Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

3421 results about "Configuration system" patented technology

System configuration. A system configuration in systems engineering defines the computers, processes, and devices that compose the system and its boundary. More general the system configuration is the specific definition of the elements that define and/or prescribe what a system is composed of.

Multimedia surveillance and monitoring system including network configuration

A comprehensive, wireless multimedia surveillance and monitoring system provides a combination of megapixel digital camera capability with full motion video surveillance with a network, including network components and appliances such as wiring, workstations, and servers with the option of geographical distribution with various wide area carriers. The full service, multi-media surveillance system is capable of a wide range of monitoring techniques utilizing digital network architecture and is adapted for transmitting event data, video and / or image monitoring information, audio signals and other sensor and detector data over significant distances using digital data transmission over a LAN, wireless LAN, Intranet or Internet for automatic assessment and response including dispatch of response personnel. Both wired and wireless appliance and sensor systems may be employed. GPS dispatching is used to locate and alert personnel as well as to indicate the location of an event. Automatic mapping and dispatch permits rapid response. The wireless LAN connectivity permits local distribution of audio, video and image data over a relatively high bandwidth without requirement of a license and without relying on a common carrier and the fees associated therewith. The surveillance system may be interfaced with a WAN (wide area Network) or the Internet for providing a worldwide, low cost surveillance system with virtually unlimited geographic application. Centralized monitoring stations have access to all of the surveillance data from various remote locations via the Internet or the WAN. A server provides a centralized location for data collection, alarm detection and processing, access control, dispatch processing, logging functions and other specialized functions. The server may be inserted virtually anywhere in the Intranet / Internet network. The topology of the network will be established by the geographic situation of the installation. Appropriate firewalls may be set up as desired. The server based system permits a security provider to have access to the appliance and sensor and surveillance data or to configure or reconfigure the system for any station on the network.
Owner:PR NEWSWIRE

Site acceleration with content prefetching enabled through customer-specific configurations

A CDN edge server is configured to provide one or more extended content delivery features on a domain-specific, customer-specific basis, preferably using configuration files that are distributed to the edge servers using a configuration system. A given configuration file includes a set of content handling rules and directives that facilitate one or more advanced content handling features, such as content prefetching. When prefetching is enabled, the edge server retrieves objects embedded in pages (normally HTML content) at the same time it serves the page to the browser rather than waiting for the browser's request for these objects. This can significantly decrease the overall rendering time of the page and improve the user experience of a Web site. Using a set of metadata tags, prefetching can be applied to either cacheable or uncacheable content. When prefetching is used for cacheable content, and the object to be prefetched is already in cache, the object is moved from disk into memory so that it is ready to be served. When prefetching is used for uncacheable content, preferably the retrieved objects are uniquely associated with the client browser request that triggered the prefetch so that these objects cannot be served to a different end user. By applying metadata in the configuration file, prefetching can be combined with tiered distribution and other edge server configuration options to further improve the speed of delivery and/or to protect the origin server from bursts of prefetching requests.
Owner:AKAMAI TECH INC

Integrated configuration system for use in a process plant

An integrated configuration viewing system for use in a process plant includes a computer readable memory and a plurality of template configuration objects stored on the computer readable memory. Each of the plurality of template configuration objects includes a graphical representation of a physical entity within the process plant, a parameter storage adapted to communicate with the process plant to obtain and store device parameter information associated with the physical entity within the process plant, and a configuration storage adapted to store configuration parameters associated with the physical entity within the process plant. A first routine is stored on the computer readable memory and adapted to be executed on the processor to present a library section on a user interface. The library section is adapted to present depictions of the plurality of template configuration objects to a user via the user interface. A second routine is stored on the computer readable memory and adapted to be executed on the processor to present a configuration area on the user interface. And a third routine is stored on the computer readable memory and adapted to be executed on the processor to enable a user to select one of the plurality of template configuration objects from the library section and to place the selected template configuration object within the configuration area to create a process configuration module within the configuration area.
Owner:FISHER-ROSEMOUNT SYST INC

Module class objects in a process plant configuration system

A configuration system for a process plant uses module class objects to assist in configuring, organizing and changing the control and display activities within the process plant. Each module class object generically models or represents a process entity, such as a unit, a piece of equipment, a control activity, etc., and may be used to create instances of the object, called module objects, which represent and are tied to specific equipment within the process plant. The module class objects may represent process entities of any desired scope, which means that a single module class object may be used to configure the control and display activities of process entities of any desired scope within the process plant, instead of just at a control module level. In particular, module class objects of a large scope may be used to configure large sections or portions of the process plant, which makes configuration of the process plant easier and less time consuming. A module class object may be a unit module class object reflecting a physical unit within the process plant, an equipment module class object reflecting a physical piece of equipment within the process plant, a control module class object reflecting a control module or scheme within the process plant, or a display module class object reflecting a display routine that provides information to a user within the process plant.
Owner:FISHER-ROSEMOUNT SYST INC

Bed exit and patient detection system

A bed exit and patient detection system especially adapted for use in the general medical or surgical floor area of a hospital or other healthcare facility as part of a vital signs monitoring and remote warning system includes a plurality of pressure sensors disposed in the patient's bed in a series of rectangular strips or zones that run laterally across the bed in the area of the patient's mid-back, hips and mid-legs, respectively. Each zone contains a plurality of sensors, arranged symmetrically about the centerline of the bed, with the corresponding sensors on opposite sides of the centerline in each zone being connected in parallel. The sensors are connected to a processor with multiple input channels that continuously monitors the sensor states to determine, from the pattern of sensor states observed, whether the patient is in bed, out of bed or is actively attempting to ext the bed at the sides or foot of the bed. At least three different sets of bed exit logic rules are available for user selection to configure the system for high, medium or low sensitivity, or bed exit privileges, for any particular patient. In some embodiments, the system also is capable of detecting when a patient is attempting to assume certain prohibited in-bed positions, such as sitting positions or slumping positions. An alarm in the form of a pre-recorded voice announcement or an alarm over a pre-existing nurse call system is provided when the sensor states are indicative of an out-of-bed or an exiting bed condition, or other prohibited in-bed positions, for a predetermined minimum period of time.
Owner:HOANA MEDICAL

Trade allocation

A trade allocation system includes a computer system having a network interface over which messages can be exchanged with an order management system. The computer system is also coupled to a first database that stores data associating portfolios with risk classes and target ratios. A second database stores instructions to configure the system to receive from order management systems messages describing trades of financial instruments. Each message can include a financial instrument identifier, a size of the trade, and a risk class identifier. The instructions also configure the processor to query the first database to determining a portfolios that are associated with a risk class identified by a risk class identifier in a message as well as to determine a target ratio for each of the portfolios. The processor then allocates the trade of the financial instrument among each of the portfolios based on the target ratios. Allocating a trade of a financial instruments among a group of portfolios include receiving a message descriptive of a trade of a financial instrument. The message can include a financial instrument identifier and a size of the trade. A collection of portfolios are then identified based on a match between a risk class of the portfolio and the risk class of the traded financial instrument. The trade is then allocated among each of the portfolios based on a target ratio associated with each portfolio.
Owner:UBS BUSINESS SOLUTIONS AG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products