HEVwhitePapper

合集下载

草叶集 英文版

草叶集 英文版

草叶集英文版In the literary annals of the United States, the "Leaves of Grass" by Walt Whitman stands as a monumental work, a collection of poems that revolutionized American poetry. Its influence extends far beyond the borders of the United States, reaching global audiences through its various translations, including the English edition. The English version of "Leaves of Grass" not only preserves the essence of Whitman's original work but also introduces a new dimension of understanding and appreciation to international readers.The essence of Whitman's poetry lies in its celebration of life, nature, and the individual. His poems are a testament to the resilience and diversity of American culture, reflecting the spirit of the frontier and the promise of a new nation. The English translation of "Leaves of Grass" captures these themes, making them accessible to a wider audience. The language is vivid and evocative, transporting readers to the vast landscapes and rich cultural tapestry of Whitman's vision.The translation of "Leaves of Grass" into English was a momentous occasion, marking a significant milestone in the history of literary translation. It was not just alinguistic exercise; it was an act of cultural exchange and understanding. The English edition introduced Whitman's unique voice and perspective to a global audience, sparking interest and debate among scholars and readers alike.The impact of the English version of "Leaves of Grass" is felt in various ways. It has influenced generations of writers and poets, inspiring them to explore new themes and techniques. The work's emphasis on individuality and self-expression has resonated with readers seeking to express their own identities and experiences. The poetry's celebration of nature and the beauty of the world has also been a source of inspiration for environmentalists and conservationists.The English edition of "Leaves of Grass" has also contributed to the global dissemination of American literature. Its popularity abroad has helped shape the perception of American culture and values in international forums. The work's themes and images have become part ofthe global literary canon, influencing writers and thinkers across the globe.In conclusion, the English version of "Leaves of Grass" is not just a translation; it is a bridge between cultures, a medium for understanding and appreciation. It preservesthe essence of Whitman's original work while introducingnew dimensions of meaning and significance to international readers. The influence of this translation is felt in the realm of literature, culture, and global understanding, making it a vital part of the literary landscape.**《草叶集》:英文版之魅力与传播**在美国文学史上,沃尔特·惠特曼的《草叶集》是一部具有里程碑意义的作品,这部诗集革命性地改变了美国诗歌的面貌。

Sendyne 漏接地 DC 电力系统安全白皮书说明书

Sendyne 漏接地 DC 电力系统安全白皮书说明书

White Paper Safety of unearthed (IT)DC power sy stemsSafety of unearthed (IT)DC power systemsAbstract --- Ungrounded, unearthed, “floating” or IT (Isolé-terré or Isolated Terra) are all terms used to describe power systems that have no intentional conductive connection to earth’s or chassis ground. The main advantage of the IT power system is that a single “short” will not disable its ability to continue delivering power. It is es-sential for the safety of such systems to continuously monitor their isolation state as even a single fault can generate hazards to personnel in contact with these systems. “Isolation monitors” are the devices required by several international standards to perform this function. This paper reviews the potential hazards in an IT system and the most common methods employed today for detection of isolation faults. It identi-fies safety related shortcomings inherent to each method and illustrates some of the unique features of Sendyne’s SIM100 designed to overcome them.Keywords --- isolation monitor; ground fault detection; symmetrical faults; EV safety; charging station safetyUngrounded, unearthed, “floating” or IT (Isolé-ter-ré or Isolated Terra) are all terms used to describe power systems that have no intentional conduc-tive connection to earth’s or chassis ground. The main advantage of the IT power system is that a single “short” will not disable its ability to contin-ue delivering power. Figure 1 illustrates the basic topology of such a system.The resistive connections, shown in Fig 1, between the terminals of the power source and the chas-sis are referred to as the “isolation resistances” (,ISO PR and ,ISO NR) and they represent the par-allel combination of all resistive paths from the power source terminals to the chassis (including the ones the isolation monitor introduces). The values of isolation resistances are desirable to be high so leakage currents that travel through them are kept to a harmless minimum. The capacitors shown represent the parallel combination of all capacitances present, including the Y-capacitorstypically used in DC IT systems to suppress EMI. The values of Y-capacitors are kept within limits in order to avoid hazardous accumulation of en-ergy. The voltages Vp and Vn are shown each to be equal with half the battery voltage, which will be the case if the values of ,ISO P R and ,ISO N R are equal.Isolation faultsIf either of the isolation resistances decreases be-low the threshold of 100 Ohms/Volt a hazard oc-curs if a person makes contact with the terminal “opposite” to the leaking resistor. This hazardoussituation is illustrated in Figure 2.This contact closes the circuit and current flows through a person’s body. Note that although it is shown that Vn < Vp in this example, an isolationfault cannot be detected based solely on voltage readings. The following illustrations show two examples where an isolation fault may be present while Vn = Vp .A “symmetrical” or “double” isolation fault may occur through insulation failures in power connec-tors or other environmental and intrusion reasons and, depending on the value of leakage currents, may cause power loss, overheating and even fire.Detection of these types of faults is an absolute re-quirement for the safety of IT power systems. Capacitive faultsOf equal importance to personal safety is another type of hazard. While international standards do not yet require it to be monitored, it is the haz-ard that can be caused by excessive energy stored in the IT power system capacitors. IT system de-signers ensure that design values of Y-capacitors prevent energy storage beyond the safety limit of 0.2 J. Sub-system failures, such as a coolant leak-age or personnel interventions, may alter the orig-inally designed capacitance values. In this case energy discharged through a person’s body can create a hazardous event as shown in Fig. 5. Note that the stored energy limits are set for theparallel combination of all capacitances between the power terminals and chassis.Sendyne’s SIM100 is the only isolation monitor today that tracks dynamically IT system’s capac-itances and reports the maximum energy that can be potentially stored in them.Figure 2: Single isolation faultbattery packFault detection methodsWhile there are several methods traditionally used in the field for the implementation of an isolation monitoring function, they can be broadly grouped in three main categories that will be described in the following sections.Voltage methodThis method is the simplest one and relies ex-clusively on voltage measurements between each power pole and the chassis. It depends on the ob-servation that a single isolation fault will create an imbalance between the two voltages Vp and Vn. If the initial values of isolation resistances are known by some method, the voltage ratio between Vp and Vn can be used to estimate the value of a single faulty isolation resistance. As it was illus-trated in the previous sections, this method com-pletely fails to detect “symmetrical” or any type of concurrent faults, where both isolation resistances change, and it is not acceptable in any product that intends to be safe.Resistance insertion methodSpecific safety related standards such as the ISO 6469-1, SAE J1766 and CFR 571.305, speci-fy a method for estimating isolation resistances through insertion of a known value resistor. The method involves two steps:STEP 1: Measure V P and V N and determine the lower of the two.STEP 2: Connect a known resistance R 0 in parallel to the isolation resistance of the higher voltage (V P >V N ) as shown in Figure 7 and measure again the two new voltage values 'P V and 'N V .The ,ISO N R can be shown to equal:',0'1N P P ISO NP P V V V R R V V −=+There are several issues with this method. In or-der to be accurate, R0 has to be selected in the range of 100 to 500 Ω/V. This is exactly the range in which the isolation system becomes hazardous, which means that during the measurement period the system becomes deliberately unsafe. A second issue is that during the measurement the voltage should be stable. This requirement severely lim-its the utility of the method in systems that have active loads most of the time. A third issue is re-lated to cost, size and reliability, as inserting and de-inserting the test resistor in the high voltage system requires expensive and bulky relays. For these reasons the method is not utilized in active IT systems.Current measurement methodA variation of the voltage method that is refer-enced frequently, especially in quick charger specifications, is the current measurement meth-od. It appears in international standards like IEC 61851-23, IEEE 2030.1.1 and in CHAdeMO spec-ifications. An illustration of this method is shown in Figure 8. Two equal value resistors R along with a current measuring device are simultaneously connected to the power rails as shown in the il-lustration. The current measurement device mea-sures the current that goes through it and deter-mines the value of the fault isolation resistor R F according to the relationship:2bg F V i R R =+where:i g is the measured current R is the grounding resistor R Fis the insulation resistanceThis method has all the drawbacks of the voltage method described previously, such as that it can-not detect symmetric isolation faults. Worse, the resistors R have to have a low resistance value in order to provide measurement accuracy around the isolation fault values and at the same time set-tle capacitances quickly. In a 500 V IT system the R s used are specified to only 40 kΩ, while the fault isolation value calculated by the 100 Ω/V rule is 50 kΩ. It is obvious that while these resistances remain connected the system is not safe. This is the reason that all of the mentioned internationalstandards specify a “Maximum detection time” to be less than 1 s. What these specifications mean (although they do not state it explicitely) is that if the current measurement method is used, it is un-safe for the circuit to remain connected for more than a second.In addition, the measurement sensitivity of this method is optimized around the fault values of the isolation resistances thus it cannot provide accu-rate estimates for the actual values outside this range. This is the reason that some standards re-quire a self check to be implemented by insertion of a fault resistor in the IT system. For a 500 V sys-tem , the insertion of a “fault resistor” of 50 kΩ will create a potential hazard by allowing more than 20 mA -twice the limit - fault current.Because the current measurement method was utilized in the early days of quick charging, many standards still reference it.In the end of 2017 the International Organization for Standardization (ISO) issued a letter regarding IEC 61851-23 stating:“It is, as always, strongly recommended that users of standards additionally perform a risk assessment. Specifically in this case, standards users shall select proper means to fulfill safety re -quirements in the system of charging station and electric vehicle.”Signal injection methodTo overcome the limitations of the previously described methods, a signal injection method is utilized in most of today’s isolation monitoring devices. While there are many variations in the method, in principle the implementation is the same and is illustrated in Figure 9.A known current X i is injected in a branch of the isolation circuit, forcing a change in the respective voltage. In the example shown in Figure 9 the value of the parallel combination of the isolation resistances ISO R will be:ISO XV R i ∆=Implementations of this method vary in the way the signal is injected, the method utilized for cal-culating its value, the signal shape, duration and amplitude and other details.One variation (Nissan US Pat. 6,906,525 B2 ) re-lies on the injection of a pulsed signal through a coupling capacitor and then detecting the attenu-ation of the original signal due to the presence of an isolation resistance.Some of the issues with the signal injection meth-od include:• An active IT power system (or battery) willinterfere with the signal used to identify isolation resistance. Therefore this method can be effective only when there is no inter-fering load activity.• The DC injection method can take a longtime to make a determination depending on the time constant of the RC isolation circuits.• The AC injection method by design cannotbe accurate in the whole range of possi-ble isolation resistance values. It is opti-mized for the range of fault resistance (100 Ohms/V or 500 Ohm/V) and provides only an estimate of the parallel combination of isolation resistances.known square pulse through a coupling capacitor and de-tecting the attenuation of the signal by the isolation resis-tances/capacitors.Sendyne’s SIM100Sendyne’s patent pending method for monitoring the isolation state of the IT power system over-comes all shortcoming of the methods described in the previous section. Specifically, the SIM100 is capable of estimating accurately the state of the isolation system when the load is active and the battery voltage is continuously varying. This unique feature, while important for the safety of every IT electrical system, is especially important for the safety of systems that are engaged in com-mercial activities with very little down time, such as commercial vehicles and equipment.The SIM100 is the only product in the market to-day that provides estimates for the isolation sys-tem capacitances. Besides the added safety pro-vided by estimating the energy stored in them, capacitances estimation is necessary to be able to analyze the isolation system behavior dynamically and during transitions. Sendyne utilizes state-of-the-art stochastic filtering and numerical meth-ods to evaluate the isolation state dynamically and accurately. The SIM100 provides individual estimates for each isolation resistance and capac-itance along with the uncertainty in their calcula-tion. Typical accuracy of SIM100’s estimates is better than ±5%.SIM100 response timeThe SIM100 refreshes its estimates every 500 ms. Slow changes in the system isolation state can be tracked and updated within this interval. For large changes, such as the ones described in the UL 2231 tests, the response time of the SIM100 is less than 5 s.As can be seen in Figure 13, SIM100 provides stable and accurate results within 5 sec of the transition. Response time is well below the 10 s requirement by different standards. Subsequent estimates are updated every 500 ms. In the same chart, highlighted in grey, are the ±15% accuracy levels specified by UL 2231-1 and 2. SIM100 esti-mate errors are below ±3%. During the transition and while SIM100 is estimating the new isolation state, it will indicate a high level of uncertainty, so the host ECU can ignore those transition results. Similar results were obtained when operating the SIM100 of the positive side of the battery.lation state taking into consideration the varying batteryvoltage and the Y-capacitances.∙V∙Vand accuracy in the successive insertion of a 200 Ohm/Vand 100 Ohm/V resistor (RF,N)BATT100*VBATT30405060708090100110120Resistance(kΩ)Time (s)Estimates of RF,Nin 10 experiments & response times (25 o C)Figure 13: Estimates of RF,Nprovided in 10 successive experimentsat room temperature. The green line represents the actual value ofthe inserted resistor. Greyed areas show UL2231-2 accuracy require-ments.Thermal stabilityPer UL 2231-2, the SIM100 was tested using the test apparatus of Figure 12 at different environ-mental temperatures. In the following illustra-tions the colored dots indicate the average error at each temperature obtained through approximate-ly 1100 reports. The experiments were repeated for different Y-capacitor values (2 x 100 nF and 2 x 1 uF). The greyed areas show the spread of error in the reports indicating the max and min error for each experiment. We illustrate the worst case er-rors that occur at the smaller insertion resistance R F,x . As can be seen all errors are well below the ±15% of the UL requirements.-505E s t im a t e e r r o r (%)Temperature o CAverage, min & max error for R F,N = 100 Ω/V * 500 V-20-15-10-505101520E s t i m a t e e r r o r (%)Temperature O CAverage, min & max error for R = 100 Ω/V * 500 VFigure 14: Inserted resistance estimate error at different temperaturesUncertaintyThe SIM100 submits along with each report an estimate of the uncertainty associated with the estimates. The uncertainty is reported as a per-centage of the estimated values and takes into consideration both the measurement and pro-cessing uncertainties. Uncertainty is derived in the interval of two standard deviations (95.45% of samples) and rounded to the next higher absolute value. For example, if the uncertainty calculated is ±1.4 % it will be rounded to ±2%. The SIM100 then adds to this value another ±3% to accommo-date for factors that cannot be calculated, such as part values shifting over age, etc. As a result, the uncertainty value provided is a conservative one. An illustration of the relationship between mea-surements distribution and uncertainties report-ed is shown in Figure 15. The green vertical line shows the actual value of the isolation resistance of the test circuit. Its value is the parallel combi-nation of the 250 kΩ inserted resistance with the 2.7 MΩ resistance of the SIM100. The red vertical line shows the average value of SIM100 reports; the actual estimate error is 1.8%. Uncertainty is estimated to ±2% and then augmented by ±3% to provide the final estimate of ±5%. As can be seen in this experiment, uncertainty provides a very+5%-5%Reported Uncertainty (%)250 kΩ20406080100120140160180FrequencyRF,P(kΩ)Histogram of RF,Pestimates over 10 experiments (25 o C)Figure 15: Distribution of reports over 1200 measurements and illustration of uncertainty reported by SIM100conservative estimate of the reported value.How to use the uncertaintyUncertainties should be used in the most conser-vative way to calculate worst case scenarios. If, forexample, the SIM100 reports a value of 100 kΩwith uncertainty of ±5%, the host should assumethe worst case possibility that the actual isolationresistance is (100 – 5) kΩ.Very high uncertaintiesThere may be instances that the SIM100 reportsvery high uncertainties. This may happen whenthere is no voltage present and there is a lot ofnoise in the IT system or during a large and rapidtransition of isolation resistance values. Duringthese instances, the SIM100 will flag the “HighUncertainty” bit to notify the host that these re-ports may be discarded.Uncertainties in capacitance estimatesWhen there is no activity on the IT power system itis expected that individual capacitance estimateswill have a high level of uncertainty. Nevertheless,the total value of isolation capacitance (the parallelcombination of all capacitances) and the estimatesfor maximum energy that can be stored on themwould be accurate. The uncertainty in capacitanceestimation will become small (less than ±5%) assoon as there is activity on the IT power bus.Variable loadsThe SIM100 is the only product today that can op-erate flawlessly in extremely noisy environments when the load of the IT power system is active. This is an important safety feature especially in commercial environments where the electrical equipment is in use most of the time. The SIM100 will provide accurate estimates even while the power system experiences violent swings of 10s or 100s of Volts.Figure16 shows the test setup and SIM100 re-sponses under a battery load corresponding to an accelerated driving profile. In the test circuita 250 kΩ resistor is connected and disconnected every 60 s. At the battery terminals an accelerat-ed driving profile load is simulated. The result-ing battery voltage is shown in the Battery voltage chart. The greyed areas indicate the 60 s intervals when the resistor is disconnected. The histogram shows the distribution of SIM100 reports in the periods when the resistor is connected.The green vertical lines in the histogram show the actual isolation resistance when the 250 kΩ resis-tor is connected. As can be seen in the histograms, the error between the average reported value and the actual value is less than 1%.R F = 250 kΩTest CircuitLoadI ,N501001502002503003500120240360480600720840960108012001320V B A T (V )Time (s)SWSW SW SW SW SW SW SW SW SW SWF r e q u e n c yHistograms of SIM100 R F estimates229230231229230231229230231229230231229230231229230231229230231229230231229230231229230231229230231Green line indicatesactual R F value 1% errorBattery voltage - Accelerated driving profileFigure 16: Distribution of reports over 1200 measurements and illustration of uncertainty reported by SIM100SIM100 Self-testingThe SIM100 performs a continuous self-testingprocess. During the self-test, the SIM100 checksthe validity of all connections and the integrity ofall references and critical hardware components.Details on the self-test process can be found in the“SIM100 Safety Manual”Field upgradeableThe SIM100 comes equipped with Sendyne’s pro-prietary boot-loader. The boot-loader relies onAES128 cryptographic standard to ensure thatfirmware updates are not compromised. It can beaccessed through CAN -bus and allows field up-grades of the SIM100 software.CAN communicationsThe SIM100 CAN protocol description can befound in the “SIM100 CAN 2.0B Protocol Docu-ment” and the “SIM100.dbc” files. The SIM100can be ordered with CAN running at 250 kb/s or500 kb/s. The SIM100MOD can be ordered withor without CAN bus termination resistors. For in-formation on ordering see the “Ordering informa-tion” section of the SIM100MOD datasheet.SENDYNE SENSING PRODUCTS WHITE PAPER| 11© 2019 Sendyne Corp.Sendyne Corp250 West BroadwayNew York, NY 10013Forthelatestproductinformationemail:****************©2019 Sendyne Corp, all rights reserved. This document contains information that is proprietary to Sendyne Corp. and may be duplicated in whole or in part by the original recipient for internal business purposes only, provided that this entire notice appears in all copies.In accepting this document, the recipient agrees to make every reasonable effort to prevent unauthorized use of this information. All trademarks mentioned in this document are the trademarks of their respective owners.。

