摘要:
Methods, systems, devices and computer programs for configuring nodes on a wireless network can include generating a security key for the network, setting the security settings on the access point based on the security key, and saving the security key in a profile data file on a removable memory device along with a portable configuration utility for using the profile data file for configuring other nodes on the network. The removable memory device can then be inserted into other nodes and the portable configuration utility can be run to match the same key on the other network nodes based on the information stored in the profile data file on the removable memory device.
摘要:
A Universal Serial Bus (USB) modem/Wireless Wide Area Network (WWAN) device is provided that when connected to a host device, presents itself as an Ethernet endpoint to the host device, without requiring additional software/drivers to be downloaded to the host device. Embedded in the USB modem/WWAN device are various modules that provide functionality allowing either automatic connection to the Internet or redirection to a local Web User Interface (UI) that a user may employ to configure the USB modem/WWAN device and/or manually connect to the Internet. Additionally, the USB modem/WWAN device employs predetermined rules to determine whether or not/how the redirection occurs, including in scenarios where wireless connectivity to the Internet is unavailable.
摘要:
An apparatus comprises a first interface module configured to interface with one or more user devices through a wireless local area network (WLAN) connection; a second interface module configured to interface with a wireless communication network through a wireless wide area network (WWAN) connection; and a controller. The controller is configured to detect availability of carrier hotspots; if no carrier hotspot is detected, route traffic to and from the one or more user devices through the WWAN connection; and if a carrier hotspot is detected, route traffic to and from the one or more user devices through the detected carrier hotspot.
摘要:
A method for conducting encrypted communication in a network and a network having a plurality of nodes organized into a plurality of groups which initiates encrypted communication between a first one of the plurality of nodes of a first one of the plurality of groups and a second one of the plurality of nodes of the first one of the plurality of groups different from the first one of the plurality of groups using a group key and initiates encrypted communication between a third one of the plurality of nodes of the first one of the plurality of groups and a fourth one of the plurality of nodes of a second one of the plurality groups different from the first one of the plurality of groups using a session key.
摘要:
An apparatus comprises a first interface module configured to wirelessly interface with one or more user devices; a second interface module configured to interface with a wireless communication network; and a controller. The controller is configured to detect a signal received through the second interface module, the signal including a command; and execute the command. Executing the command causes one or more components of the apparatus to exit a power conservation mode and enter a full operation mode.
摘要:
A two-way wireless communication system comprises a central authority in communication with a plurality of client devices via both a circuit switched data communication system and a packet switched data communication system. The packet switched communication system can assign packet switched network addresses to the client devices dynamically. Therefore, the central authority can be configured to send a circuit switched message, through the circuit switched data network, to a client device requesting the client device to register with the central authority through the packet switched data network
摘要:
A network is audited by running task programs and evaluating the results of the task programs. Task programs are tools that are configured to retrieve information about a particular network device. A service is arranged to coordinate the scheduling, execution, and data collection and aggregation of each task program over disparate networks such as multiple domains. Each task program executes at a scheduled time and provides results to a parser. The parser formats the results and provides the formatted data to the service. The service stores the collected data in a database. A client can schedule and/or review the results of audits by communicating with the service. The collected data can be compared and filtered according to rule-based templates that define acceptable network device configurations. Reports can be generated based on the templates such that a client can evaluate results from task programs executed over the entire network.
摘要:
A system and method are provided by which a user, at a client workstation, can efficiently, simply and effectively manipulate, and specifically crop, a high resolution image that has been scanned and/or otherwise stored in a server with which the client worksation is in web-based communication. The disclosed system and method reduce and/or eliminate the need to transfer a file containing a full high resolution image from the server to the client workstation across a web-based data transfer network. A cropping request may be generated by a user via a client workstation and only that request may be transferred to, and implemented through, the server, eliminating significant data transfer requirements regarding the transfer of the extremely large files associated with high resolution images required of conventional cropping methods. An addition advantage is reduction and/or elimination of a need for sophisticated image display and processing software to reside within each client workstation.
摘要:
A method and system reconstructs a contone image from a binary image by first tagging pixels to identify one of a multiplicity of image content types. The tag information and the pattern of bits surrounding the pixel to be converted to a contone value are used to reconstruct a contone image from a binary image. The pattern of bits in the neighborhood is used to generate a unique identifier. The unique identifier is used as the address for a lookup table with the contone value to be used. A filter also generates a contone value. A selector selects between the look-up table contone value and the filter contone value based an image context type.
摘要:
A fluid specimen testing device having a removable lid which carries at least one testing strip behind a transparent top viewing window. Testing is initiated by tilting the device into a stable sideways orientation to allow the specimen to contact the sampling pad portion of the strip. The device is adapted to provide stability in the upright, tilted and inverted orientations. A roll-inhibiting feature also acts as an indicator for proper roll positioning in the tilted configuration. The strips are also oriented in the lid so that they are substantially vertical when the device is in the tilted position thereby enhancing a condition for proper capillarity. The strip is carried close to the upper surface which allows it to be copied on a flat glass copier providing for more objective recordation of the test results.