Hewlett-Packard Labs, 1-U4
HP-Hewlett-Packard发行的用户指南说明书
User Guide© Copyright 2015 Hewlett-Packard Development Company, L.P.Intel is a trademark of Intel Corporation in the U.S. and other countries and is used under license.The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.First Edition: September 2015Document Part Number: 828940-001Product noticeThis guide describes features that are commonto most models. Some features may not beavailable on your computer.Software termsBy installing, copying, downloading, orotherwise using any software productpreinstalled on this computer, you agree to bebound by the terms of the HP End User LicenseAgreement (EULA). If you do not accept theselicense terms, your sole remedy is to return theentire unused product (hardware and software)within 14 days for a refund subject to therefund policy of your place of purchase.For any further information or to request a fullrefund of the computer, please contact yourlocal point of sale (the seller).Safety warning noticesurface. Do not allow another hard surface, such as an adjoining optional printer, or a soft surface, such aspillows or rugs or clothing, to block airflow. Also, do not allow the AC adapter to come into contact with theskin or a soft surface, such as pillows or rugs or clothing, during operation. The computer and the AC adaptercomply with the user-accessible surface temperature limits defined by the International Standard for Safetyof Information Technology Equipment (IEC 60950).iiiiv Safety warning noticeProcessor configuration setting (select models only)IMPORTANT:Select computer models are configured with an Intel® Pentium® N35xx/N37xx series or aCeleron® N28xx/N29xx/N30xx/N31xx series processor. If your computer is configured as described, do notchange the processor configuration setting in msconfig.exe from 4 or 2 processors to 1 processor. If youdo so, your computer will not restart. You will have to perform a factory reset to restore the original settings.vvi Processor configuration setting (select models only)Table of contents1 Getting to know your computer (1)Right side (1)Left side (2)Display (3)Top (4)TouchPad (4)Buttons (5)Bottom (6)Labels (7)2 Using TouchPad gestures (8)Using TouchPad gestures (8)Tapping (8)Scrolling (10)3 Using the action keys (12)Using the action keys (12)4 Power and Battery (13)Factory-sealed battery (13)Charging the Battery (13)5 More HP resources (14)More HP resources (14)6 Electrostatic Discharge (15)Index (16)viiviii1Getting to know your computerRight sideComponent Description(1)USB 2.0 ports Connect optional USB devices, such as a keyboard, mouse,external drive, printer, scanner or USB hub.(2)AC adapter light●White: The AC adapter is connected and the battery ischarged.●Amber: The AC adapter is connected and the battery ischarging.●Off: The computer is using battery power.(3)Power connector Connects an AC adapter.Right side1Left sideComponent Description(1)Security cable slot Attaches an optional security cable to the computer.NOTE:The security cable is designed to act as a deterrent,but it may not prevent the computer from being mishandledor stolen.(2)HDMI port Connects an optional video or audio device, such as a high-definition television, any compatible digital or audiocomponent, or a high-speed High-Definition MultimediaInterface (HDMI) device.(3)USB 3.0 charging (powered) port Connects an optional USB device, such as a keyboard, mouse,external drive, printer, scanner or USB hub. Standard USBports will not charge all USB devices or will charge using a lowcurrent. Some USB devices require power and require you touse a powered port.NOTE:USB charging ports can also charge select cell phonesand MP3 players, even when the computer is off.(4)Audio-out (headphone)/Audio-in (microphone)jack Connects optional powered stereo speakers, headphones, earbuds, a headset, or a television audio cable. Also connects an optional headset microphone. This jack does not support optional microphone-only devices.WARNING!To reduce the risk of personal injury, adjust the volume before putting on headphones, earbuds, or a headset. NOTE:When a device is connected to the jack, the computer speakers are disabled.NOTE:Be sure that the device cable has 4-conductor connector that supports both audio-out (headphone) and audio-in (microphone).(5)Micro memory card reader Reads optional memory cards that store, manage, share, oraccess information.To insert a card:▲Hold the card label-side up, with connectors facing theslot, insert the card into the slot, and then push in on thecard until it is firmly seated.To remove a card:▲Press in on the card it until it pops out.(6)Power light●White: Computer is on.●Blinking white: Computer is in Sleep mode.2Chapter 1 Getting to know your computerComponent Description●Off: The computer is off.DisplayComponent Description(1)Internal display switch Turns off the display and initiates Sleep if the display is closed whilethe power is on.NOTE:The internal display switch is not visible from the outside ofthe computer.(2)WLAN antennas*Send and receive wireless signals to communicate with wireless localarea networks (WLANs).NOTE:The position of the WLAN antennas may differ, dependingon model.(3)WWAN antennas*Send and receive wireless signals to communicate with wireless widearea networks (WWANs).(4)Internal microphone Records sound.(5)Webcam Records video, captures still photographs, and allows videoconferences and online chat by means of streaming video.(6)Webcam light On: The webcam is in use.*The antennas are not visible from the outside of the computer. For optimal transmission, keep the areas immediately around theantennas free from obstructions. For wireless regulatory notices, see the section of the Regulatory, Safety, and Environmental Noticesthat applies to your country or region.Display3TopTouchPadComponent Description(1)TouchPad zone Moves the on-screen pointer and selects or activates items onthe screen.4Chapter 1 Getting to know your computerButtonsComponent Description(1)Power button●When the computer is off, press the button to turn on thecomputer.●When the computer is in the Sleep state, press the buttonbriefly to exit Sleep.●When the computer is on and you want to lock the screen,press the power button until you see the sign-in screenappear. Pressing the power button during screen-lockmode turns off the computer.●When the computer is on and you want to turn it off, pressand hold the powerTop5Component Description(1)Speakers (2)Produce sound. 6Chapter 1 Getting to know your computerThe labels affixed to the computer provide information you may need when you troubleshoot system problems or travel internationally with the computer.IMPORTANT:All labels described in this section will be affixed to the bottom of the computer.For help finding these locations, refer to Getting to know your computer on page 1.NOTE:Your label may look slightly different from the illustration in this section.●Service label—Provides important information, including the following:Component(1)Model name (select products only)(2)Product number(3)Serial number(4)Warranty periodHave this information available when you contact support.●Regulatory label—Provides regulatory information about the computer.●Wireless certification label or labels—Provide information about optional wireless devices and theapproval markings of some of the countries or regions in which the devices have been approved for use.If your computer model includes one or more wireless devices, one or more certification labels areincluded with your computer. You may need this information when traveling internationally.Labels72Using TouchPad gesturesA TouchPad allows you to control the pointer on the screen using your fingers.Using TouchPad gesturesThe TouchPad supports a variety of gestures that let your fingers tap and scroll to manipulate items on thedesktopTappingTo make an on-screen selection, use the Tap function on the TouchPad.●Tap one finger on the TouchPad zone to make a selection.8Chapter 2 Using TouchPad gestures●Tap two fingers on the TouchPad zone to bring up a context-sensitive menu.Using TouchPad gestures9ScrollingScrolling is useful for moving up, down, or sideways on a page or image. Scrolling to the left or the right withtwo fingers will scroll the screen, if there is more content viewable to either side, or will move back and forththrough web browser history.To scroll, place two fingers slightly apart on the TouchPad, and then drag them across the TouchPad in an up,down, left, or right motion.NOTE:Scrolling speed is controlled by finger speed.10Chapter 2 Using TouchPad gesturesTo scroll between open tabs in Chrome, slide three fingers left or right on the TouchPad.Using TouchPad gestures113Using the action keysUsing the action keysFor more information on action keys and keyboard shortcuts, go to https:///chromebook/answer/183101?hl=en.Icon Key Descriptionesc esc is a key that interacts with other keys to activate the computer's functions.Back Go to the previous page in your browser history.Forward Go to the next page in your browser history.Reload Reload your current page.Full screen Open your page in full-screen mode.Display apps Displays open apps.NOTE:Pressing this button in conjunction with ctrl takes a screenshot.Brightness down Decreases the screen brightness incrementally as long as you hold down the key.Brightness up Increases the screen brightness incrementally as long as you hold down the key.Mute Mutes speaker sound.Volume down Decreases speaker volume incrementally as long as you hold down the key.Volume up Increases speaker volume incrementally as long as you hold down the key.Power button●When the computer is off, press the button to turn on the computer.●When the computer is in the Sleep state, press the button briefly to exit Sleep.●When the computer is on and you want to lock the screen, press the powerbutton until you see the sign-in screen appear. Pressing the power buttonduring screen-lock mode turns off the computer.●When the computer is on and you want to turn it off, press and hold the powerbutton.12Chapter 3 Using the action keys4Power and BatteryFactory-sealed batteryThe battery in this product cannot be easily replaced by user themselves. Removing or replacing the batterycould affect your warranty coverage. If a battery is no longer holding a charge, contact support.When a battery has reached the end of its useful life, do not dispose of the battery in general householdwaste. Follow the local laws and regulations in your area for battery disposal.Charging the Battery1.Connect the power adapter to the computer.2.Verify that the battery is charging by checking the AC adapter light. This light is located on thecomputer's left side, next to the power connector.AC adapter light StatusWhite The AC adapter is connected and the battery is charged.Amber The AC adapter is connected and the battery is charging.Off The computer is using battery power.3.While the battery is charging, keep the AC adapter connected until the AC adapter light turns white.Factory-sealed battery135More HP resourcesMore HP resourcesYou have already used Setup Instructions to turn on the computer and locate this guide. For product details, how-to information, and more, use this table.Resource ContentsSetup Instructions●Overview of computer setup and features.Help and SupportFor U.S. support, go to /go/contactHP.For worldwide support, go to /country/us/en/ wwcontact_us.html.● A broad range of how-to information and troubleshooting tips.Safety & Comfort GuideGo to /ergo.●Proper workstation setup.●Guidelines for posture and work habits that increase your comfortand decrease your risk of injury.●Electrical and mechanical safety information.Worldwide supportTo get support in your language, go to /country/us/en/ wwcontact_us.html.●Chat online with an HP technician.●Email support.●Find support telephone numbers.●Locate HP service center locations.Regulatory, Safety and Environmental NoticesThis guide is provided in the box.●Important regulatory notices.Limited Warranty*This guide is provided in the box, or go to/go/orderdocuments.●Specific warranty information about this computer.*You can find the expressly provided HP Limited Warranty applicable to your product located with the user guides on your computerand/or on the CD/DVD provided in the box. In some countries/regions, HP may provide a printed HP Limited Warranty in the box. Forcountries/regions where the warranty is not provided in printed format, you may request a printed copy from /go/orderdocuments or write to:●North America: Hewlett-Packard, MS POD, 11311 Chinden Blvd., Boise, ID 83714, USA●Europe, Middle East, Africa: Hewlett-Packard, POD, Via G. Di Vittorio, 9, 20063, Cernusco s/Naviglio (MI), Italy●Asia Pacific: Hewlett-Packard, POD, P.O. Box 200, Alexandra Post Office, Singapore 911507When you request a printed copy of your warranty, please include your product number, warranty period (found on your service label),name, and postal address.IMPORTANT:Do NOT return your HP product to the addresses above. For U.S. support, go to /go/contactHP. Forworldwide support, go to /country/us/en/wwcontact_us.html.14Chapter 5 More HP resources6Electrostatic DischargeElectrostatic discharge is the release of static electricity when two objects come into contact—for example,the shock you receive when you walk across the carpet and touch a metal door knob.A discharge of static electricity from fingers or other electrostatic conductors may damage electroniccomponents. To prevent damage to the computer, damage to a drive, or loss of information, observe theseprecautions:●If removal or installation instructions direct you to unplug the computer, unplug it after being properlygrounded and before removing a cover.●Keep components in their electrostatic-safe containers until you are ready to install them.●Avoid touching pins, leads, and circuitry. Handle electronic components as little as possible.●Use nonmagnetic tools.●Before handling components, discharge static electricity by touching an unpainted metal surface of thecomponent.●If you remove a component, place it in an electrostatic-safe container.If you need more information about static electricity or assistance with component removal or installation,contact support.15IndexAAC adapter lightidentifying1action keys12back12brightness down12brightness up12esc12forward12full screen12mute12power button12volume down12volume up12audio-in (microphone) jack, identifying2audio-out (headphone) jack, identifying2Bbattery bay7buttonspower5Ccomponentsbottom6display3left side2right side1top4connector, power1Eelectrostatic discharge15Hheadphone (audio-out) jack2Iintegrated webcam light, identifying3internal microphones, identifying3Jjacksaudio-in (microphone)2audio-out (headphone)2Llabels7regulatory7service7wireless certification7WLAN7lightsAC adapter1power2webcam3Mmemory card reader, identifying2memory card, identifying2microphone (audio-in) jack,identifying2NNext window12PportsHDMI2USB1USB 3.0 charging (powered) 2power button, identifying5power connector, identifying1power lights2product name and number,computer7Rregulatory informationregulatory label7wireless certification labels7Sscrolling TouchPad gesture10security cable slot, identifying2serial number7serial number, computer7service labelslocating7slotsmemory card reader2security cable2speakers, identifying6Support14TTouchPad gesturesscrolling10TouchPad zone, identifying4traveling with the computer7UUSB 3.0 charging (powered) port,identifying2USB ports, identifying1Wwebcam light, identifying3webcam, identifying3wireless antennas, identifying3wireless certification label7WLAN antennas, identifying3WLAN device7WLAN label7WWAN antennas, identifying316Index。
