摘要:
Exemplary embodiments may provide one or more computer readable storage media storing executable instructions that when executed on processing logic output a source code listing and external content to an editor. The media may hold instructions for creating a source code listing in an editor, the source code listing being executable when the source code listing is compiled or interpreted. The media may further hold instructions for inserting a non-executable statement into the source code listing, the non-executable statement including metadata identifying external content. The media may hold instructions for interpreting the metadata. The media may further hold instructions for communicating with external content. The media may also hold instructions for outputting the source code listing and the external content to the editor. The media may further hold instructions for interacting with the external content from the source code listing.
摘要:
Methods, systems and computer program products are provided for managing information technology (IT) processes for a computer network. An incident report, including associated data, is received from an application monitoring resources on the computer network. Additional data associated with the computer network resources to be obtained based on the incident report is automatically identified and obtained. Related data in a historical database is automatically identified based on the incident report and/or the additional data and the identified related historical data is automatically retrieved. The incident report, the additional data and/or the related historical data are analyzed to identify a responsive process to respond to the incident report.
摘要:
A foam propellant system can be transportable and used by individuals to suppress a fire or cover a spill area. The system may include a water and/or foam concentrate source and a compressed air source. The water and/or foam concentrate may be mixed together with the compressed air in a mixing tube under pressure producing an expanded fluffy foam that can be propelled into the desired area.
摘要:
An embodiment of a scanning system is described including optical elements that direct an excitation beam at a probe array, detectors that receive reflected intensity data responsive to the excitation beam, where the reflected intensity data is responsive to a focusing distance between an optical element and the probe array, a transport frame that adjusts the focusing distance in a direction with respect to the probe array, an auto-focuser that determines a best plane of focus based upon characteristics of the reflected intensity data of at least two focusing distances where the detectors further receive pixel intensity values based upon detected emissions from a plurality of probe features disposed on the probe array at the best plane of focus, and an image generator that associates each of the pixel intensity values with at least one image pixel position of a probe array based upon one or more position correction values.
摘要:
Wireless data services such as wireless email are becoming common, and in particular, “always-on” systems, where new email is automatically forwarded by the service provider to the wireless device. The problem is that there is no effective mechanism for implementing “always-on” systems when the user is moving around a network, or from one network to another. The invention addresses this problem by generating a session key at the service provider's system for a given data session, and returning this session key to the mobile device. Each time the mobile device communicates with the service provider, it enters this session key into a field that will simply pass through the communication network to the service provider. This allows the service provider to manage the data session, preparing proper accounting records and directing the deletion of stale data sessions on network resources.
摘要:
The invention relates to a method of rendering caustics in a computer graphics scene. The method comprises obtaining a photon map of said scene, redistributing photons from said photon map into an arrangement with a blue noise spectral signature by performing a relaxation step in respect of each of a number of photons, determining a constraining vector for each of a number of photons and rendering said scene using results from the redistributing photons and/or from determining a constraining vector.
摘要:
A method for manufacturing a blood filter assembly is provided that includes the steps of providing a first housing sheet and a second housing sheet. The method includes locating and sealing at least one port onto each of the first and second housing sheets. The method includes locating the filtration medium between the first housing sheet and the second housing sheet. The method includes applying heat and pressure to form at least one seal that commingles the first and second housing sheets along with the filtration medium, wherein the periphery of the seal commingles only the first and second housing sheets.
摘要:
Systems and methods are described for improved authentication of subscribers wishing to connect to a wireless network using the EAP-AKA protocol. Embodiments exploit the requirement that the client store and transmit the Pseudonym and Fast Re-authentication Identities upon request. By using the Fast Re-authentication Identity to store session state key information, the need for the AAA server to store and replicate the EAP-AKA key information for every session is eliminated.
摘要:
Wireless data services such as wireless email are becoming common, and in particular, “always-on” systems, where new email is automatically forwarded by the service provider to the wireless device. The problem is that there is no effective mechanism for implementing “always-on” systems when the user is moving around a network, or from one network to another. The invention addresses this problem by generating a session key at the service provider's system for a given data session, and returning this session key to the mobile device. Each time the mobile device communicates with the service provider, it enters this session key into a field that will simply pass through the communication network to the service provider. This allows the service provider to manage the data session, preparing proper accounting records and directing the deletion of stale data sessions on network resources.