vault-family-2015-overview-brochure

合集下载

1 Introduction Security in FileVault

1 Introduction Security in FileVault

Security in FileVaultSakthiyuvaraja SakthivelmuruganCIS751Report,Fall20071IntroductionApple introduced FileVault into the Macintosh operating systems to provide a extra layer of security by encrypting the content of users home directory.Only a person with the users password will be able to decrypt and view the content of the users home directory.This report discuss about the implementation details and security in FileVault.2Overview of FileVaultFileVault employs Advanced Encryption Standards algorithm(AES also known as Rijndael,is a wildly used block cipher)to encrypt the user data.When a user selects to secure his/her home directory with FileVault.A Sparse Image is created and the contents of the user directory is copied into the sparse image.The older contents are securely deleted so that they cannot be recovered using external software.A sparse image is a disk image which can be encrypted and occupies only the amount a space the data within takes.When a user logs in to the system the sparse image will be mounted in his home directory.The contents and folder structure will be same as it was before,so the user will not see any change in the way his home directory looks before and after encrypting with FileVault.When the user logs out the sparse image will be unmounted.Only a user which the password used for encryption could mount the sparse image.The sparse image internally has a header and data region.Fewfields in the header region is encrypted and whole of data region is encrypted.The users password is used to decrypt the content of the header which are encrypted.These encryptedfields have information about decrypting the data region.The user cans set a Master Password using which the password to a sparse image can be reset in the event of the user forgetting his password.If the user forgets both the master and user password the content of the sparse image will be unrecoverable.3Sparse Image3.1Header RegionThe header of the sparse image contains details needed for decrypting the data region.Thefields of the header are:•Salt for PBKDF2•Encrypted IV for3DES-EDE•Encrypted HMAC-SHA1KEY•Encrypted AES-KEYThe key used for encrypting the data region is encrypted(Key Wrapping)by again.There are certain advantages of using this mechanism,namely a stronger and difficult to crack encryption technique can be used to encrypt the key.One may argue that this stronger encryption technique can be used for encrypting the data;But it might prove to be detrimental if the time take for encrypting huge data is high.The Password Based Key Derivation Function(PBKDF2)is used to create a key passKey from the user password.The key derivation function takes in three arguments user password user_pass, salt s and iteration count1000in this case.The key wrapping unwrapping is done using the passKey,initialization vector IV and applying the 3DES-EDE on it which is shown in Table2.•wrapped key=3DES-EDE(passKey,IV,key_to_be_encrypted)•passKey=PBKDF2(salt,password,iteration)3.2Data RegionThe data region is encrypted/decrypted using AES-128block cipher.The IV is output of HMAC-SHA1which takes the chunk number and Hmac-sha1key read from the header and the key is the 128bit AES Key stored in the header region.The content of the user home directory stored in the sparse image gets encrypted as4K byte chunks in AES-128CBC mode.•Encrypted Data Chunk=AES-128cbc(K,IV,chunk,ENCRYPT)•IV=trunc128(HMAC-SHA1(hmac-key||chunkno)•K-Symmetric Key•IV-Initialization Vector•chunk-Data to be encrypted•HMAC-SHA1-Hashed Message Authentication Function•hmac-key-Key used for HMAC-SHA1•chunkno-Count of the chunk that is to be encrypted/decrypted.4AnalysisMost of the time the user password will be a simple dictionary based word which are easy to remember.Easy to remember password lacks entropy and are prone to brute force attack.Also the password do not have the sufficient length needed for cryptographic operations.So the password goes through a process called key strengthening which derives a key out of the password which are stronger and is difficult to be cracked.PBKDF2is a key strengthening function,it applies a pseudo random function,to the input password or passphrase along with a salt value and repeats the process many times(1000is arecommended minimum)to produce a derived key.Having a salt added to the password reduces the ability to use a preset dictionary to attack a password.The iterations increase the work that must be done on the attacker’s side to build a brute force attack.If the salt is changed,the entire attack dictionary has to be rebuilt.This overhead makes pre built dictionary attack difficult on FileVault.The passKey derived out of user password is not actually used for encryption of the sparse image data.The role of passKey is to wrap another key which is used for encryption of the data. This method is employed because,when user changes his password the encrypted data has to be re-encrypted using the new key.Re-encrypting will be an over head especially when the user data is huge.Now,only the headerfields has to be re-encrypted with the new key and has to be replaced in place of the old header.The unwrapping of the keys is done using3DES-EDE.The unwrapped keys include the AES-Key and HMAC-SHA1-Key.The former is used for the decryption and encryption of the data and the later is used for the Hashed Message authentication code.The AES-128employs CBC cipher block chaining,this mode makes sure that no two identical plaintext block encrypt to the same cipher text.This is done by XORing the preceding cipher block with the plaintext.There are problems with this mode of ciphers.If there is a bit error in the beginning of the block it gets propagated to the rest of the cipher.Also if n th chunk has to be decrypted or encrypted it is dependent on n-1th chunks.An alternative approch called the counter mode is applied in FileVault. Which is a simple variation of cbc.The IV is not calculated from the preceeding cipher instead the chunk no is used for it.Since,IV should not be known by the attacker,an HMAC is created using the chunk no which is difficult to reproduce without knowing the HMAC-Key.HMAC are collision resistant so there will beεchance that the attacker canfind the IV even if the chunk number is know to the attacker.We have just seen that no two IV can be identical.Consider d1and d2are two data chunks wich are identical with c1and c2as chunk numbers.AES(d1,IV1,AES-Key)=AES(d2,IV2,AES-Key). Where IV1=Hmac-sha1(key,c1)and IV2=Hmac-sha1(key,c2).This shows that no two cipher in the data region will be identical.4.1Possible AttacksEven after using complex techniques to keep the data safe,there are some attacks possible on FileVault.Watermarking is one of them.The CBC mode of operation leads to watermarking attacks.Where the attacker will be able to predict the presence of some information with out knowing the key.4.2Known IssuesOn power failure and on some rare occasion if the sparse image gets corrupted the user may end up losing all data of his home directory since sparse image is a singlefile inside which all the data of the user home directory is stored.4.3VersionsThe Sparse Image has two versions:version1where the header information are at the end of the disk image and version2where the header information are stored in beginning of thefile.The analysis was done for version2which is the current version used in Mac OS X10.4.5ConclusionFileVault can’t possibly be extended with the current design to incorporate a full disk encryption as many people would want to.But its possible to do;to have a full disk encryption the boot process has to be modified to understand the decryption technique and more enhancements so that the encrypted disk image can be mounted from which the OS should start booting.The speed of the system may go down considerably considering the number of encryption and decryption operation that has to occur and a single disk image will be a point point of failure for corruption.Recovering corrupted image will be hurdle that has to befixed.FileVault can’t possibly be extended with the current design to incorporate a full disk encryption.FileVault was meant to encrypt home directories for which it is perfectly designed and have the security features.6Reference•/vilefault/23C3-VileFault.pdf•/rfc/rfc3826.txt•/rfc/rfc2898.txt•New Methods in Hard Disk Encryption,Clemens Fruhwirth7AppendixAn overview of the experiments done as a part of the report.•Apple Open Source Libraries analysis to understand the implementation of FileVault–libsecurity_filevault-28631–libsecurity_cdsa_utilities-32432–libsecurity_apple_csp-32567•Creation of sparse image using hdiutil.The debug mode of hdiutil gave some internals fo the sparse image,but not much could be understood as the disk framework is private.•A code sinippet which simulates the implementation of the header region.。

CaviWipes 洗涤棉签说明书

CaviWipes 洗涤棉签说明书

SAFETY DATA SHEETProduct Name: CaviWipes™ BleachProduct Use: Hard surface cleaner and disinfectant wipes. Read and understand the entire label before using. Use only according to label instructions. It is a violation of Federal law to use this product in a manner inconsistent to label instructions.Manufacturer: METRE X™ RESEARCH1717 W. Collins Ave.Orange, CA 92867U.S.A Canadian Distributor: Sybron Canada LPBrampton, Ontario L6W 4T5Information Phone Number: 1-800-841-1428 (Customer Care)Chemical Emergency Phone Number (Chemical Spills, Leaks, Fire, Exposure or Accident only): CHEMTREC 1-800-424-9300 (in the US) 1-703-527-3887 (Outside the US)SDS Date of Preparation/Revision: July 11, 2017GHS / HAZCOM 2012 Classification:This product is not hazardous according to the OSHA Hazacom 2012 standard (29 CFR 1910.1200) Label Elements:Signal Word: None requiredPictogram: None requiredHazard Phrases: None requiredPrecautionary Phrases:None RequiredThis product is an aqueous solution impregnated on a polyester wipe.Eye Contact: If contact occurs, flush eyes with large quantities of water, holding the eyelids apart. Get medical attention if irritation persists.Skin Contact: Wash hands thoroughly with soap and water. If irritation develops, get medical attention.Inhalation: None normally required. If irritation or symptoms develop, move to fresh air and get medical attention.Ingestion: Ingestion is unlikely due to product form. If swallowed, rinse mouth with water. Do not induce vomiting. Never give anything by mouth to an unconscious person. Get medical attention.Most important symptoms and effects, acute and delayed: May cause mild eye irritation. Prolonged skin contact may cause skin irritation.Indication of immediate medical attention and special treatment, if needed: None required under normal conditions of use.Suitable (and Unsuitable) Extinguishing Media: Use any extinguishing media that is appropriate for the surrounding fire.Specific Hazards Arising from the Chemical: This product will burn once the liquid has evaporated. Combustion may produce carbon and sodium oxides.Special Protective Equipment and Precautions for Firefighters: Firefighters should wear positive pressure self-contained breathing apparatus and full protective clothing for fires in areas where chemicals are used or stored.Personal precautions, Protective equipment, and Emergency procedures: No special precautions are required for handling clean wipes. When using wipes to clean and disinfect, please follow appropriate universal precautions due to potential pathogens on the surface.Environmental Precautions: Avoid release to the environment. Report spill as required by local and federal regulations.Methods and Materials for Containment and Cleaning up: Do not reuse towelette. Pick up wipe and place in an appropriate container for disposal. If used, place in a container for infectious waste disposal. Do not flush in toilet.Precautions for Safe Handling: Avoid contact with eyes. Wash thoroughly with soap and water after handling. Not for cleaning or sanitizing skin. Do not use as a diaper wipe or for personal cleansing.This product contains bleach. Do not use this product with other chemicals such as ammonia, toilet bowl cleaners, rust removers, or acid, as this releases hazardous gases.Conditions for Safe Storage, Including any Incompatibilities: Store this product in a cool, dry area, away from direct sunlight and heat to avoid deterioration. Protect container from physical damage. When not in use, keep container tightly closed to prevent moisture loss.Exposure LimitsAppropriate Engineering Controls: General ventilation should be adequate for normal use.Respiratory Protection : None normally required. For operations where the occupational exposures are exceeded, a NIOSH approved respirator with dust/mist cartridges or supplied air respirator appropriate for the form and concentration of the contaminants should be used. Equipment selection depends on contaminant type and concentration. Select in accordance with 29 CFR 1910.134 and good industrial hygiene practice. For firefighting, use self-contained breathing apparatus.Hand protection: None required for handling clean wipe. Follow appropriate universal precautions for cleaning surfaces and equipment potentially contaminated with infectious materials.Eye Protection : None required for handling clean wipe. Follow appropriate universal precautions for cleaning surfaces and equipment potentially contaminated with infectious materials.Protective Clothing: None required for handling clean wipe. Follow appropriate universal precautions for cleaning surfaces and equipment potentially contaminated with infectious materials.Hygiene measures: None required for handling clean wipe. Appearance: Clear, colorless liquid on a polyester towelette Odor: Bleach odor Odor Threshold: Not available pH: 10.4 (typical) Melting/Freezing Point: 32°F (0°C) BoilingPoint/Range:212°F (100°C) Flash Point: Not flammable Evaporation Rate: Same as waterFlammability: (Solid, Gas) Not applicable FlammabilityLimits:Not applicable Vapor Pressure: Same as water Vapor Density: Not available Relative Density: 1.04 (typical) Solubilities:Complete soluble in water Partition Coefficient: (N-Octanol/Water) Not available AutoignitionTemperature:Not flammable Decomposition Temperature: Not available Viscosity:Not availableReactivity: None known.Chemical Stability: Stable.Possibility of Hazardous Reactions: None known.Conditions to avoid: None known.Incompatible Materials: Avoid contact with strong oxidizing agents, acids, caustics, and ammonia. Hazardous decomposition products: Carbon and sodium oxides.Potential Health Effects:Inhalation: Not a normal route of exposure with a wipe. Inhalation of vapors may cause irritation of the nose and throat. In an OCSPP 870.1300 acute inhalation study, the LC50 for the product was determined to be greater than 2.21 mg/L (Category IV).Skin Contact: Prolonged skin contact may cause skin irritation with redness and itching. . In an OCSPP 870.2500 Acute Skin Irritation Study, this product was shown to be minimally irritating to skin (Category IV). In an OCSPP 870.1200 Acute Dermal Toxicity in rats, the LD50 in rats was determined to be 5050 mg/kg (Category IV). This product did not cause skin sensitization with guinea pigs in an OCSPP870.2600 skin sensitization study.Eye Contact: May cause mild irritation with redness and tearing. In an OCSPP 870.2400 Acute Eye Irritation Study, this product was shown to be minimally irritating to eye (Category IV)Ingestion: Ingestion is an unlikely route of exposure for a wipe product. If swallowed, may cause gastrointestinal disturbances including nausea and diarrhea. In an OCSPP 870.1100 acute oral toxicity study with rats, the LD50 was determined to be greater than 5000 mg/kg (Category IV).Chronic Hazards: None expected.Carcinogen: None of the components are listed as a carcinogen or potential carcinogen by IARC, NTP, ACGIH, or OSHA.Acute Toxicity Values:Product: Oral rat LD50 >5000 mg/kg (no mortalities), Inhalation rat LC50 >2.2 mg/L/4 hr (no mortalities), Dermal rat LD50 >5050 mg/kg (no mortalities).Toxicity: No toxicity data available for product.Sodium Hypochlorite: 96 hr LC50 Oncorhynchus mykiss 1.65 mg/L, 48 hr EC50 daphnia magna 141ug/LPersistence and degradability: Biodegradation is not applicable to inorganic substances. Bioaccumulative Potential: Not data available. This product is not expected bioaccumulate.Mobility in Soil: No data available.Other Adverse Effects: None known.Solution Disposal: Flush thoroughly with large quantities of water into sewage disposal system in accordance with Federal, State, and local regulations.Container Disposal: Nonrefillable container. Do not reuse or refill this container. Offer for recycling, if available. If recycling is not available, discard in trashThis chemical is a pesticide product registered by the United States Environmental Protection Agency and is subject to certain labeling requirements under federal pesticide law. These requirements differ from the classification criteria and hazard information required for safety data sheets (SDS), and for workplace labels of non-pesticide chemicals. The hazard information required on the pesticide label is reproduced below. The pesticide label also includes other important information, including directions for use.FIFRA Labeling:Keep Out Of Reach of ChildrenThis product meets EPA’s Toxicity Category IV by all routes of exposure. Therefore a Signal Word, Precautionary Language and First Aid Statement is not required in accordance to EPA Label Review Manual: Chapter 7.Physical or chemical hazard: This product contains bleach. Do not use this product with other chemicals such as ammonia, toilet bowl cleaners, rust removers, or acid, as this releases hazardous gases.U.S. Federal Regulations:EPA SARA 311/312 Hazard Classification: Not HazardousEPA SARA 313: This Product Contains the Following Chemicals Subject to Annual Release Reporting Requirements Under SARA Title III, Section 313 (40 CFR 372): NoneProtection of Stratospheric Ozone: This product is not known to contain or to have been manufactured with ozone depleting substances as defined in 40 CFR Part 82, Appendix A to Subpart A.CERCLA SECTION 103: The RQ of this product based on the RQ of sodium hypochlorite of 100 lbs present at 1% maximum is 10,000 lbs. Many states have more stringent release reporting requirements. Report spills required under federal, state and local regulations.California Proposition 65: This product does not contain chemicals known to the State of California to cause cancer and/or reproductive toxicity.International InventoriesUS EPA TSCA Inventory: All of the components of this product are listed on the Toxic Substances Control Act (TSCA) Chemical Substances Inventory or exempt.Canadian Environmental Protection Act: All of the components in this product are listed on the Domestic Substances List (DSL) or exempt.NFPA Rating: Fire: 0 Health: 0 Instability: 0Effective Date: July 11, 2017Supersedes Date: February 6, 2017Revision Summary: Section 11 Inhalation, Skin Contact and Ingestion, Acute Toxicity Values, Section 16 NFPA RatingThe information and recommendations set forth herein are taken from sources believed to be accurate as of the date of preparation, however, METREX™ RESEARCH makes no warranty with respect to the accuracy or suitability of the recommendations, and assumes no liability to any use thereof.。

