摘要:
A system and method for managing electrically isolated fuel cell powered devices within an equipment rack is disclosed. The system discloses: an equipment rack; fuel cell devices; a fluid bus; a fluid manifold, coupling the fluid bus to each of the fuel cell devices; and an external fuel cell manager, for controlling a flow of fuel cell fluids to each of the fuel cell devices. The method discloses: generating electrical power on an electrical bus internal to each of a set of fuel cell devices, which are located in an equipment rack having an external electrical bus; transporting fuel cell fluids from a fluid bus to the fuel cell devices through a fluid manifold; adjusting the electrical power generated by each of the fuel cell devices; and electrically isolating the internal electrical bus of each of the fuel cell devices from the external electrical bus.
摘要:
The present invention includes a method and system for dynamically controlling cooling resources in a data center based on the workload of the data center. Accordingly, based on the workload constraints (power consumed, latency, etc.) of the data center, each of a plurality of different types of cooling resources is activated in an optimal fashion. Consequently, a substantial savings in operational costs related to cooling resources is achieved. A first aspect of the present invention is a method for dynamically controlling cooling resources in a data center. The method comprises determining a workload within the data center, determining an amount of heat being generated as a function of the workload and activating each of a plurality of different types of cooling resources within the data center in an optimal fashion based on the amount of heat being generated.
摘要:
There is disclosed a method of identifying a product involving generating a code unique to the product, said code being provided by a multitude of individual identifiers, applying the multitude of the identifiers of the code to the packaging of the product as a pattern to identify the product. The method also involves applying a sub-set of two or more of the multitude of the identifiers of said code to the product, said sub-set of the multitude of the identifiers of the code being applied so they will be presented in the same pattern order as they appear in the pattern order of the multitude of the identifiers of the code applied to the packaging. The product can be identified with a reasonable likelihood of being a genuine product by determining that a presented pattern order of the sub-set of the multitude of the identifiers applied to the product corresponds to a presented pattern order within the multitude of the identifiers applied to the packaging.
摘要:
A computing node is connected to a sensor and an actuator. The computing node receives a module which is used to program the computing node to perform a function associated with the sensor and the actuator.
摘要:
Methods and systems of the present invention employ perturbation techniques for configuring RFID-tag-reader networks in order to achieve increased overall efficiency of a network of RFID-tag readers. According to described embodiments of the present invention, individual RFID-tag readers within a multi-RFID-tag-reader network may be removed or shut down, or RFID-tag readers may be displaced relative to one another, in order to remove interferences between RFID-tag readers and to increase the interrogation efficiency of the multi-RFID-tag-reader network.
摘要:
Methods and systems of the present invention employ perturbation techniques for configuring RFID-tag-reader networks in order to achieve increased overall efficiency of a network of RFID-tag readers. According to described embodiments of the present invention, individual RFID-tag readers within a multi-RFID-tag-reader network may be removed or shut down, or RFID-tag readers may be displaced relative to one another, in order to remove interferences between RFID-tag readers and to increase the interrogation efficiency of the multi-RFID-tag-reader network.
摘要:
Methods and systems of the present invention are directed to clustering RFID-tag readers of a multi-RFID-tag-reader network in order to obtain a set of RFID-tag readers with high probability of detecting an event, but with low probability of collisions and with an acceptable cost. The cost may be determined by any of numerous cost functions of the RFID-tag readers in the set of RFID-tag readers, and may represent a cost in power, long-term reliability, and other such metrics that may be applied to an RFID-tag network.
摘要:
A computing node is connected to a sensor and an actuator. The computing node receives a module which is used to program the computing node to perform a function associated with the sensor and the actuator.
摘要:
A method of authenticating products includes receiving a description of detectable features read from a package. The package includes two or more detectable features, and the detectable features are affixed on the package based on encoded information. Authentication information is provided based on a comparison of the received description to one or more stored package identifiers.
摘要:
A method of authenticating a package is described. The method includes receiving a read identifier. The read identifier includes information from multiple modes of information storage on a package. Authentication information is provided based on a comparison of the read identifier and one or more stored identifiers.