摘要:
A method and system for a client application (1) to request a data item from an access server (3) in a computer controlled control system. The control system includes objects and a plurality of access servers, which said objects represent various entities that have a defined functional meaning in the control system. Each access server, such as an OPC server, may provide access to one or more real-time data, historical data, and alarm and event data items. In an embodiment the method provides means, which enables the Access Service Handler (2) component, by querying a said object, to obtain a reference for a desired data item, to find out which access server handles the said data item. The Access Service handler then makes request to the identified access server.
摘要:
A computer-implemented method for the replacement of equipment in a process control system for an industrial plant, in which a replacement operation is conducted at least in part by means of a first software application component for conducting e-procurement operations whereby one or more replacement devices complying with a defined specification may be procured from one or more external suppliers, which component is functionally linked with at least one second software application component for managing runtime operational data associated with said equipment, such that e-procurement operations may be initiated via said at least one second software application component.
摘要:
A method and system for a client application (1) to request a data item from an access server (3) in a computer controlled control system. The control system includes objects and a plurality of access servers, which said objects represent various entities that have a defined functional meaning in the control system. Each access server, such as an OPC server, may provide access to one or more real-time data, historical data, and alarm and event data items. In an embodiment the method provides means, which enables the Access Service Handler (2) component, by querying a said object, to obtain a reference for a desired data item, to find out which access server handles the said data item. The Access Service handler then makes request to the identified access server.
摘要:
A method and arrangements in a computerized system for control operations is disclosed. The computerized is adapted for processing data associated with real world entities based on objects representing the real world entities. In the method at least one formal instance is created, the at least one formal instance containing information regarding instantiation of at least one object. At least one formal instance is associated with one or more formal instances or groups of formal instances based on information of the type of said at least one object or the at least one formal instance.
摘要:
A computer-implemented method for the replacement of equipment in a process control system for an industrial plant, in which a replacement operation is conducted at least in part by means of a first software application component for conducting e-procurement operations whereby one or more replacement devices complying with a defined specification may be procured from one or more external suppliers, which component is functionally linked with at least one second software application component for managing runtime operational data associated with said equipment, such that e-procurement operations may be initiated via said at least one second software application component.
摘要:
A method of integrating an application in a computerized system for representing a real world object, and a system employing the method. The real world object may be any object, device, process or item of equipment, including equipment in industrial or commercial installation or process, in any location. The real world object is represented as an object, called a Composite Object, in a part of a computer program. The invention also includes Aspects which represent the data and/or operations of a Composite Object. The Composite Object is a container holding at least one Aspect representing data for the real world object. The Composite Object includes at least one interface for use by another object which interface is implemented by the Aspect System and accessed through an object Request Broker, that complies, for example, with COM. The principal advantage of the method and system is that applications within the system do not require prior information about other objects or applications included in the system. Modular and simplified expansion of the system is enabled, together with the later integration of applications not specified at the time of designing the system.
摘要:
An exemplary system and method for testing the configuration of a computer system includes detecting a function which is executed by the computer system; and testing whether the detected function contravenes a configuration rule of the computer system.
摘要:
A software object is positioned in structures, such as a functional structure, location structure and order structure, where each structure consists of a hierarchy of software objects. In each structure the software object inherits security from other software objects in the hierarchy. Since the software object is inserted into multiple hierarchical structures the security of the software object is inherited from software objects in multiple hierarchical structures. The user authority to interact with a software object is, in addition to the identity of the user logged in, dependent on the inherited security of the software object. As a software object is inserted, deleted and moved in a hierarchical structure the security of the software object changes.
摘要:
Exemplary systems and methods for installing and configuring a computer include stipulating configuration rules and transmitting all programs to be installed to the memories of the computers of the computer system, selecting and executing functions which are intended to be executed by the computer system, in a sequence, and checking to determine whether a running function which is currently being executed contravenes a configuration rule.