摘要:
Power utilized in a local power network may be managed. The local power network may include a power management system. The power management system may communicate with one or more of a circuit controller, a switch controller, and/or an outlet controller in order to manage power utilization.
摘要:
Application-manager software authenticates a user of a client device over a channel. The authentication operation is performed using a directory service. The application-manager software presents a plurality of applications in a GUI displayed by the client device. The plurality of applications depends on the authentication, the client device, and the channel. And the plurality of applications includes a thin application and a software-as-a-service (SaaS) application. The application-manager software receives a selection as to an application from the user. If the selection is for the SaaS application, the application-manager software provisions the SaaS application. The provision includes automatically logging the user onto an account with a provider of the SaaS application using a single sign-on and connecting the user to the account so that the user can interact with the SaaS application. If the selection is for the thin application, the application manager software launches the thin application.
摘要:
The present invention is directed to methods of identifying an agent which modulates hydroxylation of hypoxia inducible factor (HIF), comprising contacting a HIF asparagine hydroxylase and a test substance in the presence of a substrate of the hydroxylase under conditions in which asparagine in the substrate is hydroxylated in the absence of the test substance; and determining hydroxylation of the substrate.
摘要:
An asset monitoring and security system includes at least one asset assigned a unique identifier and operable wirelessly transmit an identification signal embodying the identifier. A data store maintains a list of the assets and privileges associated with the assets for authorized users of the assets. A control unit is adapted to receive identification signals from the assets and monitor positions of the assets within a defined area. The control unit communicates with the data store and is further operable to initiate an alarm event when privileges associated with a given asset for authorized users of the asset are exceeded. Each of the assets includes a lock-out mechanism that impedes use of the asset when the lock-out mechanism is activated. The control unit activates the lock-out mechanism of a given asset when the privileges associated with the asset for authorized users of the asset are exceeded.
摘要:
A debugging proxy can be used to manage communication between a client and a debugger or debugging component. A debugging protocol can be used by the debugging proxy to facilitate communication management. A debugging protocol can provide for asynchronous messaging, and can allow for the communication of large grain messages. A debugging protocol can also implement a priority scheme that can be used to process messages between a client and a debugger based upon a priority assigned to each message.
摘要:
Improved duplicate and near-duplicate detection techniques may assign a number of fingerprints to a given document by (i) extracting parts from the document, (ii) assigning the extracted parts to one or more of a predetermined number of lists, and (iii) generating a fingerprint from each of the populated lists. Two documents may be considered to be near-duplicates if any one of their fingerprints match.
摘要:
A propellant strip assembly for use in propellant actuated fastener driving tools. The assembly includes a carrying strip which contains a plurality of pockets which each hold a propellant charge and a sensitizer to activate the charge. The carrying strip is adhesively joined to a cover strip to isolate the individual charges, and each pocket is also sealed around its periphery to further improve the isolation. The cover strip may contain a ribbed section to physically separate the charge and sensitizer within each pocket to aid in prevention of accidental ignition.
摘要:
Methods, systems, and techniques for managing groups of entities, such as individuals, employees, or systems, and providing entitlement and access to computer resources based on group membership are provided. Example embodiments provide a Group Management System having a Group Management Engine “GME,” an Entitlement Engine, and a Provisioning Engine, which work together to allow simplified grouping of entities and providing entitlement and access to the entities based upon the group membership. In one embodiment, the GME leverages dynamic programming techniques to enable accurate, scalable systems that can manage near real time updates and changes to the group's status or to the entities' status. These components cooperate to enable provisioning of applications based upon current entitlement.
摘要:
The present invention provides a vortex generator that may be used in systems for separating oil from air oil mixtures. The vortex generator comprises a rotating disk having a rim having a plurality of passages extending through it and a cavity formed by the rotating disk and a cavity wall wherein a vortex is created when there is a flow through the plurality of passages into the cavity.
摘要:
An asset monitoring and security system includes at least one asset and at least one user identification device assigned a unique identifier and operable to transmit an identification signal embodying the identifier over a wireless communications link. A data store maintains lists of the assets, users authorized to use the assets, and privileges associated with the assets for each of the authorized users. A control unit is adapted to receive identification signals from the assets and user identification devices and monitor positions of the assets and user identification devices within a defined area based on the identification signals. The control unit communicates with the data store and is further operable to initiate an alarm event when privileges associated with a given authorized user for a given asset are exceeded. Each of the assets includes a lock-out mechanism that impedes use of the asset when the lock-out mechanism is activated.