invention is directed to techniques for allowing a user to remotely interrogate a target computing device in order to collect and analyze computer evidence that may be stored on the target computing device. A forensic device receives input from a remote user that identifies computer evidence to acquire from the target computing device. The forensic device acquires the computer evidence from the target computing device and presents a user interface for the forensic device through which the remote user views the computer evidence acquired from the target computing device. In this manner, forensic device allows the user to interrogate the target computing device to acquire the computer evidence without seizing or otherwise “shutting down” the target device.
Type:
Application
Filed:
February 12, 2009
Publication date:
June 11, 2009
Applicant:
Architecture Technology Corporation
Inventors:
Frank N. Adelstein, Matthew A. Stillerman, Robert Joyce
Abstract: The invention is directed to techniques for monitoring and testing publish/subscribe network systems. For example, an enterprise network that has a number of geographically dispersed network devices and interconnected sub-networks may be configured to operate as a publish/subscribe network system in which each of the dispersed network devices sends and receives messages for specific groups of the network devices. The techniques described herein enable data object capture and analysis in the application layer of a publish/subscribe network system using shim adapters. The techniques also enable network packet capture and analysis in the network layer of a publish/subscribe network system. Furthermore, the techniques include integrated analysis of testing results from the application layer and the network layer to determine performance characteristics, such as latency, across both of the layers.
Type:
Grant
Filed:
July 14, 2006
Date of Patent:
April 21, 2009
Assignee:
Architecture Technology Corporation
Inventors:
John Wu, Benjamin L. Burnett, Matthias H. Wollnik
Abstract: The invention is directed to techniques for allowing a user to remotely interrogate a target computing device in order to collect and analyze computer evidence that may be stored on the target computing device. A forensic device receives input from a remote user that identifies computer evidence to acquire from the target computing device. The forensic device acquires the computer evidence from the target computing device and presents a user interface for the forensic device through which the remote user views the computer evidence acquired from the target computing device. In this manner, forensic device allows the user to interrogate the target computing device to acquire the computer evidence without seizing or otherwise “shutting down” the target device.
Type:
Grant
Filed:
June 23, 2003
Date of Patent:
February 24, 2009
Assignee:
Architecture Technology Corporation
Inventors:
Frank N. Adelstein, Matthew A. Stillerman, Robert Joyce
Abstract: A mounting jig assembly for mounting a door handle to a door having a main door bore includes a drill jig constructed and arranged for placement on the door over the main door bore and having at least one mounting hole, wherein the drill jig is constructed and arranged for engaging a door latch at more than one location.
Type:
Grant
Filed:
October 13, 2006
Date of Patent:
January 27, 2009
Assignee:
Architectural Builders Hardware Mfg., Inc.
Abstract: Techniques are described for generating and actively verifying a boot code associated with a peripheral device of a computer system to prevent potential security threats the boot code may introduce into the computer system. The techniques for generating boot code entail generating the boot code from a high-level programming language using a verification application program interface (API). The API aids in generating a certificate, which is associated with the boot ode in that the certificate describes operation of the boot code. After generating the boot code and associated certificate, the two are loaded onto a memory module of the peripheral device. Once the peripheral device ie connected to the computer system, the computer system may retrieve the boot code and certificate. The computer system utilizes techniques to actively verify the boot code by performing a security check on the boot code in accordance with the associated certificate.
Type:
Grant
Filed:
September 4, 2003
Date of Patent:
December 16, 2008
Assignee:
Architecture Technology Corporation
Inventors:
Matthew A Stillerman, Dexter Kozen, Thomas J Merritt
Abstract: A mount for mounting a component within an opening of a substantially planar body includes a front bracket having at least one attachment wing that attaches to a first surface of the body. The attachment wing is substantially coplanar with the plane of the body. The mount also includes a back plate secured to the component, and at least one connector connecting the front bracket to the back plate. A component-and-frame combination includes a component having a perimeter edge and at least one protrusion on the perimeter edge, and a frame has an inside surface facing a center of a framed space. The frame has at least one indentation of the inside surface corresponding in position to the protrusion. The protrusion and the indentation are shaped to allow the component to be inserted into the frame from only a first side of the frame, and to allow the component to be removed from the frame from only a second side of the frame.
Abstract: A light control device implemented as a luminaire exhibits an ultra-wide batwing luminous intensity distribution in an upper hemisphere that provides substantially uniform illumination of a ceiling surface, even when the luminaire is mounted very close to the ceiling. Luminous side panel diffusers facilitate blending the luminaire with the ceiling surface as they create a batwing luminous intensity distribution in a lower hemisphere to evenly illuminate a work plane.