FreeSync-Whitepaper

FreeSync-Whitepaper

White Paper |A MD PROJECT FREESYNCTABLE OF CONTENTSINTRODUCTION 3 PROJECT FREESYNC USE CASES4 Gaming4 Video Playback5 System Power Savings5 PROJECT FREESYNC IMPLEMENTATION 6 Implementation Overview6 Required Components7 Edid Requirements7INTRODUCTIONThis document describes AMD’s dynamicrefresh rate (DRR) feature, also known as“Project FreeSync”.For many years, the display industry has operated with the understanding that displaysrun at a fixed refresh rate (eg. 60 Hz). This is in contrast with the fact that there are many types of content that can be sent to a display, each with its own unique, and sometimesvarying, frame rate. When the display refresh rate is not synchronized to the contentframe rate, the user can experience undesirable effects such as tearing and stutter. Formobile applications, unnecessarily high display refresh rates for static and video contentcan increase power draw and reduce battery life. These factors have given rise to theneed for a technology that allows the refresh rate of the display to adapt to the framerate of the content, in a way that appears seamless to the end user. AMD has developed Project FreeSync, that uses a VESA industry standard (known as “Adaptive-Sync) to enable variable refresh rate capabilities over DisplayPort and Embedded DisplayPort interfaces.Figure 1 shows how a variable refresh rate scheme can allow a graphics source to dynamically adjust display refresh rate based on typical content frame rates for power efficient, virtually stutter free and low-latency display update.Desktop Content (Nominal 60 Hz)Gaming Content(30 ~ 120Hz+)Static Desktop Content(Lowest Refresh Rate, ~10Hz)Video Content(24/25/30/50/60 Hz)Figure 1: Content Adaptive Display RefreshGAMINGVariable refresh rate technologies have obvious benefits for the gaming experience. In a typical video game, the rendering frame rate varies widely over time due to the diversity of GPU computational work required throughout the game (illustrated in Figure 2). Some scenes with little detail or few effects will render quickly at a high frame rate while, while other scenes with more detailed environments which may include a greater number of effects (such as explosions, smoke, etc), can take a longer time to render. This variance in frame rate has traditionally presented gamers with a trade-off with respect to how they choose to refresh the display, such as choosing to enable the ‘VSync’ setting.Figure 2: Illustration of Frame Rate over time in a typical video gameWith ‘VSync’ enabled, the display buffer is only refreshed during the vertical blanking interval between frames, so that a full frame is always displayed and no tearing is ever visible. This is great if the game’s rendering frame rate is always higher than the refresh rate of the display. If the game’s frame drops below the refresh rate of the display (e.g. during a short period of intensive action), then the new frame will not be ready in time for the display’s blanking interval, and the previous frame will be repeated on the display. This is illustrated in Figure 3 as Render Frame B took so long to render, that Frame A had to be repeated. This effect manifests itself as stutter and lag to the end user. The alternative for the gamer is to disable VSync, which helps eliminate stutter and lag, but can produce visible tearing, especially during scenes with fast movement.120100806040200102030405060708090100FRAME RAT ETIME (SECONDS)Short period of intensive actionVSYNC RATEVSYNC/2 RATEFigure 3: Frame analysis of traditional VSync vs Project FreeSync TRADITIONAL VSYNCVariable refresh rate technologies such as Project FreeSync address these issues by dynamically changing the display refresh rate in response to the rendering frame rate of the game using DisplayPort Adaptive-Sync. In the case illustrated in Figure 2, the display will wait until Render Frame B is finished and ready before updating the display. This helps ensure that a frame is almost always displayed as soon as possible, avoiding lag. It also helps ensure that framesdo not need to be repeated within the refresh rate range of the display, avoiding stutter. The display refresh rate is synchronized to the rendering frame rate, which helps avoid the issueof tearing associated with VSync-off. Project FreeSync provides the ideal solution for smooth gameplay with decreased lag and virtually no tearing.VIDEO PLAYBACKProject FreeSync may also be applied to use cases other than gaming. For example, it could be used to enable essentially seamless playback of video at almost any frame rate (Eg. 23.98, 24, 25, 29.97, 30, 48, 50, 59.94, 60 fps). In the case of video content with a fixed frame rate, the refresh rate is set up to match the frame rate of the video content. Project FreeSync can help provide judder-free playback at almost any video frame rate without the need for costly Frame Rate Conversion (FRC) post-processing. This can also help reduce power consumption during video playback.SYSTEM POWER SAVINGSAMD’s variable refresh rate technology has been available to notebook PC makers for quite some time as a system power saving feature for embedded notebook panels (known as DRR). The DisplayPort Adaptive-Sync feature is already a capability of the Embedded DisplayPort interface. When the system enters a static screen state (no new content), the refresh rate of the display is lowered to the minimum rate that it can support, to save power. The transition between refresh rates is invisible to the end user, and it comes at a low cost to PC makers, since no additional hardware is required to enable this feature. IMPLEMENTATION OVERVIEWAMD’s Project FreeSync implementation involves adjusting the vertical blank duration on a frame-by-frame basis to alter the resulting frame period and hence the refresh rate.Please refer to Figure 4 for an example where vertical blank time is increased for lower refresh rate.Figure 4: Vertical Blank AdjustmentIn this mode of operation, timing changes related to the vertical blank must be ignored by the DisplayPort™ receiver, which must now track the timing from the source. The DisplayPort™ source will tell the sink to enter this mode of operation using a register write. For a plug and play user experience, the graphics driver reads the capability of the display to establish support for this feature. The display’s EDID must properly indicate that it isa “continuous frequency display” and report the range of refresh rates that the display supports. This allows the graphics driver to set up the range (from minimum to maximum) of refresh rates supported by the display.REQUIRED COMPONENTSThe requirements to enable dynamic refresh rate via Project FreeSync are:• AMD driver build: Upcoming AMD Catalyst™ beta driver (to be announced)• Operating System: Windows® 7 and Windows® 8.1• AMD Parts:°AMD Radeon™ R9 290 Series graphics card°AMD Radeon™ R7 260 Series graphics card°2014 A-Series Desktop and Mobility APUs, formerly codenamed"Kaveri", "Temash" and "Kabini"• Display Interface: DisplayPort™ or eDP required for first version• Compatible Display or Embedded Panel (notebooks) supporting DisplayPortAdaptive-SyncCONCLUSIONIn summary, AMD’s Project FreeSync utilizes DisplayPort Adaptive-Sync to provide variable refresh rate capability that offers a number of benefits:• Helps improve battery life by reducing the refresh rate of the panel when thescreen is static.• Ensures that the transition between refresh rate is seamless and undetectableto the user.• Can be enabled by plug and play, making it transparent to the operating systemand end user.• Reduces implementation complexity on the Timing Controller (TCON) and panelby keeping the GPU’s pixel clock rate constant and varying blank parameters.• Dynamically adapts the display refresh rate to fixed video content frame rate fora power efficient and virtually stutter-free video playback experience.• Dynamically adapts the display refresh rate to variable gaming content renderrate for low latency and a smooth, virtually stutter-free gaming experience.DISCLAIMERTHE INFORMATION PRESENTED IN THIS DOCUMENT IS FOR INFORMATIONAL PURPOSES ONLY AND MAY CONTAIN TECHNICAL INACCURACIES, OMISSIONS AND TYPOGRAPHICAL ERRORS. AMD RESERVES THE RIGHT TO REVISE THIS INFORMATION AND TO MAKE CHANGES FROM TIME TO TIME TO THE CONTENT HEREOF WITHOUT OBLIGATION OF AMD TO NOTIFY ANY PERSON OF SUCH REVISIONS OR CHANGES.AMD MAKES NO REPRESENTATIONS OR WARRANTIES WITH RESPECT TO THE CONTENTS HEREOF AND ASSUMES NO RESPONSIBILITY FOR ANY INACCURACIES, ERRORS OR OMISSIONS THAT MAY APPEAR IN THIS INFORMATION. AMD SPECIFICALLY DISCLAIMS ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR PURPOSE.IN NO EVENT WILL AMD BE LIABLE TO ANY PERSON FOR ANY DIRECT, INDIRECT, SPECIAL OR OTHER CONSEQUENTIAL DAMAGES ARISING FROM THE USE OF ANY INFORMATION CONTAINED HEREIN, EVEN IF AMD IS EXPRESSLY ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.©2014 Advanced Micro Devices Inc. All rights reserved. AMD, the AMD Arrow logo, ATI, the ATI logo, Radeon, and combinations thereof are trademarks of Advanced Micro Devices, Inc.HDMI is a trademark of HDMI Licensing, LLC. Other names are used for informational purposes only and may be trademarks of their respective owners. PID XXXXXXX。

