-
公开(公告)号:US20140218500A1
公开(公告)日:2014-08-07
申请号:US14173113
申请日:2014-02-05
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Chandrasekhar Narayanaswami , Mandayam Thondanur Raghunath , RAMON CACERES , STEFAN BERGER
CPC classification number: G01N21/8803 , G01N21/954 , G01N2021/0118 , G01N2021/889 , G01N2201/06 , G01N2201/08 , G02B23/2484 , G06Q10/20 , G07C3/00 , H04N7/18
Abstract: A system for monitoring performance of a machine for detection of visible signs of failure, includes: a machine enclosure housing machine parts; at least one canal through the machine enclosure acting as a visual conduit for providing a view into the interior of the machine; a guide rail within the canal for moving a camera into the interior; an interface to the machine configured to receive images from the visual conduit; and a repair network for linking the interface to a monitoring center that provides for the repair of problems with the machine.
Abstract translation: 用于监测机器性能的系统,用于检测可见的故障迹象,包括:机器外壳,容纳机器部件; 通过机器外壳的至少一个管道用作视觉导管,用于提供机器内部的视野; 运河内的导轨将相机移入内部; 该机器的接口被配置为从视觉导管接收图像; 以及用于将接口链接到监视中心的维修网络,其提供对机器的问题的修复。
-
2.
公开(公告)号:US20170300309A1
公开(公告)日:2017-10-19
申请号:US15132321
申请日:2016-04-19
Applicant: International Business Machines Corporation
Inventor: STEFAN BERGER , KENNETH A. GOLDMAN , SIMON J. KOFKIN-HANSEN , HUI LEI , VIJAY K. NAIK , DIMITRIOS PENDARAKIS , JAYARAM KALLAPALAYAM RADHAKRISHNAN , DAVID R. SAFFORD , SHU TAO
CPC classification number: G06F8/60 , G06F8/61 , G06F9/45533 , G06F9/45558 , G06F21/57 , G06F2009/45587 , G06F2221/2111 , H04L41/00 , H04L63/107 , H04L67/10 , H04L67/34 , H04W4/021
Abstract: Examples of techniques for deploying an application on a cloud environment satisfying integrity and geo-fencing constraints are disclosed herein. A computer implemented method may include: receiving a guest application for deployment on a cloud environment; receiving the integrity constraints on the integrity of each of the plurality of host where the application is to be deployed; receiving geo-fencing constraints identifying a geographic location where the guest application is to be deployed; determining for which of the plurality of hosts the integrity constraints and the geo-fencing constraints are satisfied; and deploying the guest application on at least one of the plurality of hosts that satisfy the integrity constraints and the geo-fencing constraints.
-