Abstract:
A non-modal notification user interface element is displayed persistently but unobtrusively such that a user may easily determine that authentication credentials are required by a background synchronization process. The non-modal notification is configured such that it may be ignored by the user such that their workflow is not interrupted. The background synchronization continues to synchronize the data it can even though the background synchronization may require authentication credentials for a subset of the data to be synchronized. The user may select the non-modal notification user interface element at any point in time in order to supply the required authentication credentials. The non-modal notification is removed from the display when there are no further authentication credentials required.
Abstract:
Methods, systems, and computer program products disambiguate a globally universal identifier (GUID) within a file after the file is duplicated. The method involves generating a GUID for the file, generating a location identifier that defines a unique location of the file when the GUID was generated, and storing the location identifier in association with the GUID. The method also involves opening and examining the file, determining whether the location identifier matches a current location of the file, and in response to determining that the location identifier does not match the current location, generating a new GUID and replacing the GUID with the new GUID. Additionally, the method may also involve remapping references mapped to the GUID in the file to the new GUID and resetting the location identifier to match the current location.
Abstract:
Many different users may access, revise and update the same shared object simultaneously through several different transports. Clients may communicate asynchronously by accessing the shared object through a physical server. Clients may also communicate synchronously by accessing the shared object through a peer-to-peer network. A manifest file associated with the shared object identifies the locations where other versions and instances of the shared object are stored. The shared object and the associated manifest file allow a client to transition seamlessly between local access, synchronous and asynchronous communication such that the user is not aware that the mode of communication has changed. A user may change location and any available data sharing transports are automatically identified. Thus, the user may access a shared object and collaborate with other authorized users through different mechanisms.
Abstract:
Methods and associated systems for automated auditing of agreements. Questions relevant to qualitative and quantitative measures of an agreement relative to selected criteria are retrieved from an audit template along with associated answer options. The questions and answer options are presented to a user and user input received to provide answers to the questions. An audit score is generated to measure a degree of compliance of the agreement with the selected criteria. Scores may be presented for individual questions, or may be aggregated for groups or categories of questions. Scores may be compared to desired threshold values and suggestions to improve the score may be provided. Summary presentations of questions and answers or categories of questions and answers may be presented to monitor compliance over a number of such audits.
Abstract:
A system and method for synchronizing a plurality of main processors. At a first time and in response to a first time reference, a first rendezvous signal is sent from a first to a second of the plurality of main processors. At a second time, and in response to a second time reference, a second rendezvous signal is sent from the second of the plurality of main processors, to the first of said plurality of main processors. After the first rendezvous signal is received by the second of the plurality of main processors and the second rendezvous signal is received by the first of said plurality of main processors, substantially simultaneous scanning of control information is initiated by the first and second of the plurality of main processors. In variations, a difference between the first and second times signals a fault condition.
Abstract:
A system and method for holding, transporting, and tracking electronically tagged objects maintained in a portable carrier housing includes a locking mechanism for enabling limited authorized access using a proximity sensor recognizing an identity code of an authorized user, a location tracker for detecting the location of the portable carrier, and an inventory logger registering placement and removal of the electronically tagged objects within and out of the portable carrier housing, registering the location of the portable carrier housing at a time of placement or removal of the electronically tagged object, and registering the identity code of the authorized user within proximity of the proximity sensor. The system further includes a transmitter for uploading data from the inventory logger to a database and a receiver for at least receiving instructions for locking the portable carrier housing when detecting an attempted unauthorized access or detecting a condition indicative of unauthorized access.
Abstract:
Many different users may access, revise and update the same shared object simultaneously through several different transports. Revisions to the shared object are automatically synchronized such that all users can view the revisions to the shared object. Conflicting revisions are reconciled and merged into a current version of the shared object. A client may request the current version of the shared object from a store when the current version of the shared object is not available from the store. The current version of the shared object is synchronized with the client when the store receives the current version of the share object.
Abstract:
A system for validating communications between a plurality of processors is disclosed. The system includes a plurality of loop back paths, and each of the loop back paths is coupled to a corresponding one of the plurality of processors. In addition, each loop back path is configured to attenuate one of a plurality of signals transmitted from each of the corresponding ones of the plurality of processors so as to generate a plurality of loop back signals. A plurality of signal transmission paths are configured to carry a corresponding one of the plurality of signals from one of the plurality of processors to another of the plurality of processors, and a plurality of comparators compare the plurality of loop back signals to the plurality of transmission signals so as to enable the validity of each of the plurality of signals to be assessed.
Abstract:
A remote water meter monitoring system is provided. A mesh network-type transceiver unit is coupled to a water meter housing having a water counting mechanism inside to transmit water consumption information as well as other sensor information, such as backflow detection, water pressure, and water metrics (e.g., residual chlorine and temperature) to a central server system via a bridge device and a corresponding mesh network. Mechanical energy from the water flowing through the water meter housing is converted to electrical energy via an energy conversion unit. An electrically powered shut off valve is remote addressable via the transceiver unit.
Abstract:
A large-tow fiber placement system having (1) a creel, (2) a tow feeding mechanism, (3) a tow cutting mechanism, and (4) a tow consolidation system, wherein the creel shuttles a spool to maintain a substantially fixed exit path of a large-tow exiting the spool, the tow feeding mechanism has a head that is cooled by a fluid to control integrity of the large-tow and the tow consolidation system has interlocking shoes to provide a continuous application of the head is disclosed.