Hewlett-Packard升级与维护指南说明书
Upgrading and Servicing GuideThe information in this document is subject to change without notice.Hewlett-Packard® Company makes no warranty of any kind with regard to this material, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose.HP shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance, or use of this material.HP assumes no responsibility for the use or reliability of its software on equipment that is not furnished by HP.This document contains proprietary information that is protected by copyright. All rights are reserved. No part of this document may be photocopied, reproduced, or translated to another language without the prior written consent of HP.Hewlett-Packard CompanyP.O. Box 4010Cupertino, CA 95015–4010USACopyright © 2005, 2007 Hewlett-Packard Development Company, L.P.All rights reserved.This product incorporates copyright protection technology that is protected by method claims of certain U.S. patents and other intellectual property rights owned by Macrovision Corporation and other rights owners. Use of this copyright protection technology must be authorized by Macrovision Corporation, andis intended for home and other limited viewing uses only unless otherwise authorized by Macrovision Corporation. Reverse engineering or disassembly is prohibited. Apparatus Claims of U.S. Patent Nos. 4,631,603, 4,577,216,4,819,098, and 4,907,093 licensed for limited viewing uses only.HP supports lawful use of technology and does not endorse or encourage the use of our products for purposes other than those permitted by national copyright law.Table of ContentsSafety Information (1)Opening and Closing the PC (1)Preparing the PC (1)Before Opening the PC (1)After Closing the PC (2)Removing the Side Panel (2)Replacing the Side Panel (2)Removing the Front Panel (2)Replacing the Front Panel (3)Locating Components Inside the PC (3)Removing and Replacing Drives (3)Removing a Drive (4)Replacing or Adding a Drive (5)Adding Memory (7)Removing a Memory Module (7)Installing a Memory Module (8)Removing or Installing an Add-In Card (8)Removing an Add-In Card (9)Installing an Add-In Card (9)Replacing the Battery (10)Upgrading and Servicing Guide iiiiv Upgrading and Servicing GuideSafety InformationThis product has not been evaluated for connection to an “IT” power system (an AC distribution system with no direct connection to earth, according toIEC 60950).WARNING: Please read “SafetyInformation” in the Warranty and SupportGuide before installing and connectingyour system to the electrical powersystem.Opening and Closing the PCPreparing the PCBefore you upgrade any component in your PC, you need to prepare the PC so that you can safely handle it and the components.Read the following items before attempting to upgrade or service the PC.•These procedures assume familiarity with the general terminology associated with personalcomputers and with the safety practices andregulatory compliance required for using andmodifying electronic equipment. •Write down and save the system model and serial numbers, all installed options, and otherinformation about the system. It’s easier to consult this information than to open up and examinethe PC.•It is recommended that you use an antistatic wrist strap and a conductive foam pad when working on the system.WARNING: Always disconnect the modemcord from the telephone system, and thendisconnect the PC from the power sourcebefore removing the front and side panelsof the PC. Failure to do so before youopen the PC or do any procedures canresult in personal injury or equipmentdamage.Before Opening the PC1Remove any diskette or optical disc (CD or DVD)from the PC.2Click the Start button, and then click Turn OffComputer. Click Turn Off.3Disconnect the modem/telephone cable, if present.CAUTION: To reduce the risk of personalinjury from electrical shock or hotsurfaces, disconnect the power cord fromthe wall outlet, and allow the internalsystem components to cool beforetouching.4Disconnect the power cord from the electrical outlet and then from the PC.5Disconnect all other attached cables (such as thekeyboard, mouse, and monitor) and all externaldevices.CAUTION: Static electricity can damagethe electronic components of the PC oroptional equipment. Ensure that you aredischarged of static electricity by brieflytouching a grounded metal object.Upgrading and Servicing Guide 1After Closing the PCTo avoid injury and equipment damage, always follow this procedure in this order after closing the PC. 1Reconnect the power cord.WARNING: To reduce the risk of electricalshock, fire, or damage to the equipment,do not plug telecommunications ortelephone connectors into the networkinterface card (NIC) (labeled as anEthernet connector).2Reconnect the modem/telephone cable, and allother cables (such as the keyboard, mouse, andmonitor) and external devices.3Turn on the PC and all peripherals.4If you installed an add-in card, install any software drivers supplied by the card manufacturer. Removing the Side Panel1Remove the side panel by loosening the screw (D) that secures the panel to the PC chassis.2Slide the panel back about 1 inch (2.5 cm), andthen lift it off the unit.WARNING: Beware of sharp edges insidethe chassis. Replacing the Side Panel1Place the side panel in the proper position on the chassis and slide it into place.2Ensure that the hole for the thumbscrew alignswith the hole in the chassis, and replace thethumbscrew (D).Removing the Front PanelThis procedure is necessary only when removing or replacing an optical drive, memory card reader, diskette drive, or the hard disk drive.1Press the three tabs toward the center of thechassis (1).2Swing the front panel away from the chassistoward the right.3Lift the front panel up slightly and remove it.2 Upgrading and Servicing GuideReplacing the Front Panel1Align the top of the front panel with the top of the chassis front.2Press the panel onto the chassis at the top and ateach side near the bottom until the panel snaps into place.Locating Components Inside the PCA Upper optical drive bay, may be a CD-ROM, CD-RW,DVD-ROM, DVD+RW/+R, or combination driveB Lower optical drive bay, may be empty (blank plate) or aCD-ROM, CD-RW, DVD-ROM, DVD+RW/+R, orcombination driveC Memory card reader (select models)D Diskette (floppy) drive (select models)E Front connector panel (no replacement instructions)F Hard disk driveG Second hard disk drive (select models) Removing and Replacing DrivesYour PC has several drives that you can replace or upgrade. See the preceding topic, “Locating Components Inside the PC,“ for drive type and location.The hard disk drive is either a Serial ATA (advanced technology attachment) drive that uses a narrow data cable, or a Parallel ATA drive that uses a wide data cable.Select models have a second hard disk drive.CAUTION: Back up your personal files onthe hard disk drive to an externalstorage device, such as a CD, beforeremoving the hard disk drive. Failure todo so will result in data loss. Afterreplacing the hard disk drive, you needto run System Recovery using therecovery discs to load the factory-installed files. See the userdocumentation that came with your PCfor details about the recovery procedure. You can add an optical drive into an empty lower optical drive bay.Upgrading and Servicing Guide 35Push down the two retaining clips on the ends of the memory socket until the memory module pops out of the socket.WARNING: Do not pull the memorymodule out of the socket. Use theretaining clips to eject the module.6Lift the memory module from the memory socket.Installing a Memory Module Upgrade the memory in your PC with memory of the same type and speed as the memory originally installed in your PC.CAUTION: When handling a memorymodule, be careful not to touch any ofthe contacts. Doing so may damage themodule.1Open both latches of the memory module socket: •If you are replacing a memory module, put the new memory module in the same memory slotfrom which the old memory was removed.Or•If you are adding a memory module, install the new module into the socket nearest thepreinstalled module, and install additionalmodules in the next available sockets.2The memory module can be installed in only oneway. Match the notch on the module with the tabon the memory socket (B). Push the modulecarefully and firmly into the slot, ensuring that the latches on both ends snap into place.3Set the chassis upright.4Complete the procedures to replace the side panel, and close the PC. See “Opening and Closing the PC“ on page 1.NOTE: If a blank screen is displayed after replacing or adding a memory module, the memory is installed incorrectly or it is the wrong type of memory. Remove and reinstall the memory module.Removing or Installing an Add-In CardAn add-in card is a circuit board, such as a PCI or an AGP card, that fits into a PC add-in card slot. Your PC contains several add-in card slots that can be used to add components to your PC. The PC component configurations vary by model.WARNING: Do not overload the systemby installing add-in cards that drawexcessive current. The system is designedto provide 2 amps (average) of +5 Vpower for each board/card in thecomputer. The total +5 V current draw ina fully loaded system (one with all add-incard slots filled) must not exceed the totalnumber of slots multiplied by 2 amps.A Phillips screwdriver is needed to remove, replace, or add an add-in card.8 Upgrading and Servicing GuideUpgrading and Servicing Guide 9Removing an Add-In Card1 Complete the procedures to prepare the PC and to remove the side panel. See “Opening and Closing the PC“ on page 1.2 Gently lay the PC on its side.3 On the back of the PC, remove the screw from the bracket cover for the add-in card slots, and then remove the bracket cover.4 Inside the PC, locate the add-in card slots on the motherboard.6 If you are not replacing the old add-in card with a new add-in card, close the open slot by inserting the metal slot cover into the opened slot.Installing an Add-In Card1 Align the edge of the add-in card with the slot on the chassis and gently but firmly press the card straight down into the add-in card slot. The whole connector should be seated properly in the card slot.Replacing the BatteryA lithium battery on the motherboard provides backup power for the PC’s timekeeping capability. The battery has an estimated life expectancy of seven years. When the battery starts to weaken, the date and time may be incorrect. If the battery fails, replace it with a CR2032 lithium battery (3 volt, 220mAH rating) or an equivalent battery.WARNING: There is danger of explosionif the battery is incorrectly replaced.Replace only with the same, orequivalent, type of battery. Discard usedbatteries according to the manufacturer’sinstructions.1Complete the procedures to prepare the PC and to remove the side panel. See “Opening and Closing the PC“ on page 1.2Gently lay the PC on its side.3Remove any cabling, if necessary, to reach thebattery.4Remove any memory modules, if necessary, toreach the battery. See “Adding Memory“ onpage 7.5To remove the battery, push the latch away from the battery and lift the battery from the socket.6Install the new CR2032 battery in the socket, with the positive (+) side facing the latch.7Replace memory modules or cables you removed. 8Set the chassis upright.9Complete the procedures to replace the side panel, and to close the PC. See “Opening and Closing the PC“ on page 1.10 Upgrading and Servicing GuideUpgrading and Servicing Guide 11Part number: 5991-7158。
2016年计算机一级MSOffice考试试题冲刺及答案(1)
2016年计算机一级MSOffice考试试题冲刺及答案(1) 一、选择题1在微机中,西文字符所采用的编码是( )。
A.EBCDIC码B.ASCII码C.国标码D.BCD码参考答案:B参考解析:西文字符采用ASCⅡ码编码。
2现代计算机中采用二进制数制是因为二进制数的优点是( )。
A.代码表示简短,易读B.物理上容易实现且简单可靠;运算规则简单;适合逻辑运算C.容易阅读,不易出错D.只有0,1两个符号,容易书写参考答案:B参考解析:二进制避免了那些基于其他数字系统的电子计算机中必须的复杂的进位机制,物理上便于实现,且适合逻辑运算。
3二进制数110001转换成十进制数是( )。
A.47B.48C.49D.51参考答案:C参考解析:2016年计算机一级MSOffice考试试题冲刺及答案(1)4汉字区位码分别用十进制的区号和位号表示。
其区号和位号的范围分别是( )。
A.0~94,0~94B.1~95,1~95C.1~94,1—94D.0~95,0~95参考答案:C参考解析:区位码:94×94阵列,区号范围:1~94,位号范围:1~94。
5一个汉字的机内码与国标码之间的差别是( )。
A.前者各字节的最高二进制位的值均为1,而后者均为0B.前者各字节的最高二进制位的值均为0,而后者均为lC.前者各字节的最高二进制位的值各为1、0,而后者为0、1D.前者各字节的最高二进制位的值各为0、1,而后者为1、0参考答案:A参考解析:国标码是汉字信息交换的标准编码,但因其前后字节的最高位为0,与ASCⅡ码发生冲突,于是,汉字的机内码采用变形国标码,其变换方法为:将国标码的每个字节都加上128,即将两个字节的最高位由0改1,其余7位不变,因此机内码前后字节最高位都为1。
6十进制数32转换成无符号二进制整数是( )。
A.100000B.100100C.100010D.101000参考答案:A参考解析:7若已知一汉字的国标码是5E38,则其内码是( )。
Hewelett-Packard SHF测量设备说明书
been designed for testing SHF relay stations such as are used in video and communica
uring external power levels and external frequencies. One of the sets, the Model 624A, covers a range from 8500 to 10,000 mega cycles. The other set, Model 62 3 B, can be ob tained for any one of six frequency ranges*.
the frequencies at which each set operates.
each set. ^^^^ 8500-10,000 MC SET
The Model 624A Test Set is
continuously tunable over a range
from 8500 to 10,000 megacycles
5925 -6225 me 6850 -7150 me 6125 -6425 me 7125 -7425 me 6575 - 6875 me 7425 - 7725 me
tions work. Since many applications for the sets in
volve field use, the sets have been kept small and each housed in a convenient carrying case. For production and laboratory appli cations, the panels of the sets have been de signed to fit standard relay racks when the instrument case is removed.
