摘要:
In accordance with the invention a configurable electrical distribution system is provided for selectively connecting an electrical power source to load devices. The system comprises a panel and a plurality of switching devices mounted in the panel, each switching device for connection in a branch circuit to a load device for selectively delivering electrical power to the load device. A panel controller is mounted in the panel and is operatively connected to each of the switching devices. The panel controller comprises a programmed controller for controlling operation of the switching devices and a panel memory connected to the programmed controller storing configuration data relating to operation of the switching devices. A port is provided for operatively connecting an external memory device to the programmed controller. A user interface is operatively associated with the programmed controller to transfer configuration data between the external memory device and the panel memory.
摘要:
Embodiments of the invention may be used to generate an analysis model of a building for use in thermal modeling and other analyses. A method for generating a model for use in determining environmental requirements includes the steps of receiving a computer-aided design (CAD) model of a building design, parsing the CAD model to identify one or more rooms in the building design, and generating a description for each of the one or more rooms. The description of a given room specifies a set of geometric properties describing the given room. The method also includes the steps of determining an environmental requirement of the building design based on the descriptions generated for the one or more rooms and storing the results of the analysis and the determined environmental requirement for review.
摘要:
Methods and apparatus, including computer program products, for providing a physical computer aided design (CAD) model comprising a plurality of physical objects in a flow system. Each of the plurality of physical objects are joined at one or more physical linkages. An analytical model of the flow system is generated based on the one or more physical linkages. And one of the analytical model or the physical CAD model is automatically updated to reflect a change to the other.
摘要:
In an example, a computing device includes a trusted execution environment (TEE), including an enclave. The enclave may include both a binary translation engine (BTE) and an input verification engine (IVE). In one embodiment, the IVE receives a trusted binary as an input, and analyzes the trusted binary to identify functions, classes, and variables that perform input/output operations. To ensure the security of these interfaces, those operations may be performed within the enclave. The IVE tags the trusted binary and provides the binary to the BTE. The BTE then translates the trusted binary into a second format, including designating the tagged portion for execution within the enclave. The BTE may also sign the new binary in the second format and export it out of the enclave.
摘要:
The present invention is concerned with substituted azole derivatives that selectively modulate, regulate, and/or inhibit signal transduction mediated by certain native and/or mutant proteine kinases implicated in a variety of human and animal diseases such as cell proliferative, metabolic, allergic, and degenerative disorders. In particular, several of these compounds are potent and selective Flt-3 inhibitors or/and syk inhibitors.
摘要:
In an embodiment, a security engine of a processor includes an identity provider logic to generate a first key pair of a key pairing associating system user and a service provider that provides a web service and having a second system coupled to the system via a network, to perform a secure communication with the second system to enable the second system to verify that the identity provider logic is executing in a trusted execution environment, and responsive to the verification, to send a first key of the first key pair to the second system. This key may enable the second system to verify an assertion communicated by the identity provider logic that the user has been authenticated to the system according to a multi-factor authentication. Other embodiments are described and claimed.