摘要:
A lock for the rings of photo albums and other binders includes a lock and a security component to prevent opening of the album in a retail store and to prevent pilferage of the contents or the improper insertion of refill pages. Once a consumer has made an album selection, the security component is removed. Once removed, the lock is moveable between a first position in which opening of the album rings is permitted and a second position in which opening of the rings is prevented. The initial release of the security component preferably requires a tool. In the most preferred embodiment, the lock slides in a slot in a binder body and includes a lower ridge which aligns with an opening in a pair of spring plates to permit ring opening. When the ridge is moved away from the opening and into the cavity of the binder body, the rings cannot be opened.
摘要:
Apparatus for regeneration of spent, coke contaminated fluidized cracking catalyst by burning coke therefrom with a molecular oxygen containing regeneration gas in a fluidized dense phase bed, and for burning substantially all carbon monoxide to carbon dioxide. Means are provided for transferring heat from the top of said regeneration apparatus to the bottom, employing catalyst as the transfer medium. Additionally, means are provided for maintaining a homogeneous fluidized dense phase bed of catalyst undergoing regeneration. Also, conical standpipe means is provided for deaerating regenerated catalyst.
摘要:
Process for producing an injection water for an oil reservoir by pressurizing water having a total dissolved solids content of 20,000 to 45,000 ppm and a sulfate concentration of 1,000 to 4,000 ppm to 350 to 1250 psi absolute; and dividing the water into first and second feeds for reverse osmosis (RO) and nanofiltration (NF) units respectively. The units are operated in single-pass, single-stage mode or single-pass, two-stage mode, the NF permeate has a pressure at least 5 psi higher than the RO permeate, and the recoveries of the RO and NF permeates are 35 to 75% and 35 to 60% by volume respectively. RO permeate and NF permeate are mixed in a ratio of 2:1 to 40:1 to provide injection water having a TDS content of 500 to 5,000 ppm, and a sulfate concentration of less than 7.5 ppm.
摘要:
Replicating modifications of a directory that include receiving in a source directory service for a source directory requests for modifications in the source directory and transmitting, from the source directory service to a duplicate directory service for a duplicate directory asynchronously in parallel over a plurality of data communications connections, requests for the same modifications in the duplicate directory. In typical embodiments, a duplicate directory may replicate a subtree of a source directory, receiving requests for modifications may include receiving in the source directory service requests for modifications in the subtree in the source directory, and transmitting requests may include transmitting requests for the same modifications in the subtree in the duplicate directory.
摘要:
A computer implemented method, data processing system, and computer program product for password policy enforcement in a distributed directory when policy information is distributed. When a proxy server is providing a request from a client to a backend directory server, the proxy server performs a series of LDAP operations on a targeted set of backend directory servers to collect password policy information applicable to a target user. The password policy information applicable to the target user is partitioned and distributed across the plurality of backend directory servers. When the password policy information for the target user has been collected, the proxy server evaluates the collected password policy information to determine an effective password policy for the target user. The proxy server then sends the request and subsequent requests with the effective password policy to a backend directory server.
摘要:
A method, system, and computer usable program product for preserving references to deleted directory entries are provided in the illustrative embodiments. An instruction to delete an entry is received. A second entry referencing the entry is identified. The second entry is marked as a ghost reference to the entry. The entry is converted to a deleted entry. A ghost attribute with a value of “false” may be added to the entry. A ghost attribute or tag with a value of “false” may be added to the second entry. The ghost tag may correspond to an attribute of the second entry that references the entry. An entry may be deleted by setting a value of a ghost attribute in the entry to true. The second entry may be marked as the ghost reference by setting a value of a ghost attribute or a ghost tag in the second entry to true.
摘要:
A method, system, and computer usable program product for transferring messages to a directory are provided in the illustrative embodiments. A listing of message templates that is stored in a computer usable storage medium is received. A list of messages is received. The listing of message templates is loaded in a directory. The directory executes in a data processing system and is configured to store messages. The list of messages are loaded in the directory. Messages are loaded in the directory by receiving a list of messages in the directory. A message is selected and identified from the list of messages. A determination is made if the message corresponds to an existing base message entry in the directory. A message instance entry is created in relation to the existing base message entry if the message corresponds to an existing base message entry and the message is otherwise handled if not.
摘要:
A mechanism for providing proxy support for special subtree entries in a directory information tree by defining filters at the proxy level to indicate relationships between main subtree entries and associated special subtree entries. A proxy server receives a request from a client for a special subtree entry and determines whether the distinguished name of the main subtree entry can be built using information in the request and pre-defined relationships between the main subtree entry and the requested subtree entry. If so, the proxy server builds the distinguished name of the main subtree entry associated with the special subtree entry and applies a partitioning filter to the distinguished name of the main subtree entry to determine a target directory server in the plurality of backend directory servers that comprise the special subtree. The proxy server then sends the request to the target directory server.
摘要:
A directory server handles requests for values of dynamic attributes by providing at least one declaration for an attribute to be handled as a real-time attribute associated with but external to a directory structure; receiving a directory access protocol request for access to an attribute value from the associated directory structure; detecting requested access to an attribute declared as a real-time external attribute; resolving a real-time value by obtaining an attribute value from a real-time source external to the directory structure; converting the obtained attribute value from a real-time attribute to a static attribute, wherein the real-time attribute is incompatible with the directory access protocol, and wherein the static attribute is compatible with the directory access protocol; and returning to a requester the converted real-time attribute directly in the directory access protocol, wherein storing and updating of the converted real-time attribute value in the directory structure is eliminated or avoided.
摘要:
A method, system, and computer usable program product for managing deleted directory entries are provided in the illustrative embodiments. An instruction to delete the entry is received. A second entry that includes a reference to the entry is identified. A third entry including information to be preserved from the entry is added in a deleted entries subtree. The third entry is modified to include the reference information from the second entry. The third entry is saved such that during a restore of the entry the third entry provides the information to restore the entry and the reference to the entry. The third entry may include a set of attributes that store an identifier of the second entry. The entry is restored from the third entry and made available in the directory. A reference is recreated in the second entry to the restored entry forming a restored second entry.