Abstract:
A headset for a head having a first earpiece, a second earpiece, and a headband. The first earpiece has a horseshoe shaped housing and a plurality of audio elements. The housing of the first earpiece has a crest. The second earpiece has a horseshoe shaped housing and a plurality of audio elements. The housing of the second earpiece has a crest. The headband extends between the crest of the first earpiece and the crest of the second earpiece. The plurality of audio elements of the first earpiece are positionable against a first side of the head and the plurality of audio elements of the second earpiece are positionable against a second side of the head.
Abstract:
Methods and systems for detecting aberrant behavior in time-series observation data, such as non-existent domain data, are disclosed. The methods and systems analyze the time-series observation data to determine time-series prediction data. The time-series observation data and time-series prediction data are used to determine a threshold that is based on the standard deviation of deviation values between the time-series observation data and time-series prediction data. The threshold may be used to detect aberrant behavior in subsequently obtained time-series observation data.
Abstract:
Methods and systems provide tracking or logging requests to resolve non-existent domain (NXDomains) and organizing the NXDomains to support searching of the domain names including ranking the NXDomains based on popularity, e.g, number of hits or potential traffic based on the number of requests made for the NXDomain. NXDomain logs may be organized so that it supports searching by creating an inverted index including n-grams of the NXDomains. Searching includes identifying a target substring in one or more of the indexes, selecting those matching NXDomains satisfying some threshold criteria, and displaying the NXDomains in a selected order such as by demand or popularity associated with, for example, a selected geographical location from which resolution requests targeting respective NXDomains originate.
Abstract:
There is disclosed a process of forming reinforcements, baffles and seals having malleable carriers. The process typically includes application of an activatable material to a malleable carrier and contouring of the activatable material the malleable carrier or both.
Abstract:
A method for compressing a set of small strings may include calculating n-gram frequencies for a plurality of n-grams over the set of small strings, selecting a subset of n-grams from the plurality of n-grams based on the calculated n-gram frequencies, defining a mapping table that maps each n-gram of the subset of n-grams to a unique code, and compressing the set of small strings by replacing n-grams within each small string in the set of small strings with corresponding unique codes from the mapping table. The method may use linear optimization to select a subset of n-grams that achieves a maximum space saving amount over the set of small strings for inclusion in the mapping table. The unique codes may be variable-length one or two byte codes. The set of small strings may be domain names.
Abstract:
Athletic apparel, including compression garments and athletic footwear, is disclosed as capable of monitoring the wear of compression fabric and/or cushioning material by attaching a performance gauge onto the apparel. The performance gauge includes microcapsules that contain a colorless dye and/or a co-reactant, wherein the microcapsules can breakdown in concert with the wear and degradation of the compression fabric or cushioning material, thereby allowing the dye and co-reactant to mix and produce color indication. As the wear of the fabric and cushioning material increases, more microcapsules breakdown resulting in a progression of color change visible through additional layers on the performance gauge, or by the fabric and/or cushioning material. The microcapsules can be engineered to breakdown based on any variation of factors that correspond to the degradation of compressive fabric and cushioning material, including shear force, tension, impact force, and/or exposure to high temperature and water.
Abstract:
A system, computer-readable medium, and method for identifying similarities in network traffic are provided. Hash values are calculated from Internet Protocol (IP) addresses in a group of IP addresses that request a domain name, a hash signature is generated from the hash values and paired with the domain name, and the domain name is then clustered with another domain name having a paired hash of the same value. The clustered domain names are then extracted and used in a similarity calculation.
Abstract:
Methods and systems are disclosed for generating and authenticating barcodes and in particular generating trusted barcodes. In one embodiment, a method, performed by a certificate authority for creating a trusted content, comprises receiving, via a receiver, a target content and verifying the target content to determine whether the target content is safe or appropriate. Further, the method comprises, based on a result of the verifying, generating and storing, in a storage medium, response data; generating, via a processor, and storing in the storage medium an identifier corresponding to the response data; generating, via the processor, resolution data, the resolution data including the identifier and an address of the certificate authority; and transmitting, via a transmitter, the resolution data as the trusted content.
Abstract:
Methods and systems analyze historical NXD traffic to predict future DNS traffic. In one embodiment, a system may count NXD responses generated by an Authoritative DNS server during a particular time period and calculate the variance in NXD traffic for domains over time. The system may then generate a coefficient of variance (CoV) value for each domain observed. Finally, the system may predict positive domain traffic based upon the calculated CoV data. In other embodiments, the system may also base the prediction on the classification of domains as “original” domains or “re-registered” domains. In another embodiment, the system may also base the prediction on the “size” of name servers. Additionally, or alternatively, the system may determine the number of unique name servers for a domain and base the prediction on the number of unique name servers for a particular domain name.