Abstract:
An arrangement to reduce refreezing of meltable snow includes a wiper arm configured to wipe the meltable snow from an ambient-facing surface of a window positioned on a vehicle. The arrangement also includes a sensor coupled to the wiper arm that is configured to gather and transmit a parameter on the vehicle and environment. The arrangement also includes a processor that is configured to receiving the parameter, determining refreezability of the meltable snow based on the parameter, and defining an action to be performed by the wiper arm.
Abstract:
An approach is provided in which an information handling system creates a printed circuit board (PCB) layout based upon a set of packaged components. The information handling system modifies the PCB layout based upon an adjustment of the set of packaged components and generates board design data based on the modified PCB layout. In turn, the information handling system simulates the PCB layout using the board design data.
Abstract:
An approach is disclosed that receives, from a number of mobile devices, time data with the timing data is based on an elapsed time from a timing signal and line-of-sight events directed to the mobile devices. A location of each of the mobile devices is determined based on the respective timing data received from each of the mobile devices. A portion of an overall image to display at each of the mobile devices is determined based on the identified location of the mobile devices, and the overall image is displayed by transmitting the determined portion to each of the plurality of mobile devices.
Abstract:
An approach is provided to copy records between tables in a relational database. In the approach, a Structured Query Language (SQL) table COPY statement is received with the COPY statement identifying a source table and a target table. Table column names are retrieved from a metadata that corresponds to the source table. The retrieved table column names are used to generate an SQL statement that includes an INSERT INTO clause pertaining to the target table and a SELECT clause pertaining to the source table, wherein the INSERT INTO clause includes a set of target column names and wherein the SELECT clause includes a set of corresponding source column names.
Abstract:
An approach is provided in which a system creates a network application model that includes network policy objects and connection rules corresponding to sending data between the network policy objects. The system converts the network application model to network configuration information, which links the network policy objects to the connection rules. In turn, a network control plane is configured based upon the network configuration information to map the network application model to a physical infrastructure.
Abstract:
An approach is provided in which a set of common instructions are each executed by at least two processor cores. Each of the processor cores queues values resulting from at least one of the common instructions (a critical section). The queued values are compared by a queued comparator. An exception is issued in response to the comparison revealing unequal values having been queued by the processor cores.
Abstract:
An approach is provided to receive a request at a first computer system from a second system. The first system generates an encryption key, modifies retrieved source code by inserting the generated encryption key into the source code, and compiles the modified source code into an executable. A hash value of the executable program is calculated and is stored along with the encryption key in a memory area. The executable and the hash value are sent to the second system over a network. The executable is executed and it generates an encrypted result using the hash value and the embedded encryption key. The encrypted result is sent back to the first system where it is authenticated using the stored encryption key and hash value.
Abstract:
An approach is provided in which a number of inter-unit communication connections are detected between a rack-mounted system unit and adjacent rack-mounted system units. The connections are established by a set of electrical contacts selected from a set of available electrical contacts included on surfaces of the rack-mounted system unit. The set of electrical contacts is determined by physical masks inserted between the rack-mounted system unit and adjacent rack-mounted system units. A configuration of rack-mounted system units is identified including the rack-mounted system unit and the adjacent system units rack based on an arrangement of the inter-unit communication connections.
Abstract:
An approach to handling integrated security roles is presented. An upstream application includes one or more role-mapping requirements that correspond to an upstream security role and a downstream security role. The upstream security role is expanded by adding an upstream security role identifier in a downstream application's role-mapping table or by adding upstream user-to-role mappings to a downstream application's role-mapping table. When an upstream security role is expanded, a user assigned to the upstream security role automatically has access to role-mapped downstream applications.
Abstract:
An approach is provided that gathers observational traffic data at traffic controller nodes. Each of the traffic controller nodes communicates observational traffic data to other traffic controller nodes via a network. The traffic controller nodes negotiate traffic control parameters. The negotiating process receives timing proposals from the other traffic controller nodes included in the related set. The nodes analyze the proposed timings based on the traffic controller's gathered observational traffic data. The traffic controller node prepares responses in response to the analysis. The traffic controller node sends the negotiation responses to the other traffic controller nodes. The traffic controller node also adjusts its traffic control parameters that control the node's cycle times based on the analysis.