摘要:
A maintenance information coordination system coordinates maintenance-related information held by a user of a machine or held by an independent maintenance service provider company of the machine. Maintenance-related information is held by a provider of the machine. A user machine inference unit of the maintenance information coordination system infers a machine identifier provided by the provider of the machine, which operates in a zone for which maintenance work information has been recorded from a provider machine information storage unit, a user information storage unit and an operation information storage unit. It further infers a mapping relation between the machine identifier assigned by the provider and an identifier of the machine assigned by its user from operation information of the machine and information in a user machine information storage unit, and a maintenance work information storage unit and stores the mapping relation into an integrated maintenance information storage unit.
摘要:
In a computer system including a plurality of data storage apparatuses and a management computer, a given data storage apparatus, upon receipt of a control request for a local data storage apparatus from a management computer, accesses the hierarchical relation information between the storage areas in the local data storage apparatus and the storage areas of the other data storage apparatuses, and in the case where a storage area in the local data storage apparatus is set to correspond to a level lower than the other data storage apparatuses, transmits an approval request to the other data storage apparatuses. The given data storage apparatus, upon receipt of the approval from the other data storage apparatuses, executes the control request of the management computer.
摘要:
A design/evaluation support tool 100 is constructed from a table link use unit 110 identifying linkages between a threat-to-component correspondence table 125, a risk-value table 126, a component contribution rate table 127, and a risk-to-assurance level correspondence table 128, based on their respective duplicate items; and a component assurance level deriving unit 111 deriving an assurance level of each of components that conforms to a risk value of a threat that a security function of each of the components counters by weighting the risk value of the threat by a component rate of contribution based on linkages of the tables.
摘要:
In a gear case of a throttle body, a valve gear is fixed to one end of a throttle shaft, an intermediate reduction gear is rotatable around an intermediate shaft, a pinion gear is fixed to a motor shaft of a drive motor, and a full close position stopper is provided for defining the full close position of a throttle valve. Those are provided all in alignment with the longitudinal centerline of the gear case. For car models where the throttle body bore inside diameter is identical but the rotation direction of the drive motor differs, only some components in the gear case need be replaced and the other components in the gear case can be used as common components.
摘要:
An enzyme electrode comprising: an insulative base plate; two or more electrodes formed on the surface of the insulative base plate and each having an exposed portion; an insulative protection film to insulate and protect the electrodes excluding at least those exposed portions; and an immobilized enzyme film to integratedly cover the exposed portions.
摘要:
A method for producing a granular composition including the steps of: stirring and granulating a mixture containing not less than 3 parts by weight and not more than 80 parts by weight of a phenol compound represented by the formula (1): wherein R1 is an alkyl group having 1 to 8 carbon atoms, X is an n-valent alcohol residue having 1 to 18 carbon atoms optionally containing a heteroatom, a cyclic group, or a heteroatom and a cyclic group, and n is an integer of 1 to 4, and not less than 20 parts by weight and not more than 50 parts by weight of a binder to obtain a granular agglomerate; and cracking the granular agglomerate at a temperature equal to or lower than the melting point of the binder and equal to or higher than the temperature which is 10° C. lower than the melting point, through a cracking machine equipped with a separation mechanism capable of recovering a granule having a particle size of not more than 5 mm, and a cracking mechanism, to obtain a granule.
摘要:
A design/evaluation support tool 100 is constructed from a table link use unit 110 identifying linkages between a threat-to-component correspondence table 125, a risk-value table 126, a component contribution rate table 127, and a risk-to-assurance level correspondence table 128, based on their respective duplicate items; and a component assurance level deriving unit 111 deriving an assurance level of each of components that conforms to a risk value of a threat that a security function of each of the components counters by weighting the risk value of the threat by a component rate of contribution based on linkages of the tables.
摘要:
In a computer system including a plurality of data storage apparatuses and a management computer, a given data storage apparatus, upon receipt of a control request for a local data storage apparatus from a management computer, accesses the hierarchical relation information between the storage areas in the local data storage apparatus and the storage areas of the other data storage apparatuses, and in the case where a storage area in the local data storage apparatus is set to correspond to a level lower than the other data storage apparatuses, transmits an approval request to the other data storage apparatuses. The given data storage apparatus, upon receipt of the approval from the other data storage apparatuses, executes the control request of the management computer.
摘要:
Techniques of improving the safety of an information processing system at low cost are provided, the information processing system having an OS provided with an access control function based upon discretionary access control for preventing illegal accesses to files. A method and apparatus for providing the information processing system with functions and areas usable only by a specific user different from a system administrator. The areas are provided with an access control function in order to prevent the access control function from being tampered.