摘要:
Creating and managing an editable cache of unsent message fragments during conversations using real-time messaging systems (such as instant messaging, text messaging, chat sessions, and so forth). Using this cache, a user participating in a real-time messaging conversation can cache at least one message fragment, and can then recall selected fragments for review and/or editing (as desired by the particular user) before sending to other conversation participants. Preferably, any unsent message fragment from the cache can be sent, upon request of the user, through a mouse click or keystroke.
摘要:
Systems, methods and media for providing a distributed execution environment with per-command environment management are disclosed. In one embodiment, a plurality of digital systems are connected to a serving device. The serving device comprises a sequencer to originate environment attributes and commands to be executed within the environment. Each digital system under test and serving device comprises a listener with a queue to receive environment attributes and commands. A listener on a digital system under test or serving device implements the environment attributes and executes the received commands within the specified environment.
摘要:
Access to an authentication image may be protected so that only authenticated processes have access to the image. The image can be displayed to authenticate a User Interface (UI) to a computer user. The image indicates the UI can be trusted. If the image is not displayed, it may be that an application UI is “spoofed” to trick a user into providing sensitive information. Additionally, a large variety of different images can be used as authentication images, so spoofing one image be recognized by most users. A set of original images may be provided, along with image modification processes which can generate a large number of variations. Techniques for authenticating UIs in a virtual machine context are provided. A secure attention sequence is also provided, which allows users to test whether processes running on a computer are authenticated.
摘要:
A system and method for automatically regulating access control levels in an access control system based on prevailing security levels including homeland security levels, local environment situations such as crowds, rioting, looting, severe weather and temporal states such as workdays, weekends, holidays, and open houses.
摘要:
A trailer axle assembly includes a non-rotating axle tube that extends laterally between a pair of wheel ends. Each wheel end supports a disc brake assembly that selectively generates a braking force to slow or stop rotation of the wheel ends. The disc brake assemblies include a torque plate that is mounted to the axle tube. The axle tube includes a radial location feature that holds the torque plate fixed relative to the axle tube so that rotational brake torque is transmitted directly through a solid interface. The axle tube also includes an axial location feature that positions the torque plate at a predetermined location along the axle beam and prevents relative axial movement between the axle beam and the torque plate.
摘要:
Aspects for efficient order processing in a manufacturing environment are described. The aspects include utilizing a hierarchical definition language with run-time control capability to represent and control a box line manufacturing process of computer systems in a unified manner. Further provided is a state file, the state file including blocks, sub-blocks, tasks, and containers for run-time information of the box line manufacturing process of computer systems. A sequencer tool interacts with the state file to direct tasks of the state file, monitor task completion, and update the state file with real-time control information. A listener tool interacts with the sequencer tool to start tasks, monitor tasks, and send task results to the sequencer tool.
摘要:
A filter for removing undesired materials from a fluid, such as used cooking oil, for example, includes a filter envelope including first and second panels. The first panel has a permeability which is greater than that of the second panel. The first panel of the filter envelope may be formed from a filter pad and the second panel from a filter paper, and may enclose a metal spacer grid. When the filter is connected to a pump for drawing the oil through the filter, the flow of the oil is directed selectively through the filter pad, whereby undesired materials are removed from the oil. The filter provides for efficient flow of the oil to be filtered while removing undesired materials therefrom.
摘要:
A neutron absorbing apparatus which includes two adjacent neutron absorbing plates and a mounting assembly with latching means configured to be easily secured to fuel assemblies while the fuel assemblies remain under water in a fuel storage rack, thereby eliminating the need to remove the fuel assemblies or the fuel storage rack for installation. The two neutron absorbing plates are positioned orthogonally to form a chevron cross section which can be placed about the fuel assemblies by insertion in the existing space between the fuel assemblies and the cell walls of a fuel storage rack. A prescribed orientation of the chevron configured neutron absorbing plate in the cells of the fuel storage rack together with the selected use of a single neutron absorbing plate economically provides sufficient neutron absorption in all radial directions about the fuel assemblies to maintain safe storage conditions in closely packed fuel storage racks.
摘要:
The claimed subject matter provides a system or method for managing software changes. An exemplary method comprises creating a reset boot loader, a last known good (LKG) boot loader, and a current boot loader, then pointing the reset boot loader, LKG boot loader, and current boot loader to a parent virtual hard disk (VHD) containing a default master image. An operation to perform is determined, and a service partition is booted into. The LKG boot loader or current boot loader is pointed to a child VHD loaded with another desired image based on the operation selected, and the system is rebooted into the parent VHD or child VHD pointed to by the current boot loader.