Abstract:
The disclosed is that an automatic releaser with wireless controls, comprising a housing, rechargeable batteries, wireless controls, an electromagnetic mechanism, and a release mechanism, which being characterized in that the housing is provided with a cylindrical configuration having a upper cavity and a coaxially lower cavity therewith; the wireless controls includes a remote control, a control switch, antennas, and a wireless control module. The electromagnetic mechanism includes an electromagnet and an iron core. The release mechanism includes a release pin, a movable sleeve and a release sleeve sequentially suited to one another from inside to outside. The preferred embodiments of the releaser and machines using the present teaching would have the following benefits: (1) the remote control is configured to control the testing procedure within the range of 500 meters thereby eliminating the inconvenience used with the supply power line to the test and improving the safety distance coefficient for the testing personnel; (2) the design of the movable sleeve can prevent the steel ball falling outwards from the movable sleeve; (3) the steel ball contacts with the peripheral rubber ring of the thru hole of the release sleeve while rolling forwards to it, then trends to move forwards to the movable sleeve under the action of the elastic force of the ring.
Abstract:
An electronic device includes an EMI shielding board, two electronic components and a flat cable. The EMI shielding board includes a first side and a second side opposite to the first side. The two electronic components are arranged at the first side of the EMI shielding board. The flat cable is connected between the two electronic components. The EMI shielding board further includes a first through slot and a second through slot both configured therein. The flat cable passes through the EMI shielding board via the first and second through slots. A part of the flat cable is on the first side of the EMI shielding board, and the remaining part of the flat cable is on the second side of the EMI shielding board.
Abstract:
A cable positioning mechanism includes a main body and first and second positioning members arranged on the main body. The first positioning member includes a first surface and a second surface connecting with the first surface. The second positioning member includes a first end parallel to the second surface and a second end parallel to the first surface. The second end cooperates with the second surface to define a first holding space for allowing a cable being placed thereinto. The first end cooperates with the first surface to define a second holding space communicating with the first holding space. The second positioning member further includes a hook. The hook extends into the second holding space and clamps the cable to the main body when the cable is rotated to be received in the second holding space. An electronic device using the cable positioning mechanism is also provided.
Abstract:
A method for presenting relationship closeness, relating to the field of communications, includes: acquiring an identifier of a contact object selected by a user; acquiring, according to the identifier of the contact object, at least one contact factor of contact between the user and the contact object in a period; calculating a value of closeness between the user and the contact object according to the contact factor, where the value of closeness is used to indicate closeness between the user and the contact object; and displaying the value of closeness as a graphical object. The device includes: a first acquiring module, a second acquiring module, a calculation module and a display module. Through the present invention, the relationship closeness can be presented objectively.
Abstract:
A method for propagating authentication session information to a plurality of cores of a multi-core device includes establishing, by an authentication virtual server executing on a first core of a device intermediary to at least one client and server, a session for a user, the authentication virtual server authenticating the session. A traffic management virtual server executes on a second core of device, and receives a request to access a server via the session. The traffic management virtual server may identify, responsive to a determination that the session is not stored by the second core, from an identifier of the session that the first core established the session. The second core may send to the first core a request for data for the session identified by the identifier. The second core may receive from the first core a response to the second request identifying whether the session is valid.
Abstract:
A switch may be used to force the expiration of a cookie on a user's system by inserting an expiration field into the cookie contained in a network response packet. Additionally, a mechanism is provided to delete or damage a cookie contained in a network request packet, so that server software is not disrupted by the receipt of a cookie. Deleting a cookie results in a cleaner request, but damaging a cookie may be more efficient in certain circumstances. By providing these features, an efficient cookie switching design is provided.
Abstract:
All in one multifunction pallet, comprising a main part of the pallet, collapsible supporting legs, belts, joint shafts coupled by nuts, and RFID tags providing an easy to use, easy to operate and easy to recycle pallet. RFID tags equipped on the pallet offer a great advantage for supply chain management to utilize RFID technology. The fully folded pallet has zero space waste and one truck can transport at least fourfold pallets comparing with the currently and widely used and various pallets existing on the market. This convenient to use, recyclable, all in one pallet can significantly lower various RFID tag costs in RFID technology applications in large scale. Any damaged part can be easily replaced with new parts to keep the pallet continually in use, thereby reducing the coast per pallet in the supply chain.
Abstract:
The present invention provides a system and method of managing traffic traversing an intermediary based on a result of end point auditing. An authentication virtual server of an intermediary may determine a result of an end point analysis scan of a client. Responsive to the determination, the traffic management virtual server can obtain the result from the authentication virtual server. Further, the traffic management virtual server may apply the result in one or more traffic management policies to manage network traffic of a connection of the client traversing the intermediary. In some embodiments, the authentication virtual server may receive one or more expressions evaluated by the client. The one or more expressions identifies one or more attributes of the client. The traffic management virtual server can also determine a type of compression or encryption for the connection based on applying the one or more traffic management policies using the result.
Abstract:
A hypertext transfer protocol (HTTP) connection between a client terminal and a server includes a client-side connection and a server-side connection. Different techniques are used to extend the persistence of the HTTP connection. These techniques include keeping the server-side connection persistent if the client terminal sends a RESET to the server, keeping the server-side connection persistent but closing the client-side connection if the client terminal sends a RESET or a FIN packet to the server, rewriting a “Connection: Close” header in a request to a “Connection: Keep-Alive,” inserting a “Connection: Keep-Alive” in a header of a request, modifying a “Connection: Close” header in a request, and changing the HTTP version value in a request.
Abstract:
The present invention relates to communication technologies, and provides a decompression method for communication network, in which such fields as an SN are compressed by using an ROHC scheme, so that the compression efficiency is increased. The ROHC uses a WLSB algorithm to compress some fields which change regularly, and decodes by using the decompressor's context through transmitting the low significant bits in these fields. In order to avoid using the inefficient ergodic method and the incorrect direct replacing method in low bits, the present invention selects, based on the mathematical characteristics of the definition of interpretation intervals, to decode by using the method that the low bits is determined by the received k significant bits while the high bits is determined jointly by the local storage information and these k significant bits. Its decoding method can be used for decompression of an SN, a TS and an IP-ID in an ROHC compression.