惠普公司英文介绍
惠普公司英文介绍商英101 [1**********]2 徐年红HP = Hewlett-Packard Development Company, LPAbout Hp labshistorysome opportunitiesWorldwide sitesProductsAbout Hp labsHP is a technology company that operates in more than 170 countries around the world. We explore how technology and services can help people and companies address their problems and challenges, and realize their possibilities, aspirations and dreams. We apply new thinking and ideas to create more simple, valuable and trusted experiences with technology, continuously improving the way our customers live and work.No other company offers as complete a technology product portfolio as HP. We provide infrastructure and business offerings that span from handheld devices to some of the world's most powerful supercomputer installations. We offer consumers a wide range of products and services from digital photography to digital entertainment and from computing to home printing. This comprehensive portfolio helps us match the right products, services and solutions to our customers' specific needs. HistoryStanford University classmates Bill Hewlett and Dave Packard founded HP in 1939. The company's first product, built in a Palo Alto garage, was an audio oscillator —an electronic test instrument used by sound engineers. One ofHP's first customers was Walt Disney Studios, which purchased eightoscillators to develop and test an innovative sound system for the movie Fantasiasome opportunities that we believeCloud and Security – Delivering the secure application and computing end-state of Everything-as-a-Service.Intelligent infrastructure – Designing a system of smarter, more secure enterprise computing devices, networks, and storage built on scalable architectures. It’s about creating technology that blends into the way we work and live our lives as individuals and in business.Mobile and Immersive Experiences – Designing compelling user experiences that fundamentally change how people communicate, collaborate, socialize, and entertain---utilizing multimedia technologies to deliver intuitive, interactive, mobile, and immersive audio-visual experiences.Networking and Communication – Creating the next generation of network architectures and communications technologies, which provide predictable, high-quality and power-efficient networking while reducing management complexity.Printing and Content Delivery – Transforming inflexible, manual mass production printing processes to flexible, customized, on-demand printing processes which are enabled by new digital technologies that allow for lower cost, higher quality commercial printing.Services – Creating technologies and processes that deliver new ways to leverage data across different formats and business disciplines, enabling faster, betterWorldwide sites»Bangalore, India »Beijing, China »Bristol, England»Fusionopolis, Singapor »Haifa, Israel »Palo Alto, USA»St. Pe tersburg, RussiaProductslaptopsLaptop & Tablet PCs »Laptops for home»Laptops for businessPavilion, Presario, Mini, EliteBook, and more laptops and notebook computersprinterPrinters & All-in-ones »Printers for home»Printers for businessInkjet, laser, all-in-one, multifunction, large-format, and otherprinters SoftwareSoftware »Software productsSoftware and operating systems for management, security and moreDesktops»Desktops forbusines sPCs, Workstations, Thin Clients, POS, and more desktop computerSupplies»Supplies for home»Supplies for businessInk, toner, paper and other printer suppliesScanners»Scanners for home»Scanners for businessScanners, fax and products that do scan / fax / copy / printSmartphones & HandheldsFor home »Smartphones & handhelds»CalculatorsFor business»Smartphones & handhelds»CalculatorsMore smartphones, accessories & calculators.Monitors»Monitors for home»Monitors for businessFlat screens, LCDs and more computer monitors Monitors »Monitors for home »Monitors for businessFlat screens, LCDs and more computer monitors。
频谱分析仪使用手册
ES A系列频谱分析仪使用手册通信网络管理中心通信枢纽室目录第一章安装和设置 ............................................ 错误!未定义书签。
1、初始检查 .............................................. 错误!未定义书签。
2、电源要求 .............................................. 错误!未定义书签。
3、首次开启分析仪 ........................................ 错误!未定义书签。
4、运行内部对准 .......................................... 错误!未定义书签。
5、打印机设置和操作 ...................................... 错误!未定义书签。
6、防止静电释放 .......................................... 错误!未定义书签。
第二章前面板和后面板特性 .................................... 错误!未定义书签。
1、前面板概览 ............................................ 错误!未定义书签。
2、后面板特性 ............................................ 错误!未定义书签。
3、键概述 ................................................ 错误!未定义书签。
4、前面板和后面板符号 .................................... 错误!未定义书签。
第三章进行基本测量 ......................................... 错误!未定义书签。
计算机发展历史
1984年1月: Apple 的Macintosh发布。基于Motorola 68000微处理器。可以寻址16M。
1984年8月:MS-DOS 3.0、PC-DOS 3.0、IBM AT发布,采用ISA标准,支持大硬盘和1.2M高密软驱。
1937年,Alan Turing 想出了一个"通用机器(Universal Machine)”的概念,可以执行任何的算法,形成了一个"可计算(computability)”的基本概念。Turing 的概念比其它同类型的发明为好,因为他用了符号处理(symbol processing) 的概念。
1854年,George Boole 出版"An Investigation of the Laws of Thought”,是讲述符号及逻辑理由,它后来成为计算机设计的基本概念。
1882年,William S. Burroughs 辞去在银行文员的工作,并专注于加数器的发明。
1889年,Herman Hollerith 的电动制表机在比赛中有出色的表现,并被用于1890 中的人口调查。Herman Hollerith 采用了Jacquard 织布机的概念用来计算,他用咭贮存资料,然后注入机器内编译结果。这机器使本来需要十年时间才能得到的人口调查结果,在短短六星期内做到。
发展历史
公元前82年有齿轮计算机,可以计算小型天文信息。
1614年,苏格兰人John Napier (1550-1617)发表了一篇论文,其中提到他发明了一种可以计算四则运算和方程运算的精巧装置。
1623年,Wilhelm Schickard (1592-1635)制作了一个能进行六位以内数加减法,并能通过铃声输出答案的'计算钟'。通过转动齿轮来进行操作。
物理学报模板和参考文献引用格式
请按照蓝色提示书写文章并删掉蓝色提示。
除标题和各节段标题外,全文用2倍行距,小四号宋体书写。
使用本模板时,请保留编辑排版用的红色部分,不要删掉下划排正体,下划~~~~~排黑体中文标题*(要简短明确,有基金资助要加*)——二号黑体居中诸葛亮1)2)刘备1)†关羽2)(通讯联系人要加剑号)——四号长仿宋居中1)(山西大学光电研究所,量子光学与光量子器件国家重点实验室,太原 030006)(要全称到院系)——六号宋体居中2)(清华大学物理系,北京 100084)——六号宋体居中(2008年1月22日收到;2008年3月31日收到修改稿)——六号宋体居中<空一行>中文摘要部分.(要简明扼要不分段,突出结论成果)——小五号宋体,摘要通栏排版,两边各缩进两格)<空一行>关键词:关键词1,关键词2,关键词3,关键词4(不超过4个,与英文Keywords对应)——五号宋体,两边各缩进两格)PACS:02.10.Yn, 33.15.Vb, 98.52.Cf, 78.47.dc——10p1. 引言——四号仿宋顶格占三行(为编辑校阅方便,全文用小四号宋体单栏排版)——正文五号宋体双栏排版二十世纪八十年代以来,量子光学发展了若干种方法:冷原子云释放再捕获(release and recapture, 简记为RR)[1],冷原子云受迫振荡[2],冷原子光谱分析[3],*国家重大研究计划课题(批准号:2006CB00000)、国家自然科学基金(批准号:123456,567890)和博士后科学基金资助的课题.——六号宋体†通讯联系人. E-mail: aaaaa@c(若第一作者是通讯联系人,仅写E-mail即可)——六号宋体非平衡四波混频[4],飞行时间光谱(time of flight, 简记为TOF )[5]和二维飞行时间吸收成像[6]等等.(中文逗号“,”,句号用实心点“.”,不能用英文的实心点句号)2.中性原子模型——四号仿宋顶格占三行2.1.理论模型——五号黑体顶格占二行中性原子磁光在六维相空间中冷原子云的初始概率分布可近似表示为 [7]——公式居中排,等号对齐标号至尾000000000{}(,,;,,)()()x y z i i iv i x N x y z v v v g i g v σσ∈=, ⋅, ∏ , (1a)111111000{}(,,;,,)()()x y z i i iv i y N x y z v v v g i g v σσ∈=, ⋅, ∏ , (1b)其中,00(,)i g i σ和0()i iv g v σ,为高斯分布函数.2.2.实验——五号黑体顶格占二行1. 采用了Hewlett-Packard 公司生产的型号为HP LaserJet 1300激光打印机,如图1所示.图1 短程飞行时间吸收谱模型——六号宋体(插图使用word 的嵌入式居中插入图片命令;对图介绍简单明了;标目尽量使用在正文中给出定义的符号,也可用汉字,但不能用英文;使用规范单位)3. 实验系统及测量结果——四号仿宋顶格占三行查询得到结果如图2所示,图2 查询结果 (a)地球;(b)切格瓦拉——六号宋体(有分图的一定要有主图题,分图的也要有相应说明)分析计算得到结果如表1所示:表1 两种数据——六号宋体样本 /J E/J 密度/kg.m-3水 1 7.8 1000甲烷0.5 27 420(表格要使用如上所示的三线表,注意单位的写法)4.结论——四号仿宋顶格占三行介绍了.(要简洁明确,多个结论可逐一列出,一般不分段)感谢北京大学力学系某某教授和某某博士以及某某的建议讨论.——小五号宋体文献六号宋体排版,下划排斜体,下划~~~~~排黑体(注意是全部作者,姓在前,名的首字母缩写在后,年份在作者后,杂志斜体用缩写,卷号黑体,页码最后。
2013年的Hewlett-Packard安全事件优化技巧与方法说明书
AgendaIn this session, you will learn•How to enrich your security events in smart connectors by–Adding missing information from raw logs or from sources outside of the raw logs –Correcting event fields populated incorrectly–Further parsing of some event fields•Using well known mechanisms such as–Parser Overrides–Categorization Overrides–Map Files•And not so well known mechanisms such as–Conditional Mappings–Event Merging–Extra Processors–Additional Regex Parsers–External Map Files–Field ExtractorsParser overridesSupport generally provides parser overrides to customers to fix parsing and mapping issues•You can write your own parser overrides by requesting Support for–Unobfuscated parsers for a given connector and device–Location where the overrides are to be placed for the connector and device (current/user/agent/fcp/<folder-path>/) •Unobfuscated parsers are HP’s IP and are provided only based on a business justification provided by the customer•In all types of parsers, you can–Add new event field mappings for the unmapped existing tokens–Capture more tokens from raw logs and map them–Fix or enhance the existing event field mappings with the help of•Operations(documented in flex connector guide)•Conditional Mappings (discussed in a later slide)–Further parse the individual fields using extra processors (discussed in a later slide)•In regular expression parsers, you can–Combine information from individual log lines that are part of a larger event into a single event using Event Merging (discussed in a later slide) •Simple example - parser override for oracle audit db connector to correct the event time from GMT to local time zone–Add the following property to the override file current/user/agent/fcp/oracle_db/10_X.sdktbdatabase.properties event.deviceReceiptTime=__toLocalTimeStamp(TIMESTAMP)Categorization overridesFixes and enhancements to categorization come in biweekly AUP updates for subscribed customers•You can also come up with your own fixes and enhancements and place them–In a file named after the ‘Device Product’–In a subfolder named after the ‘Device Vendor’ under the folder “current/user/agent/acp/categorizer/current”–ExamplesCISCO, CiscoRouter cisco/ciscorouter.csvCISCO, Cisco VPN cisco/cisco_vpn.csvBarracuda Networks, Spam Firewall barracuda_networks/spam_firewall.csv•Categorization files are also used to set agent severities where a device does not provide device severity. You can use the same concept to provide agent severities–In the case of your own flex connector when the device does not have a concept of a device severity–In the case of some event types where the category fields and severities are either missing or populated incorrectly•Example: A categorization file the provides missing categories and agent severities for VMWare VirtualCentre–current/user/agent/acp/categorizer/current/vmware/virtualcentre.csvevent.deviceEventClassId,set.event.categoryObject,set.event.categoryBehavior,set.event.categoryTechnique,set.event.categoryDeviceGroup ,set.event.categorySignificance,set.event.categoryOutcome,set.event.originator,set.agentSeverityUserLoginSessionEvent,/Host/Operating System,/Access/Start,,/Operating System,/Informational,/Success,Source,LowUserLogoutSessionEvent,/Host/Operating System,/Access/Stop,,/Operating System,/Informational,/Success,Source,LowMap filesCSV files that allow you to set values for some event fields based on the values of other event fields event.deviceCustomString1,regex.event.deviceCustomString2,range.event.deviceCustomNumber1,set.event.customerURI North America,americas_.*,1-99,/All Customers/Americas/CustomerAEurope,emea_.*,100-199,/All Customers/EMEA/CustomerBAsia,apj_.*,200-299, /All Customers/APJ/CustomerC•Header of the CSV file defines the Getter and Setter fields–Getter Fields•Constant values - specified in the header as event.field•Regular Expressions - specified in the header as regex.event.field•Ranges (Integers, IP Addresses, MAC Addresses) – specified in the header as range.event.field–Setter Fields•Only constant values – specified in the header as set.event.field•Contents of the file come from a public or private knowledge outside of raw logs•Location and Naming of files–Are placed under current/user/agent/map folder–Named as map.N.properties where N is the next available number in the numerical sequence 0,1,2…–Caveat: If there is a missing file in the sequence, map files that follow in the sequence will not be picked upConditional mappingsAllow you to do some of the event field mappings differently based on a certain token or event field •Widely used in windows unified connector parsers to do mappings differently based on the windows event id •In firewall and IDS events, source and destination mappings can be reversed based on the direction of traffic •You can use them for use cases such as above in parser overrides or flex connectors•Example:conditionalmap.count=1conditionalmap[0].field=event.deviceEventClassIdORconditionalmap[0].token=EventIDconditionalmap[0].mappings.count=2conditionalmap[0].mappings[0].values=532,534conditionalmap[0].mappings[0].event.sourceAddress=TOKEN_ADDRESSconditionalmap[0].mappings[1].values=533conditionalmap[0].mappings[1].event.destinationAddress=TOKEN_ADDRESSconditionalmap[0].mappings[1].additionaldata.DATA=TOKEN_DATAEvent mergingAllows you to combine multiple log lines into a single event•Used when the log lines happen to be segments of a single logical event spanning over a period of time•Currently limited to regular expression parser•ExampleUnix Sendmail logssendmail[24080]: h8ULinI24080: from=<dasusr1>, size=184, class=0, nrcpts=1, msgid=<200309302144.h8ULinI24080@n030->, proto=SMTP, daemon=MTA, relay= [192.168.30.102] (may be forged)sendmail[1987]: g8AEvxpV001987:from=root,size=643,class=0,nrcpts=1,msgid=<***************************************>, relay=root@localhostsendmail[27596]: h8ULinI24080: to=<dasusr1@n030-h102>, ctladdr=<dasusr1> (111/101), delay=00:00:00, xdelay=00:00:00, mailer=local, pri=30116, dsn=2.0.0, stat=Sentsendmail[1987]: g8AEvxpV001987: to=root, ctladdr=root (0/0), delay=00:00:00, xdelay=00:00:00, mailer=relay, pri=30051, relay=localhost [127.0.0.1], dsn=4.0.0, stat=Deferred: Connection refused by localhost–Individual log lines contain only partial info. Event is not complete without the info from log lines for the same email message –Log lines for the same email message need not come in order–Common token is a requirement for merging events. In this case it is the email message idEvent merging - continued•Merging Propertiesregex=.