摘要:
A power grid model system, method and computer program product which includes a switching state processor, a topological processor, an equipment update processor, and a historic power grid model for a power grid. The historic power grid model has an equipment layer and a topology layer. Responsive to a switch operated in a power grid, the switching state processor is notified of the operated switch, notifies the topological processor of the operated switch and notifies the power grid model for updating of the historic power grid model; and the topological processor determines the extent of the update of the power grid model, parses through details of the equipment layer and updates the topology layer in the power grid model. Responsive to an equipment update to the power grid, the equipment update processor is notified, updates the historic power grid model and notifies the topological processor of the equipment update; and the topological processor determines the extent of the update in the historic power grid model, parses through details of the equipment layer and updates the topology layer in the historic power grid model.
摘要:
An aspect of the present invention facilitates a service application to operate with different frameworks executing in application servers. In one embodiment, the different interfaces according to which the different frameworks are designed to operate with service application are identified, including the interface implemented by the service application. Wrapper modules are then generated based on the differences between the identified interfaces and the interface implemented by the service application. The generated wrapper modules are then deployed along with the service application to facilitate the service application to operate with different frameworks.
摘要:
Particular embodiments generally relate to allowing access of non-secure elements through a non-secure channel when a top-level page was accessed through a secure connection. In one embodiment, a webpage is accessed over a secure channel. The webpage includes secure and non-secure elements. When a non-secure element for the webpage is determined, a client may message with the server to open a non-secure channel for accessing the non-secure element. For example, the client may request port information in the request. The server then can respond with port information for a non-secure channel. The client then accesses data for the non-secure element through the non-secure channel using the port information.
摘要:
Simplifying access to documents accessed recently on a remote system. In one embodiment, the list of documents accessed by a user using a first instance of an application in a first/remote system is maintained. The list of documents is provided/displayed to the same user when using a second instance of the same application on a second/local system, thereby facilitating the user to access the documents accessed recently on the remote system.
摘要:
A computer implemented method for generating a summary of one or more resume from one or more of resumes to analyze insights of the one or more resume is provided. The computer implemented method includes (i) processing a first input includes a first indication to select a first resume from one or more of resumes, (ii) extracting, from the first resume, a first information, (iii) obtaining, from the first resume, a second information, (iv) generating a first table based on the first information and the second information, and (v) generating a first summary based on the first table, the first summary indicates a first correlation between (i) the one or more events associated with the first section and (ii) the one or more events associated with the second section over years.
摘要:
In an embodiment, a customer sends a set of requirements for a cloud to a cloud complier, which identifies vendors matching the set of requirements. Information on the matching set of vendors is provided to the customer, thereby enabling the customer to select desired vendors for constructing the cloud.
摘要:
A message originator, such as an author of an email, can designate “section access settings” which can selectively permit or deny access of portions of the email's content. Recipients who are not authorized may not exercise the access right upon the designated portion of content. For example, an access right may allow displaying a section of text in an email message only for specified recipients and not to other recipients. In a preferred embodiment, the entire email content, including restricted portions, is provided to all recipients, including unauthorized recipients. Unauthorized recipients are prevented from exercising the access right even though the restricted portion has been received.
摘要:
A content distribution system stores encrypted content, an operating system, a decrypt application and a decrypt key on a portable storage device with a serial communication interface such as USB. The portable storage device may be connected to a hardware unit (containing a corresponding/compatible serial interface) designed to boot from the stored operating system. Upon booting, the operating system automatically retrieves the encrypted content, decrypt application and decrypt key, and executes the decrypt application to generate (by decrypting using the decrypt key) the source content, which is then reproduced/replayed on a suitable system such as a television. Content such as songs/movies etc., may thus be distributed efficiently on a relatively small-sized portable storage devices such as a USB thumb drive.
摘要:
Simplifying access to documents accessed recently on a remote system. In one embodiment, the list of documents accessed by a user using a first instance of an application in a first/remote system is maintained. The list of documents is provided/displayed to the same user when using a second instance of the same application on a second/local system, thereby facilitating the user to access the documents accessed recently on the remote system.
摘要:
Particular embodiments generally relate to allowing access of non-secure elements through a non-secure channel when a top-level page was accessed through a secure connection. In one embodiment, a webpage is accessed over a secure channel. The webpage includes secure and non-secure elements. When a non-secure element for the webpage is determined, a client may message with the server to open a non-secure channel for accessing the non-secure element. For example, the client may request port information in the request. The server then can respond with port information for a non-secure channel. The client then accesses data for the non-secure element through the non-secure channel using the port information.