如何选择合适的小型企业防火墙 White Paper说明书

如何选择合适的小型企业防火墙 White Paper说明书

WHITE PAPERHow To Pick the Right Small Business FirewallAnd the battle keeps escalating. Over time, mature malware and attacks “as-a-service” have begun to increase on the dark web, making advanced threats even more challenging to hunt down. They increasingly require deep packet inspection (DPI) to identify malicious markers and indicators. Advanced intrusion prevention/detection services (IPS/IDS) should be part of the threat prevention services your firewall utilizes.But once again, a firewall’s ability to perform DPI effectively—especially without slowing down the firewall—restspredominately on its level of performance. Firewalls lacking advanced processors often leave off this critical capability when making throughput claims. Or they assert things like only companies being targeted by state-sponsored attackers need it—a dangerous fallacy. An attacker’s ability to hide an attack that requires DPI is table stakes today. And while purchasing a separate IPS system isn’t unheard of, the use case is often only seen in the largest companies due to the staggering amount of data they must analyze. At the SMB level, this simply isn’t the case.Content FilteringThe most effective way to prevent users from being infected by malicious websites (such as drive-by downloads) is to prevent them from going there in the first place. Content filtering performs a check on URLs based on URL categories, such aspornography, gambling, malicious content, and file sharing, while building exemptions for approved traffic. But in today’s world of hybrid workforces that don’t have an integrated endpoint and network solution, such enforcements performed by the firewall often fall away when a user is offline, or they require the manual updating of the endpoint to match changes on the network side. An integrated solution, however, that ensures endpoint and network security are in constant communication without manual intervention fixes this.Endpoint HygieneIntegrated endpoint and network security have additional advantages beyond keeping agents updated. Traditionally,understanding what is running on an endpoint, identifying vulnerabilities, and implementing patching had to be run from an endpoint product’s management console. However, when firewall and endpoint solutions are built using the same operating system, this visibility can be obtained directly from the firewall. This enables network access control to be enforced based on endpoint risk and hygiene assessments, forcing the end-user to update and patch their system appropriately before being allowed on the network. This significantly reduces network risk from employees who have been offline working remotely for long periods.Again, the firewall’s ability to inspect such traffic without creating a bottleneckdepends entirely on performance, and buyers should pay attention to how muchthroughput a firewall can handle with encryption enabled. Without rapid decryption,your firewall cannot analyze incoming traffic, which means data ends up beingsent straight through to the end-user and onto the network rather than slow downmission-critical applications and workflows—risk and all.Antivirus (AV), Advanced Threat Protection, Intrusion Prevention In addition to the more sophisticated threats businesses face, today’s cyber criminals often use older attacks in the hope that the firewall doesn’t have the memory to still include them in its inspection database. To combat this, firewalls need to combine threat-matching signatures with machine-learning capabilities—commonly called “advanced threat protection”—to identify all threats, new or old, to successfully fight today’s attackers. But while many vendors may market their security as advanced malware protection, it is not uncommon for basic protections, such as AV, to be mislabeled as “advanced.” To truly understand the solutions embedded in a modernfirewall, one should look to third-party reports and testing services to determine thetrue efficacy of their protection.Few modern firewalls can perform a full inspection of encrypted traffic without severely undermining their its. However, “the percentage of encrypted web traffic on the internet has steadily increased, from around 50% in 2014 to around 95% today.”5Domain Name System (DNS)While URLs are designed to be interpreted by humans to ease internet navigation, the underlying code used to navigate to sites can be hijacked to obscure and hide malicious intent while still offering the same superficial URL—a process known as Domain Name System (DNS) hijacking. Ensuring you work with a vendor that provides DNS security as part of their threat subscriptions provides an additional layer of websecurity against a rising threat.SandboxingWhen new files are introduced to the network, AV usually checks them against a database of known attacks to block their entry. But this approach is ineffective against unknown threats. In that case, a “sandbox” is used to open and “detonate” files and attachments unknown to AV inspection to determine if they are malicious. Once again, depth of integration and inherent performance will determine how fast this process can occur. Here, single-vendor solutions have another advantage. Each element of the security fabric operates using the same underlying code and leverages the same specialized security processors, including the sandbox. As a result, risks can be quickly determined, and threat intelligence automatically shared across the security fabric in near real-time without manual intervention. Additionally, thanksto deep integration and automation capabilities, automated playbooks and threat responses can immediately kick in, including quarantine, alerting, and remediation—When new files are introduced to the network, AV usually checks them against a database of known attacksto block their entry. But this approach is ineffective against unknown threats. In that case, a “sandbox” is usedto open and “detonate” files and attachments unknown to AV inspection to determineif they are malicious.precisely what you want out of an intelligent, proactive cybersecurity system.IoT Visibility and ControlThe Internet of Things (IoT) ranges from smart appliances in the home to sophisticated operational technology (OT) sensors and monitors on manufacturing floors, in inventory rooms, and in hospital ICUs. The challenge for most administrators is the lack of standardization across these devices, making it extremely difficult to accurately discover all the devices on the network and appropriately control them.Hackers have been quick to exploit the lack of security surrounding IoT and use their vulnerabilities to gain a foot in the door of many networks. While some vendors sell a separate solution to address the IoT challenge, some innovative security vendors have begun integrating the ability to track IoT devices and identify those compromised into the underlying operating system of the firewall. Some even offer this free of charge, helping businesses future-proof their business without added complexity or cost.Network Control of Switching and Wireless AccessUnfortunately, no platform is 100% secure, especially in the face of ongoing digital innovation. Network segmentation prevents ransomware and similar threats from moving freely across your network, enabling the firewall to inspect and control traffic moving across the network (east-west) at critical checkpoints.This is the starting point for building a “zero trust” network framework—the leading cybersecurity approach of successful enterprises. Teams can further increase their flexibility and limit their attack surface by only allowing specific people or departments access to applications or application abilities, known as granular application control. This prevents threats from using less inspected or newly deployed application protocols to avoid detection. They can also control access to applications on a per-user or per-session basis, a technique known as zero trust network access (ZTNA).However, all this additional inspection adds extra load, making the firewall’s application control services’ performance, depth, and flexibility even more critical. And when the various devices in the ecosystem (firewall, switch, wireless access point) aren’t from the same vendor, managing these policies is also much more complex. This is also why a single vendor capable of pushing and maintaining these policies from a centralized source streamlines operations and strengthens security.Secure SD-WANSD-WAN is deployed by businesses looking to replace fixed multiprotocol label switching (MPLS) connections, optimize user experience for cloud applications, reduce onboarding time for new locations, and better use local internet access. The challenge is that few standalone SD-WAN solutions include security. Fortunately, an SD-WAN device optimizes traffic using much of the same routing information the firewall uses, which has led some innovative vendors to consolidate the two devices.However, even when conjoined, SD-WAN capabilities can vary significantly between firewalls. Some include advanced routing functionality and innovations like self-healing networks, while others only provide the bare minimum to claim they offer SD-WAN. But as business plans increasingly include significant shifts to the cloud, paying close attention to a firewall’s SD-WAN capabilities, along with the vendor’s pace of innovation, is an excellent way to enable growth and avoid unnecessary investments down the road.Avoiding Complexity as You Grow As business plans increasingly include significant shifts to the cloud, paying close attention to a firewall’s SD-WAN capabilities, along with the vendor’s pace of innovation, is an excellent way to enable growth and avoid unnecessary investments down the road.Dealing with growth is an exciting and stressful time for companies of any size. Apparent demand for your products and services proves that your go-to-market strategy was successful, and there was a need for your solutions. But maintaining that growth while avoiding complexity down the road can be a massive challenge. More users mean more connected devices, new locations must be onboarded, and new technologies to support business and customer demands mustbe implemented. While some IT projects can be easily ripped and replaced, that’s simply not the case when it comes to essential networking and security.Once established and intertwined into businesses’ processes, replacing an underlying infrastructure is neither quick nor inexpensive. Rarely can everything be done at once. This leaves the IT team struggling to manage multiple vendors and disparate solutions while constantly troubleshooting issues as components are added, replaced, or updated. The process is so painful that many businesses build workarounds and implement long-term band-aids to provide temporary relief, further exacerbating complexity.Managing Multiple LocationsAs businesses scale, new locations must be brought on board and synced with the main office. Staff must be hired to oversee these locations, managing multiple firewalls, switches, access points, and security solutions to ensure permissions and configurations remain consistent regardless of where a user is located.Vendors that have integrated SD-WAN into their firewalls are at a unique advantage. “Zero touch deployment and provisioning” allows devices to be sent to a remote location and “phone home” once there and plugged in. Without the need for an on-site IT person, the devices receive preconfigured templates and configurations, thereby minimizing, if not eliminating, errors that stem from manual configuration. This not only decreases risk but also minimizes onboarding time and costs arising from travel and lodging for IT staff.But once operational, businesses must still manage these devices over the long term. Selecting a vendor with centralized cloud management significantly simplifies this task. Centralized cloud management gives IT teams visibility over theentire ecosystem—users, devices, application usage, threats, and network utilization. This helps them identify and quickly troubleshoot potential problems from anywhere the internet is available, even from their phone.And once again, single-vendor solutions are at an advantage. But this requires proper solution integration. Vendors thathave grown through mergers and acquisitions often still need multiple management consoles to oversee their supposedly “integrated platform.” In contrast, vendors who maintain and develop solutions around a common operating system can easily aggregate management, reporting, and analysis into a single portal.Copyright © 2021 Fortinet, Inc. All rights reserved. Fortinet , FortiGate , FortiCare and FortiGuard , and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet’s General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable.October 7, 2021 9:42 PM Third-party IntegrationsIntegrating third-party products can be challenging, and not all vendors do it well. Most vendors offer “open” applicationprogramming interface (API) integrations, but quality and updates can still vary widely. If not well-maintained, “tight integration” with third-party solutions can quickly become outdated.Understanding a vendor’s relationship with their technology alliance partners is key to understanding their integration story.Are they able to develop turnkey solutions together? How easy are the integrations to deploy, and how deep do they run? What is their track record of integration? If these issues are not considered, integration with third-party tools can quickly become a source of pain and complexity.Don’t Get Caught With Buyer’s RemorseAs our thirst for digital innovation grows, so too do the challenges that stem from cybersecurity. The consumerization of IT has made once unaffordable technologies accessible to lean IT teams. But this growth is double-sided. Even smaller businesses have shifted from a safe, clearly defined office perimeter to a much riskier scenario. Users now work from anywhere, accessing private information through multiple devices and locations across a technology stack similar to small enterprises but growing much more quickly. And while it would be easy for a smaller business to claim, “We’re too small to be attacked,” the datasuggests otherwise. Attackers have also taken advantage of the consumerization of technology and use “as-a-service” attacks just like legitimate businesses use Software-as-a-Service.So, who do you trust? While large businesses can run their networking and security investments through extensive real-world testing, this is a luxury for many. Meanwhile, many vendors claim they provide all the functionality we have discussed, but the reality is often far different from sales pitches. So, how do you know which solutions work and which don’t?Luckily, there are numerous industry analysts and testing businesses whose role is to provide third-party validation. Even those with a focus on leading industry players are an advantage. A vendor’s absence from such reports should raise the question of whether their solution can genuinely protect your business or has the commitment and resources to be a long-term partner.Businesses need to select a firewall designed to support a fully integrated security fabric—one with the performance required to drive critical functionality and defend against cyberattacks at every stage of your business growth. The right solutionprovides the peace of mind that comes from not only knowing that your security works now but will continue to protect and sustain your business in the future, even as technologies and business strategies continue to evolve. Additionally, working with a vendor who understands your needs now and tomorrow ensures longevity, prevents unnecessary workarounds, and avoids the rip and replace conversations down the road that can derail a business.1 2019 Global State of Cybersecurity in Small and Medium-Sized Businesses , Ponemon Institute, October 8, 2019.2 “Avoiding Complexity: The Impact Complexity Has on Organizations Over Time and How SMBs Can Prevent It ,” Fortinet and Vanson Bourne, October 2021.3Ibid.4“2020 Cost of a Data Breach Report ,” IBM Security, July 2020.5 “HTTPS encryption on the web ,” Google Transparency Report, accessed September 28, 2021.。