*?(?:sendmail|sm-mta).*? (\\S+?): ((from|to|ruleset|lost input channel)(?:=|\\s).*) token.count=3token[0].name=messageIdtoken[1].name=eventtoken[2].name=identifiermerge.count=1merge[0].pattern.count=1merge[0].pattern[0].token= Identifiermerge[0].pattern[0].regex=(from|to)merge[0].starts.count=1merge[0].starts[0].token=identifiermerge[0].starts[0].regex=frommerge[0].ends.count= 1merge[0].ends[0].token=Identifiermerge[0].ends[0].regex= tomerge[0].id.tokens= messageIdmerge[0].timeout=6000merge[0].sendpartialevents=falseExtra processorsChained parsers called from inside an existing parser to parsed the contents of an event field further •Used when the content of the field is in a different format than parsed by the parent parser–Example: When a portion of the log message or a database column has xml content, an xml extra processor is used extraprocessor[0].type=xmlextraprocessor[0].filename=fpsmc_db/notification/xmlforefrontextraprocessor[0].field=event.deviceCustomString1extraprocessor[0].conditionfield=event.deviceCustomString1extraprocessor[0].conditiontype=regexextraprocessor[0].conditionvalues=(^<\\?xml.*)extraprocessor[0].clearfieldafterparsing=false•Extra Processor Typesregex regular expression parserkeyvalue keyvalue parserdelimited delimited token parser (ex:- csv)xml xml parsermap map file•Condition Typesregex field content matches regular expression conditionequals field value equals one of the condition valuesAdditional Regex parsersRegex parsers deployed for a connector type to further parse the contents of one or more event fields •Contents of the parser file are very much like a regular expression parser used in a flex connector or supported connector –The only extra property is ‘source.field’ which defines the event field that needs to be further parsed–Simple Example:source.field=event.messageregex=(.*?):(.*)token.count=2token[0].name=String1token[0].name=String2event.flexString1=String1event.flexString2=String2•Location and Naming of files–Placed under current/user/agent/fcp/additionalregexparsing/<agent-type> folder where <agent-type> is the value of agents[0].type in current/user/agent/agent.properties file–Named as regex.N.properties where N is the next available number in the numerical sequence 0,1,2…–Caveat: If there is a missing file in the sequence, map files that follow in the sequence will not be picked up•Advantages over a regex extra processor–Independent of original parsers or parser overrides and kicks in after both of them in the event flow–In connectors such as syslog connector with subagents, same event enrichment may require multiple parser overrides for different subagents. Insuch cases, a single additional regex parser can be used to achieve the same resultExternal map filesA type of map file mechanism where the data to set resides in an external source like a database •Contents of the file are properties that define the mapping unlike map files which are CSV files with a header–Example Propertiestype=sql (Only database type supported currently for external source)field.getter=destinationAddress (Only one getter field can be specified)field.setter.count=2 (At least one setter field needs to be specified)field.setter[0]=deviceCustomString1field.setter[1]=deviceCustomDate1jdbc.class=oracle.jdbc.driver.OracleDriverjdbc.url=jdbc:oracle:thin:@myhost:1521:arcsight (URL syntax varies based on the jdbc driver used)ername=arcsightjdbc.password=OBFUSCATE.4.8.1:5pEDYBZpXFJGsYID9GibEA== (encrypted password)jdbc.query=select IPADDR, Info, TimeStamp from mytable where IPADDR in (?\u0000?)field.addrs.as.numbers=true (whether address columns in the database are numbers or strings) •Encrypted password–Clear text value for jdbc.password has to be encrypted using the following commandcurrent/bin/arcsight agent obfuscate -p <clear-text-password>External map files – continued•SQL Query–jdbc.query=select IPADDR, Info, TimeStamp from mytable where IPADDR in (?\u0000?)–Is executed for every batch of events (default batch size is 100)–Needs to return the getter column as the first column followed by all of the setter columns in the defined order–The where class needs to employ a condition involving the getter column with the ‘in’ operator followed by a special placeholder “?\u0000?” which will be replaced by the actual values of the defined getter field from the batch of events–The values of the setter columns returned in the query result will be set to the defined setter fields in the batch of events •Naming and Location of the files–Placed under current/user/agent/extmap/id folder, where id is the identifier for a specific destination–Named as extmap.N.properties where N is the next available number in the numerical sequence 0,1,2…Field extractorsAllow you to extract relevant information from the log file names or paths into event fields •Particularly useful when this information is missing from the raw logs•Example1: For a file reader connector–Assume that your log file name is 'myhost.1.log' and that when it rotates, it is 'myhost.2.log' and so on.–If you need to extract both the host name and the index. You can accomplish extraction by specifying the following properties agents[0].usefieldextractor=trueagents[0].extractsource=File Nameagents[0].extractregex=(\\w+)\\.(\\d+)\\.logagents[0].extractfieldnames=deviceHostName,deviceCustomNumber1•Example2: For a multiple folder follower connector–Assume that your multiple folder flex connector is processing logs from multiple web server instances running on different ports on multiple machines and the logs are deposited in a folder named after the machine IP Address and the instance’s port number (/opt/mnt/webservers/1.1.1.1/443, /opt/mnt/webservers/1.1.1.1/8443, /opt/mnt/webservers/2.2.2.2/443 …)–You can extract the IP Address and Port Number with the following properties specified for every folderagents[0].folder[N].usefieldextractor=trueagents[0].folder[N]. extractsource=File Pathagents[0].folder[N].extractregex=.*?(\\d+.\\d+.\\d+.\\d+)/(\\d+)/.*?.logagents[0].folder[N].extractfieldnames=deviceIPAddress,deviceCustomNumber1Customer use case•OriginalAgentHostName and OriginalAgentIPAddress for system health events from C1 connectors on ESM console are being set to host name and IP Address of CA2 and not CA1•When observed on Logger, the originalAgent fields were set correctly to CA1•Development agreed it is a bug and will provide a fix in the long term•Support provided short term workaroundWorkaround•Map files on C1 connectors (current/user/agent/fcp/map/map.0.properties )set.event.flexString1, set.event.flexString2 Host-name1, 192.168.10.1 •Additional regex parsers on the Logger onboard connectorunder current/user/agent/fcp/additionalregexparsing/loggerCA1 C2 = UDP encrypted CEF Syslog connectors forwarding system health events from C1 to Logger Logger is forwarding all events from C2 to ESM Connector Appliances regex.0.sdkrfilereader.propertiesregex.1.sdkrfilereader.properties。
hewlett-packard 打印机 说明书
用户指南要查找问题解答,请选择您打印机机型图片下面的主题:说明●说明与声明●术语与约定说明与声明hewlett-packard 公司说明本文档包含的信息如有更改,恕不另行通知。
Hewlett-Packard (HP) 公司对本书不作任何形式的保证,包括(但不限于)针对特殊目的之商用性及适用性的隐含保证。
Hewlett-Packard 对于任何错误,以及由其所述内容、性能表现或使用本手册造成的附带性或后果性损失概不负责。
保留所有权利。
除版权法允许之外,未经 Hewlett-Packard 事先书面许可,不得对本手册进行复制、改编或翻译。
声明Microsoft、MS、MS-DOS、Windows 和 XP 是 Microsoft Corporation 的注册商标。
TrueType 是 Apple Computer, Inc. 在美国的商标。
Adobe 和 Acrobat 是 Adobe Systems Incorporated 的商标。
版权所有 2003 Hewlett-Packard Company术语与约定本《用户指南》中使用了下列术语和约定。
术语HP Deskjet 打印机亦指HP 打印机或打印机。
符号>符号可以指导您完成一系列的软件步骤。
例如:单击文件 > 打印。
注意和警告注意说明可能会对 HP Deskjet 打印机或其他设备造成的损坏。
例如:注意!不要触摸打印墨盒墨水喷嘴或铜质触点。
触摸这些部件将会引起墨水阻塞、不喷墨和电路接触不良。
警告标示可能会对您自己或其他人造成伤害。
例如:警告!将新的和用过的打印墨盒放在儿童接触不到的地方。
图标注图标表示为您提供的附加信息。
例如:为了获得最佳效果,请使用 HP 产品。
鼠标图标表示通过这是什么?帮助功能可获得附加信息。
例如:如需更多有关每个标签画面上的选项信息,请指向一个选项然后右击鼠标以显示这是什么?对话框。
单击这是什么?以查看关于选取的选项的更多信息。
Hewlett-Packard Development Company L.P. 2007年版本硬盘
Drives User Guide© Copyright 2007 Hewlett-Packard Development Company, L.P.The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.First Edition: March 2007Document Part Number: 435821-001Product noticeThis user guide describes features that are common to most models. Some features may not beavailable on your computer.ENWW iiiiv Product notice ENWWTable of contents1 Identifying installed drives2 Handling drives3 Improving hard drive performanceUsing Disk Defragmenter (3)Using Disk Cleanup (3)4 HP 3D DriveGuard (select models only)HP 3D DriveGuard status (5)HP 3D DriveGuard software (6)5 Replacing a hard drive6 Using an optical driveInserting an optical disc (12)Removing an optical disc when running on battery or external power (13)Removing an optical disc when no computer power is available (14)7 Using external drivesOptional external devices (16)Optional External MultiBay and External MultiBay II (17)Index (18)ENWW vvi ENWW1Identifying installed drivesTo view the drives installed on the computer, select Start>Computer.ENWW12Handling drivesDrives are fragile computer components that must be handled with care. Refer to the following cautions before handling drives. Additional cautions are included with the procedures to which they apply.CAUTION:To reduce the risk of damage to the computer, damage to a drive, or loss ofinformation, observe these precautions:Before you move a computer or external hard drive from one location, initiate Sleep, and allowthe screen to clear.Before handling a drive, discharge static electricity by touching the unpainted metal surface ofthe drive.Do not touch the connector pins on a removable drive or on the computer.Handle a drive carefully; do not drop a drive or place items on it.Before removing or inserting a drive, shut down the computer. If you are unsure whether thecomputer is off or in Hibernation, turn the computer on and then shut it down through the operatingsystem.Do not use excessive force when inserting a drive into a drive bay.Do not type on the keyboard or move the computer while the optical drive is writing to a disc. Thewrite process is sensitive to vibration.When the battery is the only source of power, be sure that the battery is sufficiently chargedbefore writing to media.Avoid exposing a drive to temperature or humidity extremes.Avoid exposing a drive to liquids. Do not spray the drive with cleaning products.Remove media from a drive before removing the drive from the drive bay, or traveling with,shipping, or storing a drive.If a drive must be mailed, place the drive in a bubble-pack mailer or other suitable protectivepackaging and label the package “FRAGILE.”Avoid exposing a drive to magnetic fields. Security devices with magnetic fields include airportwalk-through devices and security wands. The airport security devices that check carry-onluggage, such as conveyor belts, use x-rays instead of magnetism and will not damage a drive. 2Chapter 2 Handling drives ENWW3Improving hard drive performanceUsing Disk DefragmenterAs you use the computer, files on the hard drive become fragmented. Disk Defragmenter consolidates the fragmented files and folders on the hard drive so that the system can run more efficiently.To run Disk Defragmenter:1.Select Start > All Programs > Accessories > System Tools > Disk Defragmenter.2.Click Defragment now.For additional information, access the Disk Defragmenter online Help.Using Disk CleanupDisk Cleanup searches the hard drive for unnecessary files that you can safely delete to free up diskspace and help the computer to run more efficiently.To run Disk Cleanup:1.Select Start > All Programs > Accessories > System Tools > Disk Cleanup.2.Follow the on-screen instructions.ENWW Using Disk Defragmenter34HP 3D DriveGuard (select models only) Under either of the following conditions, HP 3D DriveGuard protects the hard drive by parking the driveand halting I/O requests:●You drop the computer.●You move the computer with the display closed while the computer is running on battery power.A short time after the end of one of these events, HP 3D DriveGuard returns the hard drive to normaloperation.NOTE:Internal hard drives and optional MultiBay II hard drives (select models only) areprotected by HP 3D DriveGuard. Hard drives that are in an optional docking device or connectedto a USB port are not protected.For more information, refer to the HP 3D DriveGuard online Help.4Chapter 4 HP 3D DriveGuard (select models only)ENWWHP 3D DriveGuard statusThe drive light on the computer changes to an amber color to show that the drive is parked. To determine whether drives are currently protected or whether a drive is parked, use Mobility Center:●If the software is enabled, a green check mark is superimposed over the hard drive icon.●If the software is disabled, a red X is superimposed over the hard drive icon.●If the drives are parked, a yellow moon is superimposed over the hard drive icon.NOTE:The icon in the Mobility Center may not show the most up-to-date status on the drive.For immediate updates after a change in status, you need to enable the notification area icon.To enable the notification area icon:1.Select Start>Control Panel>HP 3D DriveGuard.2.Under Icon in System Tray, click Visible.3.Click Apply.If HP 3D DriveGuard has parked the drive, the computer will behave in the following ways:●The computer will not shut down.