Kiran Kumar - Sunnyvale CA Zhihai Wang - Sunnyvale CA Wilbur G. Catabay - Saratoga CA Kai Zhang - Saratoga CA
Assignee:
LSI Logic Corporation - Milpitas CA
International Classification:
H01L 21302
US Classification:
438689, 438700, 438706, 438710, 438712
Abstract:
A method of processing a substrate, where the substrate is transferred from an ambient environment into a clean environment. The substrate is heated to at least a first temperature within the clean environment, and then maintained at no less than the first temperature within the clean environment. The substrate is selectively transferred within the clean environment to more than one processing chambers, and processed in the more than one processing chambers. The substrate is transferred from the clean environment into the ambient environment.
Pratima Ahuja - Foster City CA, US Manoj Khangaonkar - Foster City CA, US Kai Mike Zhang - Lake Oswego OR, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04L 9/00
US Classification:
713151, 713150, 726 4, 709220, 705 79
Abstract:
A method is disclosed for asymmetric security in data communications between two or more nodes. Asymmetric security within data communications refers to sending and receiving messages at different security levels. The method includes a receiving module, a transmission module, and a communication module. The receiving module receives a first message at a first security level from a first node. A security level may be defined by implementation of one or more security features, including encryption, digital signatures, and/or other security features. The transmission module transmits a second message at a second security level to the first node in response to receiving the first message. The first and second messages may be communicated during a single communication session. The communication module communicates the second security level to the first node. The communication may be directly between two nodes or may occur via a broker or other intermediate node.
Apparatus, System, And Method For Message Level Security
Pratima Ahuja - Foster City CA, US Manoj Khangaonkar - Foster City CA, US Kai Mike Zhang - Lake Oswego OR, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04L 29/06
US Classification:
713151, 713166, 713176, 709238, 709244
Abstract:
An apparatus, system, and method are disclosed for selective, end-to-end message level security. The apparatus includes a message class definition module, a security module, and a messaging module. The message class definition module identifies a predetermined message class of an internode message. The security module applies security to the message at an application layer. The security that is applied to the message corresponds to a security level, which depends on the message class of the message. The security may include encryption, authentication, and/or other security features. The messaging module communicates the message between a first node and a second node. A third node, such as a broker, may be interposed between the first and second nodes, in which case the security of the message is preserved at the third node.
A secret string is established so as to be known only to a client computing system and a server computing system. A non-encrypted version of a message, a message counter value, and first hash value are received by the server computing system from the client computing system. The first hash value, based on a content of the message, the message counter value, and the secret string, is generated at the client computing system using a first hash algorithm. Using the first hash algorithm, the server generates second hash value based on the content of the received message, the received message counter value, and the secret string. The server computing system accepts the received non-encrypted version of the message as authentic upon determining that the received message counter value is greater than a previously received message counter value and that the second hash value matches the first hash value.
Mandar Ganesh Bhatkhande - Milpitas CA, US Srikanth Bhattiprolu - Santa Clara CA, US Atul Ravindra Daherkar - Cedar Park TX, US Thomas Pollinger - San Mateo CA, US Charles James Redlin - Rochester MN, US Chidanandan Theyancheri - Pleasanton CA, US Kai Mike Zhang - Lake Oswego OR, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 9/44
US Classification:
717120, 717104
Abstract:
A computer program product is provided. The computer program product includes a computer useable medium having a computer readable program. The computer readable program when executed on a computer causes the computer to generate a topology role in a topology role tier that is included in a topology pattern. Further, the computer readable program when executed on a computer causes the computer to create a component in a component tier that is defined in the topology pattern such that the component corresponds to the topology role. In addition, the computer readable program when executed on a computer causes the computer to map the topology role to a deployment target.
Pratima Ahuja - Foster City CA, US Manoj Khangaonkar - Foster City CA, US Kai Mike Zhang - Lake Oswego OR, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04L 9/00
US Classification:
713151, 713150, 726 24, 709220, 705 79
Abstract:
An apparatus and system are disclosed for asymmetric security in data communications between two or more nodes. Asymmetric security within data communications refers to sending and receiving messages at different security levels. The apparatus includes a receiving module, a transmission module, and a communication module. The receiving module receives a first message at a first security level from a first node. A security level may be defined by implementation of one or more security features, including encryption, digital signatures, and/or other security features. The transmission module transmits a second message at a second security level to the first node in response to receiving the first message. The first and second messages may be communicated during a single communication session. The communication module communicates the second security level to the first node.
