Abstract:
A threaded drum is rotated by a drive shaft. As the threaded drum rotates, part of a cable is wrapped around the drum, while at the same time, a second part of the cable is unwrapped from the drum. Rotation of the drive shaft is based on rotation of an operator.
Abstract:
A security control verification and monitoring subsystem of a managed computer system performs security control verification operations regularly and for each security control verification operation determines the applicable security benchmark level for use by a given computer. The subsystem assigns security risk categories to groups of computers based, for example, on overall system or group administrator supplied potential impact settings and/or system type and business or information type selections. The subsystem further associates the security risk categories with security benchmark levels based on mapping information supplied by the overall system or group administrator. The subsystem then directs the computer to benchmark definition files based on the assigned security risk category, the associated security benchmark level and attributes of the computer. The subsystem performs the security control verification operations whenever the computer performs computer profile data update operations, and thus, monitors essentially continuously the security control compliance of the computer. The subsystem stores the results of the security verification operations and includes the results in reports for the system, group or computer.
Abstract:
A user access security subsystem of a computer information database system utilizes computer grouping criteria and user type criteria to control user access to both computer profile data and system administrative features. The computer grouping criteria determine profile data access for the respective users. The user type criteria determine which administrative features are accessible to the respective users, and thus, what administrative authority is delegated to the users. The combination of the computer grouping and the user type criteria restricts a given user to exercising the delegated administrative authority only with respect to the particular grouping of computers to which the user has been granted access through the associated login group. To maintain access security, the subsystem allows a given user to grant to another only those access rights that are equal to or more restrictive than the given users rights. Thus, the given user cannot grant access to a login group that is a peer or a superior of his own login group and/or cannot assign a user type that is associated with greater access to system administrative features than his own user type. The user access security subsystem enforces the access restrictions by tailoring the user interface presented to the user based on the associated login group and user type.
Abstract:
A dishwasher (10) includes a housing (12) having a washing chamber (14) and a door (16) for gaining access to the washing chamber. A washing nozzle (22) is provided in the washing chamber for directing a fluid stream against dishes held in the washing chamber. A circulation pump (18) circulates fluid under pressure through the washing nozzle. A supply line (20) delivers fluid to the circulation pump while a drain line (24) discharges fluid from the washing chamber. Additionally the dishwasher includes an acoustical insulation blanket (26) of thermoplastic material. That blanket extends around the washing chamber and the circulation pump and is precisely cut to fit snugly around the fluid supply line and the drain line so as to eliminate gaps therebetween and the acoustical leaks associated therewith. A method is also disclosed for enclosing the noise-generating components of the dishwasher in an acoustical insulation blanket of thermoplastic material.
Abstract:
A system for assisting a customer during shopping includes machine-readable currently-owned item indicia store (13) and a compatibility determination subsystem (10). The machine-readable currently-owned item indicia store includes a smart-card, magnetic disk or the like (16), for storing indicia identifying selected characteristics of items which are currently owned by the customer, including such information as, for example, accurate color and/or styling parameter and metric information. The compatibility determination subsystem generates a compatibility assessment in response to the currently-owned item indicia stored by said currently-owned item indicia store (102), indicia identifying selected characteristics for items provisionally selected by the customer, and compatibility parameter information identifying compatibilities among various types of indicia.
Abstract:
A method of obtaining information about usage of application executable files and associated software program in a network of computers or on an individual computer is provided. The method involves collecting information about last use of software programs, and associated executable files, on a computer or a set of managed computers from various resources on the computers. The information that is collected includes file name, directory, date and time the executable was last started, a security identifier of the last user, the method of last use, whether the executable was found to be running at the time it was found, and whether the executable is registered to run as a service. From this information, a list is generated regarding software items, and the list is merged such that a given executable has a single software item on the list. Reports are produced detailing information about one or more software items on the list. The reports may be displayed in a graphic user interface designed for that purpose.