The Ultimate Ownership of Western European Corporations

The Ultimate Ownership of Western European Corporations

The Ultimate Ownership of Western European CorporationsMara Faccio * and Larry H.P. Lang **(Forthcoming, Journal of Financial Economics)AbstractWe analyze the ultimate ownership and control of 5,232 corporations in 13 Western European countries. Fi r ms are typically widely held (36.93 percent) or family controlled (44.29 percent). Widely-held firms are more important in the U.K. and Ireland, family-controlled firms in continental Europe. Financial and large firms are more likely to be widely-held, while non-financial and small firms are more likely to be family-controlled. State control is important for larger firms in certain countries. Dual class shares and pyramids are used to enhance the control of the largest shareholders, but overall there are significant discrepancies between ownership and control in only a few countries.----------* Department of Finance and Business Economics, Mendoza College of Business, University of Notre Dame, Notre Dame, IN 46556-5646, U.S.A. Tel.: +1 219 631 5540; fax: +1 219 6315255; e-mail: mfaccio@.** Chinese University of Hong Kong, 225 LKK Building, Shatin, Hong Kong. Tel.: +852 2609 7761; e-mail: llang@.hk.We are grateful to Marco Bigelli, Lorenzo Caprio, Edith Ginglinger, Arun Khanna, John McConnell, Stefano Mengoli, Robert Pye, Gordon Roberts, Bill Schwert (the editor), George Tian, and especially Andrei Shleifer and an anonymous referee for providing helpful comments. We benefited from comments from workshop participants at the Nati onal University of Singapore, Washington University at St Louis, the Capacity Building Seminar in Manila (sponsored by the Asian Development Bank), the European Financial Management Association meeting (Athens), the European Finance Association meeting (London), the Financial Management Association meeting (Seattle), and the Scottish Institute for Research in Investment and Finance (Edinburgh). We also thank Bolsa de Valores de Lisboa, Commerzbank, Helsinki Media Blue Book, Hugin, the Union Bank of Switzerl and, and the Vienna Stock Exchange for generously providing us with their data sets. Mara Faccio acknowledges research support from Università Cattolica, Milan, and MURST (research grant #MM13572931). Larry Lang acknowledges research support from a Hong Kong Earmarked Grant.The Ultimate Ownership of Western European Corporations1. IntroductionRecent studies suggest that Berle and Means’ (1932) model of widely-dispersed corporate ownership is not common, even in developed countries.1 In fact, large shareholders control a significant number of firms in many countries, including developed ones. To examine ownership and control by large shareholders, La Porta, Lopez-de-Silanes and Shleifer (1999) traced the control chains of a sample of 30 firms in each of 27 countries. They documented the ultimate controlling owners and how they achieved control rights in excess of their ownership rights through deviations from the one-share-one-vote rule, pyramiding, and cross-holdings. Claessens, Djankov, and Lang (2000) carried out a similar task for 2,980 listed firms in 9 East Asian countries.2 They found significant discrepancies between ultimate ownership and control, allowing a small number of families to control firms representing a large percentage of stock market capitalization.This paper answers two questions. What is the structure of the ultimate ownership of Western European firms? What are the means by which owners gain control rights in excess of ownership rights? To answer these questions, we collect ultimate o wnership data for a sample of 5,232 listed firms in Austria, Belgium, Finland, France, Germany, Ireland, Italy, Norway, Portugal, Spain, Sweden, Switzerland, and the U.K. We include a large number of medium- and small-sized corporations, and we include both non-financial and financial companies. We measure ownership and control in terms of cash flow and voting rights. For example, if a family owns 25 percent of Firm X that owns 20 percent of Firm Y, then this family owns 5 percent of the cash flow rights of Firm Y – the product of the ownership stakes along the chain – and controls 20 percent of Firm Y – the weakest link along the control chain.Western European firms are most likely to be widely held (36.93 percent) or family controlled (44.29 percent). Widely-held firms are especially important in the U.K. and Ireland, while family control is more important in continental Europe. Widely-held firms are more important for financial and1 See Shleifer and Vishny (1997), Claessens et al. (2000) and Holderness et al. (1999).1large firms, while families are more important for non-financial and small firms. In certain countries, widely-held financial institutions also control a significant proportion of firms, especially financial firms. In some countries of continental Europe, the State also controls a significant proportion of firms, especially the largest. Widely-held corporations control few firms.We report the use of multiple classes of shares, pyramidal structures, holdings through multiple control chains and cross-holdings3, devices that give the controlling shareholders control rights in excess of their cash flow rights. Dual class shares are used by few firms in Belgium, Portugal, and Spain, but by 66.07 percent, 51.17 percent, and 41.35 percent of firms in Sweden, Switzerland, and Italy. Pyramids and holdings through multiple control ch ains are used to control only 19.13 and 5.52 percent of listed firms respectively, being less important for family-controlled firms and more important for firms controlled by the State and by widely-held financial institutions. 53.99 percent of European firms have only one controlling owner. More than two-thirds of the family-controlled firms have top managers from the controlling family. Overall, we find a substantial discrepancy between ownership and control in Belgium, Italy, Norway, Sweden, and Switzerland, but much less elsewhere.Our results for the 20 largest firms differ slightly from those of La Porta et al. (1999), in that we find fewer State-controlled firms and more widely held firms, fewer pyramids, and more dual class shares. Compared to the findings of Claessens et al. (2000) for East Asia, we find that: families control a higher proportion of firms; each family controls fewer firms on average; top families control a lower proportion of total stock market capitalization4; a higher proportion of family-controlled companies have family members in top management; and the largest shareholder is less often alone, but averages much higher cash flow rights, control rights and ratio of cash flow to voting rights. These differences may be due to weaker law enforcement in Asia that allows controlling owners to achieve effective control of a large number of firms by controlling and owning a smaller part of each firm.2 Hong Kong, Indonesia, Japan, South Korea, Malaysia, the Philippines, Singapore, Taiwan, and Thailand.3 Pyramiding occurs when the controlling shareholder owns one corporation through another which he does not totally own. Firm Y is held through “multiple control chains” if it has an ultimate owner who controls it via a multitude of control chains, each of which includes at least 5 percent of th e voting rights at each link. “Cross-holdings” means company Y directly or indirectly controls its own stocks.2Section 2 describes the data. Section 3 discusses ultimate ownership patterns. Section 4 discusses the means whereby owners gain control rights in excess of ownership rights and Section 5 measures the extent to which this has been achieved. Section 6 presents conclusions.2. Data2.1. Data sources and sample selectionSome of the p revious studies of corporate ownership and control, such as Lins and Servaes (1999a, 1999b), relied primarily on Worldscope. However, we found its coverage inadequate. For example, Worldscope included only 176 of 632 Spanish listed firms at the end of 1997.5 Moreover, ownership data was sometimes missing6. To ensure accuracy, we included only countries for which we could obtain alternative sources (especially primary or official) to permit cross-checking.7 This consideration excluded Luxembourg, Greece8, D enmark9 and Holland10 leaving 13 Western European countries that had comprehensive, reliable ownership data: Austria, Belgium, Finland, France, Germany, Ireland, Italy, Norway, Portugal, Spain, Sweden, Switzerland and the U.K. For these countries, Table 1 l i sts the data sources for ownership and multiple classes of shares. Data limitations confined our4 Japan stands apart from the rest of East Asia in this regard: the top Japanese family controls only 0.5 percent of total market capitalization5 In this case, we instead relied upon the Spanish Stock Exchange regulatory authority’s files (Comision Nacional del Mercado de Valores, 1998) which provides quarterly information on all shareholders with at least 5 percent of control rights, as well as directors’ ownership for all listed firms.6 In this case, Worldscope reports zero ownership stakes.7 We did not rely on Worldscope if we had an official data source (i.e., the Stock Exchange ownership files). When official data sources were not available, we collected data from alternative sources. We used Worldscope for ownership data only when information for a specific firm could not otherwise be identified.8 In addition, Greek shares are often held in bearer form, masking the identities of their owners.9 La Porta et al. (1999) used Hugin for Denmark. However, Hugin covers less than 20 percent of all listed firms and we could not locate information from other official sources10 The Stichting Toezicht Effectenverkeer (STE, the Securities Board of the Netherlands), responded to our request for data as follows: “The implementation of the 1992 Act has resulted in the list of disclosed notifications being no more than an historical overview that has been overtaken by countless events and no longer provides the desired transparency of the (Dutch) stock market. Furthermore, the file corruption will become greater with the passage of time. Given the above and the fact that the 19963sample to the period from 1996 to the end of 1999.11 This is not a significant restriction since ownership structures tend to be rather stable, as noted in La Porta et al. (1999).The European Corporate Governance Network (ECGN), too, has sponsored several studies on ownership structures within the European Union.12 However, compliance with the European Union directive on large shareholdings (88/627/EEC) restricts meaningful cross-country analysis with non-European Union countries. In particular, the ownership measures documented in those studies represent neither ultimate ownership nor ultimate control stakes. Specifically: they do not consider the use of multiple voting shares; they simply add up direct and indirect control stakes without tracing them to the ultimate owners; the controlling owner is defined as the one who controls an absolute majority (i.e., over 50 percent) of voting rights, or holds enough voting rights to have de facto control13,14 and the mechanisms used to secure control rights in excess of ownership rights are not systematically analyzed.[Insert Table 1 about here]Over the sample period, a total of 5,547 firms were listed in these 13 countries. Of these, we excluded 167 firms whose ownership was not recorded, 61 that use nominee accounts (mostly in the U.K. and Ireland, where firms are not required to disclose the identity of their “true” owners) and 87Act does not empower the STE to take any measures in this regard which would lead to an up-to-date overview, the STE does not issue this list to third parties.” See also de Jong et al. (1998).11 Data are from 1996 for France, Germany, Italy, Switzerland, and the U.K.; from 1997 for Spain and Portugal; from 1998 for Sweden a nd Norway; and from 1999 for Austria, Belgium, Finland, and Ireland.12 Becht and Boehmer (1998) for Germany; Bianchi, Bianco, and Enriques (1998) for Italy; Bloch and Kremp (1998) for France; Crespi-Cladera and Garcia-Cestona (1998) for Spain; de Jong, Kab ir, Marra, and Roell (1998) for the Netherlands; Renneboog (1998) for Belgium; Goergen and Renneboog (1998) for the U.K.13 For example, French regulation defines de facto control as occurring when a person or a legal entity owns, directly or indirectly, more than 40 percent of voting rights and no other partners or shareholders own a higher percentage directly or indirectly (Bloch and Kremp, 1998). This corresponds to a control threshold of 40 percent.14 To illustrate the bias that this definition introduces, consider the ultimate control structure of Montedison (Italy). Montedison has two shareholders with a stake above 2 percent: Compart with a stake of 33.45 percent and Mediobanca with a stake of 3.77 percent. Compart is indicated in the Italian supervisory authority’s files as the “ultimate” owner of Montedison. However, we found that Compart has three shareholders with stakes above 10 percent: Credit (11.01 percent), Cassa di Risparmio di Roma (10.14 percent), and Mediobanca (15.26 percent). According to our definition, Compart is the ultimate controlling shareholder of4affiliates of foreign firms (i.e., a foreign firm controls at least 50 percent of their voting rights) where we could not follow their ownership chain.15 This screening left 5,232 firms comprising 94.32 percent of the listed firms in the 13 countries.16 For these firms, our database records all owners who control at least 5 percent of voting rights. In France, Germany, and Spain, such owners must disclose their identity; the disclosure threshold is 2 percent in Italy and 3 percent in the U.K.The difficulty of organizing dispersed shareholders means that if the largest shareholder holds a substantial block of shares, then he has effective control. In line with earlier studies, we shall assume that 20 percent of the voting shares suffices to ensure control. We shall also discuss some cases that assume a control threshold of 10 percent. If no shareholder exceeds a given control threshold, then the firm is said to be “widely held” at that threshold. Table 2 sets out the screening process and lists the samples of firms analyzed in later tables.[Insert Table 2 about here]The exclusion of firms that use nominee accounts may overstate the proportion of widely-held firms in our sample. However, nominee accounts are the largest shareholders in only a small proportion of firms (less than 5 percent), so any bias is likely to be marginal. Ireland and the U.K. have the highest proportion of nominee accounts so this bias would be strongest there. These countries also have the highest proportions of widely-held firms, so the exclusion of firms using nominee accounts is unlikely to distort our cross-country comparisons.A shareholder of a corporation is said to be an ultimate owner at a given threshold if he controls it via a control chain whose links all exceed that threshold. If a firm has two owners with 12 percent of control rights each, then we say that the firm is half controlled by each owner at the 10 percent threshold, but that the firm is widely-held at the 20 percent threshold. In the case of a firm with two owners – a family with 20 percent of control rights and a widely-held corporation with 19 percentMontedison at the 20 percent threshold. However, at the 10 percent threshold, Mediobanca would be the largest ultimate owner of Montedison, with a 15.26 percent + 3.77 percent = 19.03 percent control stake.15 We retain the affiliates of foreign firms in our database whenever the holding firm is included in our sample.16 Our sample coverage of countries is: Austria: 100.00 (percent), Belgium: 89.04, Finland: 87.76, France: 89.26, Germany: 99.15, Ireland: 82.14, Italy: 100.00, Norway: 72.77, Portugal: 100.00, Spain: 100.00, Sweden: 94.96, Switzerland: 100.00, and the U.K.: 95.69. The low figure for Norway is due more to limited data coverage than to our screening.5of control rights – we would say that this firm is half controlled by each owner at the 10 percent threshold, but family-controlled at the 20 percent threshold.2.2. Calculation of cash flow rights and control rightsCorporate ownership is measured by cash flow rights, and control by voting rights. Ownership and control rights can differ because corporations can issue different classes of shares that provide different voting rights for given cash flow rights. Ownership and control rights can also differ because of pyramiding and holdings through multiple control chains.Firm Y is said to be controlled through “pyramiding” if it has an ultimate owner, who controls Y indirectly through an other corporation that it does not wholly control. For example, if a family owns 15 percent of Firm X, that owns 20 percent of Firm Y, then Y is controlled through a pyramid at the 10 percent threshold. However, at the 20 percent threshold, we would say t hat Firm Y is directly controlled by Firm X (which is widely-held at the 20 percent threshold) and no pyramiding would be recorded. If Firm X holds 100 percent of Firm Y, then again there is no pyramid. Pyramiding implies a discrepancy between the ultimate owner’s ownership and control rights. In the above example, the family owns 3 percent of the cash flow rights of Firm Y – the product of its ownership stakes along the control chain — but its control rights are measured by the weakest link in its control chain, i.e., 15 percent.Firm Y is said to be controlled through a “multiple control chain” if it has an ultimate owner who controls it via a multitude of control chains, each of which includes at least 5 percent of the voting rights at each link. In the previous example, suppose that the family also owns 7 percent of Firm Y directly. Then the family owns 10 percent of the cash flow rights of Firm Y (0.15 * 0.20 + 0.07) and controls 22 percent of its voting rights (min (0.15, 0.20) + 0.07).171817 A firm can be controlled by holdings through multiple control chains, even though it is not controlled by pyramiding. For example, suppose that Firm A controls 10 percent of B and 100 percent of C, which controls 15 percent of B. Since C is fully controlled by A in the control chain A-C-B, there is no pyramiding. However, Firm A controls Firm B directly and indirectly through Firm C, with control rights of 25 percent. We conclude that Firm A controls Firm B through multiple control chains bec ause: (1) Firm B has a controlling owner at the 20 percent level; (2) B is controlled via multiple control chains; and (3) all links in each chain involve at least 5 percent of the control rights.18 Claessens et al. (2000) defined “holdings through multiple control chain” as “cross-holdings”.6Firm Y is said to be controlled by a “cross-holding” at the 20 percent threshold if Firm X holds a stake in Firm Y of at least 20 percent, and Y holds a stake in Firm X of at least 20 percent, or if firm Y holds directly at least 20 percent of its own stocks.2.3. Types of ownershipThis section discusses our classification of ultimate owners into the following six types: Family: A family (including an individual), or a firm that is unlisted on any stock exchange.Widely-held financial institution: A financial firm (SIC 6000-6999) that is widely-held at the control threshold.State: A national government (domestic or foreign), local authority (county, municipality, etc.), or government agency.Widely-held corporation: A non-financial firm, widely-held at the control threshold.Cross-holdings: The firm Y is controlled by another firm, that is controlled by Y, or directly controls at least 20 percent of its own stocks.Miscellaneous: Charities, voting trusts, employees, cooperatives, or minority foreign investors.Where the ultimate owner of a corporation is an unlisted firm, we tried to trace its owners19 using all available data sources. We had incomplete success because most of our sample countries do not require unlisted firms to disclose their owners.20 If we failed to identify the owners of an unlisted19 In the case of the Fiat group, for example, we traced the ownership of La Rinascente back to the Agnelli family from Il Taccuino dell’Azionista, although we find two unlisted firms in its chain of control (namely, Carfin and Eufin). In fact, La Rinascente is controlled by Eufin (with a 32.8 percent ownership and a 40.51 percent control stake), which is wholly controlled by Ifil. Wer gehört zu wem is particularly useful in a number of cases in Germany. However, it helps us identify the owners for only 20 percent of unlisted German firms. For example, we find that TCHIBO Holding AG is the largest owner of Beiersdorf AG (a listed firm) with a 25.87 percent O&C stake. TCHIBO Holding, however, is an unlisted firm. We identified its ultimate owner: the Herz family, which has a 100 percent O&C stake. Another case is Heidelberger Zement AG, whose largest owner (with a 19.07 percent O stake and a 21.8 percent C stake) is Schwenk Gmbh, again an unlisted firm. We find that Schwenk is 90 percent owned and controlled by the Schwenk family, and 10 percent owned by the Babette family. In some cases, the ownership structure of unlisted firms is more complex. For example, the direct owner of Thyssen AG is Thyssen Beteiligunsverw Gmbh, which is unlisted. We find that this firm is 49.999 percent owned and controlled by Commerzbank (a listed, widely-held financial firm), and 49.981 percent owned and controlled by Allianz. A number of complex cases of ownership of unlisted firms were also reported by La Porta et al. (1999).20 One exception is the U.K., where the 3 percent disclosure rule also applies to unlisted firms. However, we were still not able to find ownership data for all unlisted firms.7firm, then we classified them as a family.21 Below, we offer both a general justification for this convention and statistical support for it in the largest European economies.Our database records the unlisted subsidiaries of widely-held corporation or financial institution, so any listed firm controlled by an unlisted firm that is controlled by a widely-held corporation or financial institution would be recorded as being controlled by the latter in our database. Thus, an unlisted firm that we identified as the ultimate controller of a listed firm is unlikely to be, in fact, controlled by a widely-held corporation or financial institution. Nor is the unlisted firm likely to be controlled by the State; insofar as the State controls firms, they tend to be listed. In any case, State ownership has decreased dramatically in Europe after the privatization wave of the 1990s. The low likelihood that an unlisted firm is, in fact, controlled by a widely-held corporation, widely-held financial institution or the State leaves families as the most likely controller of an unlisted firm. This is supported by the following country studies.For Germany, we collected a sample of 500 unlisted firms with ultimate owners from Wer gehört zu wem.22 We found that the average control stake is 89.44 percent. In 68 percent of the cases, the largest owner is the sole owner; in the remainder, the largest owner holds an average stake of 67 percent. Families, both domestic and foreign, are the largest ultimate owners of 90.6 percen t of these firms. At the 20 percent level, financial firms control 4.9 percent of unlisted firms, the State 2.67 percent, and cross-holdings 1.83 percent. Thus, both State and widely-held financial firms are insignificant as ultimate owners of unlisted firms. Furthermore, since the State and the largest financial institutions are included in the Wer gehört zu wem database, we were able to identify them and trace their ownership chain. This further reduces the possibility of bias in our sample.For Italy, Bianchi et al. (1998) considered a sample of 1,000 manufacturing firms surveyed by the Bank of Italy. They reported that the largest immediate shareholder of these firms held, on average, a direct stake of 67.69 percent. Among all types of immediate sharehol ders, individuals held 4821 This approach is close to that of Claessens et al. (2000), who regarded as a family any controlling shareholder that was an unlisted firm in a business group.22 We considered firms in alphabetical order, including a firm in our sample if we could trace its ultimate owners. We stopped when our sample numbered 500.8percent of equity, non-financial firms 36.9 percent, financial firms 0.17 percent, the State 4.6 percent, and foreign investors 8 percent. We secured a wider sample of 3,800 unlisted Italian firms with ultimate owners from the AIDA database.23 We found that the State is the largest owner for 0.4 percent of firms, financial institutions for 0.2 percent, and families (domestic and foreign) for 99.4 percent. The average ultimate control stake of the largest controlling shareholder was 70.71 percent.For France, Bloch and Kremp (1998) summarize the ownership structure of a sample of 282,322 (mostly unlisted) firms.24 For firms with more than 500 employees, the largest owner held, on average, 88 percent of the capital. For 56 percent of th e unlisted firms, the largest owner was a family; for the remaining 44 percent it was another corporation, usually an unlisted firm. For the U.K., Goergen and Renneboog (1998) reported that 78 percent of unlisted firms are fully controlled by one shareholder, while the remaining 22 percent have a shareholder who (directly) holds a majority stake.252. 4. Examples[Insert Figure 1 about here]Figure 1 illustrates dual class shares and pyramiding in the Nordström family group of Sweden. All holdings of more than 5 percent of a firm’s shares are listed. All firms shown in Figure 1 have dual class shares: A-shares carry one voting right while B-shares carrying one-tenth of a voting right. Realia has two classes of shares: 2.641 million A-shares and 42.922 million B-shares. A- and B-shares have the same face value, so the total stock capital is 45.563 million shares. A-shares constitute 5.8 percent of stock capital (= 2.641 million / 45.563 million) while B-shares constitute 94.2 percent). A-shares carry 2.641 million votes, while B-shares carry 4.292 million votes (= one-tenth of 42.922 million).23 AIDA is a private database provided by Bureau Van Dijk. The AIDA database provides accounting information for about 130,000 Italian firms and ownership information for 25,314 Italian firms. Fi rms with ownership data in the AIDA database are not ranked in any order. We traced ownership to ultimate owners starting from the first firm listed in the AIDA database using ownership information contained in that database. A firm was included if we could trace its ultimate owners. We stopped when our sample reached 15 percent of firms with ownership data.24 Their results were based on data compiled by the French central bank (Fiben), that is unavailable to the public.25 The figures are based on a sample of 12,600 unlisted firms from the Jordan’s database, which is compiled by a private data vendor, Bureau Van Djik.9Thus, A-shares carry 38.09 percent of the votes (= 2.641 million /(2.641 million + 4.292 million)), while B-shares carry 61.91 percent of votes.Realia has three direct shareholders: Columna Fastigheter, Lingfield Investment and the Eriksson family. Columna owns 1.933 million A-shares and 14.007 million B-shares. Thus, Columna owns 35 percent (= (1.933 million + 14.007 million)/ 45.563 million) of cash flow rights, a nd controls 48.1 percent (= (1.933 million + 1.401 million) / (2.641 million + 4.292 million)) of votes in Realia. Realia’s second largest direct shareholder, Lingfield Investments, owns no A-shares and only 6.259 million B-shares, which comprise 13.7 percent (6.259 million / 45.563 million) of the cash flow rights, and 9 percent (0.6259 / (2.641 million + 4.292 million)) of the control rights. Finally, the Eriksson family owns 0.591 million A-shares and 0.101 million B-shares, comprising 1.5 percent (= (0.591 million + 0.101 million) / 45.563 million) of the ownership rights, and 8.7 percent (= (0.591 million + 0.0101 million) / (2.641 million + 4.292 million)) of the control rights. Through Columna Fastigheter, the Nordström family has sole control of Realia at the 20 percent threshold. However, at the 10 percent threshold, Realia has a second large shareholder, Blockfield Properties.In Relia’s control structure there are two pyramiding chains: Nordström family/Columna/Realia and Blockfield/Columna/Realia.[Insert Figure 2 about here]Figure 2 illustrates the control of Unicem by pyramiding, holdings through multiple control chains, and dual class shares within the Agnelli family group, the largest Italian group. The methodology presented in Figure 1 is used to compute cash flow rights (O) and control rights (C), taking account of dual class shares. Unicem is directly controlled by two major shareholders: Ifi and Ifil. Ifil is controlled by Ifi with a direct stake (O = 7.97 percent; C = 14.6 percent) and an indirect stake (O = 20.55 percent; C = 37.64 percent) through Carfin, a wholly owned, non-financial unlisted firm. Since Carfin is wholly controlled by Ifi, we consider Ifi’s stake in Ifil as a direct holding rather than a pyramid, although we say there is holdings through multiple control chain (see footnote 17). Ifi is controlled by a single major shareholder, Giovanni Agnelli & C. S.p.A. (the Agnelli family). The Agnelli family’s control of Unicem is thus exercised through pyramiding (Ifi-Carfin-Ifil-Unicem), non-voting shares (within Ifi, Ifil,10。