HOW TO WRITE A WHITE PAPER 怎么写白皮书 英语指南

HOW TO WRITE A WHITE PAPER 怎么写白皮书 英语指南

HOW TO WRITE A WHITEPAPER如何写白皮书All set to write a white paper? If you are still preparing and searching for ways to compile a company’s deep knowledge of its industry and present it to your users as a white paper, this article may help you with white paperwriting.White papers are useful to highlight the expertise of a company. It is undoubtedly one of the most valuable tools of marketing.But what is the right way to make a white paper? You can take some references from business reports as white papers are quite similar to them. To write a flawless one, you must know what it is,why people need a white paper and what all is needed for white paper writing.If you are eager to know all these things, go ahead:What is a white paper?A white paper is a detailed guide or report of a particular topic and the problems it has. It is written to inform the audience and make them understand the topic, its problems, and solutions.This was a layman definition, a structured one as per the world of marketing would go like this:A white paper is a piece of content resembling an eBook. Opinions and facts included in white papers are supported by research and statistics derived from reliable sources. They include visuals as well, such as tables, images, graphs, charts, and manymore.The white paper is generally longer, detailed, and technical than an eBook.Backstory of White PaperThe term “white papers” traces its origin in England’s government-issued documents. One of the widely popular examples is the Churchill White Paper, 1922, which was commissioned by Winston Churchill.In businesses, especially inB2B, consulting, financial, sectors, white papers are used for communicating the philosophy of a company on a certain topic. It makes the case for the goodness of their product.White papers can be considered as an editorial than other forms of content. It has a deep foundation of research which gives it an authoritative tone. This is the reason why they promote thought leadership.What is the use of white paper?Businesses prepare white papers with two major intentions:To record expertise* To market themselvesThey are dedicated to an audience outside the range of business. This is why they act as a medium to attract new readers to the company as potential consumers by providing them with industry knowledge.A white paper is not a sales pitchEvery writer must know that white papers can never be a sales pitch. They are written in an entirely different way. Yes, they both serve a purpose to sell the company, but white papers don’t market in typically. They highlight the expertise of business by highlighting valuablerecommendations and internal expertise of the company. Unlike sales pitch, they don’t bid for the business.Examples:White Paper: Online Advertising: Making marketing cheap yet effective* Sales Pitch: How XYZ marketing is saving users’ budget on advertising?Types of white papersThere are various types of white papers a company can publish:Backgrounder: This white paper offers a detailed explanation of the b enefits of a company’s service, product, and methodology.* Problem-Solution Approach: While white paper writing, one walks through the solution to an issue that is prevalent in the industry.If you are a student and willing to know about other white papers, you can get online assignment help. Experts in such sites can let you know about them.How to select a white paper topic?It is tough to choose the right kind of topic. Here are the three factors you can consider while choosing a topic:Audience: Keep your target audience in mind. Try to ascertain their preferences.* Expertise: While writing a white paper you must highlight the expertise of your business.* Problem-based: Address a specific problem related to your business or industry.* Solution-focused: It should have a proposed solution or recommend a solution to the problem. How to prepare for white paper writing ResearchA white paper topic has to be research comprehensively. You can dig information from industry resources, online references, and internal documents.You don’t have to follow any stern rules on citations, however, do cite data that you didn’t know prior to research. But, try to know the readers’ confidence is expected to grow with a big list of resources.All your sources must belong to authoritative websites. To make a valuable document, you will have to cite credible origins. Also, you can take help with custom research paper writing.Read white papersIt is always a good idea to read others’ work before writing your own. By doing so, you can gain ideas on how to make your content more engaging. Also, you can decide on things you don’t want to include in your piece of writing.So, find out white papers written on your topic on the web. Go through them and determine the knowledge gaps you have. Use your reading skill as an opportunity to create existing content. Go for organizational toolsIsn’t it great to keep track of all sources, content, and ideas involved while writing a white paper? By using an organization tool like Mind-Map, you can do this easily. Such tools allow the writer to connect multiple pieces of information into one visual overview.There is no need to spend extrabucks to access an organizer. You can use free tools like FreeMind which are simple to use.How to format a white paperThe white paper format is generally a standard document. The order of content is often similar to other business documents, but the major difference is:Many business communications place conclusions at the beginning of the document, such as business proposals or technical reports. The white paper places the summary or conclusion at the end.* This order reflects the wishes of the audience and their preference while receiving information. * Content and research shows inform the audience. In a white paper, these are the twofactors that increase their understanding problem.* The last section offers a constructive moment. Here the audience receives solutions that are backed by reliable evidence in the document.* The preferences and journeys of readers in a business report and white paper are different. The major findings follow suit.* In case you are not sure of distinctions and lack business writing skills, you can connect to some online report writers.Irrespective of the journey, your document must be easy to read and understand. It must have informative headings and overall easy navigation. Here are the basics for drafting all sections:TitleIt must be appealing as users are more likely to click on catchy titles than the plain, boring ones. You can say, it is crucial to think of a good title. Try to clearly say what readers will get in your content. Entice them with your title.Don’t use the phrase “white paper” in the title unless required. It has been observed that the audience seek authoritative indicator. Understand the preferences of your potential readers.AbstractThis section is picked by most of the users. It gives a brief overview of the major points of a white paper. Here, the readers are allowed to acknowledge they have found a relevant document to serve their needs. After going through abstracts they must feel they are in the right place.Problem StatementThe problem statement explains the problem your white paper is mainly addressing. The main issue has to be defined and put into context. This has to ensure readers understand the problem.BackgroundIn this section, you will have to offer background information needed for the readers. Your readers should be able to grasp the issue and solution.The contents of the background must be detailed, high-level, broad, and technical. It must depend on the reader and theproblem.When original research is done for a white paper, you must communicate the methods.SolutionHere comes the most sorted moment of white paper writing.On the basis of the preceding data, you will have to present the solution here. It must be argued and developed for the use of aggregated evidence and expertise of the author and their company.ConclusionYou may already know what the conclusion is meant for. Summarize the content of the major findings of your white paper. Present recommendations based on solutions provided. ReferencesAll sources are utilized to develop a white paper which should be aggregated and cited here. References add validity to your white paper. This is the only section where your readers get content for further research. Follow citationformats like MLA or APA. Create it as per your industryWhat not to do while preparing a white paper Knowing everything about white paper is good if you are a beginner. But before you begin with one, there are certain mistakes you must know so that you can avoid them.There are some common mistakes listed here. All of them have the potential to turn your effort and dedication into a wasted venture. Let us quickly go through them:Make it like a sales pitchYes, white papers are used in marketing campaigns where businesses present their products and services. But that does not mean it should look like a sales pitch. If you are turning a white paper into a sales pitch, you are taking itall wrong. This will instantly turn your readers off. Because, when the audience comes to white papers in search of informative pieces made without any bias. Thus, it should help them by providing information and not try to persuade them to buy a service or product. A sales pitch is a different concept, you can save it for product brochures or other content.Lack of in-depth researchYou have already read that white papers mustbe intensely researched documents. It is right that carrying out valuable authentic research requires a lot. Apt research often needs collective efforts. At times it may fall beyond the budget of a marketing team, and minor statistics from the first page of a simple Google searchwill not do any good.Lengthy research is often time-consuming. Searching through a number ofscholarly works and collecting relevant statistics will surely take time, but the results will be worth your effort. If you want your white paper to have an intended effect, establish your content as an authoritative source. A source to which your users can trust want return. In any case, don’t compromise with research.Not-so-good designThe design of white paper is a broad concept to discuss. Though we cannot elaborate much here, it’s worth a brief mentioning. All writers, newbies, or pros must focus on the written content of the white paper, it matters a lot. But if one is neglecting design, even the perfect content will go unnoticed. Not putting effort to create stellar designs can harm your white paper to a great length. On the other hand, a good design canmake your salient points stand out. Your readers will easily understand what is presented in the paper. Visuals like videos, charts, images, and graphs supporting your argument are important. You can search on the internet how people make efficient use of visuals in design.Keeping it vagueWhite papers do hidden marketing. They serve a purpose to offer facts and information without directly persuading them. But, the essence remains in attracting potential consumers. To drive people towards a brand, white papers must not be boring. Don’t make it vague.Try telling a story. Problem-solutions papers, backgrounders, research findings, all they have some story. Make your readers aware of these stories through your narrative. Because they cannot make it via the whole piece if there willbe nothing to keep them connected. Set a problem, discuss its solution. Involve some success stories, it’s a proven formula to create engaging content.Keeping it abstractBecause most white papers will involve sharing research findings, it can be easy to leave them in the realm of theory without explaining how to utilize those findings on a practical level. This is truly more of backgrounders but can be the case with problem-solution white papers aswell.Generally, white papers present and share research findings. It is very to keep them in the reign of theory. You don’t need to describe how to use the research findings in the real world. TakeawayPreparing a perfect white paper is not a 2-minute job. Time, skill, and effort are the key ingredients you need to create a valuable and appealing document. When you are making something to share a company’s essence, knowledge, contribution to the welfare of society, role in the industry, you must focus on all the four pillars of a white paper: research, format, design, and content. One stellar white paper can increase business opportunities to a great extent.。

Microsoft合作伙伴Go-To-Market策略指南说明书

Microsoft合作伙伴Go-To-Market策略指南说明书

Go-T o-MarketBenefitsPresenter NamePip Simeon************************ Partner Marketing LeadGo T o MarketGo-T o-Market ProgramsPeer based research and training designed to support and coach your team throughout your marketing growth Promote Your Business with Go-To-Market ProgramsReady to use, customizable marketing, sales and readiness content to help you promote your business, save time and grow your customer base Designed to support you in increasing awareness, generating leads and improving lead velocity for your app or serviceGo-To-Market Resource DeskThe GTM Resource Desk works with you to execute Go-To-Market activitiesYour one point of contact for Go-To-Market help, expertise, and guidanceCreate a Go-To-Market plan inalignment with yourmarketing and salesobjectivesGlobal OperatingModel supporting 14languagesGTM Consultant workswith you to review andexecute GTMactivities Email: *****************By partnering with Microsoft you get access to Go-To-Market benefits designed help you increase awareness, generate qualified leads, and expand your business through partnershipsMEMBER LEVEL Optimize your marketing capabilities through modern marketing education and ready-to-go campaign content SILVER COMPETENCYLaunch and grow yourbusiness through marketingassets and digitaloptimizationMARKETPLACEIncrease awareness andaccelerate your success inthe marketplaceGOLD COMPETENCYGenerate leads and increaseyour close rates through jointmessaging and lead sharingopportunitiesBy partnering with Microsoft you get access to Go-To-Market benefits designed help you increase awareness, generate qualified leads, and expand your business through partnershipsCORE•Education and best practices focused on modern marketing•Customizable marketing, sales andreadiness assets•Curated, customizable social content and syndication platform•Access to list of recommended agenciesMember level benefits+CORE•Partner Listing Optimization*•Marketing Consultation with GTMResource Desk (choice of one)*–Sales/Marketing Asset Review–Website Review–Value Proposition Review–Templated digital marketingcampaign kitsPAID•Social Promotion•Mini Case Study•PR Support•Customer One Pager•Customer Presentation•Customer Case StudyTRANSACTAll Trial benefits+•Test Drive Sponsorship•Microsoft Executive PR EndorsementCONSULTINGAll Trial benefits+•Azure Sponsored AccountsTRIALAll list benefits+•Social Promotion Spotlight + Blog Post•Press Release Support•Mini Case Study•Marketplace Feature + Category Promo•Learning Media WebcastLIST•AAD Integration + Onboarding•Marketplace Listing Optimization•Marketplace Blog w/ Newsletter + Social•Marketplace Performance InsightsSilver level benefits+COREBi-directional lead sharing•Priority Customer Matching•Co-Sell Ready Listing Optimization*•Marketing Consultation Services withGTM Resource Desk*–Selection of one review offered atSilver core benefit level–Customized, co-branded digitalmarketing campaign materials,including landing page in MicrosoftPDC to support generating leadsPAID•Lead Generation campaign in the PDC•Animated Mini Commercial•Partner Seller Readiness•Secret Shopper•Sales Enablement•Global Expansion•Telesales Campaign•WorkshopsGTM RESOURCE DESK SUPPORTDIGITAL SUPPORThttps://******************Available November 2018 *Available November 2018Membership GTM Benefits: CoreIncluded in Membership levelEducation: aka.ms/smartmarketingSmart Partner Marketing is dedicated to helping you transform your growth with digital marketing. The site is built for you -with best practices and recommendations from other partner companies who are successful and credit some of that success to marketing •Access market insights and research and benchmark their capabilities to help guide their strategies and growth•Guided digital marketing growth path to assess where they are and how they can get to the next level•Partners can hear advice from other partners and what they did to grow their business through marketing•Partners can access free digital marketing training to train up their marketing person/team•Partners can access professionally developed marketing assets to utilize in their campaignsSyndicated Content: aka.ms/get.socialMicrosoft Social Syndication platform connects with your social media accounts and email lists and enables you to select, customize, and share content.•Comprehensive 10-week customer-focused digital campaigns that include to-customer content (videos, emails, e-books/whitepapers, thought leadership articles) and to-partner resources (demo videos, teleguides, brochures, pitch decks)•Gated Content enables partners to gather leads directly from engagement on their social media accounts•Auto-Update allows the tool to push content to partners’ social media accounts without partner actionMarketing and Sales Content: Aka.ms/pmcMicrosoft Partner Marketing Center offers you customizable marketing, sales, and readiness assets•Customer pitch decks•Copy blocks for use on websites or social media•Customizable pre-written emailsList of Recommended Marketing Agencies: *****************Email Syndication***********************************************Included in Silver competency attainmentMember Core Benefits+Partner Center and Marketplace Listing OptimizationMarketing Consultation with GTM Resource Desk: A personalized consultation with a marketing specialist that includes a review of your go-to-market materials and provides actionable recommendations for optimizing your materials.Select one review:•Sales + Marketing Bill of Materials: The review of sales or marketing BOM spans a range of your materials including product/solution brief, sales deck, credentials, business case, product/solution video demo and customer references. Any applicable materials will be reviewed during the allotted time, with each asset assessed against a tailored list of criteria for compelling customer communications.•Website: A Website review focuses on just that: evaluating the your current website to identify ways it could better support GTM efforts.•Value Proposition: This review option centers on the your value proposition and its efficacy in positioning the unique elements of the your solution, and the benefits in opting to work with the you•Templated Campaign kits:Ready-to-go digital customizable marketing campaign kits aligned to solution areas. The GTM Resource Desk will provide the campaign kit with a campaign playbook to support you in customization, will review assets and provide actionablerecommendations for optimization. Campaign kits include:–Landing page template–Social promotion templates (LI, FB and Twitter)–Demand Gen and Nurture email headers–Acquisition asset template(s), with ability to customize with logo and case study–Campaign playbook and best practice guideRequires fundingPress Release Support ($500 USD): Includes Microsoft approval of a partner-drafted press release and quote attributed to a Microsoft representative.Mini Case study($500 USD): Showcases your solution and how it has benefited from development on the Microsoft cloud platform, in a one slide formatSocial Promotion ($500 USD): Social Promotion showcases the your solution and its use of Microsoft technology in a tweet on a Microsoft Twitter outlet with up to hundreds of thousands of global followers, including on @Azure, @Office365, @MSFTDynamics365, and @MSPartnerApps. Additional outlets, like Financial Services, Health, Government, Public Safety & National Security or other outlets, can be requestedCo-Sell Bill of MaterialsCustomer presentation($500 USD): Partner-drafted deck introducing your solution to new customers.Customer one-pager($500 USD): Showcases to potential customers the features of the your solution and the Microsoft cloud platform on which the solution was built. It can be used to fulfill the Customer One-Pager requirement for a GTM Ready or Co-Sell Ready listing in OCP CatalogCustomer Case Study($500 USD): Partner-drafted customer, Microsoft reviewed case study showcasing the success of a customer using a your solution.Partner Quote: “The co-branded datasheet and mini case study definitely helps with credibility; there are companies that wouldn’t have done business with us if we didn’t have the bond with Microsoft. We've also formed new connections with other Microsoft partners.”-Mark Voermans, Chief Business Development, iReckonPartner Quote: "Assisted by the Microsoft GTM Services team, our press release drew nearly 107 million unique visitors, helping Veeam to attract customers."-Ratmir Timashev, CEO, VeeaGold Benefits**************************************************Included in Gold competency attainmentSilver Core Benefits+Bi-directional lead sharing through Partner Center Sales ConnectPartner Center Priority Customer MatchingMarketing Consultation with GTM Resource Desk: A personalized consultation with a marketing specialist that includes a review of your go-to-market materials and getting you enabled in the Microsoft Partner Demand Center (PDC). The PDC runs lead generation campaigns aligned to key solution areas that are partner first, Microsoft supported campaigns and target Microsoft customers.•Selection of one review offered at the Silver core benefit level•PDC Enablement: Lead capture landing page in the Microsoft Partner Demand Center•Customized, co-branded campaign bill of materials aligned to solution area campaigns designed to drive demand for partner solutions in the Partner Demand Center. Campaign BOM includes:–Lead capture landing page, instrumented in the Microsoft Partner Demand Center–Editorial review of an existing partner asset–A set of automated nurture emails to further qualify leads–Campaign playbook and best practices guideRequires fundingLead Generation Campaign in the PDC ($30,000 USD): Generate qualified leads for your solution with a co-branded, co-messaged digital marketing campaign executed through the Partner Demand Center (PDC). All campaigns are aligned to key solution areas that and are partner first, Microsoft supportedPartner Seller Readiness ($8,500+ USD): Revolutionize your approach to selling cloud services and increase sales pipeline velocity. Microsoft partner CSG Services delivers a customized 3-to 4-day training workshop to help partners accelerate sales for their solution built on the Microsoft platform Secret Shopper ($10,000 USD): Optimize your profitability and grow your revenue by improving your customer buying experience through a comprehensive secret shopper assessment and improvement planSales Enablement ($15,000+ USD): Increase sales with materials that position the offering value, target audience, and differentiatorP2P Workshop ($20,000 USD): Expand your business by learning how to effectively leverage partnershipsGlobal Expansion ($5,000+ USD): Partners who have proven themselves domestically to scale their business through international expansion. In order to support partner expansion in prioritized countries, we have partnered with AIM International, a consulting agency, to provide a Global Expansion Enablement program to help partners get ready and enter new marketsWorkshops ($8,000+ USD): Learn from experts, train your sale teams, and grow your business through multi-day workshops including: Envisioning Workshop, Business Design Workshop, Solution Definition Workshop, Launch Planning Workshop, Sales Readiness Workshop, Pipeline Acceleration Workshop, Sales & Marketing Campaign Workshop, Customer Journey Analysis WorkshopAnimated Mini Commercial ($2,500 USD): Partners can increase awareness of their solution through execution of a 60-90 second Animated Mini Commercial highlighting the solution's benefitTelesales ($10,000+ USD): Develop and grow your qualified sales pipeline with outbound telesales resourcesCustomer Case Study($2,500 USD): Two page customer case study written by Microsoft showcases success of a customerusing a your solution. The case study will be published on the primary Microsoft customer reference outlet, .***********************************************Marketplace Go-To-Market BenefitsEarn GTM benefits just by listing your solution or service in Azure Marketplace or AppSource.​ The more you offer in the marketplace, the greater your benefits.All listing benefits+•Social Promotion Spotlight •Press Release Support •Mini Case Study •Azure Sponsored Accounts *•Marketplace Featured Apps and Category Promotion **•Learning Media Webcast **•Industry Blog Post **•White-glove AAD Integration and Onboarding •OCP Catalog Listing •Marketplace Listing Optimization •Marketplace Blog with Newsletter and Social Amplification•Marketplace Performance InsightsAll listing benefits+•Social Promotion Spotlight •Press Release Support •Mini Case Study •Marketplace Featured Apps and Category Promotion **•Learning Media Webcast **•Industry Blog Post **All listing benefits+•Social Promotion Spotlight •Press Release Support •Mini Case Study •Marketplace Featured Apps and Category Promotion **•Learning Media Webcast **•Industry Blog Post **•Test Drive Sponsorship **•Microsoft Executive PR Endorsement **Only applicable to Azure MarketplaceGTM RESOURCE DESK SUPPORT****************** Requires MPN Silver or Gold Competency ** Requires MPN Gold Competency and/or Co-Sell Ready OCP Catalog ListingMarketplace GTM BenefitsWhite-glove AAD Integration and Onboarding: Support with Azure Active Directory integrationOCP Catalog Listing: Listing showcasing your solution to Microsoft sellers and marketersMarketplace Listing Optimization: Personalized support for improving your solution listingMarketplace Blog with Newsletter and Social Amplification: Feature in a marketplace blog post with additional promotion Marketplace Performance Insights: Dashboard showcasing visitor activity for your marketplace listingSocial Promotion Spotlight: Post on Microsoft Twitter outlet highlighting your solutionMarketplace Press Release Support: Approval of partner-drafted press release and Microsoft representative quoteMini Case Study:Single-slide about your solution and how it benefits from development on the Microsoft platform Marketplace Featured Apps and Category Promotion*: Promotion in featured spots in Azure Marketplace or AppSource Learning Media Webcast*: Reach Microsoft sellers via a live recorded webcast featuring your speakersIndustry Blog Post*: Guest post on Microsoft product and industry blog propertiesTest Drive Sponsorship*: Featured promotion, higher search positioning, and improved sales conversion ratesMicrosoft Executive PR Endorsement*: Executive endorsement for your new marketplace listing* Requires MPN Gold Competency and Co-Sell Ready Listing in OCP Catalog6 in 60 minutes -mid OctoberAdvice and Training Smart Partner Marketing aka.ms/smartmarketing Content and Resources Partner Marketing Center aka.ms/pmc NZ Partner Hub /en-nz/community/partner-hub/Services GTM Services Social Syndication aka.ms/get.social Contact me ************************Email GTM Resource Desk with questions *****************Access resources to get started。

