Brooke Madsen Anderson - Boulder CO, US Wiliam C. Bunn - Longmont CO, US Mary Karnes - Boulder CO, US Sarah M. Lieberman - Bridgewater NJ, US Mira E. Wilczek - Cambridge MA, US
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION - Armonk NY
International Classification:
G06F 21/00
US Classification:
726 11
Abstract:
A graphical representation of the firewall and a network coupled to the firewall is generated and displayed. A number of an inbound port of the network is displayed. An arrow adjacent to the port number pointing toward the network is displayed to indicate that a communication is permitted to the port. The port number and the arrow are located between an icon for the network and an icon for the firewall. A port number of a destination of a communication originating from the network is displayed. Also, another arrow adjacent to the destination port number pointing toward the firewall is displayed to indicate that a communication is permitted to the destination port number. The destination port number and the other arrow are located between an icon for the network and an icon for the firewall.
Robert ADAMS - Acton MA, US David HOSSACK - Somerville MA, US Benjamin VIGODA - Winchester MA, US Eric NESTLER - Cambridge MA, US Mira WILCZEK - Cambridge MA, US
Assignee:
ANALOG DEVICES, INC. - Norwood MA
International Classification:
H04R 3/00 H03F 99/00 H04R 9/08
US Classification:
381 92, 381369, 381120
Abstract:
Microphone stages in a microphone array may be coupled together in a daisy chain. Each stage may include a microphone, an analog to digital converter, a decimation unit, a receiver, an adder, and a transmitter. The converter may convert analog audio microphone signals into digital codes that may be decimated. The adder may add decimated digital codes in each stage to a cumulative sum of decimated digital codes from prior stages. This new sum may be transmitted to the next microphone stage, where the adder may add the decimated digital codes from that stage to the cumulative sum. A serial interface may be used to connect the transmitters and receivers of each of the stages. The serial interface may be used to transmit the cumulative sum of decimated digital codes between the stages. The serial interface may also be used to transmit configuration data between the stages.
Method And Apparatus For Graphical Presentation Of Firewall Security Policy
Brooke Anderson - Boulder CO, US William Bunn - Longmont CO, US Mary Karnes - Boulder CO, US Sarah Lieberman - Bridgewater NJ, US Mira Wilczek - Cambridge MA, US
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION - ARMONK NY
International Classification:
G06F 15/16
US Classification:
726011000
Abstract:
A graphical representation of the firewall and a network coupled to the firewall is generated and displayed. A number of an inbound port of the network is displayed. An arrow adjacent to the port number pointing toward the network is displayed to indicate that a communication is permitted to the port. The port number and the arrow are located between an icon for the network and an icon for the firewall. A port number of a destination of a communication originating from the network is displayed. Also, another arrow adjacent to the destination port number pointing toward the firewall is displayed to indicate that a communication is permitted to the destination port number. The destination port number and the other arrow are located between an icon for the network and an icon for the firewall. A table including definitions of a plurality of rules is generated and displayed. Each of the definitions includes entries for a source IP address and destination IP address of a permitted but vulnerable data flow. The source IP address and destination IP address entries are color coded to indicate security levels of respective source and destination networks. Another table includes definitions of a misconfigured data flow, and entries for a source IP address and destination IP address of the misconfigured data flow. The source IP address and destination IP address are color coded to indicate security levels of respective source network and destination network.
Systems And Methods For Expanding Human Perception
Frank Wilczek - Cambridge MA, US Mira Wilczek - Belmont MA, US
International Classification:
G09B 21/00 G09B 19/00
Abstract:
Media and devices that exploit the possibility of encoding multiple channels of spatially structured information into single images, by exploiting temporal modulation of color and brightness, are proposed. Applications include relief of color blindness, producing images enriched with normally “invisible” information from infrared, ultraviolet, and polarization, and effectively adding new perceptible colors within the visible spectrum.
Cogo Labs 2016 - Nov 2019
Chief Executive Officer
Everquote 2016 - Nov 2019
Member Board of Directors
Caredash 2016 - Nov 2019
Member Board of Directors
Cognius 2016 - Nov 2019
Member Board of Directors
Cogo Labs 2015 - 2016
Acting Senior Vp, Venture Strategy
Education:
Mit Sloan School of Management 2007 - 2009
Master of Business Administration, Masters, Entrepreneurship
Massachusetts Institute of Technology 1999 - 2004
Skills:
Start Ups Entrepreneurship Product Management Analytics Mobile Devices Security Semiconductors
Youtube
Lyric Semiconductor inventors explain probabi...
V3.co.uk chats with Ben Vigoda, founder of Lyric Semiconductor, and Mi...