摘要:
This application relates in general to a method, apparatus, and article of manufacture for providing secure and redundant communications and processing for a collection of Internet of Things. An extreme way of providing high availability network functionality would be to duplicate every component of the network in a High Availability (HA) style cold standby mode. As long as there is some component, even one that is already in use performing other functions in the IoT network that can pinch hit for the failing component, then uptime can still be achieved and in a more cost effective way than completely duplicate HA fashion.
摘要:
A dryer configured to dry agricultural or non-agricultural products is provided. The dryer may include a unitary source plenum that supplies air to compartments in which products are contained. Plenum conditioners may condition the air in the unitary source plenum through, for example, controlling the humidity, temperature, and flow rate of the air. Compartment conditioners may adjust the conditions of the air in each of the compartments. Thereby air may be efficiently pre-conditioned in the unitary source plenum, and then the conditions of the air may be adjusted to optimize drying of products in each of the compartments. Related methods are also provided.
摘要:
Trapping and/or processing of read/write accesses to hardware devices represented to the host through a memory mapped space may be performed without knowledge of the processor's instruction set or semantics of the processor's instructions. A single step routine may be executed to recognize page faults occurring from read/write accesses to emulated memory pages and causing the guest to retry the operation on a single step buffer. The hypervisor may perform post-operation processing on the single step buffer after the guest retries and completes the read or write access. For example, on a read request, the single step routine may place the guest value in the single step buffer for reading by the guest on a retry operation. On a write request, the single step routine may direct the guest to retry the write operation into the single step buffer. After the retry operation the single step routine may read the guest value from the single step buffer and place the guest value in a register of an appropriate emulated system.
摘要:
The Genetically Optimized Digital Ionospheric Sounding System (DISS) Transmit Antenna is a low-cost modification to the TCI 613F HF communications antenna that increases and stabilizes vertical gain from 4 to 30 MHz. Genetic algorithm and local search techniques were used in the design of the modification in order to take into account both electrical design and mechanical simplicity in this design. The novelty lies in the specific placement of conducting wires with respect to the original TCI antenna. This placement both increases the vertical gain of the antenna as a whole and adds to its stability as each wire also acts as a guy cable.
摘要:
The present invention provides systems and methods for allocating a pool of global memory among a set of client/servers so that storage volumes associated with a plurality of client/servers are each allocated a portion of the pool of global memory for caching of data from that volume. The amount of memory to be used for caching the volume's input/output operations (I/Os), the page size, the cache type, the cache replacement policy and the maximum cache read can be specified by volume. The amount of memory to be used for caching the volume's input/output operations, the cache type, the cache replacement policy and the maximum cache read I/O size can be changed dynamically by the changing volume-based attributes.
摘要:
An upright steerable vacuum cleaner is provided, which includes the use of a pivotable cylindrical motor housing, as well as a universal joint which is attached to the motor housing, such that twisting at the upper body of the vacuum cleaner clockwise causes the base of the unit to turn right, twisting in the opposite direction causes if to turn left.
摘要:
A punch press (20) having a worktable (40) for supporting a worksheet (21), a two axis positioning mechanism for positioning the worksheet under a punching head (34) and universal grippers (44, 46) supported on the worksheet positioning mechanism which can grip either the end or sides of a worksheet (21). The two axis positioning mechanism is formed from a carriage (42) which is movable along the worktable (40) and a cross slide (41) which is mounted from and movable across the carriage (42) to provide the two axis sheet positioning. The grippers (44, 46) are mounted from a T-slot (130) formed in the cross slide (41) and can be moved to different positions to accommodate various sheet sizes. Aligning pins (140, 142, 143, 144) which can be used for aligning worksheets are provided. Aligning pins (140, 142, 143, 144) during operation are retracted beneath the worktable (40).
摘要:
Item transport apparatus is described which finds particular application in a system for transporting and processing a variety of items or articles including mail pieces of the letter or flat variety. The processing of such items may entail the sorting, compact storing and retrieving thereof. In contrast to present day item transport apparatus in which the carrier devices themselves require an excessive volume to store the items being processed, the carrier of the invention retains the item in a sleeve of relatively thin semi-rigid material which adjusts substantially to the thickness of the item. Accordingly, depending upon the item itself, the overall thickness of the loaded carrier may be little more than that of the item and the storage efficiency is optimum.
摘要:
Methods and systems for securing memory within a computing fabric are disclosed. One method includes allocating memory of one or more host computing systems in the computing fabric to a partition, the partition included among a plurality of partitions, the computing fabric including a hypervisor installed on the one or more host computing platforms and managing interactions among the plurality of partitions. The method includes defining an address range associated with the memory allocated to the partition, receiving a memory operation including an address within the address range, and, based on the memory operation including an address within the address range, issuing, by the hypervisor, an indication that the memory operation is occurring at an encrypted memory location. The method also includes performing the memory operation, and performing an encryption operation on data associated with the memory operation.
摘要:
Methods and systems for securing memory within a computing fabric are disclosed. One method includes allocating memory of one or more host computing systems in the computing fabric to a partition, the partition included among a plurality of partitions, the computing fabric including a hypervisor installed on the one or more host computing platforms and managing interactions among the plurality of partitions. The method includes defining an address range associated with the memory allocated to the partition, receiving a memory operation including an address within the address range, and, based on the memory operation including an address within the address range, issuing, by the hypervisor, an indication that the memory operation is occurring at an encrypted memory location. The method also includes performing the memory operation, and performing an encryption operation on data associated with the memory operation.