摘要:
An asset monitoring and security system includes at least one asset assigned a unique identifier and operable wirelessly transmit an identification signal embodying the identifier. A data store maintains a list of the assets and privileges associated with the assets for authorized users of the assets. A control unit is adapted to receive identification signals from the assets and monitor positions of the assets within a defined area. The control unit communicates with the data store and is further operable to initiate an alarm event when privileges associated with a given asset for authorized users of the asset are exceeded. Each of the assets includes a lock-out mechanism that impedes use of the asset when the lock-out mechanism is activated. The control unit activates the lock-out mechanism of a given asset when the privileges associated with the asset for authorized users of the asset are exceeded.
摘要:
Application-manager software authenticates a user of a client device over a channel. The authentication operation is performed using a directory service. The application-manager software presents a plurality of applications in a GUI displayed by the client device. The plurality of applications depends on the authentication, the client device, and the channel. And the plurality of applications includes a thin application and a software-as-a-service (SaaS) application. The application-manager software receives a selection as to an application from the user. If the selection is for the SaaS application, the application-manager software provisions the SaaS application. The provision includes automatically logging the user onto an account with a provider of the SaaS application using a single sign-on and connecting the user to the account so that the user can interact with the SaaS application. If the selection is for the thin application, the application manager software launches the thin application.
摘要:
Power utilized in a local power network may be managed. The local power network may include a power management system. The power management system may communicate with one or more of a circuit controller, a switch controller, and/or an outlet controller in order to manage power utilization.
摘要:
A method of identifying, screening, characterising or designing a chemical entity, which mimics or binds to FIH, is described. The method comprises comparing a structural model of FIH with a structural model for said chemical entity, wherein said structural model of FIH is derived from structural factors or structural coordinates determined by subjecting to X-ray diffraction measurements a crystal comprising FIH. Such chemical entities may be used in the treatment of a condition associated with increased or decreased HIF levels or activity.
摘要:
One embodiment is a microprobe. An example of the microprobe comprises a housing having an aperture. This example of the microprobe also comprises an ISFET attached to the housing. The ISFET may have a gate located proximate the aperture. This example of the microprobe further comprises a reference electrode attached to the housing proximate the aperture. Another embodiment is a microsensor system. Another embodiment is a method for measuring a characteristic of tissue. Yet another condition embodiment is a method for monitoring tissue pH.
摘要:
Improved methods of software diagnostics are provided. Searches of data sources are conducted using search terms from internal computer information to obtain searched data. The searched data is processed by extracting technical features. The technical features are indexed to create indexes that can be searched via machine state. Filtering is conducted over the gathered data to create feeds that are available to customers. Stack traces are extracted for the purpose of matching and researching using machine state rather than key words.
摘要:
An intrusion sensing device includes an intrusion detection sensor enclosed within a housing and operable to detect an intrusion into a container. A mounting detection mechanism contacts the surface of the container when the housing is mounted thereto and is operable to detect when the housing is not in contact with the surface of the container. An access detection mechanism is operably connected to an access panel of the housing and operable to detect removal of the access panel from the housing. A control module is operable in a setup mode and an active mode. The control module is adapted to receive an alarm message from the intrusion detection sensor and operable to initiate an alarm event during the setup mode which varies from an alarm event initiated during the active mode. A wireless transmitter is operable to transmit an alarm indication signal to a remote monitoring system.
摘要:
Power utilized in a local power network may be managed. The local power network may include a power management system. The power management system may communicate with one or more of a circuit controller, a switch controller, and/or an outlet controller in order to manage power utilization.
摘要:
Improved duplicate and near-duplicate detection techniques may assign a number of fingerprints to a given document by (i) extracting parts from the document, (ii) assigning the extracted parts to one or more of a predetermined number of lists, and (iii) generating a fingerprint from each of the populated lists. Two documents may be considered to be near-duplicates if any one of their fingerprints match.
摘要:
Methods, systems, and techniques for managing groups of entities, such as individuals, employees, or systems, and providing entitlement and access to computer resources based on group membership are provided. Example embodiments provide a Group Management System having a Group Management Engine “GME,” an Entitlement Engine, and a Provisioning Engine, which work together to allow simplified grouping of entities and providing entitlement and access to the entities based upon the group membership. In one embodiment, the GME leverages dynamic programming techniques to enable accurate, scalable systems that can manage near real time updates and changes to the group's status or to the entities' status. These components cooperate to enable provisioning of applications based upon current entitlement.