摘要:
Systems and methods include optics having one or more phase modifying elements that modify wavefront phase to introduce image attributes into an optical image. A detector converts the optical image to electronic data while maintaining the image attributes. A signal processor subdivides the electronic data into one or more data sets, classifies the data sets, and independently processes the data sets to form processed electronic data. The processing may optionally be nonlinear. Other imaging systems and methods include optics having one or more phase modifying elements that modify wavefront phase to form an optical image. A detector generates electronic data having one or more image attributes that are dependent on characteristics of the phase modifying elements and/or the detector. A signal processor subdivides the electronic data into one or more data sets, classifies the data sets and independently processes the data sets to form processed electronic data.
摘要:
Communicating with a distributed service in the network computing environment. A method for communicating with a distributed service includes referencing a configuration registry to determine resources and permissions in a potential distributed service entry. A potential distributed service entry identifies a distributed service corresponding to the potential distributed service entry that is authorized to exist by virtue of an entry in the configuration registry for the potential distributed service entry specifying that the distributed service may exist, whether or not the distributed service corresponding to the potential distributed service entry exists. The method further includes using the resource information, attempting to contact the distributed service corresponding to the potential distributed service entry. Permissions of the distributed service corresponding to the potential distributed service entry are verified to match permissions of the potential distributed service entry.
摘要:
The invention involves durable and protective data storage disc cases. A case includes two portions that join to form an inner support at the center of a disc and an outer support surrounding the disc at its outer diameter. The inner and outer supports prevent the case from contacting, and possibly scratching, the data surface of a disc within the case, even when the case is subjected to a compressive force. Furthermore, the case may secure a disc by holding the disc at its center using a spindle and by holding the outer edge, beyond the data surface, on a rim at the outer support. In this manner, a disc is centered on the spindle, and further constrained by the rim at its outer edge. This secures the disc when the halves of the case are closed and allows the disc to be freely removed once the case is opened.
摘要:
A domain controller hierarchy includes one or more hub domain controllers in communication with one or more local domain controllers, such as local domain controllers at a branch office. The hub domain controller(s) is writable, while the local domain controller(s) is typically read-only. Non-secure and secure information is partitioned to specific local domain controllers at the one or more hub domain controllers. The non-secure and secure information is then passed from the hub domain controller only to the local domain controller associated with the given partition at the hub domain controller on request. For example, a user requests a logon at a client computer system at a local branch office, and the logon is passed from the local domain controller to the hub domain controller. If authenticated, the user logon account is passed to the local domain controller, where it can be cached to authenticate subsequent requests.
摘要:
A domain controller hierarchy includes one or more hub domain controllers in communication with one or more local domain controllers, such as local domain controllers at a branch office. The hub domain controller(s) is writable, while the local domain controller(s) is typically read-only. Non-secure and secure information is partitioned to specific local domain controllers at the one or more hub domain controllers. The non-secure and secure information is then passed from the hub domain controller only to the local domain controller associated with the given partition at the hub domain controller on request. For example, a user requests a logon at a client computer system at a local branch office, and the logon is passed from the local domain controller to the hub domain controller. If authenticated, the user logon account is passed to the local domain controller, where it can be cached to authenticate subsequent requests.
摘要:
Systems for improving radio reception on a mobile device are provided. In exemplary embodiments, the system comprises a headset apparatus having a plurality of antenna elements. In exemplary embodiments, the plurality of antenna elements may be positioned in such a manner as to result in low-correlation between the plurality of antenna elements. For example, at least one of the antenna elements may be vertically oriented near a plug of the headset apparatus. Further antenna elements may be oriented vertically, horizontally, or both near an earpiece of the headset apparatus or above a juncture where a left and right cord of the headset apparatus splits. Exemplary embodiments may also comprise a receiving device configured to receive RF signals from the plurality of antenna elements and process these signals for playback on the headset apparatus.
摘要:
Embodiments of the present disclosure provide hand grips for use with various items having handles. In one embodiment a hand grip includes an elongate body having an elongate lumen formed therein for receiving a portion of an elongate handle of an item to be carried. The elongate body includes an elongate channel formed by a first side and a second side of the elongate body to provide access to the elongate lumen by an elongate handle.
摘要:
An automated tightening shoe where a tightening mechanism is actuated which operates in one direction to cause automatic tightening of the shoe about a wearer's foot and which releases to allow loosening of the shoe. Shoe laces are led to the interior of the tightening mechanism in the heel whereat the laces are operatively associated in a tightening or in a loosening direction with the tightening mechanism. The tightening mechanism includes a rotatable central shaft which may have drums mounted thereto, a ratcheted coupling collar or ratcheted cam disk, a ratcheted actuator spool, a compression spring, a return spring, a ratchet wheel, and a release lever including a pawl and a cam actuator bar, all of which extend along the central shaft and operate to tighten as well as to allow loosening of the shoe laces.
摘要:
An automated tightening shoe is provided where a tightening mechanism operates to cause automatic tightening of the shoe laces about a wearer's foot and which releases the laces to allow loosening of the shoe. The shoe laces travel to the interior of the tightening mechanism located at the heel whereat the laces are operatively associated in a tightening or a loosening direction with the tightening mechanism. The tightening shoe further has a locking mechanism for locking said at least one lace in a tightened condition and a release mechanism for unlocking the locking mechanism and releasing the shoe laces. The release mechanism includes a lever arm which projects rearwardly from the rear of said shoe. Depression upon the lever arm causes the locking mechanism to unlock and release the shoe laces from being in a tightened condition.