●The computer will not initiate Sleep or Hibernation, except as noted below.NOTE:If the computer is running on battery power and reaches a critical battery level, HP3D DriveGuard allows the computer to initiate Hibernation.●The computer will not activate battery alarms set on the Alarms tab in Power Options properties.Before you move the computer, HP recommends that you either shut it down or initiate Sleep orHibernation.ENWW HP 3D DriveGuard status5HP 3D DriveGuard softwareThe HP 3D DriveGuard software enables you to perform the following tasks:●Enable and disable HP 3D DriveGuard.NOTE:Depending on your user privileges, you may not be able to enable or disable HP3D DriveGuard. Additionally, members of an Administrator group can change the privilegesfor non-Administrator users.●Determine whether a drive in the system is supported.To open the software and change settings, follow these steps:1.In Mobility Center, click the hard drive icon to open the HP 3D DriveGuard window.– or –Select Start>Control Panel>HP 3D DriveGuard.2.Click the appropriate button to change settings.3.Click OK.6Chapter 4 HP 3D DriveGuard (select models only)ENWW5Replacing a hard driveCAUTION:To prevent information loss or an unresponsive system:Shut down the computer before removing the hard drive from the hard drive bay. Do not removethe hard drive while the computer is on, in the Sleep state, or in Hibernation.If you are not sure whether the computer is off or in Hibernation, turn the computer on by pressingthe power button. Then shut down the computer through the operating system.To remove a hard drive:1.Save your work.2.Shut down the computer and close the display.3.Disconnect all external hardware devices connected to the computer.4.Unplug the power cord from the AC outlet.5.Turn the computer upside down on a flat surface, with the hard drive bay toward you.6.Remove the battery from the computer.7.Loosen the 2 hard drive cover screws (1).8.Lift the hard drive cover away from the computer (2).9.Loosen the hard drive screw (1).ENWW710.Pull the hard drive tab (2) to the right to disconnect the hard drive.11.Lift the hard drive (3) out of the hard drive bay.To install a hard drive:1.Insert the hard drive into the hard drive bay (1).2.Pull the hard drive tab (2) to the left to connect the hard drive.3.Tighten the hard drive screw (3).4.Align the tabs (1) on the hard drive cover with the notches on the computer.5.Replace the cover (2).8Chapter 5 Replacing a hard drive ENWW6.Tighten the hard drive cover screws (3).ENWW96Using an optical driveAn optical drive, such as a DVD-ROM drive, supports optical discs (CDs and DVDs). These discs store or transport information and play music and movies. DVDs have a higher storage capacity than CDs.All optical drives can read from optical media and some drives can also write to optical media, asdescribed in the following table.CAUTION:To prevent possible audio and video degradation, or loss of audio or video playbackfunctionality, do not initiate Sleep or Hibernation while reading from or writing to a CD or DVD.To prevent loss of information, do not initiate Sleep or Hibernation when writing to a CD or DVD. 10Chapter 6 Using an optical drive ENWWIf Sleep or Hibernation is initiated during playback of a disc, you may experience the following behaviors:●Your playback may be interrupted.●You may see a warning message asking if you want to continue. If this message is displayed,click No.●You may need to restart the CD or DVD to resume audio and video playback.ENWW11Inserting an optical disc1.Turn on the computer.2.Press the release button (1) on the drive bezel to release the media tray.3.Pull out the tray (2).4.Hold the disc by the edges to avoid touching the flat surfaces and position the disc label-side upover the tray spindle.NOTE:If the tray is not fully accessible, tilt the disc carefully to position it over the spindle.5.Gently press the disc (3) down onto the tray spindle until the disc snaps into place.6.Close the media tray.NOTE:After you insert a disc, a short pause is normal. If you have not selected a media player,an AutoPlay dialog box opens. It prompts you to select how you want to use the media content. 12Chapter 6 Using an optical drive ENWWRemoving an optical disc when running on battery or external power1.Press the release button (1) on the drive bezel to release the media tray, and then gently pull outthe tray (2) until it stops.2.Remove the disc (3) from the tray by gently pressing down on the spindle while lifting the outeredges of the disc. Hold the disc by the edges and avoid touching the flat surfaces.NOTE:If the tray is not fully accessible, tilt the disc carefully as you remove it.3.Close the media tray and place the disc in a protective case.ENWW Removing an optical disc when running on battery or external power13Removing an optical disc when no computer power is available1.Insert the end of a paper clip (1) into the release access in the front bezel of the drive.2.Press in gently on the paper clip until the tray is released, and then pull out the tray (2) until it stops.3.Remove the disc (3) from the tray by gently pressing down on the spindle while lifting the outeredges of the disc. Hold the disc by the edges and avoid touching the flat surfaces.NOTE:If the tray is not fully accessible, tilt the disc carefully as you remove it.4.Close the media tray and place the disc in a protective case.14Chapter 6 Using an optical drive ENWW7Using external drivesRemovable external drives enable you to store and access information.A USB drive can be added by connecting the drive to a USB port on the computer or on an optionaldocking device (select models only).An external MultiBay or MultiBay II supports any MultiBay or MultiBay II device, including thefollowing:● 1.44-megabyte diskette drive●Hard drive module (a hard drive with an adapter attached)●DVD-ROM Drive●DVD/CD-RW Combo Drive●DVD+RW/R and CD-RW Combo Drive●DVD±RW/R and CD-RW Combo DriveENWW15Optional external devicesNOTE:For information about required software, drivers, and which port on the computer to use,refer to the documentation included with the device.To connect an external device to the computer:NOTE:If you are connecting a powered device, be sure to turn off the device and unplug theAC power cord.1.Connect the device to the computer.2.If you are connecting a powered device, plug the device power cord into a grounded AC outlet.3.Turn on the device.To disconnect an unpowered external device, turn off the device, and then disconnect it from thecomputer. To disconnect a powered external device, turn off the device, disconnect it from the computer, and then unplug the AC power cord.16Chapter 7 Using external drives ENWWOptional External MultiBay and External MultiBay II An external MultiBay or MultiBay II connects to a USB port on the computer and enables you to useMultiBay and MultiBay II devices.For more information about the external MultiBay, refer to the documentation that is included with thedevice.ENWW Optional External MultiBay and External MultiBay II17IndexAairport security devices2CCDinserting12removing, with power13removing, without power14 CD drive10, 15DDisk Cleanup3Disk Cleanup software3Disk Defragmenter3Disk Defragmenter software3 disk performance3diskette drive15drive light5drivescaring for2diskette15external15hard7, 8, 15MultiBay15, 17optical10, 15See also hard drive, opticaldriveDVDinserting12removing, with power13removing, without power14 DVD drive10, 15Eexternal drive15Hhard disk driveexternal15HP 3D DriveGuard4installing8replacing7hard driveexternal15HP 3D DriveGuard4installing8replacing7HP 3D DriveGuard4Llight, drive5MmaintenanceDisk Cleanup3Disk Defragmenter3 MultiBay15, 17Ooptical discinserting12removing, with power13removing, without power14 optical drive10, 15SsoftwareDisk Cleanup3Disk Defragmenter318Index ENWW。
Hewlett-Packard Laboratories
Internet BasedInter-Business Process Management:A Federated ApproachGiacomo PiccinelliExtended Enterprise Laboratory Internet Business Management Department Hewlett-Packard LaboratoriesBristol BS12 6QZ, U.K.Email: giapicc@Floriana Marcello and Gabriele ZuglianiComputer Science DepartmentUniversity of Pisa56100 – PisaItalyEmail: marcello@cli.di.unipi.it AbstractEDI (Electronic Data Interchange) has been a powerful business to business (B2B) processenabler well before the explosion of the Internet. The competitive advantage deriving fromthis practice is quite clear as EDI had a big impact in the streamlining of administrativeprocesses and business EDP (Electronic Data Processing) in general. The main problemwas the cost, deriving especially from networking infrastructure, which prevented smalland meddle-size business to access this resource.Thanks to the low-cost connectivity and the popularity reached by the Web in terms ofelectronic commerce (EC) enabler, a lot of businesses have now the basic infrastructureneeded to support B2B processes and this is the point from which our work moves.As part of an ongoing project on federated processes, we present the results obtained withRABBIT (Research on Advanced B2B Information Technology): an infrastructure for thedefinition and enactment of federated - distributed processes. The architecture allows thespecification of multiple-organisation process independently from the geographicdistribution of the organisations involved while the coupling of a specific compilationtechnology and execution engines supports the distributed enactment of the process. Basicnetwork-fault tolerance and privacy are supported at process level.1 IntroductionIt is difficult improving what we can not measure but it is extremely difficult measuring what we can not handle and process-based infrastructures offer a natural support for managing problem complexity. The evolution of new technologies [15,16] dramatically impacts on the way in which processes are designed and a lot of emphasis is on the integration of different components into global environments [16] and then into global processes [6,10,18]. Internet technology offers an unprecedented interconnection capability [11] that distributed object architectures [13,15,16] exploit in order to boost the creation of domain-focused and location-transparent environments [4,17]: the cooperation and coordination aspects become crucial [1,2,3].In this scenario, a new layer of management (PCE2) is needed in order to support projects involving multiple competencies and the added value is in the process 2 We use the term PCE to indicate both the environment and the system that manages the definition and enactment of a process in that environment.coordination. We refer to this scenario as federation [3,5] and in this context we locate our work. Focusing on the coordination and information exchange aspects, we present a system for the definition and enactment of federated processes involving different organisations and/or different parts of the same organisation. After a brief overview of the more popular distributed object architectures and their impact on PCEs, we present and discuss the cooperation paradigm we enforce. The process-definition formalism is presented together with the federation basic infrastructure, PCE interfacing solutions and deployment facilities.2 Distributed Object ArchitecturesObject models like DCOM (Distributed Component Object Model) by Microsoft [16], the OMA (Object Management Architecture) by OMG (Object Management Group) [13] and Java RMI (Remote Methods Invocation) [15] enforce two major aspects of an application: strong modularization (components) and location transparency.Although location transparency is quite important for application components, the big impact of distributed object technologies on process-centered environments depends also on the “automation” [16] features they introduce. The mechanisms may be slightly different but the result is the same: applications may ask other applications to perform task and/or to supply data. Extra layers are built on top of basic architectures (like OLE -object linking and embedding – for DCOM or Common Facilities in the OMA [14]) in order for the applications to offer service-oriented interfaces.In terms of the actual infrastructure we build to support the federation process, we focus on Java and RMI basic services.3 Cooperation ModelThe purpose of a cooperation process is to organise resources from different organisations3 in order to achieve a common goal. The peculiar aspect of a federation [3,5] is the fact that a pool of independent and autonomous organisations agrees on a common process and the members share part of their resources and expertise in order to enact such a process. Despite the commitment to the common goal and the need to exchange data and services, autonomy and secrecy are fundamental issues for the members of a federation and any infrastructure that targets federative process support has to deal with these requirements.3We refer to a generic interpretation of the term organization indicating an autonomous and independent entity [5,9]. The term also indicates the set of applications associated with this entity.We propose a solution based on the paradigm of a common workspace. Every organisation is associated with a part of this space called workspace component (Fig.1) representing its interface to the federation and the union of the workspace components represents the federation workspace (Fig.2). In its object space, an organisation puts the data it needs to share