SanDisk Memory Vault全新产品保存影像一世纪

SanDisk Memory Vault全新产品保存影像一世纪

SanDisk Memory Vault全新产品保存影像一世纪
佚名
【期刊名称】《《电子与电脑》》
【年(卷),期】2011(000)010
【摘要】SanDisk推出全新产品-SanDisk Memory Vault,是专门用以长期保存数据的新款系列中,最先问世的首项产品。

SanDisk Memory Vault是数字时代的相簿,可让消费者将影像保存在可靠的装置之中。

新产品可连结计算机的USB插槽,【总页数】1页(P91-91)
【正文语种】中文
【中图分类】TP333
【相关文献】
1.全新战略,佳能办公产品全面发力——佳能(中国)商务影像方案部全新战略及办公设备新品发布会 [J],
2.迈进数码领域探索影像奥秘柯达医疗集团发布医疗影像全新产品 [J], 薛芳
3.Altium发布团队配置管理解决方案及全新Vault [J],
4.迈进数码领域探索影像奥秘柯达医疗集团在京发布医疗影像全新产品 [J],
5.迈进数码领域探索影像奥秘柯达医疗集团在京发布医疗影像全新产品 [J],
因版权原因,仅展示原文概要,查看原文内容请购买。

普安磁盘阵列cli手册

普安磁盘阵列cli手册

普安磁盘阵列cli手册磁盘阵列柜操作手册威科姆科技2007-101、磁盘阵列柜操作模式,提供4种磁盘阵列柜操作方式1)前面板手工操作方式;2、查看系统信息是否与自己得到的硬件信息一致。

3、进入View and edit configuration parameter cacheing parameter optimization for equeyial I、O4、 View and edit configuration parameter hot ide parameter Ma Qeued I、O count: 10245、开始创建RAID,进入 view and edit logical drive6。

按enter7。

按enter8。

创建RAID59。

按enter选中11块盘,留一块作热备,10。

按ESC确定选中的盘11、指定热备盘12、修改参数,改动WritePolicy为Write Back13、把StripeSize改为 256K14、确定创建15、开始初始化16。

等到初始化到100%,选中要分区的逻辑卷。

17。

选择分区大小,第一个分区为1600000MB,第二个分区为剩余容量,先分第一个分区。

18。

进行分区选择分区大小,原则上容量不大于4T时,分2个分区,每个分区的容量是总容量的二分之一;总容量不大于6T时,分3个分区,每个分区的容量是总容量的三分之一;以此类推。

保持每个分区的容量不大于2T即可。

a)第一个分区大小定为1600000MBb)第二个分区容量是剩下的容量19。

退出view and edit logical drive,进入view and edit hot lun。

20。

按enter21、选择CHL0ID101LUN0映射partion 0。

22、按enter,映射partion 0成功。

23、按enter确认24、接着进行CHL0ID102LUN1影射 partion125、选中partion1 ,按enter26。

Microsoft Azure Stack HCI MX Series 产品介绍说明书

Microsoft Azure Stack HCI MX Series 产品介绍说明书

ThinkAgile MX Series Making Azure Stack HCI solutions easyAccelerate your BusinessDeploying hyperconverged infrastructure is the key to simplifying and modernizing operations for traditional and state-of-the art. Large storage deployments are increasingly being replaced by HCI based solutions for most general-purpose workloads. HCI has proven to deliver better efficiency and price performance in the datacenter. Additionally, financial, healthcare, education retail and many other customers have been choosing a hybrid approach, migrating certain workloads to the cloud, while keeping other workloads on-premises.Azure Stack HCI, is Microsoft’s HCI solution for customers that wish to run workloads on-premises and extend easily to Azure for hybrid capabilities such as back-up, site recovery, storage, cloud-based monitoring and more.Azure Stack HCI is a new HCI host operating system from Microsoft, delivered as an Azure service, providing the latest and up-to-date security, performance and feature updates. Azure Stack HCI builds on the foundation of the Microsoft Windows Server Software Defined program and provides a certification path for Storage Spaces Direct solutions.Lenovo ThinkAgile MX is a fully engineered, jointly validated and integrated solution that can extend Azure Arc enabled infrastructure from hybrid multi-cloud environments to datacenter and at the edge with the flexibility to help you build and operate applications and services. Customers can quickly and easily:Develop cloud-native apps and operate themanywhere (on-prem, edge or cloud) using the same Azure portalHarness data insights from the cloud to the edgeGet simplified edge computing infrastructure forlow-latency applicationMeet residency and sovereignty needs of the on-prem platform infrastructureOperate with full, intermittent or no internetconnectionPerform life cycle management using LenovoXClarity softwareLenovo ThinkAgile MX Series (Appliances and Certified Nodes) combine the Storage Spaces Direct technology included in this new host OS, with industry leading Lenovo servers to deliver HCI building blocks that build your infrastructure solutions. Lenovo ThinkAgile MX appliances map to Microsoft Azure Stack HCI Integrated Systems and ThinkAgile MX Certified Nodesmap to Microsoft Azure Stack HCI Validated Nodes.ThinkAgile MX SeriesThe flexible building block for your Microsoft Azure Stack HCI solutions.Intel 4th Generation Xeon SP Processor based MX Model SpecificationsModel ThinkAgile MX650 V3 (Integrated Systems &Certified Node)ThinkAgile MX630 V3 (Integrated Systems & Certified Node) – SR630 V3Form Factor2U1USegment Hyperconverged Infrastructure – Microsoft Azure Stack HCI solutions Processor2x 4th generation Intel® Xeon® Scalable processors, 8-120 coresMemory Up to 8TB in 32x slots, using 16GB-256GB DIMMSNetwork10/25GbE adapters (RoCE or iWARP), 100GbE (RoCE) RDMA network adapters Drive Bays16x 3.5", 28x 2.5"4x 3.5", 12x 2.5"Storage Options –Capacity Tier Depending on configuration:4-14x HDDs: 1TB to 14TB4-30x SSDs: 480GB to 7.68TB4-24x NVMe: 750GB to 7.68TBDepending on configuration:4-10x HDDs: 600GB to 14TB4-12x SSDs: 480GB to 7.68TB4-12x NVMe: 750GB to 7.68TB4-16x E1.S NVMe: 4TBCache Tier Depending on configuration:2-6x SSDs: 800GB to 6.4TB2-8x hot-pluggable NVMe: 750 GB to 6.4TB Depending on configuration:2-4x SSDs: 800GB to 6.4TB2-4x hot-pluggable NVMe: 750 GB to 6.4TBPower Supply Dual redundant power supply per server.750W/1100W/1800W/2400W/2600WSystems Management Optional hardware management via Lenovo XClarity and resource management through Microsoft Windows Admin CenterLicense Options Azure Stack HCI Software (Included with Integrated System), Windows Server 2022 Datacenter (optional)Warranty and Support Lenovo 3-year, 4-year, or 5-year hardware warranty; ThinkAgile Advantage Single Point of Support where available (included with Integrated System)© 2023 Lenovo. All rights reserved.Availability : Offers, prices, specifications and availability may change without notice. Lenovo is not responsible for photographic or typographic errors. Warranty : For a copy of applicable warranties, write to: Lenovo Warranty Information, 1009 Think Place, Morrisville, NC, 27560. Lenovo makes no representation or warranty regarding third-party products or services. Trademarks: Lenovo, the Lenovo logo, ThinkAgile®,ThinkSystem®, and XClarity® are trademarks or registered trademarks of Lenovo. Intel® and Xeon® are trademarks of Intel Corporation or its subsidiaries. Arc®, Azure®, Hyper-V®, Microsoft®, Windows Server®, and Windows® are trademarks of Microsoft Corporation in the United States,other countries, or both. Other company, product, or service names may be trademarks or service marks of others. Document number DS0058,published March 31, 2023. For the latest version, go to /ds0058.Intel 3rd Generation Xeon SP Processor based MX Model SpecificationsModel ThinkAgile MX Series (Appliance & Certified Node)– SR650 V2ThinkAgile MX Series (Appliance & Certified Node)– SR630 V2Form Factor 2U1USegment Hyperconverged Infrastructure – Microsoft Azure Stack HCI solutions Processor 2x 3rd generation Intel® Xeon® Scalable processors, 8-40 cores Memory Up to 4TB in 32x slots, using 16GB-128GB DIMMSNetwork 10/25GbE adapters (RoCE or iWARP), 100GbE (RoCE) RDMA network adapters Drive Bays 16x 3.5", 28x 2.5"4x 3.5", 12x 2.5"Storage Options –Capacity TierDepending on configuration:4-14x HDDs: 1TB to 14TB4-30x SSDs: 480GB to 7.68TB 4-24x NVMe: 750GB to 7.68TBDepending on configuration:4-10x HDDs: 600GB to 14TB 4-12x SSDs: 480GB to 7.68TB 4-12x NVMe: 750GB to 7.68TB 4-16x E1.S NVMe: 4TBCache TierDepending on configuration:2-6x SSDs: 800GB to 6.4TB2-8x hot-pluggable NVMe: 750 GB to 6.4TB Depending on configuration:2-4x SSDs: 800GB to 6.4TB2-4x hot-pluggable NVMe: 750 GB to 6.4TBPower SupplyDual redundant power supply per server.750W/1100W/1800W/2400W/2600WSystems Management Optional hardware management via Lenovo XClarity and resource management through Microsoft Windows Admin CenterLicense Options Azure Stack HCI Software (Included with Appliance), Windows Server 2019 Datacenter (optional)Warranty and SupportLenovo 3-year, 4-year, or 5-year hardware warranty; ThinkAgile Advantage Single Point of Support where available (included with Appliance)About LenovoLenovo (HKSE: 992) (ADR: LNVGY) is a US$62 billion revenue global technology powerhouse, ranked #171 in the Fortune Global 500, employing 77,000 people around the world, and serving millions of customers every day in 180 markets. Focused on a bold vision to deliver smarter technology for all, Lenovo is expanding into new growth areas of infrastructure, mobile, solutions and services. This transformation is building a more inclusive, trustworthy,and sustainable digital society for everyone, everywhere.For More InformationTo learn more about ThinkAgile MX Certified Nodes,contact your Lenovo representative or Business Partner,or visit /thinkagile . For detailed specifications,consult the ThinkAgile MX product guides .* ITIC Global Reliability Study, /lp1117.。