white paper写法

white paper写法

white paper写法全文共四篇示例,供读者参考第一篇示例:白皮书(White Paper)是用来阐释某一特定问题,提供解决方案或者表达某种观点的一种文体。

白皮书可以用于政府部门、企业组织以及行业协会等不同领域,通常用来传达专业知识,引导公众理解,解决问题和建议政策。

白皮书的写作一般包括以下几个要素:问题描述、提出解决方案、分析论证以及结论和建议等。

下面我们来详细介绍一下白皮书的写作要点。

白皮书的写作应该从一个清晰而具体的问题开始,为读者提供一个明确的背景,使他们对所阐述的问题有一个清晰的认识。

在问题描述的部分,作者可以使用数据、案例或者研究来印证该问题的存在性,并突出其重要性和紧迫性。

接着,提出解决方案是白皮书的重点内容。

作者需要对问题进行深入分析,提出可行的解决方案,并详细说明其原理和实施方法。

在这一部分,作者需要强调解决方案的可行性和有效性,突出这个解决方案相对于其他方案的优势。

在对解决方案的提出之后,作者还需要进行分析和论证,以充分证明所提出的解决方案的可行性和有效性。

作者可以引用专家观点、研究成果、数据统计等来支持自己的观点,使得白皮书更加具有说服力和权威性。

作者需要总结结论并提出建议。

在作者可以对所提出的解决方案进行总结,并强调其重要性和实施意义;在建议部分,作者可以提出具体的实施计划、政策建议或者行动措施,以便读者能够进一步参与和落实解决方案。

在写作过程中,作者还需要注意以下几点:白皮书要求作者具有较强的专业知识和研究分析能力,因此需要认真准备和深入研究所述问题。

白皮书的写作需要简洁明了,尽量避免使用复杂的术语和难懂的句子,使得读者能够轻松理解内容。

白皮书的结构要清晰,逻辑性强,便于读者阅读和理解。

通过以上介绍,相信大家对于白皮书的写作要点有了更清晰的认识。

在写作过程中,需要认真准备,深入分析问题,提出解决方案并进行充分论证,并最终总结结论和提出建议。

希望以上内容对大家写作白皮书有所帮助。

防腐蚀材料选择白皮书说明书

防腐蚀材料选择白皮书说明书

White PaperAlloy selectionProbably the most significant trend in the instrumentation products world today is the design of increasinglycorrosion-resistant systems. Led by oil and gas companies, instrumentation and piping engineers are now focusing far more attention on the materials used to fabricate valves, manifolds and tubing systems. In the offshore project world, for example, Parker Hannifin is currently seeing exponential growth in the use of 6Mo in preference to traditional 316 stainless steel. So, why are so many choosing that particular material?How do you select the best and most cost-effective alloy for the job - something that’s going to resist corrosion for a design life of say 20 or more years? In the past, for harsh applications such as offshore oil and gas fields, the answer always seemed to be ‘316’ - because it was a “stainless” steel and appeared to provide the most cost-efficient answer. But corrosion remains unchecked and continues to wreak havoc on infrastructure, posing both an economic threat and a human safety risk. The problem is becoming even more pressing, because most operators now want to extend the life expectancy of offshore infrastructureand are operating in ever more remote and harsh environments.Evaluating material performance does not come easily to most instrumentation and pipingengineers: it’s a complex branch of science, and even if they were lucky enough to have a materials science component as one of their courses, it was probably very generalised covering a broad range of materials, such as ceramics and polymers, as well as metals. In addition, the metallurgical portion addressed a wide range of metals that would not have application in oil and gas. What would be beneficial would be a solidbasis of metallurgical principles that target both upstream and downstream use.Not so long ago, corrosion resistance would be tested and scored using qualitative terms, such as ‘resistant’, ‘somewhat resistant’, and ‘not resistant’. ‘Somewhat resistant’ may sound like a reasonable choice for an application, but this loose descriptive category can encompass a range of damage that many engineers would probably not be comfortable with when specifying a material for continued exposure on a platformwith, say, a 30 year lifecycle.Measurement of relative corrosion resistancePitting and crevice corrosion are a major cause of corrosion failure of series 300 stainless steels in aqueous chloride environments such as offshore oil and gas platforms. Once a pit or crevice corrosion site is initiated it will continueto propagate rapidly, leading to failure of the component.PREN, CPT and CCT stand for Pitting Resistance Equivalent Number, Critical Pitting Temperature,and Critical Crevice Corrosion Temperature. Understanding these acronyms takes you a long way towards choosing the best material for the job.CPT is the temperature at whichthe onset of pitting occurs, and CCT is the temperature of the onset of crevice corrosion. The quantitative measurement of pitting and crevice corrosion resistance is performedby the ASTM G150 test (in lieu ofthe ASTM G48). These standard tests are useful for determiningthe relative corrosion resistanceof corrosion resistant alloys (CRA)in environments similar to the test environment.PREN is an empirically developed guideline that indicates the relative corrosion resistance of CRA (corrosion resistant alloys) materials, based upon the percentages ofthe key elemental components of chromium, molybdenum, tungsten and nitrogen. The PREN formula is:PREN = %chromium +3.3(%molybdenum + 0.5% W) +16(%N)CPT and CCT numbers provide uswith a quantitative measurementof the likelihood of pitting andcrevice corrosion resistance. Whencombined with the PREN, (which isqualitative in nature) as in the Table,they can provide a simple approachto predicting a material’s suitabilityfor a specific application. When CPTand CCT measurements for a specificlot of material are not available,the PREN can act as indicative ofthe performance in the corrosiveenvironment when compared toother materials composed of theseelements. Though not a componentof the PREN number, nickel isimportant for determining thephase balance of the material whichcan have a significant effect on thecorrosion resistance of the material.These measured values, coupledwith knowledge of the mechanismsof corrosion (which is beyond thescope of this short article), can helppredict a material’s useful servicelife in harsh applications andenvironments, in order to guide theselection of the most cost-effectivealloys. The table shows us why 316is not always the best choice: it canbe subject to pitting and crevicecorrosion at ambient temperatures.Crevice corrosion is the most difficultto prevent, both because of thelower temperature for the onset ofthis corrosion mechanism and thedifficulty in minimizing crevicesin the design and installation ofequipment.If you factor relative material costsinto this table, it becomes obviouswhy we’re seeing the growth inthe use of 6Mo. It should also benoted that there is no “silver bullet”wherein there is one material thatcan economically perform well inevery application. 6Mo, though thematerial of choice for many offshoreapplications, isn’t a ‘blanket solution’for all offshore applications. In somecases, the temperature is too highor the H2S content (which causesanother type of corrosion failure) istoo great to resist the environment.Table 1. Comparing alloys using PREN, CPTand CCT.Parker Hannifin ManufacturingInstrumentation Products Division EuropeRiverside Road BarnstapleUnited Kingdomphone 0044 1271 /ipd© 2017 Parker Hannifin CorporationOf course, the numbers don’t tell us everything we need to know about a material, but they do provide a helpful initial guide before other properties such as allowable yield and tensile strength are factored into the selection process.The Parker Hannifin Corporation is involved in many large project applications, and it’s common for a material to be pre-selected in the specification document. We’ve learned in recent years that it’s worth exploring that decision in depth before generating the quote - to ensure it’s been thoroughly analysed for all the environmental and process environments across the project, such as methanol and chemical injection, H2S and chloride compositions, and so on. Although metallurgical know-how is becoming quite common on the project teams run by operators and their EPC (Engineering, Procurement and Construction) contractors, it’s just as important that this expertise is integral on the supplier side as well. Once the alloy selection is finalised, the next step is to ensure optimal processing of the material tomaximise the chemical resistance and minimise undesirable inclusions and post processing variations, such as improper heat treating and/or annealing.An in-depth understanding ofmaterials throughout the production, purchasing and subsequent processing/machining phasesinvolved in creating instrumentation products is absolutely critical. For instance, not all T-316 is equal to other heats of T-316 stainless steel. The more expensive alloying elements are minimised or “leaned out” to yield maximum profit by the mill. The allowable range of molybdenum, for example, is 2-3%, yet the difference in corrosionresistance of 2.5% molybdenum content versus 2% is dramatic Also, poorly processed T-316stainless steel when viewed under a microscope (Figure 1), can contain an undesirable number of inclusions and impurities in the material,which can become initiation sites for corrosion.A major element of the background of Parker Hannifin is materials expertise, derived in great part from its heavy involvement in the aerospace and semiconductor industries. That experience also incorporates all aspects of the supply chain. Virtually all Parker’s materials are purchased from mills and foundries in Western Europe, which operate to the highest possible quality standards. These, in turn, are monitored by Parker’s technical team, who also subject thosematerials to a range of tests, ensuring that the material meets or exceeds the desired specification. A greatexample of this would be Parker’s NORSOK approved 6Mo material to meet the M-650 standard.Combine this attention to detail with design features on instrumentation products which are also important to avoid corrosion - for example the way that fittings grip the tube without opening up an avenue for corrosion - and good installation practice, you have a solid foundation for building instrumentation systems with genuine longevity.In summary and in a morelighthearted vein, Parker Hannifin is exorcising the very concept of ‘exotic materials’ as much as possible from its vocabulary. In industry, the word, exotic means rare and hard to get. At Parker Hannifin, these corrosion resistant alloy solutions are readily available and already installed to a huge array of mega projects aroundthe world.Figure 1. Low quality 316 Austenitic stainless steel with lots of inclusions and detrimental phases: manganese sulphides (grey), delta-ferrite stringers (blue) and intermetallic sigma phase (orange). Source: Parker HannifinAnti-corrosion Code White Paper 01/17。