Common Configuration Framework For Applications To Configure Database Objects And Resources
Manoj Khangaonkar - Pleasanton CA, US Wen Chao Li - Beijing, CN Weixin Xu - Sunnyvale CA, US Kai Mike Zhang - Lake Oswego OR, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 15/173
US Classification:
709225, 709221, 709223, 709232, 7079991
Abstract:
Provided are a method, system, and article of manufacture for a common configuration framework for applications to configure database objects and resources. configuration interfaces are maintained for a plurality of different database types, wherein each configuration interface implements a database configuration operation with respect to a database of one database type. A configuration request is received from an application indicating a database type, database name, and a database configuration operation. A determination is made of one of the configuration interfaces for the requested database type to implement the requested configuration operation with respect to the database having the database name. The determined configuration interface is invoked with the requested database name to perform the requested configuration operation with respect to the database name.
Method And System For Non-Intrusive Event Sequencing
Atul R. Daherkar - Burlingame CA, US Manoj Khangaonkar - Foster City CA, US Hong Sun - Cupertino CA, US Kai Mike Zhang - West Linn OR, US Chendong Zou - Cupertino CA, US
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION - Armonk NY
International Classification:
G06F 17/00
US Classification:
707103 R
Abstract:
A system has a repository that stores a plurality of events. Each event requests to utilize one or more functions in a component. An event sequencing module analyzes an event sequencing key of the event if the event requests a function having a component definition that includes an event sequence qualifier. The event sequencing module grants a lock to the event for the function if no other event having the same value for the event sequencing key has the lock for the function. The event sequencing module prevents the event from being processed if another event having the same value for the event sequencing key has the lock for the function. The event sequencing key is composed of one or more object attributes. The system has a worker server that receives the event, if the event obtains the lock, and processes the function requested by the event.
Charlotte Maxwell Complementary Clinic - Oakland and San Francisco since Apr 2012
Client Advocate/Asian Program Coordinator
East Bay Vision Center Optometry - Oakland, Fremont since Mar 2011
Reception
Laney College Cal-Work Office (Work- Study) - Laney College Nov 2008 - Jun 2009
Clerical Aide
Education:
College of Alameda 2013 - 2013
California State University-East Bay 2009 - 2011
Bachelor of Science (BS), Human Resources Management/Personnel Administration, General
Laney College 2002 - 2009
Associate of Arts (A.A.), Business Administration and Management, General
Skills:
Nonprofits Customer Service Community Outreach Healthcare Microsoft Office Powerpoint Microsoft Excel Teamwork Employee Relations Microsoft Word Fundraising Public Speaking Research Management Human Resources Non Profits Social Media Marketing Event Planning Product Management Personnel Management Online Advertising Nonprofit Organizations Program Coordination
Barclays Capital - Greater New York City Area since Jul 2011
Analyst
Nobilis Capital - Greater New York City Area Oct 2010 - Mar 2011
Quant Intern, High Frequency Trading
Ashir Capital - Greater New York City Area May 2010 - Aug 2010
Summer analyst
Education:
New York University 2009 - 2011
MS, Financial Engineering
Nankai University 2005 - 2009
Bacherlor, Financial Engineering
Skills:
C++ R Matlab VBA Options Pricing Market Risk Options Derivatives
Interests:
Systematic Trading, Web Technology, Cloud Computing.
Geisinger Medical GroupGeisinger Laboratory Medicine 100 N Academy Ave, Danville, PA 17822 570 271-6338 (phone), 570 271-6105 (fax)
Education:
Medical School Fujian Med Coll, Fuzhou City, Fujian, China Graduated: 1984
Languages:
Chinese English Spanish
Description:
Dr. Zhang graduated from the Fujian Med Coll, Fuzhou City, Fujian, China in 1984. He works in Danville, PA and specializes in Anatomic Pathology & Clinical Pathology. Dr. Zhang is affiliated with Cole Memorial Hospital, Geisinger Medical Center, Geisinger Wyoming Valley Hospital and Geisinger-Shamokin Area Community Hospital.