with its partners and it can retrieve data produced by its partners and relevant for the execution of its tasks. An organisation has immediate access only to the data in the object space of its W and these are the only data exposed to the federated process: autonomy of the organisations is preserved. Each organisation shares all and only the data it agreed to release and under the circumstances defined in the federated process. At the same time each organisation receives all and only the data it is entitled (requested) to work on. Objects are the result of an activity (“artifact” or “work item”[9]), messages represent information on the state of either the system or the process. Tasks are atomic operations like the execution of an activity or the manipulation (insert, withdraw, process) of data and messages.The purpose of a federation infrastructure (F) is to manage the federation workspace in a way that, at any time, each organisation knows exactly what to do and has available the resources it needs. As F cannot interfere with the internal PCE of any organisation: autonomy is preserved.3 Process Definition LanguageThe basic operations in a cooperative process are related to the exchange of artifacts, the exchange of synchronisation (control) information and the execution of activities related to internal tasks or supporting the work of other members of the federation (Tab.1). Thevalue added by a process-based organisation depends on the fact that atomic components may be organised into complex activities (Tab. 2,3).Push(OrgA, OrgB, Obj)Pull (OrgA, OrgB, Obj)Message (OrgA, OrgB, Msg)Service (OrgA, OrgB, Srv, Obj)Task (OrgX, Act )Tab.1: Basic OperationsThe influence on the formalism coming from languages like Hoare’s CSP [8] and Milner’s CCS [12] is quite strong but we explicitly target the peculiarities of a federated process instead of working with generic distributed processes. The actual semantic of the entire language has been formalised following an approach (operational style) similar to the C-FAM (concurrent functional abstract machine) used for FACILE [7]. The point of view taken during the design of a process is the one of an impartial coordinator that looks at the members of the federation as resources to organise in order to achieve a specific result. An organisation may supply (push) data, send them control information (messages) and asking (pull) for data. A task is related to an aspect of the process it is immediately responsible for but, in order to support the central role of cooperation in the federation, it may also be asked to help one of its partners (service). The sequential operator “;” indicates that all the tasks in the process P1need to be completed before starting any task indicated in P2: the overall process ends when P2 ends.P1; P2Sequential Composition< P1& … & P n>Parallel Composition(expr)[P1+ … + P n]Choice OperatorNil Null processTab. 2: Composition OperatorsThe parallel composition operator allows multiple execution threads within a process while choice operator executes one and only one process among the P i depending on the state of the federation. Procedures (Tab.3) are introduced mainly for modularization purposes but they also offer the possibility to specify recursive process definitions (ex. loops). The types we allow for the variables are: org (organisation), msg (message), obj (object), act(activity/task) and srv(service). We enforce a “late” evaluation policy concerning procedure-call evaluation and it is therefore possible to have simple as well as mutual recursion in the definitions.Label(Var1:T1,..,VarN:Tn){ P }Procedure definitionLabel(Val1,..,ValN)Procedure callTab. 3: Procedures4 Federation InfrastructureMain components of the support infrastructure for the implementation of a federated process are the compiler, the enactment engine(s) and the interface wrappers.4.1 CompilerFor each organisation we build the process V org that contains the specification of all and only the tasks the organisation is requested to do and the synchronisation points it has to maintain with respect to its partners. Basic operations are easy to map into V org while the synchronisation problems come with the composition operators. The problem we have, for example with sequential composition, is pictured in the following example:< A(xx) & B(xx) > ; < A(yy) & B(yy) >If xx is completed in A but B is still working on it, A has to wait until also B completes xx before to start working on yy in order to preserve the semantics of the language. The compiler manages these situations with specific solutions that assure the intended semantic of the global process is preserved. This organisation-centric approach allows a modular organisation of the enactment infrastructure with major benefits also in terms of autonomy and security as well as fault tolerance. An organisation may follow its own process, unless explicit synchronisation points are specified, independently from other members of the federation (autonomy). Security is enforced by the fact that the compiler is consistent with the PSL semantics and all the actions an organisation is requested to perform derive from common federated process definition. Benefits from a fault tolerance perspective derive from the autonomy of the organisations: if an organisation experiences (temporary) problems its partner may not be affected.We anticipate that the result of the compilation is location independent, which means we model independent components but information on the physic location of the organizations (components) is ignored at this stage.4.2 Enactment EnginesIn the enactment infrastructure we distinguish three main components (Fig. 4): workspace components (W), engines (E) and the interconnection support. Focusing on a single organization, the engine has complete access to its workspace component and it can also communicate with other engines but, in a normal situation, it cannot interact directly with any PCE. Each engine Ex enacts the projection Px of the federated process produced by the compiler for the organization X and its main job is related to messagesand data management, task posting and synchronization. Also for the engine implementation, the complexity is concentrated in the support for multiple execution threads, sequential integrity and choice-step consistency.Fig.4: Enactment InfrastructureChoice-step consistency problems, for example, depends on the fact that if a path (Pi) is chosen, within a choice operator, for one of the projections of the global process then also in the enactment of all other projections we need to follow the same path. Major issue is that we allow different execution speed in different organisations and, in order not to introduce implicit synchronisation points (with solutions like waiting for all the organisation involved in the choice to reach the evaluation point), specific solutions need to be enforced both in the engine and in the compiler.4.3 PCE InterfaceThe PCE of an organisation needs a bridge to the W in order: (1) to put and get messages and data as indicated by the tasks posted by the process and (2) to access the indications on the tasks it has to perform. The W is mainly a container of data and information, and the bridge to the PCE depends on the level of interactivity and automation it enforces. In our investigation we focused on two extremes (full automation and pure presentation) but solutions in between are also possible. We focused on were Java and CORBA technology though OLE is also under investigation.5 DeploymentThe main components of our architecture (enactment aspect) are the engines, the workspace components and wrappers and thanks to the support of Java RMI (remote methods invocation) we enforced the possibility to allocate all of them in different ways without major changes.6 ConclusionsDistributed object architectures (DCOM, CORBA, Java RMI) coupled with Internet and Intranet technology have a great impact in process-centered environments both in terms of connectivity and application automation.We present a complete infrastructure supporting the federated process starting from its definition to its actual enactment. Few simple basic operators and the possibility to build high-level modules and process libraries represent the design environment we provide while the enactment environment is based on the result of a distribution-oriented compiler and specific cooperation environment. Concerning the deployment of the federation infrastructure, the components are built taking into consideration location transparency problems therefore we can tune the deployment process on the peculiarities of the federation. Autonomy, security and fault tolerance issues are reflected in all the choices and actual components in our architecture.Bibliography[1]S. Bandinelli, E. Di Nitto and A. Fuggetta. Supporting cooperation in theSPADE-1 environment. In IEEE Transactions on Software Engineering, Vol. 22, no. 12, December 1996.[2]N.S. Barghouti. Supporting cooperation in the Marvel process-centered SDE. InFifth ACM SIGSOFT Symposium on Software Development Environments.Herbert Weber (ed.), 1992.[3] C. Basile, S. Calanna, E. Di Nitto, A. Fuggetta and M.Gemo. Mechanisms andpolicies for federated PSEEs: basic concepts and open issues. In Proc. 5th Europeen Workshop on Software Process Technology. Nancy, France, 1996. [4]I.Z. Ben-Shaul, A. Cohen, O. Holder and B. Lavva. HADAS: A Network-centricframework for interoperability programming. In Proc 2nd Inter. Conference on Cooperative Information Systems. June 1997.[5]I.Z. Ben-Shaul and G.E. Kaiser. Federating process-centered environments: theOz experience. In Automated Software Engineering, Vol. 5. Kluwer Academic Publisher, 1998.[6]I.Z. Ben-Shaul and G.E. Kaiser. Integrating groupware activities into workflowmanagement. In Proc. 7th Israeli Conference on Computer Based Systems and Software Engineering. June 1996.[7]Giacalone, P. Mishra and S. Prasad. FACILE: A symmetric integration ofconcurrent and functional programming. In Proc. of TAPSOFT’89, Vol.2. Lecture Notes in Computer Science (LNCS 352). Springer-Verlag, 1989.[8] C.A.R. Hoare. Communicating Sequential Processes. Series in Computer Science.Prentice-Hall, 1985.[9] D. Hollingsworth. The workflow reference model. Workflow ManagementCoalition (WfMC), TC00-1003, November 1994.[10]N. Krishnakumar and A. Sheth. Managing heterogeneous multi-system task tosupport enterprise-wide operations. In Distributed and Parallel Databases.Kuwler Academic Publishers, 1995.[11]J. Miller, A. Sheth, K. Kochout and D. Palaniswami. The future of Web-basedworkflow. In Proc. of the International Workshop on Research Directions in Process Technology. Nancy, France, July 1997.[12]R. Milner. A calculus of communicating systems. Lecture Notes in computerScience Vol. 32. Springer-Verlag, 1980.[13]Object Management Group (OMG). A discussion of the object managementarchitecture. January 1997.[14]Object Management Group (OMG). CORBA facilities: common facilitiesarchitecture V4.0. November 1995.[15]R. Orfali and D. Harkey. Client/Server programing with Java and CORBA. WileyComputer Publishing, 1997.[16]Creating Programmable Applications with OLE Automation. Vol. 1 and 2.Microsoft Press, 1994.[17] A. Sheth (ed.). Report from the NSF workshop on workflow and processautomation in information systems. In Proc. NSF workshop on workflow and process automation in information systems: state-of-the-art and future directions.A. Sheth (ed.), May 1996.[18]G. Valetto and G.E. Kaiser. Enveloping sophisticated tools into process-centeredenvironments. In Proc. 7th IEEE International Workshop on CASE.IEEE Computer Society Press, 1995.。
配置和维护安捷伦化 学工作站计算机 安捷伦化学工作站 B.04.03 版
配置和维护安捷伦化学工作站计算机安捷伦化学工作站 B.04.03 版注意© 安捷伦科技有限公司, 2004, 2005-2010根据美国和国际版权法,未经安捷伦公司书面许可,本书内容不得以任何形式复制(包括电子存储修改或翻译)。
手册部件号G2170-97136版本09/10Germany印刷Agilent TechnologiesHewlett-Packard-Strasse 876337 Waldbronn 声明本书内容如有改变,恕不另行通知。
安捷伦科技公司对本材料,及由此引出的任何商务和特种用途不承担责任。
安捷伦科技公司对本手册中可能有的错误或与装置、性能及材料使用有关内容而带来的意外伤害和问题不负任何责任。
如果安捷伦与用户对本书中的警告术语有不同的书面协议,这些术语与本书中的警告术语冲突,则以协议中的警告术语为准。
技术许可本书对硬件和/或软件的介绍已获得特许,未经许可,不得使用或复制。
权力限制说明如果软件用于某一美国政府基本合同或次级合同,软件的使用将作为下列情况之一被许可:按照法案DFAR252.227-7014(1995年6月)确定的“商业计算机软件”;或者按照法案FAR 2.101 (a)确定的“商业条款”;或者按照法案FAR 52.227-19(1987年6月)确定的“限制计算机软件”;或者任何相当机构法规或合同条款。
软件的使用,复制或解密受安捷伦科技标准商业许可条款的管理,美国政府的非DOD部门和机构将获得不比法案FAR52.227-19 (c) (1-2)(1987年6月)大的权利。
美国政府的用户将获得不比法案FAR 52.227-14 (c) (1-2)(1987年6月)或DFAR 252.227-7015 (b)(2)(1995年11月)确定的限制权利大的权利,这一原则适用于任何技术数据。
安全警告小心提示表示危险。
提醒您在操作过程中注意,如果执行不当,将影响产品或丢失重要数据。
HP-3PAR存储日常管理手册
HP-3PAR存储日常管理手册————————————————————————————————作者:————————————————————————————————日期:2a d m i n技术支持服务热线800-810-3860/400-810-3860V e r s i o n1.0目录一,3PAR存储介绍 (3)1.3PAR InSpire架构 (3)2.3PAR InForm软件 (4)3.3PAR主要构件 (7)4.3PAR组件编号系统 (9)5.3PAR LED状态指示灯 (10)二,日常配置 (11)1.添加主机Host (11)2.创建CPG (12)3.创建VV虚拟磁盘 (13)4.分配VV虚拟磁盘 (15)三,日常维护 (17)1.存储开机步骤 (17)2.存储关机步骤 (17)3.存储日志Insplore收集 (17)4.管理机SP日志SPLOR收集 (19)5.特定信息CLI命令行收集 (21)四,HP支持服务模式 (22)1.主动式响应--SP Call-Home (22)2.被动式响应—HP服务热线 (22)3.被动式响应—邮寄存储日志 (23)May.2012Version 1.0admin一,3PAR存储介绍3PAR 系列存储平台具有超高的灵活性和高效性,突破了公共基础设施中传统存储阵列的局限性。
作为精简配置、绿色存储以及存储虚拟化技术的先行者,3PAR能帮助用户降低能耗、实履行环保义务,还可削减最高达50%的存储总拥有成本1.3PAR InSpire架构紧密集群化、多客户端的3PAR InSpire 构架设计,消除了传统整体式和模块化阵列价格高昂和扩展十分复杂的弊端。
用户可以一开始只购买较小的系统,之后,随着业务量的增加再进行扩展,即经济且连续地添加新的应用和工作负载,所有这些都将在一个单一、自动化的分层阵列中进行。
内置Thin Built In™的 Gen3 /Gen4 ASIC内置Thin Built In™的3PAR Gen3 ASIC 提供一种高效、基于硬件的零检测机制。
73--商务英语翻译chapter_7_商名和商号的翻译的汉英翻译.
