摘要:
A deal management system is used to manage a complex service deal that defines various services to be fulfilled on behalf of a client. The deal management system includes a deal specification subsystem, a cost subsystem, and an estimation subsystem. The deal specification subsystem has a new deal interface to facilitate user specification of the complex service deal, including a plurality of service elements scheduled for fulfillment from a plurality of service delivery centers. The cost subsystem tracks an aggregate cost of a service delivery center that is arranged to fulfill a particular service element. The estimation subsystem dynamically evaluates accuracy of a deal cost model for the complex service deal during a duration of the particular service element by establishing a correlation between particular service elements within the complex service deal and portions of the aggregate cost data allocated to the corresponding service delivery center.
摘要:
System and method for service pricing optimization enables analysis of multi-phased, multi-business unit, multi-process, multi-geo/country deal structure with its parts and phases having different pricing implications, and provides a flexible composite pricing schedule optimized for both service provider and receiver by gain and risk sharing. In one aspect, elementary pricing models and pricing parameters are established and a composite pricing model is constructed based on the elementary pricing models and pricing parameters. An optimizer optimizes the composite pricing model to minimize risk and maximize one or more selected criteria. Price is generated using the optimized composite pricing model.
摘要:
A method and system for finding a source failure node in a traceable network. The method includes: determining a possible source failure node according to a leaf node that has an exception, wherein the possible source failure node is a node that is most likely to cause the exception; selecting a target node to receive an investigation result corresponding to the target node, wherein the investigation result indicates whether the target node has the same exception; receiving the investigation result corresponding to the target node and updating the traceable network according to the investigation result; and returning to the step of determining a possible source failure node, if it can not be verified according to the updated traceable network that the possible source failure node is the source failure node causing the exception.
摘要:
A script-based application generation for spreadsheet software reads from one or more spreadsheets rendered by a spreadsheet program, description written in said text-based language, the text-based language for describing user interfaces, data models and/or workflow models or combinations thereof The text-based language is independent of the spreadsheet program. The description is parsed and from the description one or more user interfaces, data model or workflow model or combinations thereof are generated in the spreadsheet program.
摘要:
Multiple scanner or stepper machines are provided. A photoresist layer is coated on a monitor wafer. The photoresist layer is exposed through a mask pattern on a first of the multiple machines. The mask pattern is shifted by an offset and the photoresist layer is exposed through the mask pattern on another of the multiple machines. The shifting and exposing steps are continued for each of the multiple machines. A pattern on the monitor wafer is measured using an overlay measurement tool. Machine constants for each machine except the first machine of the multiple machines are updated based on results of the measuring to provide overlay control machine matching.
摘要:
Irregular food manufacturing detection by using conversion pattern in one aspect generates one or more rules associated with amount of resources used to manufacture a food product, collects data associated with a selected manufacturing process of the food product at a selected manufacturer and determines whether the collected data complies with the generated one or more rules. Irregularity may be identified if the collected data does not comply with the generated one or more rules.
摘要:
A method, system, and article for improving performance of a Boolean combination of at least two filters to a data stream. Stream processing is applied to an expression having two or more logical operators. As the data stream is processed, efficiency of the operators in the expression is evaluated. A sort algorithm is dynamically invoked to ensure that a more efficient operator precedes processing of a less efficient operator.
摘要:
A battery assembling device has two brackets and an assembling unit. The brackets abut each other and can be securely mounted around two battery units. The assembling unit has a quick-release housing and two clamps. The quick-release housing has two electrode holes. The clamps are respectively mounted in the electrode holes and each clamp has two opposite threaded inner surfaces. The battery units can be bundled by the brackets in advance to form regular battery modules. Because the assembling unit is easily and quickly connected with the battery modules, the assembling of a cell of an electrical vehicle is greatly convenient and fast.
摘要:
A method, system, and article for automated processing of a data stream are provided. Stream processing is applied to a hierarchical self describing data stream. As the data stream is processed, some elements therein are associated with a selected path expression. The selected path expressions are ordered based upon the hierarchy, and a tree structure is created that corresponds to the hierarchy. Each leaf node of the tree is associated with a logical operator or an expression to be applied to data processed from the data stream to the leaf node.
摘要:
In one embodiment, a technique for detecting a break in a pseudowire and automatic shutting down user network interface (UNI) ports affected by the break is provided. In response to the loss of connectivity on the shut down ports, customer edge devices may automatically switch over to redundant circuits (e.g., other UNI ports not affected by the break in the pseudowire) and establish a different pseudowire.