摘要:
A power grid model system, method and computer program product which includes a switching state processor, a topological processor, an equipment update processor, and a historic power grid model for a power grid. The historic power grid model has an equipment layer and a topology layer. Responsive to a switch operated in a power grid, the switching state processor is notified of the operated switch, notifies the topological processor of the operated switch and notifies the power grid model for updating of the historic power grid model; and the topological processor determines the extent of the update of the power grid model, parses through details of the equipment layer and updates the topology layer in the power grid model. Responsive to an equipment update to the power grid, the equipment update processor is notified, updates the historic power grid model and notifies the topological processor of the equipment update; and the topological processor determines the extent of the update in the historic power grid model, parses through details of the equipment layer and updates the topology layer in the historic power grid model.
摘要:
A power grid model system, method and computer program product which includes a switching state processor, a topological processor, an equipment update processor, and a historic power grid model for a power grid. The historic power grid model has an equipment layer and a topology layer. Responsive to a switch operated in a power grid, the switching state processor is notified of the operated switch, notifies the topological processor of the operated switch and notifies the power grid model for updating of the historic power grid model; and the topological processor determines the extent of the update of the power grid model, parses through details of the equipment layer and updates the topology layer in the power grid model. Responsive to an equipment update to the power grid, the equipment update processor is notified, updates the historic power grid model and notifies the topological processor of the equipment update; and the topological processor determines the extent of the update in the historic power grid model, parses through details of the equipment layer and updates the topology layer in the historic power grid model.
摘要:
Simplifying access to documents accessed recently on a remote system. In one embodiment, the list of documents accessed by a user using a first instance of an application in a first/remote system is maintained. The list of documents is provided/displayed to the same user when using a second instance of the same application on a second/local system, thereby facilitating the user to access the documents accessed recently on the remote system.
摘要:
Particular embodiments generally relate to allowing access of non-secure elements through a non-secure channel when a top-level page was accessed through a secure connection. In one embodiment, a webpage is accessed over a secure channel. The webpage includes secure and non-secure elements. When a non-secure element for the webpage is determined, a client may message with the server to open a non-secure channel for accessing the non-secure element. For example, the client may request port information in the request. The server then can respond with port information for a non-secure channel. The client then accesses data for the non-secure element through the non-secure channel using the port information.
摘要:
A system for identifying one or more resumes from a set of resumes matches a search query using a resume identifying tool is provided. The system includes a memory unit that stores a database and a set of modules, a display unit, and a processor. The set of modules includes (a) a keyword extraction module extracts at least one keyword from the search query, (b) a disambiguation module disambiguates the at least one keyword based on weighted formal concept analysis, and (c) and a resume identification module identifies the one or more resumes by matching (i) the at least one keyword associated with the search query, and (ii) at least one category associated with the at least one keyword with (i) at least one disambiguated keyword associated with each resume of the set of resumes, and (ii) at least one category associated with the at least one disambiguated keyword.
摘要:
Particular embodiments generally relate to allowing access of non-secure elements through a non-secure channel when a top-level page was accessed through a secure connection. In one embodiment, a webpage is accessed over a secure channel. The webpage includes secure and non-secure elements. When a non-secure element for the webpage is determined, a client may message with the server to open a non-secure channel for accessing the non-secure element. For example, the client may request port information in the request. The server then can respond with port information for a non-secure channel. The client then accesses data for the non-secure element through the non-secure channel using the port information.
摘要:
An aspect of the present invention facilitates a service application to operate with different frameworks executing in application servers. In one embodiment, the different interfaces according to which the different frameworks are designed to operate with service application are identified, including the interface implemented by the service application. Wrapper modules are then generated based on the differences between the identified interfaces and the interface implemented by the service application. The generated wrapper modules are then deployed along with the service application to facilitate the service application to operate with different frameworks.
摘要:
Some implementations disclosed herein provide techniques for caching memory data and for managing cache retention. Different cache retention policies may be applied to different cached data streams such as those of a graphics processing unit. Actual performance of the cache with respect to the data streams may be observed, and the cache retention policies may be varied based on the observed actual performance.
摘要:
A secure resource enforcer is configured to identify and provide selected secure resources. The secure resource enforcer includes a determining module configured to determine whether a resource of a web page that is requested in a first request by a client computer requires a secure connection based on a type of the resource that is requested. The secure resource enforcer also includes a redirecting module configured to redirect the client computer to a secure socket for the resource when the resource requires the secure connection. The secure resource enforcer further includes a receiving module configured to receive a second request from the client for the resource over the secure socket and a secure resource providing module configured to provide the requested resource to the client over the secure socket.
摘要:
Particular embodiments generally relate to allowing access of non-secure elements through a non-secure channel when a top-level page was accessed through a secure connection. In one embodiment, a webpage is accessed over a secure channel. The webpage includes secure and non-secure elements. When a non-secure element for the webpage is determined, a client may message with the server to open a non-secure channel for accessing the non-secure element. For example, the client may request port information in the request. The server then can respond with port information for a non-secure channel. The client then accesses data for the non-secure element through the non-secure channel using the port information.