外语系英语专业一年级学生必读书目

外语系英语专业一年级学生必读书目

外语系英语专业一年级学生必读书目(一)外语教学与研究出版社1. 书虫系列· 牛津英汉双语读物曼斯菲尔德著出版日期:2004-02-272. 外研社·DK英汉对照百科读物出版日期:2002-08-153. 英语习语与英美文化(跨文化交际丛书) 平洪张国扬编出版日期:2000-01-014. 钱锺书英文文集 2005年9月出版 43.9元5. 西行漫记(英汉对照) 出版日期:2005-07-15 ¥68.006. 英语的变易出版日期:2005-07-08 26.97. 看!世界第1/2/3/4辑(英语精短时文译评)(《英语学习》系列丛书) 出版日期:2005-06-288. 解读美国第1, 2, 3级出版日期:2005-06-139.英语词汇轻松学习法10.林语堂英文作品选11. 中国文化要略出版日期:2005-03-1412. 词语的选择与效果蔡基刚出版日期:2005-03-0213.出外语学习策略与方法潘亚玲出版日期:2004-11-0414.要你永远记得……(英文版)面有着裴杰斯著出版日期:2004-10-1015. 爱的风景(情爱卷)(《英语学习》四十年精选本)(第二辑)心智的感动(哲思小品卷)(《英语学习》四十年精选本)(第二辑)《闪亮的句子》(锦句箴言卷)成长纪事》(春春记忆卷)《时尚款款行》(潮流风尚卷)《斑斓的叶子》(杂闻卷)《在一起多关照》(职场情态卷)16. 美语走天下:语言文化篇约翰斯顿著出版日期:2004-04-1217. 美国风俗101则 Harry Collis(美)编著出版日期:2004-03-16 文学类:1、The Scarlet Letter Nathaniel Howthorne 《红字》霍桑著胡允恒译人民文学出版社2、The Adventures of Huckleberry Finn Mark Twain 《哈克贝利?芬历险记》马克?吐温著许汝祉译译林出版社3、The Portrait of a Lady Henry James 《贵妇画像》亨利?詹姆斯著项星耀译外国文学出版社4.Moby Dick Herman Melville 《白鲸》麦尔维尔著成时译人民文学出版社5.Martin Eden Jack London 《马丁?伊登》杰克?伦敦著孙法理译译林出版社6.The Great Gatsby F.S. Fitzgerald 《了不起的盖茨比》菲茨杰拉德著姚乃强译人民文学出版社7.The Old Man and the Sea Ernest Hemingway 《老人与海》海明威著吴劳译上海译文出版社8.The Grapes of Wrath John Steinbeck 《愤怒的葡萄》斯坦贝克著9.The Sound and the Fury William Faulkner 《喧嚣与骚动》福克纳著李文俊译上海译文出版社10.Catch 22 Joseph Heller 《第二十二条军规》约瑟夫?海勒著扬下程爱民邹惠玲译译林出版社British Literature1.Hamlet William Shakespeare 《哈姆雷特》莎士比亚著朱生豪译人民文学出版社2.Robinson Crusoe Daniel Defoe 《鲁宾逊漂流记》丹尼尔?笛福著徐霞村译人民文学出版社3.Gulliver’s Travels Jonathan Swift 《格列佛游记》斯威夫特著杨昊成译译林出版社4.Pride and Prejudice Jane Austen 《傲慢与偏见》简?奥斯汀著孙致理译译林出版社5.A Tale of Two Cities Charles Dickens 《双城记》查尔斯?狄更斯著张玲张扬译上海译文出版社6.Vanity Fair William Makepeace Thackeray 《名利场》萨克雷著杨宓译人民文学出版社7.Jane Eyre Charlotte Bronte 《简爱》夏洛蒂?勃朗特著吴钧燮译人民文学出版社8.Wuthering Heights Emily Bronte 《呼啸山庄》艾米莉?勃朗特著方平译上海译文出版社9.Tess of the D’urbervilles Thomas Hardy 《德伯家的苔丝》托马斯?哈代著张谷若译人民文学出版社10、The Heart of Darkness Joseph Conrad 《黑暗的心》约瑟夫?康拉德著黄雨石译浙江文艺出版社翻译类:1 汉英词语翻译探微杨全红汉语大词典出版社 12.002 英汉汉英段落翻译与实践蔡基刚复旦大学出版社 15.003 中级英语笔译模拟试题精解齐乃政中国对外翻译出版公司 22.004 汉译英口译教程吴冰外语教学与研究出版社 19.905 实用英汉翻译教程申雨平戴宁外语教学与研究出版社 13.906 英美文化与英汉翻译汪福祥伏力外文出版社 11.007 汉译英实用技能训练孙海晨外文出版社 16.808 高级翻译评析王大伟孙艳上海交通大学出版社 14.509 同声口译金话筒侯国金大连理工大学出版社 12.0010 英汉口译实用教程宋天锡国防工业出版社 26.0011 英汉翻译技巧示例毛荣贵范武邱上海交通大学出版社 16.5012 实用英语口译(英汉)新编崔永禄等南开大学出版社 10.0013 汉英时文翻译贾文波中国对外翻译出版公司 11.0014 现代汉英翻译技巧王大伟世界图书出版公司 21.6015 汉英语篇翻译强化训练居祖纯清华大学出版社 14.0016 英语口译教程吴守谦哈尔滨工程大学出版社 17.0017 按实例学英语刘慎军等北京工业大学出版社 11.0018 汉英口译入门李长栓外语教学与研究出版社 17.9019 中国时尚热点新词速译朱诗向对外经济贸易大学出版社 20.0020 英汉翻译综合教程王宏印辽宁师范大学出版社 19.0021 实用科技英语翻译讲评范武邱外文出版社 13.0022 实用口译手册钟述孔中国对外翻译出版公司 12.0023 英汉翻译基础古今明上海外语教育出版社 16.5024 教你如何掌握汉译英技巧陈文伯世界知识出版社 17.0025 英汉翻译手册惆西董乐山等商务印书馆国际有限公司 18.0026 英汉同声传译张维为中国对外翻译出版公司 12.0027 高级口译教程梅德明上海外语教育出版社 26.3028 高级翻译教程孙万彪王恩铭上海外语教育出版社 21.0029 常用英语习语翻译与应用李军韩晓玲青岛海洋大学出版社 32.0030 研究生英语翻译陶友兰查国生复旦大学出版社 28.0031 高级汉英/英汉口译教程(上下册)王桂珍华南理工大学出版社 50.0032 实用英语口译教程冯建忠译林出版社 39.5033 (名字忘了,我复印的)庄绎传不祥不祥34 英汉口译实练冯建忠译林出版社 37.0035 英汉翻译练习集(绝版)庄绎传中国对外翻译出版公司 0.8036 汉英政治经济词汇内部资料37最新汉英外交政治词汇内部资料38英汉翻译教程(自考教材)庄绎传外语教学与研究出版 17.9039口译与听力(自考教材)杨俊峰辽宁大学出版社 13.0040英汉互译实践与技巧许建平清华大学出版社 20.00基础英语类:1 英语短文阅读菁华张宜马鸿大连理工大学出版社 18.002 英汉介词/副词搭配词典钱建立刘立群大连理工大学出版社 26.003 现代英语佳作赏析(共四册)不同的作者西安交通大学出版社 45.004 中式英语之鉴 JOAN PINKHAM 外语教学与研究出版社 22.905 实用英语表达技巧方亚中武汉大学出版社 17.006 全球热点话题英语选读木村哲也外文出版社 14.007 实用分类英语惯用法刘学明湖南教育出版社 15.208 英语听说诵读实用文选365篇周淑杰天津大学出版社 20.00翻译词典类:1 新汉英分类口译词典世界图书出版公司 28.002 外事工作人员英语常用分类词汇 (绝版)北京出版社 1.103 汉英外事工作常用词汇外文出版社 48.004 汉英分类翻译词典大连理工大学出版社 58.00。

纸翻译

纸翻译

纸:单铜纸:C1S art paper or C1S art board双灰板:Grey board铜版纸:Coated Art Paper(or Board)/glossy coated paper/SBS(Solid Bleached Sulphate): C1S(coated one side单铜纸)和C2S(coated two sides双铜纸)。

根据表面涂布效果分为Matte(哑光纸)和Glossy(光面纸)。

啞粉紙: Matt Artpaper双胶纸:woodfree paper包装纸:Tissue双白纸:CCWB:clay coated white back灰底白板纸:Greyback board(GB)可移性貼紙:removeable sticker銀銻咭紙:金/銀:Foil paper:gold / silver單坑(B-坑/E坑):Single Corrugated雙坑:Double Corrugated灰底白板纸板:CCNB(Clay Coated News Back)牛底白板纸板:CCKB(Clay Coated Kraft Back)白底灰芯纸板:CCWB(Clay Coated W te Back)平板瓦楞紙:corrugated board西卡紙:Bristol board再生牛卡(testliner)原生牛卡(virgin kraft liner board)涂布的白面牛卡(coated white-top KLB)废纸挂面纸板Testliner涂布的白面牛卡(coated white-top KLB)纯牛卡:Kraft liner(KL)仿牛卡/挂面仿牛卡:Test liner(TL)面纸:outer liner芯纸:inside liner瓦楞芯纸:Medium表面蜡质瓦楞纸箱:WCC(Waxed Corrugated Containers)楞型:flute type表面处理:coating/ surface fishingUV油:UV Varnishing局部UV油:Spot UV Varnishing光膠:Opp Lamination啞膠:Matt Lamination吸塑油:Blister Varnish光油:Gloss Varnish磨光:Calendaring Varnish啞油:Matt Varnish局部印油:Spot Varnish环保磨光:ENV calendering环保吸塑:ENV heat-seal烫金:foil stamping结构:structure彩盒:color box贴纸:sticker:removable stiker 可移动性贴纸说明书:brochure/leaflet贴体包装:skin packaging天地盒:top and base or box with top and bottom lid翻盖盒: lid hinged base with extend flap精品盒: case box or plush box軋型:die-cut平版印刷:offset printing制版:make-up书刊印刷bookand periodical printing套印不准out of register透印print through印刷printing染纸:dyed paper印刷材料printing material印刷技术printing technique印刷品printed matter印刷压力printingpressure印刷油墨printig ink原稿original制版plate making包衬cylinder-packingglossy film 亮光膜matte film 亚光膜覆光膜是glossy lamination覆亚膜是matte lamination压敏纸pressure-sensitive paper沥青牛皮纸asphalt kraft paper石蜡纸paraffin paper聚乙烯涂覆纸polyethylene coated paper不规则聚丙烯防潮牛皮纸atactic polypropylene coated moisture proof kraft paper 玻璃纸cellophane (regenerated cellulose film)聚乙烯加工玻璃纸polyethylene extrusion-coated cellophane氯乙烯加工纸vinylidene chloride treated paper印刷用胶粘纸pressure sensitive adhesive papers for printing纸绳paper string纸胶带(包装用)gummed paper tapes(for packaging)牛皮纸袋kraft paper sacks包装水泥用牛皮纸袋sewn kraft paper sacks for cement可延伸牛皮纸袋extensible kraft paper sacks铝箔防水包装纸aluminium foil laminated package paper光纤维加固的牛皮纸袋fiber reinforced kraft paper sacks布袋woven bag黄麻袋jute bag牛皮纸衬垫、合成树脂布袋kraft lined, synthetic resin woven bag 甘薯淀粉包装用牛皮纸袋kraft paper sacks for sweet potato starch 马铃薯淀粉包装用牛皮纸袋kraft paper sacks for potato starch挥发性防腐纸volatile corrosion inhibitor纸幅面尺寸trimmed size of paper砂纸abrasive paper砂纸原纸abrasive base paper吸收性纸absorbent paper吸水纸,吸收性纸absorbing paper帐簿纸account book paper计算机用纸accounting machine paper无酸纸acid free paper耐酸纸acid proof paper,acid resistant paper隔音纸acoustic paper溴化银印相纸actinometer paper吸湿纸active paper计算机用纸adding machine paper地址标签纸address label paper胶粘纸adhesive paper广告纸,招贴纸advertising paper仿大理石纸agate paper仿玛瑙大理石纹纸agate marble paper耐老化纸age resistant paper航空信纸air paper名片纸alabaster paper相簿纸alabaster paper蛋白胶纸albumenized paper蛋白胶纸albumin paper地图纸aligning paper耐碱纸alkali-proof paper全棉纤维纸all rag paper全木浆纸all wood paper仿鳄皮纸allogator imitation paper西班牙草浆印刷纸alpha printing paper铝纸aluminum paper铝衬纸aluminum casting paper铝涂布纸aluminum coated paper铝粉纸aluminum dusted paper铝箔衬纸aluminum foil backing paper铝箔夹层纸aluminum laminated paper琥珀条纹纸amber laid paper弹药筒纸ammunition paper频率感应记录纸amplitude response recording paper 分析化学用滤纸analytical filter paper斜面纸angle paper斜截面纸angle-cut paper斜角纸angular paper动物胶表面施胶纸animal tub-sized paper耐酸纸anti-acid paper耐酸马尼拉纸anti-acid manila paper防蚀纸anti-corrosion paper防伪造纸anti-falsification paper防霉纸anti-fungicide paper防锈纸anti-rust paper防锈原纸anti-rust base paper防锈纸anti-tarnish paper低光泽纸,仿古纸antique paper仿古书籍纸antique book paper杀菌纸antiseptic paper保光泽纸antitarnish paper水彩图画纸aquare(le) paper档案纸archival paper绝缘纸armature paper香料纸aromatic paper含砷纸arsenical paper美术纸art paper美术装饰纸art cover paper水彩画纸art drawing paper美术广告纸,美工宣传纸art poster paper牙科用纸articulating paper牙科用纸articulating paper人造革纸artificial leather paper仿羊皮纸artificial parchment paper石棉纸asbestos paper石棉(电)绝缘纸asbestos (electrical)insulating paper 消毒纸,防腐纸aseptic paper无灰纸ashless paper无灰滤纸ashless filter paper防潮纸,沥青纸asphalt paper沥青原纸asphalt base paper防喘纸asthma paper地图纸altas paper彩色印刷纸autochion printing paper压感复写纸autocopy paper纪念册纸autograph paper自动(划线)记录纸autographic register paper 复印纸autographic transfer paper汽车袋用纸automobile-bag paper复制纸,影印纸autotype paper食品包装纸avenized paper蓝条纹书写纸azure laid(writing) paper书籍衬里纸back-lining paper裱糊纸backing paper腊肉包装纸bacon paper(纸)袋纸bag paper蔗渣浆纸bagasse paper浸渍绝缘纸bakelite paper浸渍绝缘纸bakelized paper面包纸bakers paper层合平衡纸balance sheet paper单面沥青包装纸baling paper气球用纸balloon paper鲍尔斯唐纸balston's paper竹浆纸bamboo paper绷带纸bandage paper高级书写纸bank paper钞票纸banknote paper餐桌纸banquet table cover paper理发头枕纸barber's headrest paper抗渗透纸barrier paper钡地纸baryta paper原纸base paper(弹筒)装药用纸basewad paper韧皮纸bast paper高级信纸bath paper涂蜡装饰纸batlk paper蓄电池用纸battery paper涂蜡装饰纸battik paper曲折纸板beaming paper床包装纸bedsted-wrapping paper啤酒过滤纸beer-filter paper夹层纸between-lay paper字典纸bible paper吸水性纸张bibulous paper帐目纸bill paper光泽广告纸billboard paper自动记录纸billing machine paper装订用纸binder's paper生物纸biochargeable paper饼干包装纸biscuit paper饼干包装纸biscuit cap paper蜡笔画纸bistered paper防潮纸,沥青纸bituminized paper相册黑色衬纸black album paper防潮纸waterproof paper防空纸blackout paper刮刀涂布纸blade coated paper空白书籍纸blank book paper毛毯袋用纸blanket bag paper空白书籍纸blanking paper弹药用纸,矿工用纸blasting paper耐漂纸blach resistant paper鲜肉包装纸blood proof paper吸墨纸blotting paper兰色洋蜡包装纸blue candle wrapping paper 蓝印纸blueing paper晒图纸blueprint paper兰色描图纸bluetracing paper扉页纸board paper单面光扉页纸boardglazed paper纱管纸,盘纸bobbin paper原纸body paper涂布原纸bodystock paper仿制纸bogus paper证券纸,高级书写纸bond paper书籍纸book paper帐簿纸booking paper瓶签纸bottle labelling paper压光辊用纸bowl paper纸盒糊面纸boxcover paper箱装书写纸boxed writings paper盲文印刷纸braille(printing) paper面包袋纸bread bag paper面包标签纸bread label paper光泽纸bristel paper锦纹纸,压印花纸brocade paper小册子用印刷纸brochure paper破损纸张broken paper溴素纸,照相放大纸bromide paper金色皱纹纸bronze crepe paper金色纸bronze paper棕色晒图纸brown print paper刷辊涂布纸brush(coated) paper植物幼苗防风纸brushing kraft paper 泡沫涂布纸bubble coated paper浅黄的复写纸buff copying paper (制革用)磨光纸buff(ing) paper暗色绘图纸buff drawing paper建筑用纸building paper松厚书籍纸bulking(book) paper松厚纸bulky paper染色加工纸bunt paper布纹纸burlap lined paper高光泽纸burnished paper染色加工纸,过干纸burnt paper包肉纸butcher's paper黄油包装纸butter paper(电力)电缆纸cable paper含毛壁纸caffoy paper糕点包装纸cake wrapping paper日历纸calenday paper压光辊用纸calender bowl paper压光处理的纸张calendered paper仿革纸calf paper布纹纸calico paper布纹纸cambric paper圣经纸combridge bible paper宝石花纹涂布纸cameo paper蜡烛包装纸candle paper糖果袋纸candy bag paper布纹书写纸canvas note paper有光纸cap paper电容器纸capacitor(tissue) paper植物防护纸capping paper货车包覆纸carlining paper砂糖包装纸caramel paper石碳酸纸carbolic paper复写纸carbon paper复写纸原纸carbon body paper复写纸原纸carbon raw paper复写纸原纸carbonizing paper压感复写纸carbonless (copy) paper 打光用纸,研磨纸carborundum paper 卡片纸card paper极图记录纸cardiographic paper地毯纸carpet lining paper车箱顶棚用纸板carriage pahel paper地图纸,图表纸,记录纸carte paper极图记录纸,心电图记录纸cartographic paper 纸盒衬纸carton liner paper弹壳纸,弹药用纸cartridge paper纸箱标签纸case labels paper运输包装纸case lining paper现金收支记录带纸cash control tape paper (现金收支)票据纸register paper运输包装纸casing paper帆布箱衬里用纸casket paper高光泽印刷纸,涂布美术纸cast coated paper (塑料薄膜用)浇铸纸casting paper目录纸catalog (ue) paper封面纸,绘图纸catridge paper松油纸cedarized paper芹菜培育纸celery bleaching paper赛璐珞原纸celluloid paper水泥袋纸cement bag paper陶瓷贴花纸ceramic transfer paper谷物箱衬纸cereal box liners paper白垩涂布纸chalk transfer paper办公纸chancery paper炭画书籍纸charcoal book paper木炭画纸charcoal(drawing) paper图表纸chart paper支票用纸check paper化学浆制成的纸张chemical paper支票纸,防伪纸cheque paper手工竹纸china paper模造纸chintz paper。

