摘要:
The present invention relates to heat and storage stable vinyl polymer polyol secondary dispersions containing A) at least one vinyl polymer resin having functional groups selected from hydroxyl, carboxyl and/or sulfonic acid groups and dispersed in a water/solvent mixture in the presence of a neutralizing agent, and B) at least one amphiphilic polymer built up from a hydrophobic and a hydrophilic segment. The invention also relates to a process for the preparation of the vinyl polymer polyol secondary dispersions by preparing vinyl polymer resin A) by polymerizing a mixture of ethylenically unsaturated monomers a) in the presence of an initiator b) in a water/solvent mixture and adding at least one amphiphilic polymer B), then at least partly neutralizing and dispersing the resulting product, optionally after the addition of a further amount of water.
摘要:
This invention relates to compositions comprising a polyisocyanate having ionic groups or polyether groups and at least one member selected from the group consisting of a naturally occurring polymer, a polysiloxane graft copolymer, a water-dilutable synthetic polymer and a cationic polymer or a naturally occurring polymer and at least one member selected from the group consisting of a polysiloxane graft copolymer, a water-dilutable synthetic polymer and a cationic polymer.
摘要:
A method for protecting the integrity of a set of memory pages to be accessed by an operating system of a data processing system, includes running the operating system in a virtual machine (VM) of the data processing system; verifying the integrity of the set of memory pages on loading of pages in the set to a memory of the data processing system for access by the operating system; in response to verification of the integrity, designating the set of memory pages as trusted pages and, in a page table to be used by the operating system during the access, marking non-trusted pages as paged; and in response to a subsequent page fault interrupt for a non-trusted page, remapping the set of pages to a region of the data processing system memory which is inaccessible to the virtual machine.
摘要:
A method for protecting the integrity of a set of memory pages to be accessed by an operating system of a data processing system, includes running the operating system in a virtual machine (VM) of the data processing system; verifying the integrity of the set of memory pages on loading of pages in the set to a memory of the data processing system for access by the operating system; in response to verification of the integrity, designating the set of memory pages as trusted pages and, in a page table to be used by the operating system during the access, marking non-trusted pages as paged; and in response to a subsequent page fault interrupt for a non-trusted page, remapping the set of pages to a region of the data processing system memory which is inaccessible to the virtual machine.
摘要:
A method of estimating power consumption of one or more network connected devices configured within an information technology (IT) architecture includes monitoring network events occurring within the IT architecture over a defined time period; correlating the monitored network events with predetermined power profile operating point data associated with the one or more network connected devices, wherein the power profile operating point data is based on possible network event occurrences within the IT architecture; and based on the correlating, generating an estimated energy usage of the one or more network connected devices for the defined time period.
摘要:
Cellulose-containing, optionally wood-containing materials which have been obtained using water-dispersible polyisocyanates which in turn have been prepared by reaction of the following starting components:a) modified polyisocyanates of the formula (I) ##STR1## in which: R.sup.1 denotes an aliphatic hydrocarbon radical having 2 to 18 carbon atoms; a cycloaliphatic hydrocarbon radical having 4 to 15 carbon atoms; an aromatic hydrocarbon radical having 6 to 15 carbon atoms or an araliphatic hydrocarbon radical having 8 to 15 carbon atoms,R.sup.2 denotes an aliphatic hydrocarbon radical which has 10 to 35 carbon atoms and optionally contains double bonds,R.sup.3 denotes a hydrocarbon radical which is at least divalent and can also be heterocyclic, with inclusion of the ester oxygen or amide nitrogen from X, ##STR2## where R.dbd.H or C.sub.1 -C.sub.4 -alkyl, or R is a constituent of a cyclic structure,n denotes a number .gtoreq.2 and y denotes a number .gtoreq.1,b) non-modified polyisocyanates,c) polyethylene oxide polyether alcohols optionally containing ester groups,d) optionally cycloaliphatic and/or aliphatic amines which optionally contain ether, ester or amide groups, have at least one functional group which is reactive towards isocyanates and contain at least one tertiary amino group and/or ammonium group.
摘要:
The present invention relates to a single-stage process for the preparation of polyisobutylene carboxylic acids from isobutylene-diene copolymers, which are optionally crosslinked or branched by means of a diolefine in the known manner, by reaction with ozone in the presence of a solvent.
摘要:
Mechanisms are provided for automatic address range detection for an IP network. Flow data is obtained comprising the source or destination IP addresses for the flow and one of: the other of the source or destination IP addresses; or direction data identifying the flow direction across the network boundary. A tree is generated representing IP addresses in the flow data. IP addresses with initial portions in common are represented in the tree with a node in common. Weights are assigned to nodes in the tree based on occurrences of the represented IP addresses in the flow data. The IP address range of the network is detected by identifying, based on the assigned weights, the node associated with the last initial address portion common to all IP addresses in the network. A device is automatically configured with the IP address range to differentiate IP addresses inside and outside the network.
摘要:
A method, article of manufacture, and system for indicating underutilized network devices that provide services in a data communications network. The method includes: receiving network traffic data; filtering the network traffic data to eliminate data for predefined connections; producing, from the filtered network traffic data, a graph representing a connection between a first device and a second device within the data communications network; analyzing the graph to identify a set of interconnected nodes that is outside the data communications network; and indicating an underutilized network device by producing an output dependent on traffic rate data associated with a link to the identified set of interconnected nodes that is outside the data communications network.