Abstract:
A system and method for holding, transporting, and tracking electronically tagged objects maintained in a portable carrier housing includes a locking mechanism for enabling limited authorized access using a proximity sensor recognizing an identity code of an authorized user, a location tracker for detecting the location of the portable carrier, and an inventory logger registering placement and removal of the electronically tagged objects within and out of the portable carrier housing, registering the location of the portable carrier housing at a time of placement or removal of the electronically tagged object, and registering the identity code of the authorized user within proximity of the proximity sensor. The system further includes a transmitter for uploading data from the inventory logger to a database and a receiver for at least receiving instructions for locking the portable carrier housing when detecting an attempted unauthorized access or detecting a condition indicative of unauthorized access.
Abstract:
An object tracking module establishes relationships between different types of data objects associated with application programs while a particular activity occurs. Contextual information associated with the data objects and the activity is collected to establish the relationship. The contextual information may include data objects that are accessed or created while the activity is in progress, or any other information associated with the activity. When an event related to the activity occurs, the object tracking module locates data relevant to the event based on the established relationships. The relevant data is presented in the same information space where the event occurs. A user may easily access the relevant information without manually searching for the data. The object tracking module may determine the degree of relevance between the data objects and the event such that only the most relevant objects are displayed.
Abstract:
Many different users may access, revise and update the same shared object simultaneously through several different transports. Clients may communicate asynchronously by accessing the shared object through a physical server. Clients may also communicate synchronously by accessing the shared object through a peer-to-peer network. A manifest file associated with the shared object identifies the locations where other versions and instances of the shared object are stored. The shared object and the associated manifest file allow a client to transition seamlessly between local access, synchronous and asynchronous communication such that the user is not aware that the mode of communication has changed. A user may change location and any available data sharing transports are automatically identified. Thus, the user may access a shared object and collaborate with other authorized users through different mechanisms.
Abstract:
Many different users may access, revise and update the same shared object simultaneously through several different transports. Revisions to the shared object are automatically synchronized such that all users can view the revisions to the shared object. Conflicting revisions are reconciled and merged into a current version of the shared object. A client may request the current version of the shared object from a store when the current version of the shared object is not available from the store. The current version of the shared object is synchronized with the client when the store receives the current version of the share object.
Abstract:
An auxiliary system for cooling a spent nuclear fuel pool through a submersible heat exchanger to be located within the pool. In each train or installation, a single loop or series of loops of cooling fluid (e.g., sea water or service water) is circulated. The system is modular, readily and easily installed during an emergency and can be self operating with its own power source. Multiple trains may be used in parallel in order to accomplish the required degree of spent fuel pool cooling required.
Abstract:
Notes may be shared in an online meeting with online meeting attendees through a software application associated with organizing an online meeting, for example, online meeting software, calendaring software, note-taking software, or the like. Notes may be created and/or shared before, during, and/or after the online meeting by meeting attendees. Meeting attendees may be notified when notes are shared for the online meeting. Notes may be shared with items of the software application associated with organizing the online meeting. For example, notes may be shared in online meeting software with the online meeting. Notes may be shared among items of different software applications, for example, notes shared in the online meeting software may be automatically shared with a calendar item in a calendaring software application.
Abstract:
A device is disclosed for grinding reel type mower bedknives and blades of rotary type and reel type mowers. The device is capable of manually relief grinding reel blades on an intact mower, and in various stages of disassembly, to a bare reel stripped of its housing, with virtually any relief angle. The device can manually and semiautomatically spin grind a reel type mower reel while the reel is attached to the complete mower or if the reel and supporting structure are removed to a bench, with no further disassembly required. The device can manually grind the front face of a reel type mower bedknife while the bedknife remains attached to the reel housing and can grind the front and top face of a bedknife when it is removed. It can also grind rotary type blades and a variety of other straight edged tools.
Abstract:
Notes may be shared in an online meeting with online meeting attendees through a software application associated with organizing an online meeting, for example, online meeting software, calendaring software, note-taking software, or the like. Notes may be created and/or shared before, during, and/or after the online meeting by meeting attendees. Meeting attendees may be notified when notes are shared for the online meeting. Notes may be shared with items of the software application associated with organizing the online meeting. For example, notes may be shared in online meeting software with the online meeting. Notes may be shared among items of different software applications, for example, notes shared in the online meeting software may be automatically shared with a calendar item in a calendaring software application.
Abstract:
Many different users may access, revise and update the same shared object simultaneously through several different transports. Clients may communicate asynchronously by accessing the shared object through a physical server. Clients may also communicate synchronously by accessing the shared object through a peer-to-peer network. A manifest file associated with the shared object identifies the locations where other versions and instances of the shared object are stored. The shared object and the associated manifest file allow a client to transition seamlessly between local access, synchronous and asynchronous communication such that the user is not aware that the mode of communication has changed. A user may change location and any available data sharing transports are automatically identified. Thus, the user may access a shared object and collaborate with other authorized users through different mechanisms.
Abstract:
Many different users may access, revise and update the same shared object simultaneously through several different transports. Clients may communicate asynchronously by accessing the shared object through a physical server. Clients may also communicate synchronously by accessing the shared object through a peer-to-peer network. A manifest file associated with the shared object identifies the locations where other versions and instances of the shared object are stored. The shared object and the associated manifest file allow a client to transition seamlessly between local access, synchronous and asynchronous communication such that the user is not aware that the mode of communication has changed. A user may change location and any available data sharing transports are automatically identified. Thus, the user may access a shared object and collaborate with other authorized users through different mechanisms.