Happiness Elegance Rainbow Hero Forever Bright Triumphant Dynasty
可以使人产生美好联想 的商标。
Friday, May 10, 2019
English College
商标词的翻译方法
长虹(电视机) 李宁(运动系列) 南孚(电池) 张小泉(剪刀) 养生堂(医药) 大宝(化妆品) 红豆(服装) 盼盼(安全门) 汇源(饮品)
Friday, May 10, 2019
English College
Task 2
你是上海英联食品饮料有限公司的员工,经理让你翻译一 下公司简介:
上海英联食品饮料有限公司成立于2003年4月,是英国 联合食品(欧洲食品业5强企业)旗下的分公司Twinings 和上海诺华营养食品有限公司合并后成立的新公司。
商标词的翻译方法
康佳(电器) 百乐美(饮料) 奇强(洗涤品) 格兰仕(微波炉) 新科(电器) 培罗蒙(服装) 立白(洗衣粉) 海信(空调) 多丽美(纸品)
KONKA Belmerry Keon Galanz Shinco Baromon
Liby Hisense DOLYMY
原商标是英语读者所喜 爱或认可的动、植物名 称或事物名称。
Flying Horse Spring Bamboo
P87 例4
Friday, May 10, 2019
English College
商标词的翻译方法
幸福(摩托车) 雅致(女装) 彩虹(女装) 英雄(钢笔) 永久(自行车) 光明(奶品) 凯歌(电视) 王朝(葡萄酒)
Flower
?
红梅:Red Plum Blossom
惠普发展史
管理营销资源中心 /惠普发展史惠普公司 Hewlett-Packard 是世界最大的计算机公司之一。
该公司制造的产品正被个人使用或用于工业、商业、工程、科学和教育等领域。
该公司在其 1998 财务年度营业纯收入为 424 亿美元。
HP 总部设在加利福尼亚州的Palo Alto,该公司有雇员8 万多人。
HP 公司在美国许多城市以及在欧洲、亚太地区、拉本美洲和加拿大都设有分部。
该公司通过设在100 多个国家的大约 600 个销售和支持办事处以及经销商,并通过转卖商和零售商出售其产品和服务。
创业历史——从汽车库起家HP 由 Bill Hewlett 和 Dave Packard 于 1939 年创建。
该公司建在 Palo Alto 的一间汽车库里,第一个产品是声频振荡器,它是音响工程师使用的电子测试仪器。
HP 公司的第一个客户是Walt Disney Studios,该公司购买了 HP 的 8 台音频振荡器为经典电影“Fantasia”开发和测试创新的音响系统。
1934 年,刚从斯坦福大学电气工程系毕业的戴维 .帕卡(Dave Packard)和比尔 .休利特(Bill Hewlett)去科罗拉多山脉进行了一次为期两周的垂钓野外露营。
由于彼此对很多事情的看法一致,而结成一对挚友。
此后,比尔在斯坦福大学和麻省理工学院继续研究生学业,而戴维则在通用电气公司找到一份工作。
受斯坦福大学教授及导师 Fred.Terman 的鼓励和支持,二人决定开办公司并“自己经营”。
1938 年戴维夫妇迁居至加利福尼亚州帕拉阿托(Palo Alto)市艾迪森(Addision)大街376 号。
比尔.休利特就在这栋房子后面租下一间小屋。
比尔和戴维用 538 美元作为流动资金,并利用业余时间在车库里开展工作。
比尔利用其研究课题负反馈研制成功了惠普第一台产品:阻容式声频振荡器(HP200A), 这是一种用于测试音响设备的电子仪器。
该振荡器采用炽灯作为电气接线图中的一个电气元件来提供可变阻抗,这在振荡器的设计上是一个突破利用反馈的原理,又相继生产出另外几项惠普早期的产品,诸如谐波分析仪及多种失真分析仪。
数字空间
DSpaceDSpace(数字空间)系统是由美国麻省理工学院图书馆(MIT Libraries)和美国惠普公司实验室(Hewlett-Packard Labs)合作经过两年多的努力并于2002年10月开始投入使用的,以内容管理发布为设计目标,遵循BSD协议的开放源代码数字存储系统。
该系统可以收集、存储、索引、保存和重新发布任何数字格式、层次结构的永久标识符研究数据。
目录DSpace系统简介DSpace系统功能特点DSpace的优点与不足dSPACE实时仿真系统DSpace系统简介DSpace系统功能特点DSpace的优点与不足dSPACE实时仿真系统展开编辑本段DSpace系统简介DSpace是一个专门的数字资产(Digital assets)管理系统,它管理和发布由数字文件或“位流”(bitstreams)组成的数字条目(item),并且允许创建、索引和搜索相关的元数据以便定位和存取该条目。
它包括的基本概念主要有:数字空间群(DSpace communite):数字空间是针对数字材料的长期保存而设计的。
数字材料来源于不同的组群,比如大学的院系、实验室,图书馆的采访、编目等部门,这些依据不同的授权完成不同任务的组群称作数字空间群。
1)电子用户(e-people):DSpace的用户可能是教师、学生,也可能只是一些计算机系统,因此DSpace把用户称作“E人”。
2)工作流(workflow):DSpace的运作方式,数字材料和元数据在被接受之前经过事先设定的流转审核的步骤;3)信息订阅(subscription):用户可以向DSpace发送订阅请求,以便在新材料到来时收到带有内容提要的Email提示。
编辑本段DSpace系统功能特点其特点可以归结为三个要点:基于存储的资产管理;以事件触发构建的工作流机制;以分级权限控制的管理体系;基于存储的资产管理DSpace首先是基于存储管理的,它提供对所有数字格式的支持,比如文档、书籍、数据库、计算机程序、虚拟和仿真模型、多媒体出版物和学习对象等等。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
An Open, Flexible, and Configurable System for Service Composition Fabio Casati, Ski Ilnicki, Li-Jie Jin, and Ming-Chien ShanHewlett-Packard Labs, 1-U41501 Page Mill roadPalo Alto, CA, 94304Email: {casati,ski,ljjin,shan}@AbstractMost e-services are typically delivered point-to-point; however, the e-service environment creates the opportunity for providing value-added, integrated services,which are delivered by composing existing e-services, possibly offered by different companies.This paper presents eFlow, a model and system that provides a flexible, configurable, and open approach to service composition. In fact, eFlow has an adaptive and dynamic process model, that allows processes to transparently adapt to changes in the environment, to customize service execution according to the customers’ needs, and to cope with exceptional situations. In addition, the model and the system are configurable, so that applications running on devices with limited storage space and computing power can download a version of eFlow that only includes needed features and that has a smaller footprint with respect to the complete version. 1. IntroductionThe Web is rapidly becoming the platform through which many companies deliver services to businesses and individual customers. The number and type of on-line services increases day by day, and this trend is likely to continue at an even faster pace in the immediate future. Examples of e-services currently available include bill payment, delivery of customized news, or archiving and sharing of digital documents.Services are typically delivered point-to-point. However, the e-service environment creates the opportunity for providing value-added, integrated services,which are delivered by composing existing e-services, possibly offered by different companies.In order to enable organizations to pursue this business opportunity we are developing eFlow, a platform that supports the specification, enactment, and management of composite e-services. Composite services are modeled as processes that are enacted by a service process engine.Service composition has many requirements that are in common with business process management. For instance, they both need to organize the order of activity execution (service invocation), to manage data and data transfer between activities, and to manage activity assignments and resources. In addition, they need to provide high availability, reliability, and scalability. However, the e-service environment is highly dynamic, both from a business and from a technical perspective: the type of services offered over the Internet is growing at a very fast pace, as is the number of service providers. This requires service process models and systems to be very flexible and to be able to adapt to changes (possibly without the need of human intervention), in order to offer the best available service at any given time. In addition, execution of composite services typically span organizational boundaries, and require the capability of interacting with applications based on different (and always evolving) standards and technologies. Finally, the resources involved in e-service delivery are heterogeneous in terms of computing power, ranging from high-end workstations to palmtops devices or appliances. While powerful machines may support large and complex applications, devices with limited computing and storage power impose severe limitations on the size of the applications they can execute.The eFlow model and system aims at addressing these issues by providing a flexible, configurable, and open approach to service composition. In fact, eFlow provides an adaptive and dynamic process model, that allows processes to transparently adapt to changes in the environment, to customize service execution according to the customers’ needs, and to cope with exceptional situations. In addition, the model and the system are configurable, so that applications running on devices with limited storage space and computing power can download a version of eFlow that only includes needed features and that has a smaller footprint with respect to the complete version. Finally, eFlow is an open system, in that users can replace default components with the one that best suittheir needs, to be able to interact with a given e-service environment. In the following we present the eFlow model and system and we show how they can achieve the above mentioned goals.2. The eFlow service process modelThis section presents an overview of the eFlow process model. More details on the model, and in particular on the dynamic and adaptive aspects and the transactional features (not discussed here due to space limitations) can be found in [1,2]. In eFlow, a composite service is described as a process schema that composes other basic or composite services. A schema is modeled by a graph (the flow structure), which defines the order of execution among the nodes in the process. The graph may include service,decision, and event nodes. Service nodes represent the invocation of a basic or composite service; decision nodes specify the alternatives and rules controlling the execution flow, while event nodes enable service processes to send and receive several types of events.A service process instance is an enactment of a process schema. The same service process may be instantiated several times, and several instances may be concurrently running. Service nodes can access and modify data included in a case packet. Each process instance has a local copy of the case packet, and the eFlow engine controls access to these data.Figure 1 shows a sample service process graph, related to a candidate interview service, offered by a company to its managers to simplify candidate interviewing. The composite service includes simple services provided by the company itself (such as Interview room reservation), as well as services provided by partners such as immigration status analysis, offered by a law firm.2.1. Service nodesService nodes represent the invocation of one or more services. eFlow includes three different types of service node: Basic service nodes, that represent the invocation of a service, multiservice nodes, that enable the parallel invocation of multiple instances of the same basic node, and generic service nodes, that enable the instantiation of different basic nodes.We next detail the three eFlow service node types.Basic service nodes are executed by invoking a service (provided by the same or different organization, and possibly implemented as another eFlow process). The specification of a service node includes its name, identifier, and a list of case packet variables that the node is allowed to read or write. In addition, the service node specification includes a service selection rule, to select the appropriate service (and service provider), and a deadline to control service execution time. We next detail the syntax and semantics of these two attributes.The service selection rule is a reference to a rule, executed by an eFlow component called service process broker, that enables the selection of the appropriate service to be invoked. The rule can have several input parameters, defined by references to workflow variables. When a service node is started, the eFlow engine invokes a service broker that will execute the specified rule and return the appropriate service. If no suitable service is found, an event is raised (see Section 2.3 for a description of events and event nodes). Service selection rules are defined in a service broker-specific language. eFlow has a default service broker in which service selection rules are specified by XQL queries [13] executed against the eFlow service description repository. Services in the repository are described in XML.Input parameters in service selection rules enable the customization of rule execution according to the specific service process instance data. Mapping between service node input/output data and the parameters of the invoked service is performed by a mapping function, specified as a set of string pairs <case packet variable name, service variable name>. A mapping function must be defined for a <service node, service description>pair before the service can be invoked in the context of the service node.The Deadline denotes the temporal instant by which the service node should be completed. Deadlines can be defined as timestamps (either by entering the date and time or by referring to a case packet variable of type datetime) or as an interval to be computed starting from a datetime. For instance, we can specify that a service node should be completed before 2000-3-31 18:00:00, three days before the date and time specified by case packet variable MyLimit, or one hour after node start. As the deadline expires, an event is raised. In addition, it is possible to specify that the node should be terminated upon deadline expiration.Figure 2 shows a sample specification of a basic node. Specifications are made in XML, whose syntax is constrained by a DTD.The multiservice node allows the multiple, parallel activation of the same service node. Its behavior is mainly characterized by two attributes: activation, that defines the number of instances to be started, and termination, that specifies when the node can be considered completed.Activation identifies the number of node instances to be activated; this number can be determined (at run time) as follows:1. It can be determined by the number of serviceproviders able to provide a given service;Figure 1. Candidate interview service2. It can be equal to the number of elements in a casepacket variable of type vector . In this case each service node instance receives one and only one ofthe list items as input parameter. The value of such items will affect service selection and execution. For instance, a vector may include a set ofAnd split/joinXor split/joinEnd nodeService nodeNotify eventnodeRequest event nodecustomers of different nationalities for which wewant to check their credit history. The number ofservice nodes that will be instantiated within themultiservice node will be equal to the number ofcustomers, and each node will focus on onecustomer. A service selection rule will be executedfor each service node to be activated; the rule canhave the customer’s data as input parameter, inorder to select the appropriate credit check servicefor each customer, for instance depending on thecustomer’s nationality.Figure 2. Sample XML definition of the Candidate Travel Arrangement service node Termination: An important part of a multiservice is the specification of when the multiservice can be considered completed. In most cases, the flow can proceed only when all invoked services have been completed. However, in other cases, there is no need to wait for all service instances to be completed, since the multiservice goal may have already been achieved before. For instance, suppose that we want to verify a customer’s credit with several agencies: if our acceptance criteria is that all agencies must give a positive judgment for the customer to be accepted, then as soon as one agency gives a negative opinion we can proceed with service execution, without waiting for the completion of the other services. Termination is a Boolean condition, checked every time one of the multiservice node instances terminates, that defines when the multiservice node is completed. If the condition holds, then the successor of the multiservice is activated and services in execution are canceled. An example of termination condition for the credit check example could be Rejections.length>0, where Rejections is a variable of type Vector(String), and length is an attribute common to every vector variable that contains the number of elements in the list.While multiservice nodes enable the activation of multiple instances of the same basic node, generic nodes allow the instantiation of different basic nodes. Generic nodes are not statically bound or limited to a specific set of services: instead, they include a configuration parameter that can be set with a list of actual service nodes either at process instantiation time (through the process instance input parameters) or at runtime. The specified services will be executed in parallel or sequentially depending on an execution mode attribute of the generic service node.Generic nodes are useful when it is not possible to predetermine the type of services that need to be invoked. For instance, a moving service could be composed of car rental, truck rental, storage space rental, and airline reservation services. The services to be invoked may depend on the preferences of each specific customer (some customers may only requires a truck rental service, for instance), and without the generic node a process designer would have to hardcode all the possible different options by drawing spaghetti-like process graphs and complex routing conditions. In addition, if a new service type is made available, the process definition must be changed to include the new node. The generic node is characterized by the following attributes:− Service node pool: identifies a group of service nodes. Only nodes belonging to the pool can be instantiated within this generic node.