摘要:
A system, apparatus, and method are disclosed for conducting an inventory of a data storage library. The invention includes providing a plurality of data storage slots for storing data storage cartridges, providing an accessor having a plurality of detectors mounted thereon, and concurrently detecting cartridge information with the plurality of detectors for a corresponding plurality of data storage slots. The detectors may include any combination of detectors, including but not limited to, bar code scanners, radio frequency readers, cartridge presence sensors, or cameras. In certain embodiments, the invention also includes associating the cartridge information with the corresponding data storage slot and storing the information on a data bearing medium.
摘要:
An arrangement and a method of rotating a hub of a wind turbine are provided. A wind turbine includes a hub mounted to a nacelle, whereby the hub is rotatable around an axis of rotation in respect to the nacelle. A rotor blade is arranged at the hub that leads to a torque around the axis of rotation of the hub. A counter weight is attached to the hub, whereby the counter weight has a mass that leads to a counter-torque around the axis of rotation. The counter-torque interacts with the torque during the installation of a second rotor blade to the hub. The counter weight is mounted to the hub by a mechanical arrangement that is rotatable in respect to the hub around the axis of rotation of the hub. The mechanical arrangement and the counter weight are rotatable in respect to the hub into a certain predetermined position.
摘要:
An arrangement and a method of rotating a hub of a wind turbine are provided. A wind turbine includes a hub mounted to a nacelle, whereby the hub is rotatable around an axis of rotation in respect to the nacelle. A rotor blade is arranged at the hub that leads to a torque around the axis of rotation of the hub. A counter weight is attached to the hub, whereby the counter weight has a mass that leads to a counter-torque around the axis of rotation. The counter-torque interacts with the torque during the installation of a second rotor blade to the hub. The counter weight is mounted to the hub by a mechanical arrangement that is rotatable in respect to the hub around the axis of rotation of the hub. The mechanical arrangement and the counter weight are rotatable in respect to the hub into a certain predetermined position.
摘要:
Bulk synchronization reconciling maintains data volumes at the same version in redundant data storage libraries. Tokens of each library describe version-related characteristic(s) of an associated volume of data. At least one director establishes a reconcile set of tokens of the libraries describing dissimilar version-related characteristics of a same associated volume. A plurality of subsets of the reconcile set of tokens are established based on a first criteria, and allotted to directors to reconcile the data of volumes of the subsets, to split the reconciling between the directors. An example is to select subsets based on the last binary digit of the volume identifier, e.g. odd and even numbered subsets. Alternatively, the volume identifiers may be split into upper and lower halves. Further, the directors reconcile in a sequence based on a second criteria, e.g., one in numerical sequence, and another in reverse numerical sequence.
摘要:
A simplified user authentication to a computer resource utilizing a smart card. When a new user is issued a smart card, he or she is also issued a user name (ID) and password to be used during a first use to activate the smart card. The user then connects the smart card and enters the user ID and password. The user is authenticated using the user ID and password and identifying information from the smart card. The network administration server then requests a public key from the workstation. The workstation instructs the smart card to generates public and private key. The public key is transmitted to the server. A digital certificate is created the smart card is activated. Once the smart card is activated a simplified login procedure can be used wherein connecting the smart card to a workstation initiates a login process not requiring use of a PIN number or other user input.
摘要:
A computer security system utilizing smart cards for computer access. A system for home or small business use generally is presented in which smart cards are utilized to gain access to computer functions. The user is presented with a login prompt that permits login using the smart card. The user is permitted to bypass use of the smart card and obtain access to the computer system, but such use of the computer system is logged for review by an administrator.