摘要:
A diffuser (3) for a fan (2) of axial, radial or diagonal type of construction, has an inlet opening (10) and having an outlet opening (20) for a gaseous medium which flows through a diffuser interior (I), which is enclosed by an outer housing (30), in an axially oriented main flow direction (S) from the inlet opening (10) to the outlet opening (20). The cross section of the diffuser interior (I) increases from the cross section (11) of the inlet opening to the cross section (21) of the outlet opening (20), wherein the outer housing (30) forms an outer diffuser part (AD) which delimits the diffuser interior (I) to the outside. Along the main flow direction (S), the cross section of the outer diffuser part (AD) changes from a circular cross section (31) at the inlet opening (10) to a non-circular cross section (32) at the outlet opening (20).
摘要:
A method and a device are disclosed including a user interface software component configured to dynamically display and manage grouped graphical representations, such as tiles, of electronic data and messages, such as files and emails, that are rendered based on relevance scores, and are associated with two or more user accounts. The messages may be grouped visually or logically. The user interface may automatically categorize messages by assigning certain attributes based heuristics or other information. The user interface is further configured to allow zooming in and out for more or less details, respectively. The user interface is further configured to allow automatic and/or dynamic changes to the appearance and contents of tiles based on the relevance scores and other factors, and further allow searching for, dispositioning, and taking various actions on one or a group of messages.
摘要:
A format adjustment device (1) is used to adjust the format of at least one functional element (7) on a packaging machine. The format adjustment device (1) comprises at least one bearing element (2), at least one format gauge (3) comprising at least one mounting section (4) and at least one position element (5) having a stop section (6), and at least one functional element (7) having a connecting section (8). The format gauge (3) can be connected to the bearing element (2) via the mounting section (4). The stop section (6) of the position element (5) can be connected to the connecting section (8) of the functional element (7), such that the position of the at least one functional element (7) relative to the bearing element (2) can be adjusted.
摘要:
A pay-per-use or pay-as-you-go computer uses a secure memory to store individual unique program identifiers. Each unique program identifier is associated with a particular hardware or software component, or service, or the entire computer available to a user. By combining the unique program identifier with a computer hardware identifier uniquely identified transactions may be tracked for both billing and reconciliation. Certificates associated with each unique program identifier, and coupled to the hardware identifier, provide a cryptographic basis for mutual verification of messages, requests, configuration instructions, and provisioning.
摘要:
A device, such as a component or a peripheral, and corresponding computer are adapted to be bound such that the device will only operate with that computer after the binding process. Cryptographic messages are sent between the device and computer to confirm the relationship. When the device cannot confirm it is operating with the previously bound computer, the device reduces its own operating capability to render itself substantially useless until either unbound from that computer or a successful confirmation takes place. Methods for operation, binding and unbinding are also disclosed.
摘要:
An independent computation environment (ICE) that is isolated from tampering is contained in at least one hardware component of a general purpose computing device (CD). The CD includes at least one processor and memory operable to store instructions, which when executed by the at least one processor direct the CD to execute a module being monitored by the ICE. The ICE is operable to access the memory independent of an operating system of the CD. A policy engine is maintained within the ICE to monitor metadata related to the module and manage the execution of the module in accordance with the contents of a memory addresses and/or data registers of the CD that are referenced by the metadata. The ICE is operable to activate an enforcement mechanism to control an operating state of the CD in response to the monitoring of the module.
摘要:
A network security module for protecting computing devices connected to a communication network from security threats is presented. The network security module is interposed, either logically or physically, between the protected computer and the communication network. The network security module receives security information from a security service. The security information comprises security measures which, when enforced by the network security module, protect the computer from a security threat to the computer. The network security module implements the security measures by controlling the network activities between the protected computer and the network. The network security module also temporarily implements security patches until corresponding patches are installed onto the protected computer.
摘要:
A method and apparatus for measuring data presentation is measured for authenticity and accuracy using a cryptographic capability. The data may include both presentation data and metadata related to measuring and reporting results of outputting the presentation data. After measurement, the presentation data may be presented to an output device. The output device may be a display, a sound device or other computer output. Related statistics may be collected, for example, user identity, computer identity, time, duration, and interference from other sources. In the case of displayed presentation data, unblocked viewing area, and presentation data area size may also be collected. In an exemplary embodiment, the presence of a user and/or user interaction with the presentation data may be recorded and reported. The recorded data may be securely reported to a participating host or server, by a secure channel and/or by signing and/or encrypting.
摘要:
A method and apparatus is provided for managing a plurality of devices in a federated network and a sub-network within the federated network. The devices in the sub-network may have a functional capability of performing a function associated with the federated network. For example, the federated network may include devices for providing data content such as media content and the sub-network may include devices for controlling the presentation of the data content. In addition, a constellation of devices is provided that may share data content such as media data. At least some of the devices in the constellation may form a sub-network.
摘要:
The present invention includes entity tracking, privacy assurance, and zone policy administration technologies allowing for the creation of zone policies, including the definition of zones and managed entities, the zone policies including rules that apply to the managed entities within or in relation to the zones, and privacy policies assuring privacy of sensitive data. The technologies also provide for the definition of sensors, rule event objects, and default event objects, and for the establishment of associations between rules and managed entities, sensors, and rule event objects so as to create zone policies. Event objects may generate zone policy events or actions upon compliance with or violation of various rules of zone policy. Managed entities are defined as entities associated with mobile devices capable of location tracking and communication with zone policy servers. Entities may be persons, vehicles, animals, or any other object for which tracking and zone policy administration is of value. Zone policy may include privacy policy that may restrict access to or set access conditions for data or information. Privacy policies may be used to ensure individual managed entities and their data remain anonymous to a desired degree and that sensitive data is appropriately protected.