家族办公室如何发力戴尔私有化

家族办公室如何发力戴尔私有化

家族办公室如何发力戴尔私有化作者:高皓刘中兴叶嘉伟来源:《新财富》2013年第10期很少有人注意到,迈克尔·戴尔与银湖资本对戴尔公司250亿美元收购案的幕后操刀者,是戴尔的家族办公室MSD Capital。

由两位金融界“蓝血贵族”执掌的MSD Capital,15年来对戴尔的家族资产进行集中管理和优化配置,其运作不仅熨平了由于戴尔公司业绩波动可能造成的戴尔家族财富涨跌,并将一部分利润贡献为家族基金会的经费,还帮助戴尔完成了私有化的资金与交易伙伴安排,成为家族背后忠实而强大的后盾。

家族办公室(Family Office,FO),这个家族财富管理的顶层设计工具在近两年的中国迅速发展。

无论在清华大学五道口金融学院“全球家族企业课程”中,还是在瑞士银行年度家族办公室峰会(瑞士/新加坡)上,家族办公室都成为中国富豪榜前列家族的热议话题。

为中国超高净值家族设立的单一家族办公室(Single Family Office,SFO)及联合家族办公室(Multi Family Office,MFO)日渐崛起,2013年可谓“中国家族办公室元年”。

然而,如何设计家族办公室的治理模式与经营战略,如何选聘最值得信赖的专业经理人,如何构建与家族风险偏好及传承目标相匹配的投资组合,成为摆在中国家族面前的挑战。

最近风头颇劲的戴尔家族办公室,恰可以为中国家族提供一个绝佳的参照模版。

“蓝血”经理人操盘2013年9月12日,在全球第三大PC制造商戴尔公司(DELL.NSDQ,04331.HK)于总部得克萨斯州朗德罗克召开的股东大会上,该公司董事长兼CEO迈克尔·戴尔(Michael Dell)与私募投资公司银湖资本(Silver lake)提出的250亿美元的收购要约方案获得批准。

这意味着,戴尔公司私有化尘埃落定。

很少有人注意到,这笔金融危机以来全球最大规模的杠杆收购案的幕后操刀者,正是戴尔的家族办公室MSD Capital。

筷子迅雷 NAS 服务器 Q802 存储说明书

筷子迅雷 NAS 服务器 Q802 存储说明书

Data SheetFujitsu CELVIN® NAS Server Q802 StoragePowerful 4-Drive NASThe Fujitsu CELVIN® NAS Server Q802 is the ideal product for file sharing, end to endbackup options and SAN (Storage Area Network) integration for SMB customers - enabling centralized data management at a reasonable price. It is a balanced multipurpose devicewith up to 12 TB storage and can be set up for anything from surveillance operations toNAS plus iSCSI storage.Business Server FeatureMultifunctional business server features bridges the worlds of SAN and NAS, enablescross-platform file sharing between Windows, Mac or Linux and support virtualization applicationsHot swappable drivesVMWare®/Citrix®/HyperV™ CapableiSCSI storage for cluster virtualizationEncrypted remote replication for archivingBackup ManagementComprehensive backup features to manage the challenge of data growth on physicaland virtual machines in heterogeneous environments.Easy to use online management softwareOffsite remote replicationData backup to cloud or external storage devicesSupport for third party softwareMultimedia FeaturesUp to 12 TB storage capacityEasy scale-up with up to six hard disk drives including online management toolsVirtual disk expansion virtual disc expansion with bandwidth aggregation on twonetwork ports for increased flexibilityOnline capacity expansion and RAID level migrationReliabilityService-friendly cabinet3-years spare part supplyCountry-specific warrantyTop-up services are availableCELVIN® NAS Server Q802Technical specificationsFirmware based on 3.7.3Processor: Intel® Atom™ D270x 2,1GHzMemory: 1 GB DDRIII RAM512 MB Flash on DOMFAN:1x quiet cooling fan (9cm)Intel® 82574L NIC x2 Gigabit LANFormfactor: TowerHard disk capacity Up to 4 x 2.5-inch or 3.5-inch SATA I/II/SATA 6Gb/s HDD or SSD up to 12TB raw capacity, consult HDD compatibility list Required interface Ethernet plugLED USBStatusHDD 1 -4LANPowerSystem controls Power button, One-touch copy button, Alarm Buzzer (System Warning), Reset Button, Display mode buttonColor Black housing, copper colored traysSoftware specificationNetworking TCP/IP (IPv4 /IPv6 dual stack), multi IP setting,LACP,Port trunking /NIC teaming:Balance-rr (Round-Robin), Active Backup, Balance XOR, Broadcast, IEEE 802.3ad,Balance-tlb (Adaptive, Transmit Load Balancing), Balance-alb (Adaptive Load Balancing)DHCP client, DHCP server including PXE bootCIFS/SMB, AFP/Netatalk3.2, NFS v3, HTTP, HTTPS, FTP,SFTP(admin), DDNS, NTP, Telnet, SSH, iSCSI, SNMP,WebDAV,SMSCDual Gigabit w/ Jumbo Frame, BonjouriSCSI initiator for virtual disks (max 8 disks); stack chaining masterVirtual disk support for EXT3/ EXT4/ NTFS/ FAT32/ HFS+Support for VMware VSphere 4 and 5 via NFS and iSCSIWindows Server 2008 support (Hyper-V & failover clustering)Citrix XenServer (6.0)iSCSI target (with multi-LUNs per target)iSCSI LUN online expansionLUN mapping / LUN maskingUp to 256 LUNsSCSI Primary Commands -3 (SPC-3) support / persistent reservationMC/S (multiple TCP connections / session) support to reach iSCSI targetMPIO (multipath input output) for load balancing and failoverVLAN 802.1QUSB WiFi-Adapter support IEEE 802.11b/g/nWEP, WPA-personal (AES/TKIP), WPA2-personal (AES)Connection to wireless network or Ad Hoc networkBackup Management Client backup softwareTime machine backup (OS X Lion support)3rd party backup software supportEncrypted block-level remote replication (instant, scheduled backup management); synchronization mode/RsyncReal-time remote replication (RTRR protocol) for real-time backup of server & client, 3 sync modes, filter, policydefinition, SSL protectedBackup to CloudBackup to (encryptable) USB/eSATA storage devicesLUN backup and restoreLUN point-in-time snapshot (1x)File System Management Network share management ’(max. 512 shares)Share folder level ACL supportUnicode supportJournaling file systemWeb File ManagerFile management by Web-browserFile and folder searchDirect file viewing via Google Docs support (pdf,tif/tiff,ppt,doc,xls,pptx,docx,xlsx,svg,odt)Create and send download links for public file sharing (time expiration, password protected)Disk Management Disk usage status management; HDD S.M.A.R.T.; Bad blocks scanRAID 0/1/5/5+HS/10/6, JBOD, single diskOnline RAID capacity expansion; online RAID-level migrationRAID recovery, Bitmap supportISO mounting (max 256) via Web File ManagerUser Management User quota managementWindows Active Directory support, max. 10k usersLDAP directory service supports Open LDAP, max. 10k domain usersUser account management (max. 4096users)User group management (max. 512 groups)Shared folders (max. 512)Concurrent connections (max. 256)Support batch creating usersUser Import/ Export for Multiple CELVIN NAS DeploymentSubfolder Permission (File/Directory ACL)Microsoft Networking (Samba) Host Access Control (Domain/IP)Radius Server Support for 802.1x security authentication: PAP , EAP-TLS/PAP, EAP-TTLS/PAP (WPA-Enterprise, WPA2-Enterprise)max. 10 RADIUS clients, max. 4096 usersVPN Server OpenVPN up to 256bit SSL/TLS, PPTP up to 128bit encryptionSystem Tools E-mail alert (SMTP authentication); SMS alert notificationDisk usage alertHDD standby modeAutomatic power on after power lossSchedule power on/ off (15 settings max)System firmware upgradeWake-on-LANSmart fan settingBack up, restore, reset system settingsConfigurable management portRemote login by Telnet connectionUSB, SNMP(v2, v3) UPS supportNetwork recycle binEvent Logs Complete system logs (file level): system events management, connection logs, current connection of on-line usersCentralized monitoring / syslog server (TCP / UDP)Manually and advanced log filtering via wizzardMultilingual (Online) Support Primary languages: English, German, Czech, Danish, Spanish, French, Italian, Norwegian, Polish, Russian, Finish,Swedish, Dutch, Turkish, further languages available via GUIFTP Server FTP remote access (max. 256 concurrent connections)FTP with SSL/ TLS (explicit) modeFTP bandwidth control and connection controlPassive FTP port range controlFXP and Unicode supportTFTP server (PXE boot)SFTP (admin only)Printer Server USB printer network sharing (Windows / Mac)Internet printing protocol, printer management, Apple Bonjour printingWeb Server Built-in editable php.ini, SQLite and MySQLWeb-based management via phpMyAdminMax. 32 virtual hostsBrowser support:Internet Explorer 7+Firefox 3+Safari 3+Google ChromeMySQL Server MySQL database serverSecurity Network access protection with autoblocking (SSH, Telnet, HTTP(S), FTP, CIFS/SMB, AFPPolicy based automatic IP blocking and IP filterEncrypted access (HTTPS, FTP with SSL/TLS(explicit),SSH/SFTP, RSync over SSH,CIFS host access control for shared foldersClamAV antivirus protectionFIPS 140-2 validated AES 256-bit volume based data encryptionImportable SSL certificatesOpenVPN up to 256bit SSL/TLS, PPTP up to 128bit encryptionRadius ServerInstant alert via E-mail, SMS, Instant Messaging, LCDSurveillance Station 1 channel free, up to 12 channels possible (fee-based)IP camera finder software and configurationMedia Server UPnP Media ServerTwonky MediaiTunes serverSupports UPnP Media playerGame consoles Xbox360, PS3, PSPDMP/DMAMultimedia station featuresRealtime & background photo transcodingDownload Station BitTorrent (FTP/ HTTP scheduled download)Support of TCP/ UDP tracker protocol, distributed hash table/DHTUp to 500 BT download tasksDownload configuration / download status listRSS download manager, subscription to RSS feeds, RSS downloadMultiple URLs in one taskInterfacesUSB 2.0 total Front side: x1 ; rear side: x4USB 3.0 total Rear side: x2eSATA 2 x (rear / SATA)Interfaces USB 2.0 / USB 3.0 / eSATA / Ethernet / VGA for maintenace, HDMI (not enabled), DATA SHEET: Subject to change w/onotificationSupported formatsVideo formats(Media Server): wmv, asf, vdr, avi, xvid, divx, flv, mpg, mpe, mts, m2ts, m2t, mpeg, spts, m2p, m2v, mp2t, mp2p,mpg2, dvr-msSubtitle formats(Media Server): m3u, m3u8, wpl, plsSupported formatsMusic formats(Media Server): mp3, mp4, m4a, m4b, 3gp, apl, ac3, m1v, m4v, mov, aac, amr, awb, wav, pcm, lpcm, mp1, mp2, aif,aiff, aifc, snd, wma, ogg, flac; Internet Radio (Media Server): vTuner, ShoutcastPicture formats Media Server): jpg, jpe, jpeg, tiff, tif, gif, png, bmpSupported file system EXT4 (internal/external HDD)EXT3 (internal/external HDD)NTFS (external HDD)FAT32 (external HDD)HFS+ (externel HDD)SecurityElectrical valuesPower consumption EUP mode: 0,45W WoL mode: 1,9W Sleep mode:25W Operation mode: 43 WPower supply input Internal power supply 250W 50-60Hz Input: 100-240V ACComplianceEurope CEUSA/Canada FCC Class BCompliance link https:///sites/certificates/Dimensions / Weight / EnvironmentalDimensions (W x D x H)180 x 235 x 177 mmWeight Net weight: 3.65 kg, Gross weight: 4.65 kg; Package incl. System w/oOperating ambient temperature0 - 40 °CRequired interface Ethernet plugSoftware support (Operating system)Windows® XPMicrosoft® Windows ® 7 (32 bit and 64 bit)Windows Vista®Mac OS XLinuxUNIXWindows® Server 2008 R2Windows® Server 2003Required network EthernetCELVIN NAS Server Q802; Power Cord, CD, LAN cable, Key for tray lock, trays, Quick Start Guide, Service flyerOrder informationS26341-F103-L211Single Tray with 1 TB NAS Hard Disk DriveS26341-F103-L212Single Tray with 2 TB NAS Hard Disk DriveS26341-F103-L213Single Tray with 3 TB NAS Hard Disk DriveS26341-F103-L802w/o Hard Disk Drives, 4 trays includedS26341-F103-L811 4 x 1 TB NAS Hard Disk DrivesS26341-F103-L812 4 x 2 TB NAS Hard Disk DrivesS26341-F103-L813 4 x 3 TB NAS Hard Disk DrivesS26341-F103-L816 2 x 3 TB NAS Hard Disk DrivesS26341-F103-L817 4 x 2 TB NAS Hard Disk Drives INT (EU/UK/CH power cord)S26341-F103-L818 4 x 3 TB NAS Hard Disk Drives INT (EU/UK/CH power cord)S26341-F103-L880w/o Hard Disk Drives, 4 trays included, (EU/UK/CH power cord)VFY:CQ802XX020E1 4 x1 TB NAS Hard Disk Drives EUVFY:CQ802XX030E1 4 x 2 TB NAS Hard Disk Drives EUContactFUJITSU Technology Solutions Website: /fts2013-04-02 CE-ENworldwide project for reducing burdens on the environment.Using our global know-how, we aim to contribute to the creation of a sustainable environment for future generations through IT.Please find further information at http://www./global/about/environment/delivery subject to availability. Any liability that the data and illustrations are complete, actual or correct is excluded. Designations may be trademarks and/or copyrights of the respective manufacturer, the use of which by third parties for their own purposes may infringe the rights of such owner.More informationAll rights reserved, including intellectual property rights. Changes to technical data reserved. Delivery subject to availability. Any liability that the data and illustrations are complete, actual or correct is excluded.Designations may be trademarks and/or copyrights of the respective manufacturer, the use of which by third parties for their own purposes may infringe the rights of such owner.For further information see /terms Copyright © Fujitsu Technology Solutions。

