Abstract:
A preassembled modular drop-in combustor having internal components in conformity with assembly and function specifications prior to and after insertion into an industrial gas turbine access port and internal combustor transition. The combustor assembly maintains conformity with those specifications after insertion into the combustor case if it does not inadvertently impact other turbine components during its installation. Inadvertent impact is avoided by having a combustor service zone proximal the combustor case, enabling slidable insertion of each combustor assembly into its corresponding access port and transition along its corresponding insertion path without contacting other turbine system components. A multi-axis motion combustor handling tool in the combustor service zone, preferably under automatic control, is coupled to each combustor and facilitates precise alignment along the insertion path. Automatic control facilitates consistent repetitive combustor installation and removal by executing a sequence of stored pre-determined manipulation steps.
Abstract:
Examples disclose a storage medium encoded with instructions executable by a processor of a computing device, the instructions to define a perimeter within a wireless network to monitor a wireless device for violation of the perimeter. Further, the examples provide the instructions to receive a signal data associated with the wireless device. Additionally, the examples also disclose the instructions to detect a location of the wireless device based on the signal data to determine whether the wireless device has violated the defined perimeter.
Abstract:
A switch comprises a switching module coupled to a plurality of ports. The switching module receives and forwards a plurality of packets through the ports. The switch also comprises a management unit comprising a processor and an agent executable by the processor. The agent causes the processor to monitor each packet received by the switching module and determine whether each such packet contains a predetermined fingerprint. Upon determining that a packet contains the predetermined fingerprint, the processor causes additional information to be included in a copy of the fingerprinted packet and forwarded to a predetermined address. The switching module also forwards the packet containing the predetermined fingerprint, but without the additional information, to an address corresponding to a destination address contained in the packet. A method of programming the switches is also described as well as a management workstation used to program the switches and analyze the fingerprinted packets.
Abstract:
A preassembled modular drop-in transition having internal components in conformity with assembly and function specifications prior to and after insertion into an industrial gas turbine access port. The transition assembly maintains conformity with those specifications after insertion into the combustor case if it does not inadvertently impact other turbine components during its installation. Inadvertent impact is avoided by having a combustor service zone proximal the combustor case, enabling slidable insertion of each transition and/or combustor assembly into its corresponding access port along its corresponding insertion path without contacting other turbine system components. A multi-axis motion transition handling tool (THT) in the combustor service zone, 10 preferably under automatic control, is coupled to a transition and facilitates precise alignment along the insertion path. Automatic control facilitates consistent repetitive transition installation and removal by executing a sequence of stored pre-determined manipulation steps.
Abstract:
In one embodiment, an edge network device may monitor a network service that is provided at a network service device. Information related to the monitored network service may be temporarily stored at the edge network device and transmitted to a remote network device. In one embodiment, an administrative device may compare current extracted information with stored historical information to determine if a unique machine identifier of an end user device has been spoofed.