摘要:
The present invention relates to methods of implementing an optical element having a refraction modulating composition. The methods include using a wavefront sensor to provide an optical measurement of the optical element. The present invention also relates to systems comprising an optical element having a refraction modulating composition and a wavefront sensor.
摘要:
System and method for managing the configuration of resources in an enterprise. Embodiments of the present invention gather, store, and maintain institutional knowledge of configurations of IT resources of an enterprise. A configuration database serves as a temporal record of the configurations of the resources. The configuration database can reflect a dimensional model of the enterprise configuration where various configuration items are linked together. A configuration change can be analyzed and approved, and then reflected in a change to a configuration item (CI) which imposes an appropriate change to other configuration items based on upstream, downstream, peer relationships and/or views. A system according to an embodiment of the invention can also include a change database, an inventory database, a problem database, and/or a service level management subsystem to ensure changes to an enterprise's configuration are consistent with service level agreements and/or operating level agreements.
摘要:
Composition for inhibiting the ability of mosquitoes to locate a target by olfactory emissions of the target comprise a composition of at least one inhibiting compound selected from the group consisting of 3-methyl-1-alkene-3-ols of the formula: and 3-methyl-1-alkyn-3-ols of the formula: wherein R1 and R2 are each independently a saturated or unsaturated aliphatic hydrocarbon group containing from 1 to about 12 carbon atoms, in a vehicle base that is a porous or waxy medium. The composition being capable of dispensing the inhibiting compound in an non-lethal amount effective to inhibit the ability of mosquitoes to sense a target in a three dimensional environmental space.
摘要:
A transfer client system exchanges files with a transfer server over an open network such as the Internet. The transfer client comprises an upload directory for storing files for subsequent transfer to the transfer server, an authentication registry securely storing authentication credentials, and a transfer client. The transfer client sends a log-on message to a remote transfer server over a secure transport protocol logical connection established over the open network. The log-on message includes the authentication credentials. In response the transfer client receives a session ID from the remote transfer server. The transfer client then sends a read event message to the remote transfer server which includes Session ID obtained from the remote transfer server. In response the transfer client obtains event parameters which include identification of a file name and an upload directory path previously stored in an events parameter table. The transfer client searches the upload directory and makes a file upload method call included within a Simple Object Access Protocol message over a secure transport layer logical connection over the open network to provide, to the transfer server, the binary contents of a file matching the file name and located in the upload directory.
摘要:
A microstrip slot dipole antenna of the inverted F type, includes a coplanar feed, and is suitable for easy peel-and-stick adhesive mounting. The antenna includes a ground plane, a dielectric layer, a horizontal element and a pair of spaced apart vertical elements depending therefrom defining an inverted F antenna above the ground plane with the dielectric layer therebetween. The pair of vertical elements may be conductive vias. A first antenna feed point is on an upper surface of the horizontal element, and a second antenna feed point is on an upper surface of a second vertical element of the spaced apart vertical elements. The second feed point may be a conductive pad on the dielectric layer spaced apart from a first vertical element and insulated from the horizontal element.
摘要:
A container assembly (10) comprises a vessel (21) for containing a biological medium, gametes and/or one or more embryo(s). The vessel (21) has a CO2 permeable seal (28) and a closure device (30) for selective access. A buffer chamber (60) for a CO2 enriched atmosphere at least partially surrounds the vessel and is defined by a shell (61). The buffer chamber is in communication with the CO2 permeable wall. Such a container assembly is particularly adapted for IVC in which case the permeable seal (28) prevents ingress of vaginal secretions. The buffer chamber (60) mediates the aqueous pH in the vessel after the container assembly is removed from a CO2 enriched environment.
摘要:
A system provides for the secure exchanging files with a remote transfer server over an open network such as the Internet. The system comprises a database with file transfer tables, a hypertext transport protocol (HTTP) server, and a web services server. The HTTP server is coupled to the database and provides web pages to an HTTP client to obtain file transfer event parameters and identification of a remote file transfer client to which the file transfer event parameters are associated. The file transfer event parameters are stored in the file transfer tables in association with the identification of the remote file transfer client. The web services server comprising a plurality of transfer methods. The transfer methods comprises: i) a method for associating a remote transfer client with a session ID; ii) a method for providing to the remote transfer client the file transfer event parameters that are associated with the remote transfer client in response to receiving a method call from the remote transfer client; and ii) a method call for executing a file exchange with the remote transfer client in response to receiving a method call from the remote transfer client that includes the file transfer parameters.
摘要:
The discone antenna includes a conical antenna element, having an apex, and a disc antenna element adjacent the apex of the conical antenna element. An inverted antenna feed structure, such as a flanged coaxial connector or coaxial cable, is connected to the disc and conical antenna elements and extends outwardly from the disc antenna element on a side thereof opposite the apex of the conical antenna element. The discone antenna with such an inverted feed structure facilitates an inverted positioning, for example, on vehicles, rooftops and/or control towers, etc., that will increase the bandwidth pattern in the direction of the potential target.
摘要:
A web server system provides for the secure exchanging files with a remote transfer server over an open network such as the Internet. The transfer server operates a plurality of transfer methods. Exemplary transfer methods comprise: i) a log-on method comprising steps for returning a session ID to an authenticated transfer client; ii) an active event keys method comprising steps for returning each of a plurality of event keys associated with the transfer client; iii) a read event method comprising steps for returning event parameters associated with an event key, iv) an upload method comprising steps for receiving and storing a binary object in an object storage and associating the binary object with an object ID value in an ownership table; v) a process binary object method comprising steps for determining data elements within the binary contents of the file an loading the data elements into an application table in accordance with the loading rules; and vi) a set owner method comprising steps for associating the identification of a second transfer client with the object ID value in the ownership table.
摘要:
System and method for facilitating the implementation of changes to the configuration of resources in an enterprise. Embodiments of the present invention facilitate the use of historical information about an enterprise's IT configuration to evaluate the risk and impact of proposed changes. Risk can be evaluated using a success history for an organization within the enterprise that is responsible for the proposed change, or by applying a neural network to the historical data to detect recognizable patterns in the historical data. A risk evaluation can take into account sensitivity of the change to dates assigned on a change calendar, based on sensitivity dates gathered from the historical data. Historical data can be maintained and provided by a configuration database.