Azure Stack HCI 商品说明书

Azure Stack HCI 商品说明书

Technical Use Cases for Azure Stack HCI Solution OverviewAzure Stack HCI provides enterprise customers a highly available, cost efficient, flexible platform to run a high-performance Microsoft SQL Server leveraging the power of state-of-the-art hardware and Storage Spaces Direct. Azure Stack HCI presents a highly competitive solution for delivering exceptionally performant Microsoft SQL Server. Whether running Online Transaction Processing (OLTP) workloads, or Data Warehouse and BI, to AI and advance analytics over Big Data, you will benefit from the resiliency that Azure Stack HCI offers. This is especially important for mission critical databases. Leveraging the flexibility to run SQL Server in VMs (Windows Server or Linux), it allows you to consolidate multiple database workloads and easily scale out by adding additional VMs to the Azure Stack HCI environment as needed. Additionally, Azure Stack HCI enables you to integrate Microsoft SQL Server with Azure Backup service and Azure Blob Storage service to provide cloud-based backup solutions that are reliable and secure.How to deploy Microsoft SQL Server on Azure Stack HCI1.Hardware and OS configuration for Azure Stack HCIFujitsu recommends the 2U dual-socket PRIMERGY RX2540 M5 rack server system as the best fit for the High-performance Microsoft SQL Server scenario. Please see below the configuration options that have been certified according to the Azure Stack HCI program.TypeHybrid: SSD+HDD All-Flash: All-SSD All-Flash: NVMe+SSD ServerPRIMERGY RX2540 M5(2.5’’ or 3.5’’ ) PRIMERGY RX2540 M5(2.5’’) Scalability2 to 16 nodes CPU2x Intel Xeon Silver 4208 or better (16-56 cores) Memory64GB to 3TB Drives Cache2-12x 2 .5” or 2-6x 3.5” SSD SAS/ SATA (800 GB per node or higher) - 2-4x 2.5” NVMe (3.2 TB per node or higher) Capacity4-22x 2.5 ” or 4-10x 3.5” HDD SAS/SATA (2.4 TB per node or higher) 4-24x 2.5” SSD SAS/SATA (1.92TB per node or higher)4-24x 2.5” SSD SAS/SATA (1.92TB per node or higher)Network2x PLAN EP QL41xxx 2x PLAN EP MCX4-LX 25Gb 2p SFP28 LP RDMA / TPM 2.0yes / yes HBA Fujitsu PSAS CP400i SASBranch office and edge Virtual desktop infrastructure High-performance Microsoft SQL Server Trusted enterprise virtuali s ation Scale-out storageThis solution leverages your Azure Stack HCI investment to run Microsoft SQL Server for highly available and highly performant enterprise database applications. It also provides customers’ easy backup to Azure with hybrid connectivity built in. Below, you will find a how-to guide for deploying Microsoft SQL Server on Azure Stack HCI that includes: -Solution Overview-Step by step documentation to deploy Microsoft SQL Server on Azure Stack HCIDeployment and SupportFujitsu Product Support Services provide installation and support services for hardware and software. With the Fujitsu SolutionPacks, Fujitsu provides a special Infrastructure Support package that is designed to offer a single point of contact for all components (Fujitsu and thir d-party) of a Fujitsu infrastructure solution.Customers can acquire Fujitsu Product Support Services for deployment of Azure Stack HCI the following way:The following tasks are done by Fujitsu professional engineers:-All power and network cabling.-Installation and update Windows Server 2019 Datacent re.-Configuration of Windows Server 2019 features, cluster, network, and Hyper-V.Infrastructure ManagementFor an efficient management of the complete hardware infrastructure, Fujitsu recommends Fujitsu Software Infrastructure Manager (ISM) providing a converged management for both the physical and the virtual environment, including compute, storage and network devices. ISM provides the following key features:- A dashboard with a customi s able layout providing you with all relevant information to make quick and proactive decisions-Monitoring of all critical server components including CPU and memory utili s ation-Alerting in case of system failures to quickly identify affected components-Firmware updates of all hardware components in a Azure Stack HCI cluster (covers server, storage and switch devices) Step by Step guide to deploy Azure Stack HCI1.Install Windows Server 2019 Datacent re (follow guidance above for network connectivity for Clustering)2.Add Roles and Features3.Setup Failover Clustering and enable a Cluster Witness4.Setup Storage Spaces DirectInstall Windows Admin Cent re (WAC) to manage Windows Server and Windows Server VMs.The step 1 to 4 above are done by Fujitsu Product Support Services.Copyright 2020 FujitsuFujitsu, the Fujitsu logo and Fujitsu brand names are trademarks or registered trademarks of Fujitsu Limited in Japan and other countries. Microsoft, the Microsoft logo, Windows and Windows Server are trademarks or registered trademarks of Microsoft in the U.S. and/or other countries. Other company, product and service names may be trademarks or registered trademarks of theirrespective owners, the use of which by third parties for their own purposes may infringe the rights of such owners. Technical data are 2.Set up Microsoft SQL Server on Azure Stack HCI Set up Windows Server or Linux VM a.Install SQL Server on Linux b.Install SQL Server on Windows3.Monitoring and performance tuning To insure performance and health of your Microsoft SQL Server instances on Azure Stack HCI, it is important that appropriate monitoring and tuning is put in place. Additional SQL Server database engine tutorials are included here .For tuning SQL Server 2016/2017 for high performance, the following recommended practices are provided.4.High Availability (HA)Azure Stack HCI leverages Windows Server Failover Clustering (WSFC) and can be utili s ed to support Microsoft SQL Server running in VMs (designed to help with hardware failure). Microsoft SQL Server also offers Always On availability groups (AG) which provides database-level high availability and is designed to help with application and software faults. In addition to WSFC and AG, Azure Stack HCI can also leverage Always On Failover Cluster Instance (FCI) based on using Storage Spaces Direct technology for shared storage. All of these options can leverage the Microsoft Azure Cloud witness for quorum control. It is recommended that cluster AntiAffinity rules in WSFC be leveraged for the VMs to be placed on different physical nodes in order to maintain uptime for SQL Server in the event of host failures when you configure Always On availability groups.5.Set up Azure hybrid scenarios Azure Backup supports backing up and restoring Microsoft SQL Server with application consistency. Install Azure Backup Server to start backup of your on-prem SQL data.Alternatively, you can also leverage Azure Blob Storage service for SQL Server to backup and restore to Azure BlobStorage service . This is suitable for off-site archiving. To manage the Azure Blob Storage backups, you can leverage the Managed SQL Backup feature included in Microsoft SQL Server.In addition to the backup scenario, you can set up other database services that Microsoft SQL Server (Microsoft SQLServer 2016/2017/2019) offers, connecting to Azure services such as (but not limited to) Azure Replica , Stretch Database , Azure Data Factory .SummaryWith completion of Microsoft SQL Server deployment using Azure Stack HCI, you now have a platform capable of running complex, highly available database workloads in VMs.。

filevaut2 结构

filevaut2 结构

filevaut2 结构
filevault2是苹果公司提供的一种全磁盘加密技术,它可以帮助用户保护他们的Mac电脑上的数据免受未经授权的访问。

FileVault 2使用XTS-AES-128加密算法来加密整个硬盘驱动器上的数据,这意味着即使有人物理上获取了硬盘,也无法访问其中的数据。

FileVault 2的结构涉及几个关键组件。

首先是用户的登录密码,该密码用于解锁加密的硬盘驱动器。

其次是密钥链,这是一系列用于解密文件系统密钥的密钥。

密钥链包括主密钥、回复密钥和用户密钥。

主密钥由用户的登录密码保护,而回复密钥和用户密钥则由系统生成并保存在硬盘驱动器上。

最后是加密的文件系统,它包括加密的存储卷和文件系统密钥。

文件系统密钥由密钥链解密,然后用于解密存储卷上的数据。

FileVault 2的工作流程大致如下,当用户启动Mac电脑时,系统会要求用户输入其登录密码。

一旦用户成功登录,系统将使用用户的登录密码来解锁主密钥,然后使用主密钥来解锁密钥链。

接着,系统将使用密钥链中的密钥来解密文件系统密钥,最终解密存储卷上的数据,使用户可以访问其文件和应用程序。

总的来说,FileVault 2的结构包括用户密码、密钥链和加密的文件系统,这些组件共同工作以确保用户的数据得到安全保护。

通过对这些组件的合理管理和保护,用户可以享受到强大的数据加密保护,从而确保其个人和敏感信息的安全性。

威亚维解决方案选择指南说明书

威亚维解决方案选择指南说明书

Selection Guide Fiber Cleaning Tips and Adapters FCLT-U12-MA FCLT-U12X FCLT-U25CleanBlast Tip for SC Bulkheadssupport both PC/UPC and APC polish types with the same tip. Some of the tips are also used in conjunction with a guide, as shown in the images below.Manufacturer: Product Name:VIAVI CLEANBLAST MT BULKHEAD TIP SC SC FCLT-SCX CleanBlast Tip for SC Bulkheads, HardenedE2000CleanBlast Tip for FC BulkheadsCleanBlast Tip for LC BulkheadsCleanBlast Tip for LC Bulkheads, AngledCleanBlast Tip for MU BulkheadsCleanBlast Tip for MPX BulkheadsCleanBlast Tip for MT Ferrule Bulkheads(unconnectorized)SCALE FCLT-MTP CleanBlast Tip for MPO BulkheadsCleanBlast Adapter for MT Ferrule(unconnectorized)Note: Requires FCLT-MTPCleanBlast Tip for MPO Bulkheads, AngledVIAVI CLEANBLAST MT BULKHEAD TIP Manufacturer Part Number: T-MTP-MA Ribbon T-HMFOC-P Ribbon CleanBlast Tip for HMFOC Drop T erminal Ports T-HMFOC-R Ribbon FCLT-HMFOC-R CleanBlast Tip for HMFOC Drop T erminal PortsFCLT-EXBEAM-1CleanBlast Tip for FibrecaST Jr/Sr Expanded Beam SCALE 2:1FBPT-BAP3-125CleanBlast Tip for BAP3 GuidesCleanBlast Tip for BAP4 GuidesFCLT-C130CleanBlast Tip for C130CleanBlast Tip for 29504/14 and 29504/15 T Note: Cleans Both Pins and SocketsCleanBlast Tip for 29504/4 and 29504/5 T Note: Cleans Both Pins and SocketsManufacturer: Product Name: VIAVI CLEANBLAST MT BULKHEAD TIP © 2020 VIAVI Solutions Inc. Product specifications and descriptions in this document are subject to change without notice. T-MIL2-A6Mil/Aero Angled 60 DegreesNote: Cleans Both Pins and Sockets T-MIL2-CPA Mil/Aero CleanBlast Tip for Use with Glenair T estCleanBlast Tip for 1.25mm LuxCis T erminiNote: Cleans Both Pins and SocketsCleanBlast Tip for 38999 with MT FerrulesNote: Requires FBPT-MT999 GuidesCleanBlast Tip for Radiall Quadrax Size 8 -CleanBlast Tip for Radiall Quadrax Size 8 -CleanBlast Tip for TFOCA-II Connectors(includes Guide)or call 1-844-Go VIAVI (+1-844-468-4284).。

AC Drive and Softstart Product Family Overview

AC Drive and Softstart  Product Family Overview

Connectivity
Altivar® 212
Altivar® 12 240 Vac
OEMs / Panel Builders Building Pump & Fan
OEMs / Panel Builders commercial equipment
5
20
100
700
900
Horsepower Range @ 480Vac
Altivar® 12:
Automated doors, dosing pumps, vent fans
Competitive reference of Altivar products
Competitor Rank
1
AB Powerflex 4 ABB
ACS310 or ACS320
2
Yaskawa J1000 Danfoss
FC102 or VLT2800
3
4
ABB
ATV12 ATV212
VFD-EL Yaskawa E7 ABB ACS355 ABB ACS 355 Danfoss FC102 or FC200 ABB ACS800
ACS55 or ACS150
SED2 Delta VFD-M Danfoss FC302 AB Powerflex 400 Mitsubishi A700
Material working, safety concern areas of conveying, packaging
Altivar® 312:
Material handling, car wash, mixers, conveying, packaging
Altivar® 212:ATV21 Pump & Fans (variable torque)

阴影下的巨人

阴影下的巨人

日本厂商自七十年代末期开始打入存储器市场,由于有政府投资和财 团支持等优势,日本厂商极大地威胁着美国半导体公司。1985年由于生 产能力过剩,日本公司降价促销, 存储器价格市场迅速滑落,虽然Intel 和AMD等多家半导体公司向政府游说,控告日本公司倾销产品,制定了著 名的美日半导体贸易协定,但大部分客户都已经被日本抢走。Intel和 AMD在存储器市场的占有率都一降再降。 就是这样一个关键时刻,决定了Intel和AMD在后来的发展史两个截 然不同的命运:Intel早在1971年就断然放弃将主要市场定为存储器市场 的决定,开始将主要力量转移到已有一些技术积累的微处理器开发上,经 过十多年的技术积累,也成功开发出了各个时期的代表处理器,直到 1984年Intel决定全部转入处理器业务。并于1985年,Intel成功推出了 386处理器。 而AMD公司因领导层决策失误,坚持走存储器芯片开发之路,直到 1989年,从此AMD在微处理器市场上远远被Intel甩在了后面。
而采用K6核心的CPU,后来成为AMD首个大系列,其中就全面包括K6、 K6-2、K6-2+、K6-Ⅲ、K6-Ⅲ+等几个子系列,所涉及的各种不同主频、 不同版本的处理器好几十种。
AMD K6-2
AMD K6-2+
AMD K6-III
AMD K6-III+
Cyrix 686MX
Cyrix MII
Cyrix Media GX
不幸之中的万幸
在离注册的最后期限还有不到20分钟的时候,最后一笔投 资25000美元才姗姗来迟,因为超过了注册资金的下限,所 以才使得AMD公司正式注册成功、开始营业了,也从此开始 与Intel长达30多年的竞争。在这30多年的竞争中,AMD走 过了各种不平路,总的来说可以概括为以下四个不同时期。