− Service selection variable: a reference to a case packet variable of type Vector that contains the identifiers of the service nodes to be instantiated.The variable can be set at process instantiation time or by a previously executed node.− Execution mode: defines whether the nodes should be instantiated in sequence (in the order defined by the vector) or in parallel.− Termination: it is analogous to the correspondent multiservice node attribute.2.2. Decision nodeseFlow offers three types of decision nodes: split nodes can split the flow of work along parallel or conditional branches; join nodes synchronize two or more branches; generic routing nodes can specify arbitrary routing behaviors by means of a routing language, and are used when routing requirements are very complex and cannot be handled by the eFlow split and join nodes.Split nodes have one input arc and two or more output arcs. There are two types of split nodes: and-split nodes fire all the output arcs as the input arc is fired; xor-split nodes allow instead the conditional activation of output arcs: as the input arc is fired, the routing rules associated to the xor-split are executed. Rule execution returns the identifiers of the arcs to be fired. If rule execution results in zero or in more then one output arc to be fired, then instance execution is stopped (along that path) and an event is raised.Routing rules are of the form IF <condition> then FIRE <arc>. Conditions are Boolean predicates defined over the value of case packet data, such as (make="Ferrari"and cost > 100.000). If the condition evaluates to TRUE, the action is executed. The action causes the firing of one arc, and hence the activation of the node connected in output to that arc.Join nodes synchronize branches of the process flow. They are also divided into and-join and xor-join nodes. and-join nodes fire the output arc as all input arcs have been fired; xor-join nodes fire the output arc as one input arc is fired.Generic routing nodes enables the definition or routing behaviors of arbitrary complexity. They can have any number of input and output arcs. Like the xor-split, the routing semantics is specified by means of one or more routing rules. As any input arc is fired, all the route rules are executed (in parallel). Route rules will define which output arcs should be fired. Unlike the xor-node, a generic route node can fire more than one output arc.Figure 3. A reset arc and its scope In eFlow each node can be executed only once per instance and each arc can be fired once per instance, unless it is reset by a reset arc. A reset arc can only connect two routing nodes. Every reset arc defines a scope, which is defined as the set of all work nodes and all arcs that are in the path between the destination node and the source node of the reset arc. Figure 3 shows a typical looping structure, where the loop part is included between a xor-join and a xor-split. The Figure also shows with a thick border all service nodes and arcs that are in the scope of the reset arc. 2.3. Event nodeseFlow has a very powerful event model that allows processes to send and receive events of several different types, to specify events of interest with a fine granularity, and to capture event parameters into case packet variables. All events, regardless of their type, are specified in a uniform fashion, using the same formalism and the same underlying basic concepts. eFlow can capture and manage the following event types:− Workflow events are generated by eFlow when enacting a process, such as instance or node state changes (e.g., activation or completion of nodes and process instances or expiration of deadlines), or error-handling events (e.g., a xor-splits trying to activate several output arcs).− Data events are raised upon modification of case packet variables.− Application-specific events are qualified by their name and are explicitly raised by a process (through an event node) or by an external application.− Temporal events are raised at specified points in time. eFlow can detect and raise three types of temporal events. Instant events are raised only once, at a specified date and time. Usually, the date and time are specified by providing the time of the day, plus the day, month, and year. eFlow also allows the definition of symbolic dates such as Christmas,Easter, or Thanksgiving.Interval events are raised as a given interval has elapsed since a reference event (e.g., 20 minutes after the activation of the task, or 2 days after the car accident). The reference event in eFlow can be a workflow, data, or application-specific event.Periodic events are raised periodically. The eFlowperiodic event language allows the specification of sim ple periodic intervals (e.g., “every 3 hours”) as well as the definition of expressions that have knowledge of the calendar, such as “every Monday at 2pm”, “every US election day at noon”, or “on the 28th day of each month”.Events have different parameters, depending on their type. Application-specific events may also carry an arbitrary number of user-defined parameters, whose type must be one of the eFlow data type.Notify and request nodesIn eFlow, points in process instance execution where events should be sent or received are specified by means of event nodes. There are two types of event nodes: Notify and Request. Notify nodes raise an application-specific event, which can be sent to other process instances or to other external applications. (Temporal,data, and workflow events are detected by eFlow, and cannot be explicitly raised.) Notify nodes are non-blocking: as the event is sent, process execution proceeds immediately by activating the subsequent node. Request nodes correspond instead to requests of workflow, data, temporal, or application-specific events. They are blocking: as a request node is reached in the control flow of a given process instance, the flow (along the path where the request node is defined) stops until an event with the specified characteristics is delivered to that node.Event nodes can be defined in a workflow graph just like any other node. Both notify and request nodes can have only one input and one output arc, and they can be executed only once (i.e., can only send or receive one event) unless they are reset. In the following we describe notify and request event nodes in more detail.The specification of a notify node includes the definition of the event to be generated, described by a set of <name,value> pairs that constitute its parameters. Values may be defined by constants or may refer to the name of a case packet variable, meaning that the actual value of the parameter is set to the value of the case packet variable at the time the event node is executed.For instance, the candidate interview service process sends an event notifying the interview result (to be captured by other eFlow services interested in this event and authorized to receive it). The event must indicate the candidate’s name, the evaluation result, and the interview date. Such an event could be specified as follows: eventName=”InterviewResult”candidateName=%result=%candidateInfo.Resultdate=%candidateInfo.InterviewDateIn the above example, event parameters candidateName, result, and date are set by means of case packet variables.Request nodes denote points in a process where the execution is suspended (along the path where the event node is defined), waiting for an event to be delivered. For each request node, the workflow designer specifies a request rule that defines the kind of events the node is interested in (specified by a filtering rule) and the event data that should be captured within case packet variables (specified by a capturing rule). The syntax of the request expression is the following:<request rule> := <filtering rule> ["CAPTURE" <capturing rule>]We next describe these components in detail.Filtering ruleThe filtering rule defines the characteristics of the events that the node is interested in receiving. The event of interest is simply defined by a Boolean condition over event parameters and case packet variables. Typically, the condition compares event parameters with the value of case packet variables to check if these values match.When a request node is reached by the control flow (i.e., it is activated), a request for the event will be issued. eFlow will deliver to the node the first event that satisfies the condition and that occurred after the request node activation. As an example, assume that, in a car rental process, the designer wants to specify an event node that receives an event when service node car scheduling(in the same instance) is suspended. This semantics can be achieved by the following rule:event_type=”workflow” andnew_state=”suspend” andnode=”car scheduling” andprocess_instance_id= %idDetails on the event filtering language, and in particular on the filtering of temporal events, are provided in [1].Capturing ruleBesides defining the event of interest by means of the filtering rule, a request node may also capture the value of event parameters into local workflow variables. For this purpose, the filtering rule is coupled with a capturing rule. For instance assume that, in the candidate interview process, the designer also wants to capture, from interviewCancel events (whose parameters are the candidate’s name, the position code, and the reason for cancellation), the reason why the candidate canceled the job application.Event parameters can be captured into case packet variables by specifying a set of expressions case packet variable name=event parameter name, meaning that the specified case packet variable takes the value of the specified event parameter as the event is delivered to the request node. The capturing rule for the above described example can be defined as follows:%candidate_cancellation_reason=reason Event-based process activationSome processes may need to be activated periodically, or as a given event occur. For instance, a service process that sends monthly paychecks to employee must be activated every month (periodic event), while one that handles electronic employee reimbursements must be activated as a reimbursement request is notified (application-specific event). eFlow supports these needs by allowing the definition of a process activation rule,which has exactly the same syntax of event rules defined in request nodes. In particular, the process activation rule has a filtering component that defines when a new instance of the process should be created, and a capturing rule that captures the parameters of the activating event and uses them as initialization data for the newly created instance. For instance, the activation condition for the electronic employee reimbursement process could be: event_type=”application-specific” and event_name=”reimbursement_request”CAPTURE %empName=employee_name;3. eFlow configurations and extensionsTechnological advances and the ever-increasing usage of the web to exchange information and perform transactions are extending the type of devices that can access the Internet. While some of these devices can have considerable computing power and storage space, most of them are very limited in this kind of resources. Hence, in order to enable devices to deliver composite services, we designed the eFlow model to be configurable: devices with limited capabilities (or, in general, applications that do not require all of the model and system features) can install lightweight versions of eFlow, which have less functionality but that are smaller in footprint. These simpler versions of eFlow can then be progressively upgraded, if needed, up to the full version presented in this paper. The basic version of eFlow only allows sequential, linear processes, does not include event or decision nodes, and it only offers basic service nodes. In addition, it does not provide for transactions and audit logging. This basic version can be progressively extended, by adding more functionality (at the cost of having a more heavyweight system).Figure 4shows the building blocks of the eFlow control flow model and how more complex features can be added on top of more basic configurations. Boxes represent layers, while arrows from a layer A to a layer B means that configuration B requires as a minimum the feature provided by configuration A. If a block has several input arrows, it means that at least one of the input blocks is needed. The following layers are shown:− Basic layer: allows the definition of sequential processes: no decision, event, multiservice, or generic node is provided, and no support for transactions or audit logging is included.− Conditional layer: adds the possibility of defining xor-splits and xor- join nodes.− Parallel layer: adds the possibility of defining and-splits and and- join nodes.− Generic layer: adds the possibility of defining generic routing nodes.− Loop layer: adds the possibility of defining reset arcs. The loop layer can be plugged-in on top of the conditional or of the generic layer.− Adaptive Layer: it adds multiservice and generic nodes.− Event layer: it enables the definition of notify and request event nodes.− Audit layer: adds audit logging capabilities.− Transaction layer: adds the possibility of defining virtual transactions. It requires logging since eFlowaccesses the log in order to determine the compensating sequence to be executed.The eFlow service process engine includes the core components necessary to enforce the semantics of the process model described in Section 2. While eFlow also provides default components for defining, monitoring, and dynamically modifying process instances as well as for selecting services to be invoked, all of them can be replaced with user-defined ones, in order to extend the features of the system and to enable different service broker strategies and policies. The interfaces needed in order to correctly implement these components so that they can interact with eFlow have been kept very simple, in order to ease the development of ad-hoc components for the implementation of features required by specific customers or by the adoption of a specific policy and ontology.4. ConclusionsIn this paper we have presented a model that supports the specification and execution of composite e-services. One of the most innovative aspects of eFlow is its flexibility, achieved through an adaptive process model, a configurable and extensible system, and a powerful interoperability and exception handling mechanism, achieved through events.To the best of our knowledge, there is no commercial process management system that provides the flexibility and extensibility of eFlow. Commercial process management systems, such as MQ Wor kflow [11], InConcert [7], Staffware2000 [14], or Forte’Fusion [10], are excellent for “traditional” workflow management and for integrating enterprise applications (which are the purposes for which they were originally designed), but do not provide the required flexibility and expressive power to cope with the e-services environment. In particular, their process model provides very limited event and exception handling support, does not allow for late binding of activities, and does not include generic nodes. Within the research community, no work has been done on configurable or extensible workflow systems. Work on flexible workflows has been mostly focused on dynamic process modifications (see, e.g., [4,5,8,9,12])。