摘要:
The electric motor (25) according to the invention for a motor vehicle has a stator (1) with predefined areas (4) for connection to a vehicle frame, wherein connection of the stator (1) can be done to the vehicle frame by welding or screwing, for example. In addition, the electric motor (25) according to the invention has a rotor (13), wherein the rotor (13) can be arranged on a drive shaft (17) that is mounted rotatably in the stator (1). The electric motor (25) is realized as an external rotor motor and has a planetary gear mechanism (26).
摘要:
Network flow records from various administrative domains are provided to a network monitoring entity. The network monitoring entity analyzes the network flow records in a way to locate a source of malicious network flow.
摘要:
Data for deduplication is received. The received data is deduplicated if selected conditions corresponding to the deduplication are satisfied, wherein the selected conditions include a deduplication ratio, a data deduplication threshold, and a data quiescence measure. Deduplication of the received data is discontinued if the selected conditions corresponding to the deduplication are not satisfied.
摘要:
A method and system for performing tasks when processing a client service request. The service request is processed by a group of processing elements including a main processing element and at least one offloading processing element. A subset of tasks is assigned to at least one of the offloading processing elements. When a service request is received from the client at the group of processing elements, each offloading processing element determines whether processing of the service request requires performing a task contained in the subset of tasks assigned to the respective offloading processing element. If processing of the service request requires performing tasks comprised in the subset of tasks assigned to the respective offloading processing element, those tasks are performed and outputs of the tasks are transmitted back directly from the offloading processing element to the client.
摘要:
Data for deduplication is received. The received data is deduplicated if selected conditions corresponding to the deduplication are satisfied, wherein the selected conditions include a deduplication ratio, a data deduplication threshold, and a data quiescence measure. Deduplication of the received data is discontinued if the selected conditions corresponding to the deduplication are not satisfied.
摘要:
A data storage system includes a data storage array configured for de-duplication of duplicate data therein by: identification of a plurality of portions of data; a comparison of each portion of the data to identify duplicate data and identification of a link associated with each duplicate data; a determination of whether a Hamming link-separation-distance of the identified link is greater than twice a Hamming radius of an error correction code in the data storage system; and replacement of the duplicate data with the identified link when it is determined that the Hamming link-separation-distance is greater than twice the Hamming radius.
摘要:
Provides optimizing a data path and forwarding a data from a start node to an end node over a network, wherein the data is forwarded through the data path which is determined by a data path option having a minimum overall capacity regarding first capacity values. Provides a first capacity value for a specific first node and for a specific first node function including determining a number of second data path options for the second nodes of the specific first node to perform the specific first node function, for each second data path option, the second nodes having one or more assigned second node functions. Provides a second capacity values for each of the second nodes and for each of the assigned second node functions, and determines overall capacity values of the nodes and for each of the assigned second node functions.
摘要:
A method for automated validation and execution of cryptographic key and certificate deployment and distribution includes providing one or more keys; providing one or more key deployment points; and distributing the one or more keys to the one or more key deployment points in an automated manner based on a matrix or pattern mapping of each of the one or more keys to be distributed to each of the one or more key deployment points.
摘要:
Methods and apparatus are provided for managing protocol information in a PNNI hierarchical network. In a PAR-enabled device (1) of the network, topology indicators (HC, LC) are assigned to protocol information encapsulated in PAR PTSEs received by the PAR-enabled device (1) from the network. The assignment of a topology indicator (HC, LC) to protocol information in a PAR PTSE is dependent on the location of the network node which originated that PAR PTSE in the PNNI topology as seen by the PAR-enabled device (1). Protocol information in received PAR PTSEs is then supplied to a protocol device (5) associated with the PAR-enabled device (1) in a manner dependent on the assigned topology indicators (HC, LC), for example with tags comprising the assigned topology indicators (HC, LC). The information supplied to the protocol device (5) thus reflects the topology indicators (HC, LC) which in turn reflect the location in the PNNI topology of the originating nodes of the PAR PTSEs. This allows the configuration of the network topology for the protocol in question to be controlled in dependence on the underlying PNNI topology.
摘要:
A network-attachable computer system (40) that comprises a network interface for connection to a network (41), a server module address, a secure identifier (ID), and a key k. The computer system (40) generates identity information which comprises the secure identifier ID and which is protected using said key k. This identity information is automatically sent via the network interface to a server module (42) which is reachable via the network (41) by using said server module address where it is used to determine whether the respective computer system (40) is reported lost or stolen.