Abstract:
Methods and apparatus are provided for mitigating interference between spectrally distinct wireless communication networks employing co-located, collaborating radios. A first base station is in a first network and communicates with a first radio within a first frequency range, and a second base station is in a second network and communicates with a second radio in a second frequency range. The first and second radios are geographically co-located, for example, within a public safety vehicle. The first radio determines a maximum level of interference it will accept based on current operational parameters, and communicates a corresponding threshold value to the second radio through a data link. The second radio sends a request to its base station to employ interim scheduling constraints governing uplink transmissions from the second radio, to thereby limit out of band emissions received by the first radio to a range that is less than the threshold interference level.
Abstract:
When a request is received to execute a virtualized application, an application virtualization client component evaluates an execution policy to determine if the application may be executed. If the application virtualization client component determines based on the execution policy that the virtualized application may be executed, the application virtualization client component publishes the virtualized application. The application virtualization client component publishes the application by making the virtualized application available for execution if the application is installed, and installing the virtualized application if it is not installed. The application virtualization client component also evaluates the execution policy during execution of the virtualized application. If the application virtualization client component determines that the execution policy is no longer satisfied, the application virtualization client component unpublishes the virtualized application, thereby preventing execution of the virtualized application.
Abstract:
A gas system for a firearm having a gas block coupled to a barrel with a gas capture port in communication with a barrel gas port. A sleeve removeably mounted inside the gas block has: a gas conduit; a seat near the gas conduit; a projection; and a rod conduit communicating gas through the projection. A rod movably mounted in the gas block has a cup fitting over the projection.A valve has a knob coupleable to the gas block and a plug moveable within the pressure sleeve with a plunger engageable with the seat to adjust gas flow through the gas conduit to the rod conduit. Gas discharged from a fired cartridge flows against the cup to drive the rod to reload the firearm. The plug is moveable by the knob to a plurality of positions to alter the gas conveyed to the rod.
Abstract:
Embodiments of the present invention provide an approach for configuring virtual machine (VM) images in a networked computing environment (e.g., a cloud computing environment). Specifically, in a typical embodiment, a provided VM image is associated with a set of competing VM images (e.g., via a web-based portal). Once the competing VM image(s) are associated with the provided VM image, a designation of a set of statistical actions can be designated for the provided VM image. Thereafter, a performance of the provided VM image and a performance of each of the set of competing VM images are monitored with respect to a set of predetermined attributes. This allows the performance of the provided VM image to be compared to the performance of each of the set of corresponding VM images. Based on the comparison, at least one of the set of statistical actions can be performed. In a typical embodiment, a statistical action may result in an adjustment (upward or downward) of a value of an attribute of the provided VM image where the performance of the provided image is either under-performing or over-performing with respect to a competing VM image. For example, if the provided image is performing at a speed that is a certain percentage lower than that of its competitors, the speed can be increased by a predetermined amount/percentage.
Abstract:
An antenna tower is provided having one or more antennae at the removed end thereof, which tower is configured for ease of maintenance of the antenna by a serviceman standing on the ground and servicing the antenna. Applicants' antenna tower includes a fixed vertical base or mast tube, fixed to the ground and having a removed end. At or near the removed end of the base tube, a swing tube is pivotally attached. The swing tube has a first end removably coupled to a near end of the base tube, and a removed end extending beyond the removed end of the base tube. Attached to the removed end of the swing tube is a pivotally mounted configured member or pivot tube. The pivotally mounted elongated member receives an antenna thereupon. The pivot tube is removably coupled to the swing tube to allow the pivot tube to rotate.
Abstract:
Embodiments of the present invention provide an approach for identifying optimal virtual machine (VM) images in a networked computing environment (e.g., a cloud computing environment). Specifically, in a typical embodiment, a set of system requirements, a profile, and a performance state of the networked computing environment are received as input and analyzed against a library of VM images. Based on the analysis, a set of VM images having software programs (e.g., also referred to herein as a software stack) capable of accommodating requirements defined by the input is identified. A requester can select one or more of the identified VM images, which can then be provisioned/deployed accordingly.
Abstract:
A system for securing information. The system includes a first tracking device associated with an object or an individual. In one embodiment, the first tracking device generates independently a synchronous secret key and a server generates independently the synchronous secret key. Over an insecure communication channel, the server communicates an asynchronous vector pair encrypted with the synchronous secret key with the tracking device. To securely communicate information, messages are encrypted and decrypted using the asynchronous vector pair between the tracking device and the server. To further secure message information, a set of random numbers may be further utilized with the asynchronous vector pair to further encrypt and decrypt the messages communicated between the tracking device and the server.
Abstract:
A non-metallic fuel tank includes a non-metallic tank body, at least one coupling device or mounting system for coupling the non-metallic tank body to a bed of a truck or to a trolley, and a fuel fill opening. A grounding wire may be coupled to the non-metallic tank as well as a fuel line connector which is also coupled to the existing fuel system of a truck. A mounting system for a non-metallic fuel tank includes two rear toe clamps and two front mounting assemblies which include a front mount base and an angle iron coupled together. A portable fuel tank includes a non-metallic tank body and a trolley coupled to the tank body. The trolley includes a base, a mounting system for coupling the non-metallic tank body and the base, at least one handle and at least one wheel.
Abstract:
A work machine includes a fluid circuit for use with an attachment configured to operate using one of a uni-directional flow and a bi-directional flow through the attachment. An operator-enabled mode selection switch operably connects to a controller. An electrical circuit includes the operator-enabled mode selection switch and a second operator-enabled switch. A first control valve is in fluid communication with the attachment. In response to the mode selection switch being operator-actuated to a bi-directional mode setting, the first control valve via the controller is actuatable to one of the bi-directional positions, electrical power being unavailable to the second operator-enabled switch of the electrical circuit. In response to the mode selection switch being operator-actuated to a uni-directional mode setting, the first control valve via the controller secures the first control valve in the uni-directional position, and electrical power is provided to the second operator-enabled switch of the electrical circuit.
Abstract:
The present invention relates to wire bending system for a hand tool for forming a controlled bend in a wire. The tool has a wire bending system engaged with a hand tool. The wire bending or shaping system may be open or enclosed, and optionally permits bending in a direction that is perpendicular or coaxial to an axis of a hand tool. The wire bending system may be at either side of the hand tool. A pin may be used to additionally aid bending. The hand tool is provided with a plurality of first and second operably engaged housings for securing a number of tool bits members.