Hyperion System 9 安全与用户管理白皮书说明书

Hyperion System 9 安全与用户管理白皮书说明书

A Hyperion White PaperIntroduction to Hyperion System 9Security and User ManagementA key design objective for Hyperion System 9was to make the software easy to use,not only for business users,but for administrators as well.Part of this effort was building a common security layer spanning all modules of Hyperion System 9,accessed through a single interface—the Hyperion System 9Shared Services ™User Management Console ™.To deliver this significant,innovative functionality,a completely new user interface was constructed,and substantial work was also completed on the back end.Authentication Authentication is the process by which Hyperion System 9attempts to confirm that a user is,or is not,who they claim to be.Many organizations already have a centralized authentication directory system in place,typically using technologies such as LDAP ,NTLM ,or MSAD .These directories are a centralized repository of user information,containing data such as user-names,passwords,groups,and access rights.Hyperion System 9has the ability to leverage these repositories to perform an external authentication.The term external authentication means that the user’s login information needed by Hyperion System 9is stored in these third-party directories.These directories are stored outside of Hyperion System 9,yet it is unnec-essary to import the user information into Hyperion System 9.If such a directory has not been set up within an organization,the native Hyperion System 9Shared Services,OpenLDAP directory (an Open Source version of LDAP),can be used to create and store user,group,and role information.During installation and setup,Hyperion System 9Shared Services is config-ured by a Shared Services administrator to gain access to these directories.When a user supplies their credentials (username and password) at login,Hyperion System 9accesses the user information stored in the externaldirectory to authenticate the user in real time.For administrators,having the ability to leverage their organization’sexisting security repository and managing all Hyperion System 9usersfrom one interfacesignificantly lowers their administrative burden.This white paper provides an overview of the Hyperion ®System ™9security model.It also explains,in general terms,how Hyperion System 9manages users.Authorization Authorization is the process of finding out if a valid Hyperion System 9user is permitted to access the resource they are requesting.Examples of such a resource might be a report,a folder,or a data-base.If authentication is analogous to gaining access to an office tower,authorization is analogous to gaining access to a particular office once inside the tower.When setting up Hyperion System 9for user access,a Shared Servicesadministrator must define Projects .A Project is a folder that storesone or more Hyperion System 9applications.For example,a Projectmay contain a Hyperion Planning ™application and several HyperionEssbase ®applications.An application may belong to only oneProject,and must be assigned to that Project before users can beprovisioned.Once assigned,Hyperion System 9is ready to provisionusers and groups to the application.Webster's dictionary defines the word “provision”as the act orprocess of providing;as well as the state of being prepared before-mon User Provisioning is the process of preparingHyperion System 9to provide access to users of the system,grantingroles and access control.Based on roles assigned,users are allowedto perform specific tasks,and access only the content and reports 2For business users,having a single user ID andpassword that will grant access to any or all ofthe applications within Hyperion System 9 is awelcome simplification.Single sign-on (SSO)allows a user access to multiple Hyperion System9applications after logging in only once.For singlesign-on across all of your organization’s applications,an Identity Management tool,such as NetegritySiteminder,is required.relevant to them,across Hyperion System 9applications. Provisioning is managed through the User Management Console,and is defined at the user or group level,that is, a Provisioning Manager selects users or groups and then assigns roles based on the specific application to be accessed.A group is a set of users that have the same security profile.A Group may also contain other groups.3Role Based Access ControlEach Hyperion System 9application has specific roles that may be assigned to either a business user or an administrator.A role defines the scope of activities a user can perform within Hyperion System 9.Administrative RolesThere are four global roles within Shared Services: Administrator,Directory Manager,LCM (Life Cycle Management) Manager,and Project Manager.In this way, administration tasks are spread across a number of administrators—without each having to be assigned the omnipotent Administrator role.Hyperion System 9is initially configured with one Shared Services Administrator.This is the most powerful role in the user management system and provides control over all installed Hyperion System 9applications.Administrators can perform all administrative tasks inside the UserThe are six main steps to setting up security in Hyperion System 9.Management Console,including provisioning themselves. If required,the Administrator has the ability to assign this role to other users.The administrator delegates security responsibilities to others by assigning them other,more restrictive Hyperion System 9administrative roles.For example,Directory Managers have the ability to create, modify,enable/disable,and delete users and groups within a directory.A “hard”delete is only available when a user in defined in the Hyperion System 9native directory.4The Hyperion System 9 User Management Console allows you to delegate administrative tasks across different administrative users.In addition,there are three other application-specific Shared Services roles:Provisioning Manager,Create Integrations,and Run Integrations.The Provisioning Manager may provision or de-provision both users and groups within applications.Provisioning Managersmay not provision themselves,since their function is administrative only.The Shared Services role allows you to move data between applications in what are called data integrations.The Integration role allows the user to perform actions on these integrations.The Create Integrations role can create and then manage the data integrations.The Run Integrations role can view,schedule,and run existing integrations.Finally,Shared Services provides reporting that will allow an administrator a global view of all user role assignments across all Hyperion System applications,whether these assignments are direct or inherited.Business User rolesHyperion System 9roles make it easy for the application administrator to set up security without having to involve corporate IT resources.This is accomplished through the Hyperion System 9 Shared Services User Management Console.Application-specific screens within this Console enable administrators to perform application-specific provisioning tasks.For example,the Provisioning Manager can set up users for access to dimensions within Hyperion Planning,specify the level of access,and determine which members and descendants to include.The Planning application is packaged with four predefined user roles:Administrator,Planner,Interactive User,andView User.These are listed with check boxes in the User Management Console,which makes them straightforwardto manage.The application Administrator,for example, performs all administrative tasks,such as creating appli-cations and maintaining the metadata,managing security, initiating the budgeting process,creating and maintaining forms,etc.Planning allows for more than one administrator per application,which facilitates the delegation of main-tenance across large applications.Custom roles can be defined by combining two or more roles.5Predefined user roles make setting up application specific security as simple as point and click.BI security extensionsHyperion System9 BI+™Essbase Analytics™and Hyperion System 9BI+ Enterprise Analytics™are multidimensional database management technologies.Access is grantedat both the server level and the individual application/ database level.Filter access allows security to be set on a database down to the most granular (cell) level.For Essbase Analytics and Enterprise Analytics,filter access can be granted to selected users and groups directly from the User Management Console.The filters themselves,however,must be defined within the application interface.This is one of the few exceptions in Hyperion System 9where the definition of security is only available within the application.All Hyperion System 9reporting tools—Hyperion System 9 BI+ Web Analysis™,Hyperion System 9BI+ Financial Reporting™,Hyperion System 9Smart View for Office™, and Hyperion Visual Explorer™,as well as any custom or packaged applications that access data from an Essbase Analytics or Enterprise Analytic s application—respect the security accesses imposed by the database.For relational query and reporting,row and column level security can be enforced.This ensures that the data reflected in the generated result set adheres to this data-level security.6Hyperion System 9 BI+ provides a broad range of relational and multidimensional reporting and analysis capabilities.The User Management console contains sophisticated BI extensions that ensure your data is secure.API and utilitiesHyperion System 9has a fully published API that willallow for the programmatic assignment of user roles andaccess rights.This capability can significantly reduce themanual steps needed to give users access to resources,especially when there is a very large user base (tens ofthousands of users),or when the corporate directory ishoused within a custom data source.In addition,abulk-load utility is provided to streamline the batchprovisioning of large sets of users.Conclusion A key design objective for Hyperion System 9was to make the software easy to use.The implementation of an over-arching Hyperion System 9security model is an important component in meeting this objective.Business users are issued a single user id and password that will grant them access to any or all of the applications they need within Hyperion System 9.Administrators are able to leverage their organization’s existing security repository,and manage all Hyperion System 9users from one interface.Copyright 2006 Hyperion Solutions Corporation.All rig hts reserved.“Hyperion,”the Hyperion log o and Hyperion’s product names are trademarks of Hyperion.References to other companies and their products use trademarks owned by the respective companies and are for reference purpose only.No portion hereof may be reproduced or transmitted in any form or by any means,electronic or mechanical,including photocopying ,recording ,or information storage and retrieval systems,for any purpose other than the recipient’s personal use,without the express written permission of Hyperion.The information contained herein is subject to chang e without notice.Hyperion shall not be liable for errors contained herein or consequential damag es in connection with furnishing ,performance,or use hereof.Any Hyperion software described herein is licensed exclusively subject to the conditions set forth in the Hyperion license agreement.6368_0906Hyperion Solutions Corporation Worldwide Headquarters5450 Great America Parkway,Santa Clara,CA 95054voice 1.408.588.8000 /fax 1.408.588.8500 /product information voice 1.800.286.8000 (U.S.only)consulting services e-mail *************************************/voice 1.203.703.3000education services e-mail **********************/voice 1.203.703.3535worldwide support e-mail ******************************Please contact us at /contactus for more information.。

