摘要:
A diffuser (3) for a fan (2) of axial, radial or diagonal type of construction, has an inlet opening (10) and having an outlet opening (20) for a gaseous medium which flows through a diffuser interior (I), which is enclosed by an outer housing (30), in an axially oriented main flow direction (S) from the inlet opening (10) to the outlet opening (20). The cross section of the diffuser interior (I) increases from the cross section (11) of the inlet opening to the cross section (21) of the outlet opening (20), wherein the outer housing (30) forms an outer diffuser part (AD) which delimits the diffuser interior (I) to the outside. Along the main flow direction (S), the cross section of the outer diffuser part (AD) changes from a circular cross section (31) at the inlet opening (10) to a non-circular cross section (32) at the outlet opening (20).
摘要:
A diffuser (3) for a fan (2) of axial, radial or diagonal type of construction, has an inlet opening (10) and having an outlet opening (20) for a gaseous medium which flows through a diffuser interior (I), which is enclosed by an outer housing (30), in an axially oriented main flow direction (S) from the inlet opening (10) to the outlet opening (20). The cross section of the diffuser interior (I) increases from the cross section (11) of the inlet opening to the cross section (21) of the outlet opening (20), wherein the outer housing (30) forms an outer diffuser part (AD) which delimits the diffuser interior (I) to the outside. Along the main flow direction (S), the cross section of the outer diffuser part (AD) changes from a circular cross section (31) at the inlet opening (10) to a non-circular cross section (32) at the outlet opening (20).
摘要:
A virtual machine monitor provides a trusted operating environment for a software usage metering application when a qualified virtual machine monitor is loaded as part of trusted boot and when all other programs and operating systems run in containers managed by the virtual machine monitor. The virtual machine monitor may also host a locking application for limiting the functionality of the computer if contractual terms of use are not met. Both the metering and locking applications run at a higher privilege level than ring 0, at the same level as the virtual machine monitor.
摘要:
A method a scale having an inductively scannable graduation, the scale including a sequence of graduation elements disposed in a measuring direction and a layer stack including a succession of metal layers. The succession of metal layers includes a ferromagnetic metal carrier layer and a graduation layer that forms the sequence of graduation elements. The carrier layer is disposed between the graduation layer and a metal substrate, and the metal substrate is dimensioned to definitively determine mechanical properties of the layer stack.
摘要:
A method and apparatus provide for performing language translation by obtaining a selection of a language preference for presentation of text and/or speech on an electronic device. When data is received that includes content in a language other than the preferred language, a decision whether translation is required may be reached by analyzing the context of the language or metadata associated with the language, such as. HTML tags, or language data included in a particular protocol, e.g. HTTP headers. A selection may be made of billing level, determined at least in part by the languages involved, desired accuracy, latency and volume of translation. If necessary, the data may be routed to a translation host or service before final presentation.
摘要:
Described is an independent computation environment that is built into one or more hardware components of a computer system, wherein the independent computation environment hosts a logic that measures the health of other software code that executes in memory. Examples of ways to measure health include performing a mathematical computation such as a computing a hash/digital signature on the software code in the memory, and/or evaluating statistical information related to the execution of the code and/or the code's being loaded into memory. By executing the logic in an independent computation environment, the health of software code may be measured against policy/metadata in a tamper-proof or tamper-resistant environment. When the software code measurement does not comply with the policy, some action may be taken action to penalize the computer system.
摘要:
A pay-per-use computer, or other electronic device that uses local security, may use a security module or other circuit for monitoring and enforcement of a usage policy. To help prevent physical attacks on the security module, or the circuit board near the security module, a second circuit may be mounted over the security module to help prevent access to the security module. Both circuits may be mounted on a interposer and the interposer mounted to the circuit board, creating a stack including the first circuit, the interposer, the security module, and a main PC board. When the PC board includes dense signal traces under the security module a three dimensional envelope is created around the security module. When the first circuit is a high value circuit, such as a Northbridge, the risk/reward of attacking the security module is increased substantially and may deter all but the most determined hackers.
摘要:
A trigger engine and infrastructure for event registration and handling that is reliable, secure and scalable. Transactional authenticated and/or encrypted messages (e.g., via MSMQ) are used to transport events across each server. A stable recovery mechanism is provided wherein the recovery path is nearly identical to the normal path. A trigger engine may concentrate multiple similar requests into a single base request for event notification, and upon receipt of the base event, access tables maintained in the trigger engine to track which client registered for which type of notification. In this manner, only the base event request is registered remotely, reducing the number of events that need to be communicated to remote servers. Identical event requests from clients may also be concentrated into a base event request, and events distributed to those clients when appropriate. Duplicate base event requests are blocked locally and thus only the first such one ever reaches the remote server. The trigger engines are capable of combining events in a complex manner, such as to notify a client only when a combination of time events, job events and/or other events have occurred, thus being suitable for use in a batch system.
摘要:
A computer is adapted for use in different operating modes by configuring an output controller, such as a graphics processing unit, to screen output signals prior to presenting them to the output device. A secure environment in the output controller verifies a digital signature or a hash of the output signal to determine whether the output signal is compatible with the current mode of operation. Thus only authorized output signals are presented when the computer is operating in a limited function mode, such as when metered usage time is expired. The apparatus and method also disclose similar output signal screening for determining whether the computer should be returned from a standby, or no-metering, mode to an active, or metered mode.
摘要:
A method and apparatus is provided for coordinating devices in a federated network of devices. A server may determine policies for coordinating the devices and may send messages to devices in the federated network for providing a service. The policies for providing the service among the federated devices may be based on properties of the devices or relative locations of the devices. For example, the federated devices may provide media data and control of the media data to a user. Provision of the media data and/or control of the media data may change from one device to another in the federated network based on policies from the server.