Abstract:
The invention relates to a process for preparing a polyurethane foam, wherein a polyether polyol and a polyisocyanate are reacted in the presence of: a blowing agent; of from 1 to 30 ppmw, based on the polyether polyol, of metals derived from a composite metal cyanide complex catalyst; and of from 0.5 to 100 ppmw, based on the polyether polyol, of a phosphoric acid compound comprising a phosphoric acid selected from orthophosphoric acid, polyphosphoric acid and polymetaphosphoric acid, and/or a partial ester of such a phosphoric acid.
Abstract:
In accordance with one embodiment of the present invention, there is provided a technique for resource allocation brokering in nested containers. According to one aspect, a broker mechanism is established within a first container. A second container also is established within the first container. The second container has a client mechanism. The first container's broker mechanism communicates with the second container's client mechanism to provide notices to the second container's client mechanism. The second container also has a broker mechanism that may or may not be a part of the second container's client mechanism. A third container is established within the second container. The third container also has a client mechanism. The second container's broker mechanism communicates with the third container's client mechanism to provide notices to the third container's client mechanism. Thus, communications are facilitated between higher-level containers and lower-level containers in a hierarchy of nested containers.
Abstract:
In accordance with one embodiment of the present invention, there are provided methods and mechanisms for determining an allocation of resources, including hardware resources in a computing environment. With these methods and mechanisms, it is possible for computing resource allocations to satisfy one or more operational considerations, such as for example without limitation: “reduce device heat dissipation”, “avoid single point of failure in switched network” and other allocation needs are contemplated.
Abstract:
A smart card is initially connected to a first mobile terminal and includes a first directory file adapted to store first contact cards. To access the first contact cards, initially stored in a directory of the first terminal, from a second mobile terminal an application in the first terminal copies each of the first cards of the directory in the first directory file, if the latter does not include the first card. In the second terminal connected to the card withdrawn from the first terminal, the application copies each of the first cards of the first directory file in the file of the second terminal, if the latter does not include the first card and if the first directory file is inaccessible by the second terminal.
Abstract:
In various exemplary embodiments, a system, article of manufacture, and method for providing, a cloud computing infrastructure on a system infrastructure comprising, a first virtual computing environment associated with a first class of service, the first class of service defining, in one embodiment, a first set of obligations, restrictions, and/or capabilities; providing, in the same cloud, a second virtual computing environment associated with a second class of service, the second class of service defining a second set of obligations, restrictions, and/or capabilities different from those of the first class of service; and executing the first virtual computing environment according to the first class of service and the second virtual computing environment according to the second class of service, the first virtual computing environment having a different access to the hardware platform than the second virtual environment based on the respective class of service.
Abstract:
A query language used to traverse a path in a graph-based model is provided. The system comprises a parsing module to parse a query comprising query phrases. The respective query phrases composed of an object-type identifier and a filter where the object-type identifier corresponds to respective repositories and the filter is used to identify at least a portion of the objects associated with the object-type in the respective repositories. A planning module identifies the respective repositories corresponding to the object-type identifier within each of the one or more query phrases and generates an execution plan describing data to be retrieved according to the respective repositories and results of a preceding query phrase within the query. A translation module translates the respective query phrases into respective translated queries that are readable by the respective repositories and including the filter. An execution module implements the execution plan using the translated queries.
Abstract:
A query language used to traverse a path in a graph-based model is provided. The system comprises a parsing module to parse a query comprising query phrases. The respective query phrases composed of an object-type identifier and a filter where the object-type identifier corresponds to respective repositories and the filter is used to identify at least a portion of the objects associated with the object-type in the respective repositories. A planning module identifies the respective repositories corresponding to the object-type identifier within each of the one or more query phrases and generates an execution plan describing data to be retrieved according to the respective repositories and results of a preceding query phrase within the query. A translation module translates the respective query phrases into respective translated queries that are readable by the respective repositories and including the filter. An execution module implements the execution plan using the translated queries.
Abstract:
Cremone-bolt door-locking controlled by rack-and-pinion means. The cremone-bolt rod is connected to a first rack support that is slidably mounted inside a housing that houses a second slidably mounted rack support, each rack support carrying a rack segment in engagement with a pinion, at least one rack segment being hinged to its own rack support and being provided with a set of teeth that is extended over a curved portion of its end.
Abstract:
In a method for backing up personal data of a wireless communications network subscriber, the data is saved in a mobile communications device and backed up in a server of the network. A first subset of data is prepared from a set to be saved by a SIM card and is transmitted to the server for backing up. In an asynchronous backup mode, after the transmission of a subset of data to be backed up on the server, the backup is delayed for a certain period of time in order to free the mobile device for the user, and the backup is resumed at the end of this period.
Abstract:
Network address (e.g. IP address) allocation under first and second protocols (e.g. RADIUS and DHCP) is achieved using a directory service. A common network address pool is maintained under the control of a directory service. The directory service allocates network addresses in response to requests. The directory service also maintains a record of network address allocation to users, which can be achieved by storing a network address allocated to a user at the user's entry in the directory. Thus, for example, IP address allocation under RADIUS and DHCP can be unified using a common address pool and mappings between IP addresses and the user/hosts information in an ISO/CCITT X.500 based directory service using LDAP.