会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 7. 发明申请
    • METHODS APPARATUSES, SYSTEMS, AND ARTICLES FOR DETERMINING AND IMPLEMENTING AND EFFICIENT COMPUTER NETWORK ARCHITECTURE
    • 方法用于确定和实施和高效计算机网络架构的装置,系统和文章
    • WO2005076780A3
    • 2008-11-06
    • PCT/US2004033845
    • 2004-10-13
    • MAY JOHN H
    • MAY JOHN H
    • G06F15/173G06F15/16H04L29/06H04L29/08
    • H04L67/322H04L69/24
    • Methods, apparatuses, systems, and articles of the invention are used to enhance the efficiency of a computing environment 2, and to improve its responsiveness to one or more users 14. In the invention, queuing of data 40 or computer instructions is avoided since this would detract from best case performance for a network environment 2. The rate-limiting factor for the network 2 is determined, and all constraints imposed by the rate-limiting factor are determined. Business logic 78 is programmed in modules 126 1 -126 N sufficiently small to avoid queuing of instructions. Data 40 is stored by frequency of access 142 and persistence 140 to increase responsiveness to user requests. Requests for data from a data storage device 8 are fulfilled not only with the requested data 40, but also additional data 40 which is likely to be requested in the navigational hierarchy of presentations to which the requested data belongs.
    • 使用本发明的方法,装置,系统和物品来提高计算环境2的效率,并提高其对一个或多个用户14的响应性。在本发明中,避免数据40或计算机指令的排队,因为这样 会降低网络环境的最佳情况。2.确定网络2的速率限制因素,并确定速率限制因素施加的所有约束。 业务逻辑78在模块126中被编程为足够小以避免排队等待指令。 数据40通过访问频率142和持续时间140存储,以增加对用户请求的响应。 来自数据存储装置8的数据的请求不仅满足请求的数据40,而且还满足在请求的数据所属的演示的导航层级中可能请求的附加数据40。
    • 9. 发明申请
    • TAMPER EVIDENT CAP AND CONTAINER
    • 捣蛋器盖和容器
    • WO1993023304A1
    • 1993-11-25
    • PCT/US1993004815
    • 1993-05-20
    • ZOLNOWSKI, RobertMAY, John, Paul
    • B65D41/34
    • B65D41/3409
    • A cap (26) and container (10) combination wherein the cap (26) fits about the container (10) in at least two closure positions. Two circumferential bands (29, 30) are provided around the skirt (28) of the cap (26) and there is an internal thread (31) which engages an external thread about the container neck (13). In the first position, one band of the cap (26) engages a circumferential slot (21) about the container (10). The internal thread seals with the top of the container (10). The first band (29) is removed and the container opened by removing the cap. In the second position, the second band (30) engages the slot and the threads engage each other. In the second position, the second band (30) is located about the container (10). It remains in position when and after the cap (26) is removed. Tampering of the container (10) and cap (26) can be visually detected with this configuration. A bead (19) about the container (10) is formed of a reduced cross-section in portions circumferentially around the cap (26). This facilitates assembly and disassembly of cap (26) and container (10).
    • 盖(26)和容器(10)组合,其中所述盖(26)在至少两个封闭位置围绕所述容器(10)配合。 围绕帽(26)的裙部(28)设置有两个周向带(29,30),并且存在与围绕容器颈部(13)的外螺纹接合的内螺纹(31)。 在第一位置,盖(26)的一个带接合围绕容器(10)的周向槽(21)。 内螺纹与容器(10)的顶部密封。 取出第一条带(29),并通过取下盖子打开容器。 在第二位置,第二带(30)接合槽,并且螺纹彼此接合。 在第二位置,第二带(30)围绕容器(10)定位。 当帽(26)被移除时,它保持在适当的位置。 可以用这种结构目视检测容器(10)和盖(26)的篡改。 围绕容器(10)的小珠(19)由围绕盖(26)周向的部分减小的横截面形成。 这有利于盖(26)和容器(10)的组装和拆卸。