摘要:
A support rail assembly for positioning work-related accessories adjacent a worksurface such as a table. The rail assembly includes a horizontally elongated rail supported in upwardly spaced relationship from the worksurface by a support arm or stanchion. The rail defines therein an elongate slot which permits the mounting of accessories in various positions on the rail which are convenient to the user. The rail is supportable from either the rear edge of a worksurface or may be cantilevered forwardly from a wall adjacent the worksurface or from a wall panel to which the worksurface is attached.
摘要:
A support rail assembly for positioning work-related accessories adjacent a worksurface such as a table. The rail assembly includes a horizontally elongated rail supported in upwardly spaced relationship from the worksurface by a support arm or stanchion. The rail defines therein an elongate slot which permits the mounting of accessories in various positions on the rail which are convenient to the user. The rail is supportable from either the rear edge of a worksurface or may be cantilevered forwardly from a wall adjacent the worksurface or from a wall panel to which the worksurface is attached.
摘要:
A rail-mounted hanging file arrangement includes a generally horizontally elongated rail which is supported in upwardly spaced relationship from the worksurface so as to extend generally along but above the rear edge thereof. The rail defines therein a longitudinally elongated slot which opens forwardly of the rail, and a file hanging frame is releasably attached to the rail at substantially any position therealong so that the frame is carried entirely by the rail and projects rearwardly a small distance therefrom to permit conventional hanging type files to be stored just rearwardly of the rail adjacent the rear edge of the worksurface. The file hanging frame includes a pair of generally parallel side legs which are spaced so as to permit a plurality of hanging files to be suspended therebetween, and the hang tabs provided on opposite ends of the files can engage the side legs. These side legs of the file hanging frame at their front ends fixedly join to front legs which project downwardly and also slope inwardly in converging relationship with one another. The front legs at the lower ends thereof respectively join to securing legs of short extent which are insertable into the slot of the support rail to fixedly but releasably secure the frame to this support rail.
摘要:
A computer system may be configured with software that performs an automated process for identifying intellectual property likely to be owned by a specified entity. The process may include receiving information indicative of the identity of the specified entity. The process may include searching intellectual property ownership data for explicitly-owned intellectual property that is owned by the specified entity. The intellectual property ownership data may be indicative of the identity of intellectual property owned by various entities. The process may include identifying characteristics of the explicitly-owned intellectual property, other than the identity of the specified entity. The process may include searching intellectual property characteristics data for implicitly-owned intellectual property that is implicitly owned by the specified entity by searching the intellectual property characteristics data for intellectual property having one or more of the characteristics of the explicitly-owned intellectual property, other than the identity of the specified entity. The intellectual property characteristics data may be indicative of characteristics of various intellectual property. The process may include generating a report identifying the implicitly owed intellectual property.
摘要:
A system and method distributed enterprise security, comprising, a security control module (SCM) operable to accept information, wherein the information include one or more of: a policy and configuration information at least one security service module (SSM) operable to accept the information from SCM at least one security service providers coupled to the at least one SSM, wherein the at least one security service providers is cable of at least one of, authentication of a user, determining if access to a resource is permitted based on the information, auditing of a security decision, and mapping an authenticated identity to a set of credentials to be used to authenticate a target resource, and wherein the information accepted by the SCM is relevant to one or more of the at least one SSMs.
摘要:
A system and method for a distributed system for controlling access to a first resource in a hierarchy of resources, comprising, a distributor located on a first server and capable of distributing to a second server a first policy for the first resource, a security service module (SSM) located on the second server and capable of managing based on the first policy conditions for access to at least one of: the first resource and a second resource that is hierarchically inferior to the first resource, and wherein the first policy can be overridden by a second policy wherein the second policy specifies conditions for access for a resource that is hierarchically inferior to the first resource.
摘要:
A computer system may be configured with software that performs an automated process for identifying at least potions of the likely employment history of a specified individual. The process may include receiving information indicative of the identity of the specified individual. The process may include searching patent inventor data for patents and/or patent applications that list the specified individual as an inventor. The patent inventor data may be indicative of the inventors of patents and/or patent applications. The process may include searching patent ownership data for owners to whom the specified inventor has transferred the patents and/or patent applications. The patent ownership data may be indicative of owners to whom inventors have transferred their interests in patents and/or patent applications. The process may include generating a report listing the owners in association with the specified individual.
摘要:
Thermoplastic compositions that reflect ultraviolet light are provided herein, along with articles of manufacture and methods of fluid purification using the same. The thermoplastic compositions preferably comprise a suitable thermoplastic material and microparticles of UV reflective material, such as aluminum or stainless steel. The thermoplastic compositions are useful, for example, in forming articles of manufacture comprising a UV reflective surface that are suitable for use in a water treatment system in connection with a UV light source.
摘要:
A method for delegating enterprise security capabilities, comprising, providing a capability for a first user, wherein the capability can be expressed as a policy, delegating the capability from the first user to a second user, wherein the second user is allowed to have the capability only at times when the first user is allowed to have the capability, and wherein the delegated capability is propagated in a distributed enterprise security system.