Overview of Single-Phase Grid-Connected Photovoltaic Systems

Overview of Single-Phase Grid-Connected Photovoltaic Systems

Overview of Single-Phase Grid-Connected Photovoltaic SystemsYang, Yongheng; Blaabjerg, FredePublished in:UEMP, Electric Power Components and SystemsDOI (link to publication from Publisher):10.1080/15325008.2015.1031296Publication date:2015Link to publication from Aalborg University - VBNSuggested citation format:Y. Yang and F. Blaabjerg, ''Overview of Single-Phase Grid-Connected Photovoltaic Systems,''Electric Power Components and Systems,in press, DOI: 10.1080/15325008.2015.1031296, pp. 1-10, 2015.General rightsCopyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognize and abide by the legal requirements associated with these rights.Users may download and print one copy of any publication from the public portal for the purpose of private study or research.You may not further distribute the material or use it for any profit-making activity or commercial gain.You may freely distribute the URL identifying the publication in the public portal.Take down policyIf you believe that this document breaches copyright please contact us at vbn@aub.aau.dk providing details, and we will remove access tothe work immediately and investigate your claim.Downloaded from vbn.aau.dk.Overview of Single-Phase Grid-Connected Photovoltaic SystemsYongheng Yang, Frede BlaabjergA still booming installation of solar photovoltaic (PV) systems has been witnessed worldwide. Itis mainly driven by the demand of “clean” power generation. Grid-connected PV systems will become an even active player in the future mixed power systems, which are linked by a vast of power electronics converters. In order to achieve a reliable and efficient power generation from PV systems, stringent demands have been imposed on the entire PV system. It in return advances the development of power converter technology in PV systems. This paper thus takes an over-view of the advancement of power electronics converters in single-phase PV systems, being commonly used in residential applications. Demands to single-phase grid-connected PV systems as well as the general system control strategies are also addressed in this paper.Keywords: photovoltaic systems; power converters; transformerless; single-phaseSubject classification: power electronics convertersI.INTRODUCTIONTraditional power generations that are on a basic of fossilfuel resource are considered to be unsustainable in long-term national strategies. This has been one of the maindriving forces for an increasing installation of renewableenergies like wind power, solar PhotoVoltaic (PV) power,hydropower, biomass power, geothermal power, and oceanpower, etc. into the public grids [1], [2]. Among the majorrenewables, the solar PV power generation has continuedto expand at a rapid rate over the past five years (growth inglobal capacity averaging almost 55% annually) [3], [4].As an extreme example, in Italy, 7.8% of the annual totalelectricity demand was covered by solar PV systemsthroughout 2013 [4]. In Germany, there has been around 36 GW installed by the end of 2013, where most of the PV systems are residential applications [4]-[7]. Fig. 1 further illustrates the worldwide solar PV evolution in the past years [7], which shows increasingly worldwide expecta-tions from energy production by means of solar PV power systems. Therefore, as the typical configuration for resi-dential PV applications, the single-phase grid-connected PV systems have been in focus in this paper in order to describe the technology catering for a desirable PV inte-gration into the future mixed power grid.Power electronics technology has been witnessed as the enabling technology for more renewable energies in the grid, including solar PV systems [8]. Associated by the advancements of power semiconductor devices [9], the power electronics part of the entire PV systems (i.e., power converters) holds the responsible for a reliable and effi-cient energy conversion from the clean, pollution-free, and inexhaustible solar PV energy. As a consequence, a vast of grid-connected PV power converters have been developed and commercialized widely [10]-[15].Fig. 1. Evolution of global accumulative photovoltaic capacity (Giga-Watts) from 2000 to 2013 and an estimation until 2018 in a medium scenario based on the data available on-line from . However, the grid-connected PV systems vary signifi-cantly in size and power – from small scale DC module (a few hundred watts) to large scale PV power plant (up to hundred Mega-Watts). In general, the PV power converters can simply be categorized into: module-, string-, multi-string, and central converters. The multi-string and central converters are intensively used for solar PV power plants/farms as three-phase systems [16]-[18]. In contrast, the module- and string-converters are widely adopted in residential applications as single-phase systems [19], [20]. Although the PV power converters are different in configu-ration, the major functions of the power converters are the same, including PV power maximization, DC to AC power conversion and transfer, synchronization, grid code com-pliance, reactive power control, islanding detection and protection, etc. [8], [21]. It also requires advanced and in-telligent controls to perform these PV features and also tomeet customized demands, where the monitoring, forecast-ing, and communication technology can enhance the PV integration [18], [21].As aforementioned, the PV systems are still dominant in the residential applications, and will be even diversely spread out in the future mixed grid. Thus, the state-of-the-art developments of single-phase grid-connected PV sys-tems are selectively reviewed in this paper. Focus has been put on the power converter advancements of single-phase grid-connected PV systems for residential applications. Demands from the grid operators and the consumers to single-phase PV systems are firstly introduced in § II. In order to meet the increasing demands, the general control structures of single-phase grid-connected PV systems are presented in § IV before the conclusion.II.DEMANDS FOR GRID-CONNECTEDPHOTOVOLTAIC SYSTEMSThe grid-connected PV systems are being developed at a very fast rate and will soon take a major part of power electricity generation in some areas [22], [23]. At the same time, the demands (requirements) to the PV systems as shown Fig. 2 are becoming much tougher than ever before. Although the power capacity of a PV system currently is still not comparable to that of an individual wind turbine system, similar demands to wind turbine systems are being transitioned to the PV systems [18], [21], since the number of large-scale PV systems (power plants) is continuously increased [24].Fig. 2. Demands (challenges) for a grid-connected PV system based onpower electronics converters. Nevertheless, the demands for PV systems can be speci-fied at different levels. At the PV side, the output power of the PV panels/strings should be maximized, where a DC-DC converter is commonly used, being a double-stage PV system. This is known as the Maximum Power Point Tracking (MPPT). In this case, the DC voltage (DC-link voltage) should be maintained as a desirable value for the inverter. Moreover, for safety (e.g., fire), the panel moni-toring and diagnosis have to be enhanced at the PV side [25]. At the grid side, normally a desirable Total Harmonic Distortion (THD) of the output current should be attained (e.g., lower than 5%) [26]. In the case of large-scale PV systems with higher power ratings, the PV systems should not violate the grid voltage and the grid frequency by means of providing ancillary services (e.g., frequency reg-ulation). Additionally, the PV systems have to ride-through grid faults (e.g., voltage sags and frequency changes), when a higher PV penetration level comes into reality [18], [21], [27]-[33].Since the power capacity per generating unit is relative low but the cost of energy is relative high, there are always strong demands for high efficiency in order to reduce the cost of PV energy. In respect to efficiency, the power elec-tronics system (including passive components) counts for the most of power losses in the entire PV system. Thus, possibilities to meet the efficiency demand include using advanced semiconductor devices, intelligent control, and power lossless PV topologies. Transformerless PV tech-nology is an example, and the transformerless PV inverters can achieve a relatively high conversion efficiency when the isolation transformers are removed [11], [26]. Howev-er, minimizing the ground current in these transformerless PV converters is mandatory for safety [11]. Moreover, reliability is of much importance in the power electronics based PV systems, as shown in Fig. 2. This is motivated by extending the total energy production (service time) and further reducing the cost of energy [8], [34]-[36]. Finally, because of exposure or smaller housing chamber, the PV converter system (power electronics system) must be more temperature insensitive (i.e. with temperature manage-ment), which is also beneficial for the reliability perfor-mance. As it has been illustrated in Fig. 2, advancing the monitoring, forecasting, and communication technologies is crucial to implement future grid-friendly PV systems into a mixed power grid.III.POWER CONVERTER TECHNOLOGYFOR SINGLE-PHASE PV SYSTEMSAccording to the state-of-the-art technologies, there are mainly four configuration concepts [2], [10], [37], [38] to organize and transfer the PV power to the grid, as it is shown in Fig. 3. As it can be seen in Fig. 3, each of the grid-connected concepts consists of series of paralleled PV panels or strings, and they are configured by a couple of power electronics converters (DC-DC converters and DC-AC inverters) in accordance to the output voltage of the PV panels as well as the power rating.A central inverter is normally used in a three-phase grid-connected PV plant with the power larger than tens of kWp, as it is shown in Fig. 4. This technology can achieve a relatively high efficiency with a lower cost, but it re-quires high voltage DC cables [10]. Besides, due to its low immunity to hotspots and partial shading, power mismatch issue is significant in this concept (i.e. low PV utilization). In contrast, the MPPT control is achieved separately in each string of the string/multi-string PV inverters, leading to a better total energy yield. However, there are still mis-matches in the PV panels of each string, and the multi-Fig. 3. Grid-connected PV system concepts: (a) AC-module PV system, (b) string inverter system, (c) multi-string inverter system, and (d) central PVinverter topology.Fig. 4. Large-scale PV power plant/station based on central inverters forutility applications, where multi-level converters can be adopted as the central inverters to handle even higher power up to tens of Mega-Watts. Fig. 5. Single-phase grid-connected PV systems, where the AC-module inverters, the string inverters, and the multi-string inverters are commonly used: (a) with a low-frequency (LF) transformer, (b) with a high-frequency (HF) transformer, and (c) without transformers. string technology requires more power electronics convert-ers, resulting in more investments. Considering the above issues, the module converters (DC-module converters and/or AC-module inverters) are developed, being a flexi-ble solution for the PV systems of low power ratings and also for module-level monitoring and diagnostics. This module integrated concept can minimize the effects of par-tial shadowing, module mismatch, and different module orientations, etc., since the module converter acts on a sin-gle PV panel with an individual MPPT control. However, the low overall efficiency is the main disadvantage of this concept.It can be seen in Fig. 3 that the module concept, the string inverter, and multi-string inverters are the most common solutions used in single-phase PV applications, where the galvanic isolation for safety is one importance issue. Traditionally, an isolation transformer can be adopt-ed either at the grid-side with low frequencies or as a high frequency transformer in such PV converters, as it is shown in Fig. 5(a) and (b). Both grid-connected PV tech-nologies are available on the market with an overall effi-ciency of 93-95% [26], to which is mainly contributed by the bulky transformers. In order to increase the overall efficiency, a vast of transformerless PV converters have been developed [10], [11], [26], which are selectively re-viewed in the following.A.Transformerless AC Module Inverters (Module Inte-grated PV Converters)In the last years, much more efforts have been devoted to reduce the number of power conversion stages in order to increase the overall efficiency, as well as increase the power density, being the single-stage AC-module PV in-verters. By doing so, the reliability and thus the cost can be reduced. Fig. 6 shows the general block diagram of a sin-gle-stage grid-connected AC-module PV topology, where all the desired functionalities shown in Fig. 2 have to be performed. It should be noted, the power decoupling in such a single-stage topology is achieved by means of a DC-link capacitor, C dc, in parallel with the PV module[10], [11].Fig. 6. General block diagram of a single-stage single-phase PV topology(AC module/string inverter system).Fig. 7. A universal single-stage grid-connected AC-module inverter with an LCL-filter based on the concept proposed by B.S. Prasad, etc. appeared in IEEE Trans. Energy Conversion – 23(1), p. 128-137, Mar. 2008. Since the power of a single PV module is relative low and is strongly dependent of the ambient conditions (i.e., solar irradiance and ambient temperature), the trend for AC-module inverters is to integrate either a boost or abuck-boost converters into a full-bridge or half-bridge in-verter in order to achieve an acceptable DC-link voltage [39]-[45]. As it is presented in [39], a single-stage module integrated PV converter can operate in a buck, boost, or buck-boost mode with a wide range of PV panel output voltage. This AC-module inverter is shown in Fig. 7, where an LCL-filter is used to achieve a satisfactory total harmonic distortion of the injected current. A variant AC-module inverter has been introduced in [40], which is however a resultant integration of a boost converter and a full-bridge inverter. The main drawback of the integrated boost AC-module inverter is that it will introduce a zero-cross current distortion. In order to solve this issue, the buck-boost AC module inverters are preferable [41]-[44]. Fig. 8 shows two examples of the buck-boost AC-module inverter topologies for single-phase grid-connected PV applications. In the AC-module inverter shown in Fig. 8(a), each of the buck-boost converters generates a DC-biased unipolar sinusoidal voltage, which is 180° out of phase to the other, so as to alleviate the zero-cross current distortions. Similar principles are applied to the buck-boost integrated full-bridge inverter, which operates for each half-cycle of the grid voltage. However, as shown in Fig. 8(b), this AC-module inverter is using a common source. In addition to the above topologies that are mainly based on two relatively independent DC-DC converters integrat-ed in an inverter, other AC-module inverters are proposed in the literature. Most of these solutions are developed in accordance to the impedance-admittance conversion theory as well as an impedance network [46]-[50]. The Z-source inverter is one example, which is able to boost up the volt-age for a full-bridge inverter by adding an LC impedance network, as shown in Fig. 9. Notably, the Z-source inverter was mostly used in three-phase applications in the past. Fig. 8. Buck-boost integrated AC-module inverters with an LCL filter: (a) differential buck-boost inverter based on the concept proposed by N.Vazquez, etc. appeared in Proc. of APEC, pp. 801-806, 1999 and (b) buck-boost integrated full-bridge inverter based on the concept proposed by C. Wang appeared in IEEE Trans. Power Electron. -19(1), pp. 150 -159, 2004Fig. 9. Single-phase Z-source based AC-module inverter with an LCLfilter.Fig. 10. Single-phase transformerless full-bridge string inverter with an LCL filter, which also indicates the ground current circulating paththrough the parasitic capacitor C p.B.Transformerless Single-stage String InvertersThe above-discussed AC-module inverters with an inte-gration of a DC-DC boosting converter are suitable for use in low power applications. When it comes to higher power ratings (e.g., 1 ~ 5 kWp), the compactness of AC-module inverters is challenged. In such applications, the mostcommonly used inverter topology is the single-phase Full-Bridge (FB) string inverter due to its simplicity in terms of less power switching devices. Fig. 10 depicts the hardware schematics of a single-phase FB string inverter with an LCL filter, for a better power quality. It is also shown in Fig. 10 that a leakage current will circulate in the trans-formerless topology, requiring a specifically designed modulation scheme to minimize. Conventional modulation methods for the single-stage FB string inverter topology include a bipolar modulation, a unipolar modulation, and a hybrid modulation [26]. Considering the leakage current injection, the bipolar modulation scheme is preferable [26], [51]. Notably, optimizing the modulation patterns is an alternative to eliminate the ground (leakage) currents [52]. Fig. 11. Transformerless string inverters derived from the full-bridge inverter by adding a DC path: (a) H5 inverter topology proposed by M.Victor, etc., U.S. Patent 20050286281 A1, Dec 29, 2005. and (b) H6 inverter topology proposed by R. Gonzalez, etc., appeared in IEEE Trans.Power Electron. – 22(2), pp. 693-697, Mar. 2007. Transformerless structures are mostly derived from the FB topology by providing an AC path or a DC path using additional power switching devices. This will result in an isolation between the PV modules and the grid during the zero-voltage states, thus leading to a low leakage current injection. Fig. 11 shows two examples of single-stage transformerless PV inverters derived from the single-phase FB topology by providing a DC path [53], [54]. Thanks to the extra DC bypass, the PV strings/panels are isolated from the grid at zero-voltage states. Alternatively, the iso-lation can be achieved at the grid side by means of adding an AC path. As exemplified in Fig. 12(a), the Highly Effi-cient and Reliable Inverter Concept (HERIC) string invert-er [55] has the same number of power switching devices as that of the H6 inverter, but it provides an AC path to elimi-nate the leakage current injection. Similarly, the Full-Bridge Zero Voltage Rectifier (FB-ZVR) topology is pro-posed in [56], where the isolation is attained by adding a zero voltage rectifier at the AC side, as shown in Fig. 12(b).It should be pointed out that there are also many other transformerless topologies reported in the literature in ad-dition to the above solutions by means of adding an extra path [26], [52], [57]-[60]. Taking the Conergy string in-verter as an example, which is shown in Fig. 13, the single-phase transformerless string inverter can be developed based on the multi-level power converter technology [26], [58], [59].Fig. 12.Transformerless string inverters derived from the full-bridge inverter by adding an AC path: (a) highly efficient and reliability inverter concept (HERIC) topology proposed by H. Schmidt, etc., U.S. Patent 7046534, 2006 and (b) full-bridge with a zero voltage rectifier (FB-ZVR) proposed by T. Kerekes, etc. appeared in IEEE Trans. Ind. Electron. –58(1), pp. 184-191, Jan. 2011.Fig. 13. A transformerless string inverter derived from neutral point clamped topology – Conergy neutral point clamped inverter with an LCL filter based on the concept proposed by P. Knaup, International Patent Application, WO 2007/048420 A1, May 3, 2007.C.DC-Module Converters in Transformerless Double-Stage PV SystemsThe major drawback of single-stage PV topologies is that the output voltage range of the PV panels/strings is limited especially in low power applications (e.g. AC-module inverters), which thus will affect the overall effi-ciency. The double-stage PV technology can solve this issue since it consists of a DC-DC converter that is respon-sible for amplifying the PV module low voltage to a desir-able level for the inverter stage. Fig. 14 shows the general block diagram of a double-stage single-phase PV topology.The DC-DC converter also performs the MPPT control ofthe PV panels, and thus extended operating hours can be achieved in a double-stage PV system. The DC-link capac-itor C dc shown in Fig. 14 is used for power decoupling, while the PV capacitor C pv is for filtering.Fig. 14. General block diagram of a double-stage single-phase PV topolo-gy (with a DC-DC converter).In general, the DC-DC converter can separately be in-cluded between the PV panels and the DC-AC inverters that can be the string inverters discussed above or a simple half-bridge inverter. The following illustrates the double-stage PV technology consisting of a DC-DC converter and a full-bridge inverter. Fig. 15 shows a conventional dou-ble-stage single-phase PV system, where the leakage cur-rent has to be minimized as well. However, incorporating the boost converter will decrease the overall conversion efficiency. Thus, variations of the double-stage configura-tion have been introduced by means of a time-sharing boost converter or a soft-switched boost converter [61],[62]. The time-sharing boost converter shown in Fig. 16 isa dual-mode converter, where the switching and conduc-tion losses are reduced, leading to a satisfactory efficiency. Fig. 15. Conventional double-stage single-phase PV topology consisting of a boost converter and a full-bridge inverter with an LCL filter.Fig. 16. Double-stage single-phase PV topology using a time-sharing boost converter and a full-bridge inverter with an LCL filter based on the concept proposed by K. Ogura, etc., appeared in Proc. of IEEE PESC, pp.4763-4767, 2010.An alternative to improve the efficiency can be achieved using a DC-DC converter with parallel inputs and series outputs in order to process the source energy one and a half times instead of two times. This topology has been intro-duced in [63], and it is shown in Fig. 17. It should be pointed out that the voltage step-up gain of the DC-DC converter is also improved at the same time. In addition, the impedance network based DC-DC converters (e.g., the Z-source and Y-source networks) might be another promis-ing solution for single-phase double-stage PV systems, due to the high step-up voltage gain [64]-[67].Fig. 17. Double-stage single-phase PV topology with a parallel-input series-output bipolar DC output converter and a full-bridge inverter based on the concept proposed by R. West, U.S. Patent 2008/0037305 A1, Feb.14, 2008.IV.CONTROL OF SINGLE-PHASE GRID-CONNECTED PV SYSTEMSThe control objectives of a single-phase grid-connected PV system [68] can be divided into two major parts: a) PV-side control with the purpose to maximize the power from PV panels and b) grid-side control performed on the PV inverters with the purpose to fulfil the demands shown in Fig. 2. A conventional control structure for such a grid-connected PV system thus consists of two-cascaded loop in order to fulfil the demands [32], [68] – the outer pow-er/voltage control loop generates the current references and the inner control loop is responsible for shaping current, where thus the power quality is maintained, and also per-forming various functionalities, as shown in Fig. 18.Fig. 19 shows the general control structure of a single-phase single-stage grid-connected PV system, where the PV inverter has to handle the fluctuating power (i.e., MPPT control) and also to control the injected current ac-cording to the specifications shown in Fig. 18. As it can be observed in Fig. 19, the control can be implemented in both stationary and rotating reference frames in order to control the reactive power exchange with the grid, where the Park transformation (dq Æαβ) or inverse Park trans-formation (αβÆdq) are inevitable. In terms of simplicity, the control in the stationary reference frame (αβ-reference frame) is preferable, but it requires an orthogonal system to generate a “virtual” system, which is in-quadrature to the real grid. In the dq-reference frame, the MPPT control gives the active power reference for the power control loop based on Proportional Integrator (PI) controllers, which then generate the current references as shown in Fig. 19(b). The Current Controller (CC) in the dq-reference frame can be PI controllers, but current decoupling is required. In contrast, enabled by the single-phase PQ theory [32], [69], the reference grid current i*g can be calculated using the power references and the in-quadrature voltage system. In that case, the PI controller will give an error in the con-trolled grid current. The controller (i.e., CC) should beFig. 18. General control blocks (control objectives) of a grid-connected single-phase PV system.Fig. 19. General control structure of a single-phase single-stage full-bridge PV system with an LCL filter and reactive power injection capabil-ity (CC – Current controller, PLL – Phase locked loop): (a) hardware schematics, (b) control block diagrams in the dq-reference frame, and (c) control block diagrams in the αβ-reference frame. designed in the αβ-reference frame. For example, a Propor-tional Resonant (PR) controller, a Repetitive Controller (RC), and a Dead-Beat (DB) controller [68], [70]-[73] can directly be adopted as the CC shown in Fig. 19(c). Nota-bly, since the CC is responsible for the current quality, it should be taken into account in the controller deign and the filter design (e.g., using high order passive filter, LCL fil-ter). By introducing harmonic compensators [26], [32], [68], [70] and adding appropriate damping for the high order filter [74], [75], an enhancement of the CC tracking performance can be achieved. Similar control strategies can be applied to the double-stage system, as shown in Fig.20. The difference lies in that the MPPT control is imple-mented on the DC-DC converter, while the other function-alities are performed on the control of the PV inverter. There are other control solutions available for single-phase grid-connected PV systems [76]-[78]. For example, the instantaneous power is controlled in [77], where the syn-thesis of the power reference is a challenge; in [78], a one-cycle control method has been applied to single-stage sin-gle-phase grid-connected PV inverters for low power ap-plications.It should be noted that the injected grid current is de-manded to be synchronized with the grid voltage as re-quired by the standards in this field [68]. As a conse-quence, the grid synchronization as an essential grid moni-toring task will strongly contribute to the dynamic perfor-mance and the stability margin of the entire control system. The grid synchronization is even challenged in single-phase systems, as there is only one variable (i.e. the grid voltage) that can be used for synchronization. Neverthe-less, different methods to extract the grid voltage infor-mation have been developed in recent studies [26], [68], [79]-[82] like the zero-crossing method, the filtering of grid voltage method, and the Phase Locked Loop (PLL) techniques, which are the promising solutions. In addition to the phase of the grid voltage, other grid condition infor-mation is also very important for the control system to per-form special functionalities, e.g., low voltage ride through [27], [32], where the grid voltage amplitude has to be mon-itored. Thus, advancing the monitoring technology is an-other key to a grid-friendly integration of grid-connectedPV systems.。

