摘要:
A modular multi-component power distribution system is provided having a plurality of modular components which includes a bus-bar-like power distribution assembly (PDA), branching connectors, flex connectors, and receptacles. A manufacturing process relates to the manufacture of extruded power distribution assemblies and the insertion of multiple, lengths of conductor wire along the longitudinal length thereof. In such PDA's, multiple parallel bores are formed interiorly of the PDA casing or housing wherein such conductors are not inserted into the bores until after the PDA extrusions are cut to length and plug ports are formed therein.
摘要:
A modular multi-component power distribution system is provided having a plurality of modular components which includes a bus-bar-like power distribution assembly (PDA), branching connectors, flex connectors, and receptacles. A manufacturing process relates to the manufacture of the flex connectors which have plugs provided on the opposite ends of an intermediate cable section. The intermediate cable section includes multiple conductor wires having opposite ends projecting outwardly of an outer insulative cover or jacket. The plugs are attached to the opposite ends of the cable wherein each plug includes an outer housing and cover, as well as a plurality of multi-prong quad-point electrical terminals. Each terminal is connected to a respective wire and then fitted into an appropriate socket therefore.
摘要:
The present invention is a system and method for reconciling results returned from a multi-protocol scan of a NAS system. Certain NAS systems use different protocols. Some may use the NFS protocol, whereas others may use the CIFS protocol. A scan of the NAS may therefore produce two data object names for a single data object. When a storage virtualization system is tasked with acting as an intermediary between the client and the NAS, these two data object names will cause errors during data migration, synchronization or redirection. The present invention is a method for using the results of a multi-protocol scan of the NAS in order to reconcile data object names that may present differently depending on the protocol applied.
摘要:
A fluid distribution system and method for mobile applications. The system includes a power source, a pump driven by the power source, and a motor driven by the pump. The system also includes a spray head with a fluid inlet passage, a fluid outlet passage, a fluid piston disposed in a chamber for controlled access between the inlet and outlet passages and defining a variable orifice, and a hydraulic cylinder controllably engaged to the orifice. The fluid piston and the hydraulic cylinder are aligned with a common longitudinal axis, and the inlet passage is offset from the axis in a direction opposed to the location of the outlet passage.
摘要:
Electronic commerce transaction messages are processed over a network between a client and a server in a highly reliable fashion by establishing a secure or un-secure communications connection between the network client and the network server at an electronic transaction assurance (eTA) system, which is located in a communication path between the network client and the network server. The transaction type is identified in the message and the progress of the transaction is tracked using transaction models. Any failure in the back-end server system or in the network connections is detected and the failure is recovered from using an outcome determination technique. The failure of a node within the eTA system is masked from the network client by formulating an appropriate response and sending it back to the client such that the network client and network server that were using the selected node do not see any interruption in their communications.
摘要:
A method, system, peers and computer programs determine validity of path information corresponding to a transmission path between a monitoring peer and a monitored peer in a data communication network. The monitoring peer monitors unsolicited data received from the monitored peer via the reverse transmission path identified by the path information and further monitors any data sent to the monitored peer using the path information. Validity tests are performed by the monitoring peer for the path information to restore complete confidence in its validity in a way where the rate of testing is proportional to the rate of receiving unsolicited data from the monitored peer and to the rate of sending data to the monitored peer. The monitoring peer invalidates the path information if the validity test fails.
摘要:
Apparatus and method for use in a network of, for example, computers, for generating summary data, such as traffic summary information, from a plurality of data records, the data records having a different temporal basis, for example, one hour or one day or one week, and different start and end times. The summary data is generated for a requested time interval having a requested start time and a requested end time by selecting a data record with a record start time corresponding to the requested start and an end time as far as possible from the record start time but equal to or before the requested end time. The data from that selected data record is processed, and the initial time is then set to the end time of that particular data record and the process repeated. In this way one can gather and process such data with a minimum number of steps.
摘要:
The present invention is a method for performing a multi-protocol scan of a NAS system by a storage virtualization system to create a multi-protocol file index. Current NAS systems may utilize two protocols, CIFS and NFS. Storage virtualization systems migrate, redirect or synchronize data between a primary and a secondary NAS. Present storage virtualization systems are designed to work with NFS or CIFS systems, but not both. The present invention enables a storage virtualization system to simultaneously or near-simultaneously operate using NFS and CIFS protocols. The present invention also provides for a multi-protocol scan of a NAS device to ensure that all data files and data file attributes are recognized and preserved during storage virtualization.
摘要:
An approach is provided for recycling information fragments in information spaces. An information management system detects a plurality of information management processes occurring in an information space. The information management processes retrieve one or more information fragments from the information space. The information management system then determines a sequence of states for each of the plurality of information management processes over a period of time and calculates a state trajectory from each of the sequence of states. The calculated state trajectories are used to predict a finite set of possible future states. The information management system uses the prediction to determine which of the one or more information fragments are recyclable and preserves the recyclable information fragments for responding to a subsequent request directed to the information space.