Abstract:
A communication platform for providing computer/telephony integration services to remote subscribers comprises: a hosted call switching unit in communication with an external telephone network or interconnected networks through a communications trunk; for each subscriber, a subscriber telephony component, such as an intelligent agent, executed by processing means belonging to the communication platform and connected to an external subscriber's information system through a permanent private secure data channel, whereby said subscriber telephony component can communicate in a private manner with other information system components of said subscriber so as to be logically part of said information system, each subscriber component being capable of controlling said switching unit according to subscriber data; resources available to each subscriber telephony component in association with call processing or routing; means for allocating resources to each telephone call handled by a subscriber telephony component in response to data communication with said component through a secure interface.
Abstract:
An apparatus and method for detecting ink leakage in a print head. Conductive material is provided on a print head substrate that functions as a detector for ink that has leaked out of the established ink well or conduit. The detector conductive material is preferably arranged in proximity to power and/or control signal conductors and senses when leaked ink is threatening these conductors.
Abstract:
An ink container for holding a supply of liquid ink for use in an inkjet printing system. The container includes a collapsible ink reservoir for holding a supply of liquid ink, and a multiple functioned chassis. The chassis rigidly supports an air inlet for receiving pressurized air from the printing system and an ink outlet for delivering pressurized ink to the system. The chassis supports a collapsible ink container by providing an attach surface over which the collapsible container is attached. The attach surface allows a relatively simple pleated bag construction to be used by providing a surface whose normal is substantially perpendicular to the longitudinal axis of the container. The chassis is adapted to engage with a pressure vessel opening, providing a seal that separates the pressure vessel from an outside atmosphere. The chassis provides a surface for outside electrical contacts along with locating means for a mating electrical connector, and provides pathways for them to be routed into the pressure vessel region. An efficient method of assembly of an ink container is described.
Abstract:
Hardware resolution of a scanner is increased without improving the quality of the scanner's sensor array or imaging optics. A first low-resolution representation of an image is generated during a first scan and a second low-resolution representation of the image is generated during a second scan. The scanner is configured to intentionally induce a motion error in either the first or second representation. A composite representation of the first and second representations is generated from the first and second representations, and a super resolution technique is used to generate a third representation of the image from the composite representation. The third representation has a higher resolution than the first and second representations.
Abstract:
A magnetic tape is packed prior to removal from a tape drive. The tape is packed by completely unwinding the tape and then completely rewinding the tape without reading or writing to the tape. Completely unwinding the tape and then completely rewinding the tape reduces air entrainment and thereby reduces the susceptibility of the tape to damage after removal from the tape drive.
Abstract:
A check sum calculation on data coded with a Reed-Solomon error correcting code is performed by applying a byte based polynomial remaindering process to data bytes. The polynomial is X2nullXnull2nullnull, over GF (28), where null is the primitive element GF (28) used to define redundancy coding for individual data groups. The roots of the polynomial used in the polynomial remaindering process differ from the roots of a generator polynomial of the Reed-Solomon error correcting code. The polynomial remaindering process is performed with a sub function mask containing the same mask function as used in defining redundancy coding for a data group or groups. The data group or groups are redundance coded using a Reed-Solomon code over GF (28)
Abstract:
A method of encoding a digital data stream for writing to a digital storage (DDS) format tape data storage medium, comprises writing a byte stream to a preamble region, immediately preceding a user data region, said byte stream having a characteristic of having a power spectrum (900) substantially similar to a power spectrum of said user data region. An automatic gain control circuit (504) responds to the preamble data stream in a substantially similar fashion to its response to the user data stream. The disclosure may overcome a problem in read channels detecting prior art DDS-1 to DDS-4 format preamble regions in that an automatic gain control circuit of the read channel responds differently to a cyclical preamble region in the known DDS formats, compared with its response to user data, giving rise to increased bit error rate in a sequence detector device of the read channel.
Abstract:
A security protocol entity (20) is provided that includes a mechanism for enabling a first party (11) to communicate securely with a second party (60) through an access-controlling intermediate party (13) by nesting within a first security session (64) established with the intermediate party (13) a second security session (65) with the second party (60). The protocol data units, PDUs, associated with the second security session (65) are encapsulated in PDUs associated with the first security session (64) when sent out by the first party, the intermediate party extracting the encapsulated PDUs for sending on to the second party (possibly with a change to the destination address included in the PDU to be sent on). Each PDU includes a message type field explicitly indicating to the intermediate party (13) if a received PDU encapsulates another PDU intended to be sent on. The establishment of a security session between two parties is made dependent on each party proving by attribute certificates that it has certain attributes required of it by the other party. Where the intermediate party (13) fronts for the second party (60) and the first party (11) initially contacts the intermediate party in the belief that it is the second party, then the latter will indicate its relay status to the first party which can then request the intermediate party (13) to permit a tunnel to be established through it to the second party (60). The first party may place different attribute requirements on the intermediate party in its tunnel role to those initially expected of it when the first party thought it was the second party.
Abstract:
A system and method for porting a software application from a native object oriented programming system to a target object oriented programming system is presented. The native object oriented programming system includes an application framework layer built on a set of defined native foundation classes and an operating system layer running a native operating system. The target object oriented programming system also includes an application framework layer and an operating system layer. However, the application framework layer is built on a different set of foundation classes and the target operating system is different than the native operating system. A software application that has been implemented to interface with the native object oriented programming system via an application programming interface (API) built on the defined native foundation classes may be ported to run on the target operating system in a functionally equivalent manner as if running on the native object oriented programming system using the method of the invention. The method includes defining a set of target object oriented programming system data types in terms of the native object oriented programming system data types, and then emulating the defined native foundation classes by mapping the native API method invocations to template library calls.