创始人音响产品说明书

创始人音响产品说明书

Founder 120HFounder 100FFounder 80FFounder 90CFounder 70LCRFounder 40BDESIGN5-driver, 3 way hybrid floorstand-ing with active bass acoustic suspension, Includes ARC Genesis 5-driver, 3 way floorstanding bass reflex4-driver, 2.5 way floorstanding bass reflex4-driver, 2 passive radiator, 3 way center channel bass reflex 4-driver, 3 way LCR, sealed enclosure2-driver, 2 way standmount bass reflexFREQUENCY RESPONSE ON-AXIS ±2dB from 22 Hz - 23 kHz ±2dB from 42 Hz - 23 kHz ±2dB from 50 Hz - 23 kHz ±2dB from 55 Hz - 23 kHz ±2dB from 79 Hz - 23 kHz ±2dB from 69 Hz - 23 kHz HIGH-FREQUENCY DRIVER1" (25mm) AL-MAC™ Ceramic Dome with Oblate Spheroid Waveguide (OSW™) and Per-forated Phase-Aligning (PPA™) Tweeter Lens, ferro-fluid damped / cooled1" (25mm) AL-MAC™ Ceramic Dome with Oblate Spheroid Waveguide (OSW™) and Per-forated Phase-Aligning (PPA™) Tweeter Lens, ferro-fluid damped / cooled1" (25mm) AL-MAC™ Ceramic Dome with Oblate Spheroid Waveguide (OSW™) and Per-forated Phase-Aligning (PPA™) Tweeter Lens, ferro-fluid damped / cooled Coaxial 1" (25mm) AL-MAC™ Ceramic Dome with Oblate Spheroid Waveguide (OSW™) and Perforated Phase-Aligning (PPA™) Tweeter Lens, ferro-fluid damped / cooled, Patent Pending Dual Gap Motor Structure Coaxial 1" (25mm) AL-MAC™ Ceramic Dome with Oblate Spheroid Waveguide (OSW™) and Perforated Phase-Aligning (PPA™) Tweeter Lens, ferro-fluid damped / cooled, Patent Pending Dual Gap Motor Structure 1" (25mm) AL-MAC™ Ceramic Dome with Oblate Spheroid Waveguide (OSW™) and Perforated Phase-Aligning (PPA™) Tweeter Lens, ferro-fluid damped / cooled MID FREQUENCY DRIVER6” (152mm) AL-MAG™ Cone with Perforated Phase-Aligning (PPA™) Lens, SHOCK-MOUNT™ Isolation Mounting System, and a 2” high-temp multi-layered voice coil with ventilated Apical™ former 6” (152mm) AL-MAG™ Cone with Perforated Phase-Aligning (PPA™) Lens, SHOCK-MOUNT™ Isolation Mounting System, and a 2” high-temp multi-layered voice coil with ventilated Apical™ former --Coaxial 6” (152mm) AL-MAG™ Cone with SHOCK-MOUNT™ Isolation Mounting System, a 2” high-temp multi-layered voice coil with ventilated Apical™ former, Patent Pending Dual-Sync™ Continuous Flux Motor Coaxial 6” (152mm) AL-MAG™ Cone with SHOCK-MOUNT™ Isolation Mounting System, a 2” high-temp multi-layered voice coil with ventilated Apical™ former, Patent Pending Dual-Sync™ Continuous Flux Motor --MID/BASS FREQUENCY DRIVER----6” (152mm) Ultra-High-Excursion AL-MAG™ Cone with Perforated Phase-Aligning (PPA™) Lens, Gen3 Active Ridge Technology (ART™) with Vertical Mounting System, Advanced SHOCK-MOUNT™ Isolation, and a 1.5” high-temp multi-layered voice coil with ventilated Apical™ former ----6” (152mm) Ultra-High-Excursion AL-MAG™ Cone with Perforated Phase-Aligning (PPA™) Lens, Gen3 Active Ridge Technology (ART™) with Vertical Mounting System, Advanced SHOCK-MOUNT™ Isolation, and a 1.5” high-temp multi-layered voice coil with ventilated Apical™ former BASS FREQUENCY DRIVERThree 8" (215mm) Ultra-High- Excursion CARBON-X™ Unibody Cone, Gen3 Active RidgeTechnology (ART™ with Vertical Mounting System, Advanced SHOCK-MOUNT™ Isolation, and a 1.5” high-temp multi-layered voice coil with ventilated Apical™ former Three 7" (177mm) Ultra-High-Excursion CARBON-X™ Unibody Cone, Gen3 Active RidgeTechnology (ART™) with Vertical Mounting System, Advanced SHOCK-MOUNT™ Isolation, and a 1.5” high-temp multi-layered voice coil with ventilated Apical™ former Two 6" (152mm) Ultra-High- Excursion CARBON-X™ Unibody Cone, Gen3 Active RidgeTechnology (ART™) with Vertical Mounting System, Advanced SHOCK-MOUNT™ Isolation, and a 1.5” high-temp multi-layered voice coil with ventilated Apical™ former Two 7" (177mm) Ultra-High- Excursion CARBON-X™ Unibody Cone, Gen3 Active RidgeTechnology (ART™) with Vertical Mounting System, Advanced SHOCK-MOUNT™ Isolation, and a 1.5” high-temp multi-layered voice coil with ventilated Apical™ formerTwo 5.5" (127mm Ultra-High- Excursion CARBON-X™ Uni-body Cone, Gen3 Active Ridge Technology (ART™) with Vertical Mounting System, Advanced SHOCK-MOUNT™ Isolation, and a 1.5” high-temp multi-layered voice coil with ventilated Apical™ former --PASSIVE RADIATOR ------Two 7" (177mm) Ultra-High-Excur-sion CARBON-X™ Unibody Cone, Gen3 Active Ridge Technology (ART™) with Vertical Mounting System, Advanced SHOCK-MOUNT™ Isolation, Passive ----SENSITIVITY ROOM / ANECHOIC 95 dB / 92 dB 93 dB / 90 dB 93 dB / 90 dB 94 dB / 91 dB 92 dB / 89 dB 92 dB / 89 dB IMPEDANCE Compatible with 8 ohms Compatible with 8 ohms Compatible with 8 ohms Compatible with 8 ohms Compatible with 8 ohms Compatible with 8 ohms FINISHES Piano Black, Black Walnut, Midnight Cherry, Walnut Piano Black, Black Walnut, Midnight Cherry, Walnut Piano Black, Black Walnut, Midnight Cherry, Walnut Piano Black, Black Walnut, Midnight Cherry, Walnut Piano Black, Black Walnut, Midnight Cherry, Walnut Piano Black, Black Walnut, Midnight Cherry, Walnut WEIGHT92 lbs (41.7 kg) each 72 lbs (32.7 kg) each 52 lbs (23.6 kg) each 48 lbs (21.8 kg) each 30 lbs (13.6 kg) each 25lbs (11.3kg) each DIMENSIONS (h x w x d) *45.4” x 13.9” x 17.4”(115.3cm x 35.4cm x 44.1cm)41.9” x 12.9” x 16.1”(106.5cm x 32.8cm x 40.9cm)38.2” x 11.7” x 14”(97.1cm x 29.8cm x 35.6cm)8.9” x 35.7” x 12.9”(22.6cm x 90.8cm x 32.7cm)8” x 18.9” x 12.3”(20.4cm x 48cm x 31.2cm)14.5” x 7.8” x 12.8”(36.8cm x 19.7cm x 32cm)LOW FREQUENCY EXTENSION ** 18 Hz (DIN)26 Hz (DIN)28 Hz (DIN)37 Hz (DIN)47 Hz (DIN)41 Hz (DIN)CROSSOVER2nd order at 2.4 kHz (tweeter), 2nd order digital/analog @ 500 Hz (bass)2nd order electro-acoustic at 2.1 kHz (tweeter), 2nd order @ 500 Hz (bass)2nd order electro-acoustic at 1.8 kHz (tweeter), 2nd order @ 500 Hz (bass)2nd order electro-acoustic at 2.5 kHz (tweeter), 2nd order @ 500 Hz (bass)2nd order electro-acoustic at 2.2 kHz (tweeter), 2nd order @ 700 Hz (bass)2nd order electro-acoustic at 1.6kHz (tweeter/midbass)FREQUENCY RESPONSE 30° OFF-AXIS ±2dB from 22 Hz - 20 kHz ±2dB from 42 Hz - 20 kHz ±2dB from 50 Hz - 20 kHz ±2dB from 55 Hz - 17 kHz ±2dB from 79 Hz - 17 kHz ±2dB from 69 Hz - 20 kHz SUITABLE AMPLIFIER POWER RANGE 15 - 400 watts 15 - 350 watts 15 - 220 watts 15 - 260 watts 15 - 220 watts 15 - 150 watts MAXIMUM INPUT POWER †300 watts250 watts180 watts200 watts150 watts120 wattsAll specifications are subject to change without notice. * Includes grille and terminal posts for all models. Includes feet with rubber pads on Founder 120H, 100F and 80F. Includes isolation pads for all other models. ** DIN 45 500. Indicates -3 dB in a typical listening room. † With typical program source provided the amplifier clips no more than 10% of the time.02.17.21。

