摘要:
Certain example embodiments relate to a coated article including at least one infrared (IR) reflecting layer of a material such as silver or the like in a low-E coating, and methods of making the same. In certain cases, at least one layer of the coating is of or includes nickel and/or titanium (e.g., NixTiyOz). The provision of a layer including nickel titanium and/or an oxide thereof may permit a layer to be used that has good adhesion to the IR reflecting layer, and reduced absorption of visible light (resulting in a coated article with a higher visible transmission). When a layer including nickel titanium oxide is provided directly over and/or under the IR reflecting layer (e.g., as a barrier layer), this may result in improved chemical and mechanical durability. Thus, visible transmission may be improved if desired, without compromising durability; or, durability may simply be increased.
摘要:
Certain example embodiments relate to a coated article including at least one infrared (IR) reflecting layer of a material such as silver or the like in a low-E coating, and methods of making the same. In certain cases, at least one layer of the coating is of or includes nickel and/or titanium (e.g., NixTiyOz). The provision of a layer including nickel titanium and/or an oxide thereof may permit a layer to be used that has good adhesion to the IR reflecting layer, and reduced absorption of visible light (resulting in a coated article with a higher visible transmission). When a layer including nickel titanium oxide is provided directly over and/or under the IR reflecting layer (e.g., as a barrier layer), this may result in improved chemical and mechanical durability. Thus, visible transmission may be improved if desired, without compromising durability; or, durability may simply be increased.
摘要:
An activation mechanism for a reserve battery cell generally includes a housing with a chamber containing an electrolytic solution and a delivery device configured to discharge the electrolytic solution from the housing. The delivery device includes a compressed spring configured to be released in response to an external force to initiate the discharge of the electrolytic solution from the housing.
摘要:
Automatic configuration of devices upon introduction into a networked environment, can be implemented, for example, by having a device randomly generate a series of letters and/or numbers, e.g., generate a PIN (Personal Identification Number) that encodes temporary credentials that, in addition to proving ownership and/or control over the device by virtue of having access to the PIN, also allows creating a temporary secure communication channel based on the PIN over which permanent security credentials may be transferred to the device to facilitate provisioning it to securely communicate in the networked environment. In a wireless scenario, a unique SSID and encryption key (WEP or WPA) may be determined as a function of the PIN, where both the device and its access point utilize the PIN to establish a temporary secure communication channel. Various techniques may be used to establish ownership and/or control over the device to prevent inadvertent association of the device with a wrong networked environment.
摘要:
Automatic configuration of devices upon introduction into a networked environment, can be implemented, for example, by having a device randomly generate a series of letters and/or numbers, e.g., generate a PIN (Personal Identification Number) that encodes temporary credentials that, in addition to proving ownership and/or control over the device by virtue of having access to the PIN, also allows creating a temporary secure communication channel based on the PIN over which permanent security credentials may be transferred to the device to facilitate provisioning it to securely communicate in the networked environment. In a wireless scenario, a unique SSID and encryption key (WEP or WPA) may be determined as a function of the PIN, where both the device and its access point utilize the PIN to establish a temporary secure communication channel. Various techniques may be used to establish ownership and/or control over the device to prevent inadvertent association of the device with a wrong networked environment.
摘要:
Firmware-based conversion methods for storing converted firmware variables in a firmware storage device, such as flash memory. Under one method, “eager” compression of firmware is performed. In response to a storage request, a determination is made to whether a compressor is available. If it is, the firmware variable is stored in a compressed form in the storage device; if not, the firmware variable is stored in an uncompressed form. In response to a read request for a stored firmware variable, a determination is made to whether the variable is stored in a compressed or uncompressed form. If it is compressed, a decompressor is employed to return the variable to its uncompressed form prior to providing it to the requestor; already uncompressed variables are provided directly to the requester. An application program interface is provided to enable operating system runtime access to the firmware variables. Similar conversions may be employed separately or in parallel, including encryption.
摘要:
The present disclosure relates generally to indicating an end of life condition of an electrochemical device, and more particularly to systems and methods for sensing and determining an end of life condition in a cell comprising a high capacity cathode material suitable for use in a non-aqueous electrochemical cell. The high capacity cathode material has an amorphous or semi-crystalline form of copper manganese oxide, and optionally fluorinated carbon. The present disclosure additionally relates to transmitting the determined end of life condition to a user or monitoring device of the cell.
摘要:
A planning system and method is disclosed. The planning system includes at least one business rule remote from at least one client, a meeting editor, and at least one tracker communicatively connected to the meeting editor, wherein the at least one tracker tracks at least two data items selected from the group consisting of invitees to at least one of the at least one meetings, respondents to invitations to the meeting, at least one speaker of the meeting, at least one host of the meeting, finances of the meeting, and a venue of the meeting, and wherein the at least one tracker communicates the at least two data items with the meeting editor.
摘要:
A cash dispensing automated banking machine (10) includes a user interface (12) including an opening (20). Users of the machine deliver individual sheets and stacks of sheets to and from the machine through the opening. Stacks of sheets may include sheets such as notes, checks or other documents. Stacks input to the machine may include mixtures of various types of sheets. The machine operates to receive notes, process checks and perform other operations. Notes received in the machine may be recycled and dispensed to other users. Checks processed by the machine may be imaged by an imaging device, cancelled and stored in the machine or alternatively returned to a user.
摘要:
A system and method for charging a rechargeable, or secondary, battery including a series string of cells, includes a topology of charging sources that selectively provides charging current to cells that need to be charged, but avoids overcharging cells that are already charged above a predetermined voltage threshold. Based on individual cell voltage measurements, the charging current is controlled in a manner to direct charging current to the battery cell(s) needing charge until these cells are fully charged, and by-passes battery cells that are fully charged or become fully charged.