摘要:
The invention is directed to techniques for monitoring and testing publish/subscribe network systems. For example, an enterprise network that has a number of geographically dispersed network devices and interconnected sub-networks may be configured to operate as a publish/subscribe network system in which each of the dispersed network devices sends and receives messages for specific groups of the network devices. The techniques described herein enable data object capture and analysis in the application layer of a publish/subscribe network system using shim adapters. The techniques also enable network packet capture and analysis in the network layer of a publish/subscribe network system. Furthermore, the techniques include integrated analysis of testing results from the application layer and the network layer to determine performance characteristics, such as latency, across both of the layers. In this way, the techniques provide more accurate measurements of performance characteristics in publish/subscribe network systems.
摘要:
An assay test device comprises a cup container having a detachable top cover that has a volume-reducing internal structure. A pocket shaped and dimensioned to nest a chromatographic test strip cartridge is mounted against a flattened transparent portion of the cup side wall. The cartridge is held in a vertical position with an aperture near the top edge of the cup. A splash shield projects for the brim region of the cup over that aperture preventing any part of the sample fluid poured into the cup from entering the cartridge and contacting the test strips prematurely. When the lid is installed and the cup flipped upside-down, the internally projecting structure raises the level of sample fluid for better access to the cartridge aperture. The structure can be adapted to extend all the way through the inside of the cup to contact its closed bottom. A central cavity in the structure having a open end captures a small volume of fluid and preserves it for later confirmatory analysis. In one embodiment of the invention the central cavity is created by a well secured to the bottom of the cup that is telescopically engage by a cap secured to an undersurface portion of the internally projecting structure.
摘要:
Methods, systems, devices and computer programs for configuring nodes on a wireless network can include generating a security key for the network, setting the security settings on the access point based on the security key, and saving the security key in a profile data file on a removable memory device along with a portable configuration utility for using the profile data file for configuring other nodes on the network. The removable memory device can then be inserted into other nodes and the portable configuration utility can be run to match the same key on the other network nodes based on the information stored in the profile data file on the removable memory device.
摘要:
A Universal Serial Bus (USB) modem/Wireless Wide Area Network (WWAN) device is provided that when connected to a host device, presents itself as an Ethernet endpoint to the host device, without requiring additional software/drivers to be downloaded to the host device. Embedded in the USB modem/WWAN device are various modules that provide functionality allowing either automatic connection to the Internet or redirection to a local Web User Interface (UI) that a user may employ to configure the USB modem/WWAN device and/or manually connect to the Internet. Additionally, the USB modem/WWAN device employs predetermined rules to determine whether or not/how the redirection occurs, including in scenarios where wireless connectivity to the Internet is unavailable.
摘要:
An apparatus comprises a first interface module configured to interface with one or more user devices through a wireless local area network (WLAN) connection; a second interface module configured to interface with a wireless communication network through a wireless wide area network (WWAN) connection; and a controller. The controller is configured to detect availability of carrier hotspots; if no carrier hotspot is detected, route traffic to and from the one or more user devices through the WWAN connection; and if a carrier hotspot is detected, route traffic to and from the one or more user devices through the detected carrier hotspot.
摘要:
A method for conducting encrypted communication in a network and a network having a plurality of nodes organized into a plurality of groups which initiates encrypted communication between a first one of the plurality of nodes of a first one of the plurality of groups and a second one of the plurality of nodes of the first one of the plurality of groups different from the first one of the plurality of groups using a group key and initiates encrypted communication between a third one of the plurality of nodes of the first one of the plurality of groups and a fourth one of the plurality of nodes of a second one of the plurality groups different from the first one of the plurality of groups using a session key.
摘要:
An apparatus comprises a first interface module configured to wirelessly interface with one or more user devices; a second interface module configured to interface with a wireless communication network; and a controller. The controller is configured to detect a signal received through the second interface module, the signal including a command; and execute the command. Executing the command causes one or more components of the apparatus to exit a power conservation mode and enter a full operation mode.
摘要:
A two-way wireless communication system comprises a central authority in communication with a plurality of client devices via both a circuit switched data communication system and a packet switched data communication system. The packet switched communication system can assign packet switched network addresses to the client devices dynamically. Therefore, the central authority can be configured to send a circuit switched message, through the circuit switched data network, to a client device requesting the client device to register with the central authority through the packet switched data network
摘要:
A network is audited by running task programs and evaluating the results of the task programs. Task programs are tools that are configured to retrieve information about a particular network device. A service is arranged to coordinate the scheduling, execution, and data collection and aggregation of each task program over disparate networks such as multiple domains. Each task program executes at a scheduled time and provides results to a parser. The parser formats the results and provides the formatted data to the service. The service stores the collected data in a database. A client can schedule and/or review the results of audits by communicating with the service. The collected data can be compared and filtered according to rule-based templates that define acceptable network device configurations. Reports can be generated based on the templates such that a client can evaluate results from task programs executed over the entire network.
摘要:
A system and method are provided by which a user, at a client workstation, can efficiently, simply and effectively manipulate, and specifically crop, a high resolution image that has been scanned and/or otherwise stored in a server with which the client worksation is in web-based communication. The disclosed system and method reduce and/or eliminate the need to transfer a file containing a full high resolution image from the server to the client workstation across a web-based data transfer network. A cropping request may be generated by a user via a client workstation and only that request may be transferred to, and implemented through, the server, eliminating significant data transfer requirements regarding the transfer of the extremely large files associated with high resolution images required of conventional cropping methods. An addition advantage is reduction and/or elimination of a need for sophisticated image display and processing software to reside within each client workstation.