Autodesk Vault 2011 属性系统简介与概述说明书

Autodesk Vault 2011 属性系统简介与概述说明书

AUTODESK® VAULT 2011PROPERTIES INTRODUCTION AND OVERVIEWConcepts and common administrative tasks are described in this paper. This paper is not a comprehensive description - complete details are available through Vault 2011 Help. Most of the features described are in all Vault 2011 products. However, some features are only available in the higher levels of the Vault product line.IntroductionThe property system for Vault 2011 is a single set of properties that are shared across files, items, change orders and reference designators. There are two types of properties: System and User Defined Properties (UDP.) System properties cannot be deleted but do support some configuration options like renaming and a few support mapping. Duplicate property names are not permitted for either type.UDP’s are custom created properties that support assignment to object groups, policy constraints and mapping of values with file and BOM properties. With each new vault there are numerous UDP’s supplied as part of the default configuration.Some of the highlights of the new property system:o Consistent user interface for all property managemento Property constraint overrides by categoryo Streamlined Edit Properties wizardo New vertical properties grid supports multiple files as well as Items & Change Orders o‘Lists’ support text and number data types as well as addition and removal of valueso Standardized mapping for all property sourceso Bi-directional mappingProperty DefinitionA property definition contains a name, data type, policy settings and mappings. The definition also specifies which object groups are associated with and may utilize the property. As an example, we will use the property definition Author. If Author is associated with the File and Item groups it may appear on any file or item but cannot appear with change orders and reference designators. (Reference Designators are a feature of AutoCAD Electrical). Every object (file and item) that is associated with the property definition Author will have a unique value. This may seem obvious when comparing two files as they each may have a unique value. This principle may not be as obvious when comparing objects across groups. If a file is promoted to an item, the file and item are allowed to have unique values for Author.*Change Order Link Properties remain a separate propertysystem.AdministrationCreation and AssociationTo create a property the name and data typemust be specified. The new property is notavailable for use until it has been associated toan object group. The groups are: Change Order,File, Item and Reference Designator. In thesample image below, the File object group isselected. This new property cannot be attachedto an Item, Change Order or ReferenceDesignator unless those object groups are alsoselected.All files in the categories Base or Engineering will have this property automatically attached. If this property needs to be attached to a specific file in another category it may be manually attached. Manual attachment can be done in two ways: using the Edit Properties Wizard or the Add or Remove Property located on the Actions menu.The object groups Change Order and Reference Designator do not support categories. Therefore, any property associated with one of these groups will be automatically attached to all objects in that group.SettingsThe policy values under the Property Valuescolumn (left side of the dialog) are applied toall instances of this property except where thecategory override applies. The CategoryValues allow overrides by category. Consultthe Help for further details about overrides andpolicies. In this paper, we will outline InitialValue, List Values and Enforce List Values.Initial ValueThe Initial Value is applied once when theproperty is initially associated with an object.The initial value is only applied in the absenceof a user supplied or a mapped value.The initial association occurs in three circumstances: 1) object is created (ex: adding a file or creating an item) 2) assignment to a category that automatically attaches the property 3) manual property attachment.There are two types of Initial Value: static and mapped. The static value is a fixed value and may be any value that is valid for the selected data type. An initial mapped value copies the value from a file or BOM property.Initial Values should NOT be used onproperties where all regular mappings read thevalue from a file or BOM. A blank value in themapped file or BOM field takes precedenceover the initial value. This may appear as ifthe initial value is not applied when in fact themapped value of ‘blank’ takes precedence.List ValuesProperties of type Text and Number mayprovide a list of values for user selection andsearching. The administrator may add orremove values from the list at any time.Removal of a value from the list does notremove the value from any property where thatvalue has been applied. When specifying thevalue for this property, the user may chosefrom the list of values. Enter values that arenot on the list is allowed. If this property ismapped to read a value from a file or BOM, the imported value is not required to be on the list. Enforce List ValuesWhen enabled, this option will provide a warning symbol adjacent to this property if the value is not on the list. When a value is in violation of this policy, the default configuration for lifecycle transitions will not allow a file or item to be released.MappingTo create a property mapping, the administrator must first choose which object group is to be mapped. In the image below, this is specified under the first column titled Entity . The available choices are based on the value of the Associations field. Several Content Providers are included but in most cases it is best to leave theselection on All Files (*.*). Vault willautomatically select the most appropriateContent Provider based on the file type.Next, select a file that contains the propertyor BOM field to be mapped. The image onthe left shows the file properties available formapping in the file manifold_block.ipt .The Type column shows the data type of thesource property. Mapping may be doneacross data types. However, there arespecial considerations that are detailed in thenext section. The mapping direction bydefault will chose bi-directional unless the fileor BOM property does not support the inputof values. When this occurs the mappingoption will be limited to Read only. Readonly mappings should be used sparinglybecause any UDP that contains only ‘Readonly’ mappings may not be modified in Vault.Mapping Across Data TypesThere are four property types: Text,Number, Boolean & Date . The following matrix defines valid property mappings. Whenever a mapping is created between two different property types there is the possibility of incompatibility. The onus is on the user to input valid values. If an invalid value is entered in most cases, the equivalence will flag the property as non-equivalent. The exceptions are listed below.1. Mapping Boolean with Text : The supported valid text values are: Yes/No , True/False and1/0. These values are localized. A string like ‘Autodesk’ entered in a Text property cannot be transferred to a Boolean property. This property mapping would be flagged as notequivalent.2. Mapping Text with Number or Text with Date : Works well when all clients and the serverare in the same language-locale. With mixed locales values may convert in a manner that is not intuitive and may produce an undesirable result. Therefore, mapping Text withNumber or Text with Date is only recommended when the server and all clients are working in the same locale.Create OptionThe Create option applies to write mappings; if the file property does not exist when a value is pushed to the file, the administrator may choose whether the file property is created or not. The Create option has another function that is not obvious: when enabled the equivalence calculation will consider the absence of the property definition in the file as a blank value and Supported mapping across data types Source Property (File or BOM) U DP Text Number Boolean Date Text Yes Yes (2) Yes (1) Yes (2) Number Yes (2) Yes Yes NoBoolean Yes (1) Yes Yes No Date Yes (2) No No Yescompare it against the value of the UDP in Vault. When the Create option is disabled, equivalence will be set to ‘Good’ when the mapped property definition does not exist in the file.Example: I have two departments in myorganization that both create .dwg files but theyuse different file properties to represent thesame information. The R&D department usesthe file property DwgNum. The Toolingdepartment uses the file property DrwNo. I wantto manage all drawings from both groups in asingle Vault and with one UDP ‘DrawingNumber’. The correct configuration is to createbidirectional mappings and set the Create optionto Off for both mappings. The result is that amodification of the UDP Drawing Number willwrite its value back to whichever property existsand it will not create an extra property.Mapping AutoCAD Block AttributesAutodesk® AutoCAD® block attribute mapping requires configuration on the ADMS. Select Index Block Attributes… from the Tools menu in Autodesk Data Management Server Console 2011. Enter the AutoCAD block names from which to extract attributes. After this is done, it is possible to map a UDP to an attribute using the mapping processdescribed above. Configured mappings allow thesystem to read and/or write values between the UDPand the attribute.Usage of attribute mapping is intended for singleinstances of a block or when all block instances havethe same attribute values. It is not possible for multipleblock instances to be mapped to separate UDP’s. Manycompanies have one instance of a title block in a given.dwg files. Occasionally, there are companies that use multiple instances of a title block in a single file. In these cases, the attributes often share the same values. An example is a drawing file that contains three borders of different size. Each border uses the same title block with attributes. The attributes for Customer Name, Engineer, Project Number, etc. will share the same value for all instances. Such attributes that share the same value may be mapped to a UDP. Attributes like Border Size will have a unique value for each block instance. Therefore, Border Size should not be mapped to a UDP in Vault.AutoCAD MechanicalAutodesk® AutoCAD® Mechanical software (ACM) supports three distinct sets of properties, all ofwhich may be mapped to Vault UDPs. The three ACM property sets are: file, assembly and component. See the ACM documentation for details about the intended use and differences between these properties.Vault file properties may map to ACM file properties and Vault item properties may map to ACM assembly and component properties.It should also be noted that ACM assembly and file properties having the same name, should not be mapped to the same Vault UDP.AutoCAD ElectricalAutodesk® AutoCAD® Electrical software (ACE) supports both file and BOM properties. ACE BOM properties may be mapped to Item properties. ACE utilizes properties located in .dwg’s,.wdp’s and associated databases. ACE properties are exposed to Vault in four ways:First: Ordinary DWG™ file properties and block attributes may be mapped to Vault File objects. The majority of these mappings support bi-directional mapping. Creation of these mappings is described in the Mapping section of this document.Second: WDP properties support mapping to Item properties. They also support bi-directional mapping. Creating a mapping with WDP properties requires the AutoCAD Electrical Content Source Provider. The provider isspecified in the second columnof the image at the right. Thisprovider is automatically setwhen a file of type .wdp isselected under the File Propertycolumn. If an associated .wdlfile has been created both theline number and the alternateproperty name will automaticallyappear in the list for selection.You may select the line numberor the alternate display name tocreate the mapping. All wdlproperties will appear in the listof selectable properties; it does not matter if a value is present.Third: Component BOM properties may be mapped to Item properties. This includes properties like:Catalog Number, Component Name, Component Type, Electrical Type, Equivalence Value & Manufacturer and more...To create a mapping to a component BOM property, create a new UDP and associate it to Items. Then on the Mapping tab create a new mapping, making sure the first column Entity is set to Item. Under the File Property column, browse and select any file that contains the property to which you will create the mapping. Some properties require that a value exist or the property is not available for selection in the list.Reminder: When creating new properties it is best to associate them to a category which will automatically associate them to the files and/or items where the property should appear. If this is not done, the property will have to be manually associated to the file or item.Fourth: Reference Designator properties, when mapped will appear in Vault as optional data on an Item BOM. There are eighteen Reference Designator properties available:INST, LOC, TAG, DESC1...3, RATING1 (12)These properties may be mapped to an Item BOM using the DWG content source provider.To create a mapping to a Reference Designator, create a new UDP and associate it to Reference Designator. Then on the Mapping tab create a new mapping, ensure the first column Entity is set to Reference Designator. Under the File Property column select the dwg containing the Reference Designator to which the mapping needs to be created. All Reference Designators are available for selection in the list without requiring a value.Properties(Historical)A handful of properties have duplicates having the same display name with ‘(Historical)’ appended to the end: State, Revision Scheme, Property Compliance, Lifecycle Definition, Category Name & Category Glyph. These ‘historical’ properties exist solely to retain a record of the values when a configuration change alters the value of the non-historical properties. In other words, the ‘historical’property will always contain the value as it existed when that version was created. This situation arises because these properties may have a new value due to a configuration change, even though a new version is not created.A policy change is a good example of why these historical’ properties exist. An organization may have released documents that use the property Vendor. Currently the policy on the property Vendor does not require a value. The administrator modifies the policy ‘Requires Value’ to require a value. After the automatic compliance recalculation, any existing documents (including released documents) with the Vendor property and without a value will have a new PropertyCompliance value of non-compliant. PropertyCompliance(Historical) will retain the value of compliant. MigrationThe property features of Vault 2011 are a significant enhancement. A feature overhaul of this scale poses challenges for migration. Most prominent is the calculation of property compliance. In some migration cases, the compliance calculation will require additional information beyond that which was stored in Vault 2010 or earlier versions. Performing a Re-Index will resolve the majority of these cases. It is highly recommended that a Re-Index is performed after migration. A Re-Index using the option for Latest and Released Versions Only is sufficient. In rare cases, a re-index may not restore compliance values to pre-migration values. If this occurs, manual adjustment to the property configuration may be required.File Index PropertiesFIP’s are no longer supported. The values contained by the FIP’s will remain available in UDP’s. There are multiple FIP configurations that require unique migration rules, listed here:FIP with no mapping or grouping: this ordinary FIP exists in Vault 2010 or earlier, without any mapping to a UDP and is not a member in any group. Migration will create a UDP, which will be mapped to the file property from which the FIP was created.FIP mapped to a UDP: upon migration, the UDP is carried forward and the FIP is removed from Vault. The value remains available in Vault through the UDP.Grouped FIP’s: property groups are migrated to a UDP having the same name and are mapped to the sources of all the grouped FIP’s.Bi-directional MappingsNew to Vault 2011 is the ability to create Bi-directional property mapping. In previous releases, a mapping was either Read or Write. Because of this change, a UDP that has only Read mappings may not be modified. An example is a UDP that is mapped to Read its value from the file property Creation Date. It makes no sense to write a value back to Creation Date.After migrating to Vault 2011, property mappings that were previously Read will be changed to Bi-directional. If the mapped source does not support input of a value, like the Creation Date example above, the mapping will not be changed and will remain Read. UDP’s that have multiple mappingsthrough the same Content Provider may, under specific circumstances, become non-compliant. If this occurs, it may be necessary to alter the configuration to restore compliance.An example:Vault 2010 or any previous version has a property configuration where two or more fileproperties are mapped as Read into the same UDP. This can occur when companiesmerge or when file property name standards change. For the Read mappings of theconfiguration below, equivalence is calculated on the highest priority mapping, which isEng; the mappings to the other properties are ignored.Upon migration to Vault 2011, Read mappings are converted to Bi-directional (shown below.). For the Bi-directional mappings of the configuration below, equivalence iscalculated between the UDP and each file property that exists in the file. In most cases, only one of the file properties exists in any given file, which will result in the UDP being flagged as compliant.If two properties exist in a file both will be considered for equivalence. If either file property has a value that does not match the UDP it is flagged as non-compliant.Enabling the Create option on a mapping will force equivalence calculation on that mapping even when the property definition does not exist in the file. When the property definition does not exist in the file, each mapping with the Create option set to Off is ignored for equivalence calculation.Autodesk, AutoCAD, and DWG are either registered trademarks ortrademarks of Autodesk, Inc., in the USA and/or other countries. All otherbrand names, product names, or trademarks belong to their respectiveholders. Autodesk reserves the right to alter product offerings andspecifications at any time without notice, and is not responsible fortypographical or graphical errors that may appear in this document.© 2010 Autodesk, Inc. All rights reserved.。

SolarEdge单相阶梯存储解决方案(北美)销售手册说明书

SolarEdge单相阶梯存储解决方案(北美)销售手册说明书

12-25SolarEdge StorEdge™ Solutions Benefits:More Energy - DC-coupled architecture stores PV power directly to the battery without AC conversion lossesSimple Design & Installation - single inverter for both PV and storage backup and grid-tied applicationsEnhanced Safety - no high voltage or current during installation, maintenance or firefightingFull Visibility - monitor battery status, PV production, remaining backup power and self-consumption dataCloud-based Monitoring PlatformACDCDCPV Grid Battery PackPowerOptimizersInverterMeter StorEdge™ Features:All-in-one solution uses a single DC optimized inverter to manage and monitor both PV generation and energy storage Backup power - automatically provides power to backed-up loads in the event of grid interruptionSmart Energy Management - export control, time-of-use shifting, maximized self-consumption, demand response and peak shaving capabilitiesControls third-party batteries such as the Tesla home battery, the PowerwallSolarEdge Single Phase StorEdge TMSolutions for North AmericaSingle inverter for PV, grid-tied storage and backup powerIncludes the hardware required to provide automatic backup power to backed-up loads in case of grid interruption Includes all interfaces needed for battery connection(1) For other regional settings please contact SolarEdge Support.(2) Not designed for standalone applications and requires AC for commissioning.(3) A higher current source may be used; the inverter will limit its input current to the values stated.(4) For more batteries per inverter contact SolarEdge.(5) Revenue grade inverter P/N: SE7600A-USS02NNG2.Inverter InterfaceSolarEdge Electricity Meter for North AmericaSE-MTR240-2-200-S1 / SE-MTR240-2-400-S1For meter specifications refer to: /files/pdfs/products/se_electricity_meter_na.pdf© SolarEdge Technologies, Inc. All rights reserved. SOLAREDGE, the SolarEdge logo, OPTIMIZED BY SOLAREDGEare trademarks or registered trademarks of SolarEdge Technologies, Inc. All other trademarks mentioned hereinare trademarks of their respective owners. Date: 01/2016. V。

戴尔显示器DP1.2技术规格说明书

戴尔显示器DP1.2技术规格说明书

Fiche technique du MST (transport multi-flux) DP1.2Cette document donne un aperçu de la technologie DisplayPort 1.2 intégrée aux moniteurs Dell UltraSharp.High Bit-rate 2DisplayPort 1.2 prend en charge jusqu'à deux fois la bande passante de DisplayPort 1.1a. High Bit-rate 2 (HBR2) fournit jusqu'à 5,4 Gbps/voie de bande passante, ou jusqu'à21,6 Gbps dans une configuration complète à quatre voies. Ceci se prête très bien à de nombreuses applications qui nécessitent un ultra-haut débit.MST (transport multi-flux)S'appuyant sur l'architecture micro-paquet de DisplayPort, DisplayPort 1.2 ajoute la possibilité de traiter et de conduire plusieurs appareils d'affichage via un connecteur DisplayPort. Cette fonctionnalité a souvent été désignée comme la connexion en série.Avec des écrans en série ou MST augmente le nombre de configurations de moniteurs, affichant jusqu'à un maximum de quatre moniteurs, mais est soumis à la capacité des cartes graphiques et la résolution de l'écran. Il est possible de combiner un moniteur qui possède au moins une entrée et une sortie DisplayPort 1.2 et un moniteur prenant en charge DP1.1a. Cependant, le moniteur qui prend en charge uniquement DP1.1a ne peut être connecté que comme dernier moniteur de la série MST.Réglage de DP1.1a et DP1.2 sur le moniteur UltraSharpLe réglage par défaut du moniteur est DP1.1a. L'utilisateur doit changer le réglage à DP1.2 sur l'écran pour activer MST via un réglage OSD. Veuillez consulter votre guide d'utilisation pour instruction. Pour plus d'informations sur MST, veuillez consulter le site AMD____________________Les informations présentes dans ce document sont sujettes à modification sans avis préalable. Toute reproduction de ces documents est strictement interdite, par quelque moyen que ce soit, sans autorisation écrite de Dell Inc.Marques de commerce utilisées dans ce texte : Dell et le logo DELL sont des marques de commerce de Dell Inc.Les autres marques et noms commerciaux peuvent être utilisés dans ce document pour faire référence aux entités se réclamant de ces marques et de ces noms ou à leurs produits. Dell Inc. dément toute prétention de propriété à l’égard de marques et des noms de sociétés autres que les siens.https:///Documents/50279_AMD_FirePro_DisplayPort_1-2_WP.pdf.© 2013-2014 Dell Inc. Tous droits réservés.2014 - 9 A00。

相关主题
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Manage the entire designStay in controlFind design data in seconds, share Digital Prototyping information securely with team members across the world, and know who revised designs and when with Autodesk VaultPart of the Autodesk® solution for DigitalPrototyping, the Autodesk® Vault family of datamanagement software helps you keep track ofall your digital design data. It securely stores andmanages data in a central location, helping teamsquickly create, share, and reuse Digital Prototypinginformation. With Autodesk Vault products, you’llspend less time chasing down files and more timecreating innovative designs.Connect your teamsEnhance team productivity with support forteam-based design. The Autodesk Vault familyof products lets you work closely with otherson projects without placing design data at risk. Multiuser functionality lets you control accessto design data so your entire workgroup—from managers to engineers and designers—can participate in the design process. You track and manage all data related to each digital prototype in one secure, central location. And because Autodesk® Vault Workgroup and Autodesk® Vault Professional software integrate with Autodesk design applications, it’s easier and faster than ever to manage accurate data from concept through manufacturing.Improve productivityYou don’t need to recreate the wheel. The Autodesk Vault product family includes tools that help you reuse data and minimize rework, so you can develop products faster. Instead of starting a complex model or drawing set from scratch, use a similar digital prototype as a starting point for a new design. The Vault product family improves productivity with functions designed to helpyou track, find, and organize data quickly. Saved searches and shortcuts speed up data search, while productivity tools let you manipulate design files without breaking application-specific links. And data organization tools let you control property indexing and access across file types, so you can improve data sharing and searching basedon property sets.Control revisionsMaking changes doesn’t have to interrupt your workflow: you can control design iterations from within your design application. Vault Workgroup and Vault Professional capture the history of design concepts, so you can push the boundaries of your work, or revert to older revisions if needed. Then use the Vault family of products to secure, release, and track data revisions—granting team members access to only the correct revisionsof the files. With Autodesk Vault products, you maintain control over the digital prototype as it moves through the design and production process. Data management capabilitiesThe Autodesk Vault family of products accelerates development cycles and optimizes your investment in design data with features that help you organize, manage, and track key design and release management processes.Facing these issues?• Finding past revisions for printing or viewing is tedious, if not impossible.• Personnel prematurely or accidently access drawings that are not released, leading to costly errors in manufacturing.• Adopting and complying with company and industry standards have been challenging.• Collecting the “correct” revisions of drawings as a set for batch printing of a job is very tedious, time consuming, and error-prone.Vault family of products:Less administration.More innovation.Image courtesy of Genmar YachtsAutodesk Vault productsAutodesk Vault WorkgroupAutodesk Vault Workgroup data managementsoftware helps you improve productivity andspeed design cycle times by making it easier tocreate and share Digital Prototyping informationacross workgroups. It includes functionalityfor data management, data search and reuse,revision control, and simple administrationand configuration.Autodesk Vault ProfessionalAutodesk Vault Professional is the mostcomprehensive data management product offeredby Autodesk. Including all of the functionality ofVault Workgroup, plus functionality for trackingengineering change orders, managing bills ofmaterials, and exchanging data with otherbusiness systems.Autodesk Vault products help design and engineering workgroups manage Digital Prototyping information so they can release andrevise designs more efficientlyLearn more or purchaseAccess specialists worldwide who can provide product expertise, a deep understandingof your industry, and value that extends beyond your software. To license AutodeskVault software, contact an Autodesk Authorized Reseller. Locate a reseller near you at/reseller.Autodesk EducationAutodesk offers students and educators a variety of resources to help ensure studentsare prepared for successful design careers, including access to free* software, curricula,training materials, and other resources. Anyone can get expert guidance at anAutodesk Authorized Training Center (ATC ®) site, and validate skills with AutodeskCertification. Learn more at /education.Autodesk SubscriptionSubscribe to Autodesk ® Maintenance Subscription for Autodesk Vault. MaintenanceSubscription gives you an advantage with upgrades to the latest software releases,flexible licensing rights, powerful cloud services, and technical support.** Learn moreat /maintenance-subscription .Autodesk 360The Autodesk ® 360 cloud-based framework provides tools and services to extenddesign beyond the desktop. Streamline your workflows, effectively collaborate, andquickly access and share your work anytime, from anywhere. Learn more at/autodesk360.*Free products are subject to the terms and conditions of the end-user license agreement that accompanies download ofthis software.**All Subscription benefits are not available for all products in all languages and/or regions. Flexible licensing terms,including previous version rights and home use, are subject to certain conditions.Autodesk, the Autodesk logo, AutoCAD, and ATC are registered trademarks or trademarks of Autodesk, Inc., and/or itssubsidiaries and/or affiliates in the USA and/or other countries. All other brand names, product names, or trademarksbelong to their respective holders. Autodesk reserves the right to alter product and services offerings, and specificationsand pricing at any time without notice, and is not responsible for typographical or graphical errors that may appear inthis document. © 2014 Autodesk, Inc. All rights reserved. Autodesk Digital Prototyping is an innovative way for you to explore your ideas before they’re even built. It’s a way for team members to collaborate across disciplines. And it’s a way for individuals and companies of all sizes to get great products into market faster than ever before. From concept through design, manufacturing, marketing, and beyond, Autodesk Digital Prototyping streamlines the product development process from start to finish.。

相关文档
最新文档