思科 Catalyst 9800 无线控制器 N+1 高可用性白皮书说明书

思科 Catalyst 9800 无线控制器 N+1 高可用性白皮书说明书

High Availability White PaperTable of ContentsIntroduction (3)N+1 High Availability Overview (3)Components Used (4)Difference Between SSO (Stateful Switchover) and N+1 High availability (4)Moving APs between controllers and preserving tags (5)N+1 High Availability Configuration using WebUI (5)Configuration on AP Join Profile (6)CAPWAP Timers (6)Configuration on Access Points (7)N+1 High availability workflow using Cisco DNA Center (8)Image Upgrade with N+1 deployment (8)Licensing (8)IntroductionThis guide provides information on the theory of operation and configuration for the Cisco Catalyst 9800 Wireless Controller as it pertains to N+1 mode of High Availability allowing a single WLC to be used as a backup controller for ‘N’ primary controllers. This solution allows for High availability to be configured for controllers that are geographically on separate L3 network or across the WAN link.N+1 High Availability Overview•The N+1 High Availability architecture provides redundancy for controllers across geographically apart data centers with low cost of deployment.• A single backup controller can be used in order to provide backup for multiple primary WLCs, considering appropriate compatibility in terms of AP mode.•These WLCs are independent of each other and do not share configuration or IP addresses on any of their interfaces. Each of the WLCs needs to be managedseparately and can run a different hardware and a different software version. Notethat if the software version is different between the Primary and secondarycontrollers, the AP will download the software upon joining the secondary controller and result in higher failover time will.•These WLCs can be deployed in different datacenters across the WAN link.•N+1 HA is not stateful, meaning that no state information about APs and clients is shared between controllers and thus the AP’s CAPWAP state machine will berestarted when the primary controller fails.•When a primary WLC resumes operation, the APs fall back from the backup WLC to the primary WLC automatically if the AP fallback option is enabled.•APs with high priority on the Primary always connect first to the Backup controller even if they have to push out low priority APs.•The N+1 HA can be configured in combination with AP SSO where the Primary and/or secondary controllers are their own SSO pair.•It is recommended to have the same configuration in terms of WLANs, profiles, mobility group, policy, RF and site tags as well as AP-to-tag mappings on theprimary, secondary and tertiary controllers to avoid AP flaps and service disruptions when failing over.Components UsedThe information in this document is based on these software and hardware versions: •Catalyst Wireless Controllers 9800-L, 9800-40, 9800-80, 9800-CL, Embedded wireless controller on switch and Embedded Wireless Controller(EWC) on AP9100s. •802.11ax, Wave 2 and Wave 1 802.11ac Access points.•IOS XE Release 16.10 and higher.Difference Between SSO (Stateful Switchover) and N+1 HighavailabilityMoving APs between controllers and preserving tagsThe following should be considered when moving APs between two C9800 wireless controllers for N+1 HA (C9800-1 and C9800-2):●If the AP on C9800-1 doesn’t hold any tag information (the command ap name <AP name>write tag-config was not used)and there is no mapping configured for that AP on C9800-2, the AP will be assigned default tags when moved to C9800-2.●The AP will retain the tag information when moving between the controllers, if both have thesame mapping of AP to tags. This can be done via static configuration, by assigning the AP toa location, or via filters.●The AP will also retain its tag when moved between the two controllers if the tags are savedto the AP (with the write tag-config command) and the tags are defined on both controllers.●If the AP has a saved tag assigned via the write tag-config command and joins a controllerwhere those tags are not present, it will be assigned to the default tags (assuming no other mapping is configured on the controller that the AP is joining).●In all cases, if the AP retains its tag name assignment but the settings within the tag aredifferent on the two controllers, the AP will be configured based on the settings present on the currently joined controller.When moving an AP from an AireOS controller to a C9800 controller, since the AP doesn’t carry any tag information from AireOS, it will be mapped to the default tags; this is true unless a static or dynamic tag pre-assignment has been done on the C9800 controller, as explained above.When configuring N+1 HA,•make sure that the controller has the tags and AP-to-tag mapping defined using static mapping or regular expression mapping based on AP name/location.OR•Use the write tag-config command to save the tags on the AP and define the tags on the secondary controller.N+1 High Availability Configuration using WebUIThere are two ways to configure N+1 High Availability on the Catalyst 9800: Using the AP join Profiles or High Availability configuration individually on the Access point.Configuration on AP Join ProfileUnder Configuration > Tags & Profiles > AP Join, configure the Primary Controller Name and IP and Secondary Controller Name and IP. The Enable Fallback option determines if the APs fall back from the backup WLC to the primary WLC automatically if the Primary becomes available. This is enabled by default. CAPWAP Timers and Retransmit timers are used to customize heartbeat and discovery timeouts as well as the retransmit count and interval to track the AP’s connection to the controller.CAPWAP Timers•In the Heartbeat Timeout field, enter the time (in seconds) to configure the heartbeat timer for all access points. Specifying a small heartbeat interval reduces the amount of time it takes to detect device failure.•In the Discovery Timeout field, enter a value between 1 and 10 seconds (inclusive) to configure the AP discovery request timer.•In the Primary Discovery Timeout field, enter a value between 30 and 3000 seconds (inclusive) to configure the access point primary discovery requesttimer.•In the Primed Join Timeout field, enter a value between 120 and 43200 seconds (inclusive) to configure the access point primed join timeout.•In the Retransmit Timers Count field, enter the number of times that you want the AP to retransmit the request to the device and vice-versa. Validrange is between 3 and 8.•In the Retransmit Timers Interval field, enter the time duration between retransmission of requests. Valid range is between 2 and 5.CLI Commands:WLC(config-ap-profile)#capwap backup ?primary Configures primary Controllersecondary Configures secondary ControllerWLC(config-ap-profile)#capwap fallbackCLIs for CAPWAP Timers:WLC(config-ap-profile)#capwap retransmit ?count Configures AP CAPWAP control packet retransmit countinterval Configures AP CAPWAP control packet retransmit interval WLC(config-ap-profile)#capwap timerWLC(config-ap-profile)#capwap timers ?discovery-timeout Configures AP Discovery Timeoutfast-heartbeat-timeout Configures fast heartbeat timeoutheartbeat-timeout Configures heartbeat timeoutprimary-discovery-timeout Configures primary discovery timeoutprimed-join-timeout Configures primed join timeout Configuration on Access PointsUnder Configuration > Wireless > Access Points, click on the AP. Under the High Availability tab configure Primary, Secondary, Tertiary Controller. AP failover priority determines priority on the access points that connecting to the Primary controller.CLI Commands:WLC#ap name 00f2.8b26.8a30 controller ?primary Configure primary controllersecondary Configure secondary controllertertiary Configure tertiary controllerWLC#ap name 00f2.8b26.8a30 priority ?<1-4> Enter priority numberImage Upgrade with N+1 deploymentZero downtime network upgrade is a challenge for Wireless Networks. The reason is that these networks are made up of a set of interlocked devices, WLCs and a set of APs, which all need to be up to keep the network operational.The advent of Rolling AP Upgrade opens up new possibilities for upgrading the controller code in a network without bringing the network down using an N+1 controller. This can effectively achieve a Zero Downtime network upgrade in a N+1 deployment.The idea here is to upgrade access points in a wireless network in a staggered manner, using the same Rolling AP update infrastructure as described earlier in this document, such that an appropriate number of APs are always up and running in the network and providing RF coverage to clients. For N+1 Rolling AP Upgrade to work seamlessly it is essential that the WLCs be part of the same mobility group and have the same WLAN configuration.This is explained in detail in the Patching guide here:https:///c/dam/en/us/td/docs/wireless/controller/9800/17-1/deployment-guide/c9800-ha-rau-apsp-apdp-issu-rel-17-1.pdfCisco DNA Center Configuration for N+1 High AvailabilityCisco DNA Center supports Primary and Secondary configurations for N+1 HA. The below sequence outlines the workflow to configure N+1 High Availability using Cisco DNA CenterStep 1: Discover both the primary and secondary WLC devices.Check for network connectivity between these devicesStep 2: Create buildings where the access points will be connecting to the primary and secondary controllers. In the example below the two buildings, building-sj and building-cali are created where building-sj will be a Primary managed location for WLC-1 and same will be a Secondary managed location for WLC-2.Building-cali is configured as only a primary managed location for WLC-2.managed by WLC-1Step 4: Provision the Secondary device WLC-2. In this example, WLC-2 is the primary device for building-cali and secondary device for building-sj. So, building-sj APs have Primary as WLC-1 and secondary N+1 as WLC-2Select the building-sj primary managed locationPrimary device has 1 managed primary location.Configure interface and VLANSecondary device has 1 managed primary location as building-caliAnd one secondary managed location as building-sjStep 5: Verify AP Provisioning SummarySecondary device has 1managed primary locationand 1 secondary ManagedlocationConfigure interface andVLANManaged locations ofsecondary device Selecting the floor from primary managed location of building-sjLicensing•With Catalyst 9800 since Smart Licensing is mandatory, only as many licenses as the total number of APs in the network are required.•When APs failover from primary to secondary and tertiary controllers, the smart licensing infrastructure seamless handles the failover since the AP MAC is sent in the entitlement request to the CSSM portal.•N+1 HA is part of DNA Essentials Licensing Tier.•There is no HA-SKU on the Catalyst 9800 wireless controllers.For a more detailed overview on Cisco Licensing, go to /go/licensingguide. Legal InformationTHE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEENADVISED OF THE POSSIBILITY OF SUCH DAMAGES.Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.All printed copies and duplicate soft copies are considered un-Controlled copies and the original on-line version should be referred to for latest version.Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at /go/offices.Cisco TrademarkCisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: /go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)Cisco Copyright© 2021 Cisco Systems, Inc. All rights reserved.。

MBH20 Bluetooth 单耳听筒白皮书说明书

MBH20 Bluetooth 单耳听筒白皮书说明书

White paperJuly 2014Mono Bluetooth® HeadsetThis document is published by Sony Mobile Communications Inc. without any warranty*. Improvements and changes to this text necessitated by typographical errors, inaccuracies of current information or improvements to programs and/or equipment may be made by Sony Mobile Communications Inc. at any time and without notice. Such changes will, however, be incorporated into new editions of this document. Printed versions are to be regarded as temporary reference copies only.*All implied warranties, including without limitation the implied warranties of merchantability or fitness for a particular purpose, are excluded. In no event shall Sony or its licensors be liable for incidental or consequential damages of any nature, including but not limited to lost profits or commercial loss, arising out of the use of the information in this document.© Copyright 2014 Sony Mobile CommunicationsInc.All rights reserved. Other brands, company orproduct names mentioned herein are trademarksof their respective owners. You are herebygranted a limited license to download and/orprint a copy of this document for personal use.Any rights not expressly granted herein arereserved.First released version (2014)Publication number: 1279-8999.1About this documentThis document contains technical specifications for the Sony MBH20 Mono Bluetooth ® Headset.Document historySony Mobile Developer WorldFor the latest technical news, tutorials and development tools, go to /developer.VersionJuly 2014First released version Version AProduct overview (2)Mono Bluetooth® Headset MBH20 (2)Facts – dimensions, weight, performance (2)Requirements on tablets and smartphones (3)Technologies in detail (4)Device-to-device communications (local) (4)Bluetooth® wireless technology (4)Trademarks and acknowledgements (5)Product overviewMono Bluetooth® Headset MBH20The Mono Bluetooth® Headset MBH20 is a multi compatible wireless headset with impressive talk time. You can use it to listen to turn-by-turn navigation directions from your Xperia TM device. You can also use it to listen to media such as web radio, a music player application, or audio from video clips.Facts – dimensions, weight, performanceSize (module)45.5 × 17 × 8.5 mmWeight8 gramsAvailable colours Black, WhiteKeys Multi-function key (Power on/off, Call key)Vibrator NoLED R&G LEDBluetoothBluetooth specification 3.0Profiles HSP, HFP, A2DPNFC NoUSB Yes, standard micro USB for charging onlyBatteryType Lithium-ionCapacity90 mAhCharge time 2.5 hoursUsage timeTalk time Up to 7hours (when connected with the Sony Xperia TM Z1)Standby time Up to 200hoursEnvironmental dataOperating temperature range-20°C to +60°COperating humidity range5% to 99% RHStorage temperature range-20°C to +85°CRequirements on tablets and smartphones Storage humidity range25% to 70% RH Charging temperature range0°C to 45°C Water and dust classification IP42Operating systemcompatibilityAndroid v4.1 or later Bluetooth v3.0Technologies in detailNOTE : The information outlined below is general and levels of compliance to standards and specifications may vary between products and markets. For more information, contact Sony Mobile Developer World or your Sony contact person where applicable.Device-to-device communications (local)Bluetooth ® wireless technologyMore information:/developer Bluetooth ® profiles supported Handsfree Profile v1.6Advanced Audio Distribution Profile v1.3Headset Profile v1.2Core version and supported core features Version 3.0Connectable devicesProducts which support at least one of the Bluetooth ®profiles listed above.Trademarks and acknowledgementsAll product and company names mentioned herein are the trademarks or registered trademarks of their respective owners. Any rights not expressly granted herein are reserved.Visit for more information.。

白色纸团,能干什么,英语作文

白色纸团,能干什么,英语作文

白色纸团,能干什么,英语作文Here is an English essay on the topic "What can a white paper ball do?", with a word count of over 1000 words.A simple white paper ball may seem like an ordinary and unassuming object, but it has the potential to be so much more. In the right hands, this humble paper creation can transform into a versatile tool with a wide range of applications. From artistic expression to practical problem-solving, the white paper ball can surprise us with its hidden capabilities.One of the most obvious uses for a white paper ball is as a medium for artistic exploration. Artists and craftspeople have long recognized the creative potential of this basic shape. By manipulating the paper ball, adding embellishments, or incorporating it into larger compositions, they can produce captivating works of art. Sculptors may use the paper ball as a starting point, shaping and molding it into intricate and imaginative forms. Painters might use the ball as a unique canvas, experimenting with different techniques and materials to bring it to life. Even dancers and performers have incorporated the white paper ball into their routines, using it as a prop to enhance their movements and storytelling.Beyond the realm of art, the white paper ball can also serve practical purposes. One such application is in the field of science and education. Teachers can use paper balls as interactive learning tools, encouraging students to engage in hands-on experiments and demonstrations. For example, students might use paper balls to explore the principles of physics, such as momentum, velocity, and trajectory. By tossing, rolling, or dropping the balls, they can observe and analyze the various forces at play, gaining a deeper understanding of scientific concepts.In the realm of problem-solving, the white paper ball can be a surprisingly versatile tool. Its malleable nature allows it to be shaped and molded into various forms, making it useful for tasks that require creativity and adaptability. For instance, paper balls can be used to create makeshift tools or objects, such as temporary containers, cushions, or even basic structures. In emergency situations, where resources may be limited, the ability to quickly fashion a paper ball into a functional item can be invaluable.Furthermore, the white paper ball can serve as a therapeutic and stress-relieving tool. The simple act of manipulating and shaping the paper can have a calming and meditative effect, providing a outlet for pent-up emotions or anxious thoughts. Some individuals may find that crushing, tossing, or even just squeezing a paper ball canhelp them to release tension and find a sense of calm. This makes the white paper ball a potentially useful tool in various therapeutic settings, such as counseling sessions or mindfulness workshops.Another intriguing aspect of the white paper ball is its potential for environmental sustainability. As a biodegradable and renewable resource, paper can be recycled and repurposed in numerous ways. By transforming a simple sheet of paper into a ball, we can demonstrate the versatility and adaptability of this material. This can inspire individuals to explore more eco-friendly alternatives to traditional products and to think creatively about ways to reduce waste and conserve resources.In the realm of entertainment and recreation, the white paper ball can also find its place. Children, in particular, often delight in playing with paper balls, using them in imaginative games and activities. From simple tossing and catching to more elaborate ball games, the paper ball can spark hours of creative play and laughter. Additionally, paper balls can be used in team-building exercises or group activities, fostering cooperation, communication, and problem-solving skills.The versatility of the white paper ball extends even to the realm of personal expression. By decorating or customizing the ball, individuals can imbue it with their own unique style and personality. Some may choose to write messages, draw designs, or attach smallobjects to the paper ball, turning it into a personalized item that reflects their interests, emotions, or experiences. This can be a meaningful way for people to explore their creativity and share a part of themselves with others.Ultimately, the white paper ball is a humble yet remarkable object that can transcend its simple origins. Whether used for artistic expression, educational purposes, problem-solving, therapeutic applications, or personal enjoyment, this unassuming paper creation has the power to surprise and delight us. By embracing the creative potential of the white paper ball, we can unlock new ways of thinking, learning, and engaging with the world around us. So the next time you come across a plain white paper ball, don't underestimate its capabilities – instead, let your imagination soar and discover the endless possibilities it holds.。

White Paper Schottky Diodes

White Paper Schottky Diodes

White Paper Schottky Diodes By Gerd FischerSchottky DiodesSchottky diodes use a metal-semiconductor junction as opposed to the semiconductor-semiconductor junctions used in standard diodes. This configuration allows for lower forward bias voltage drops (0.15V - 0.45V vs. 0.5-0.7V) and faster switching times, making them ideal for power supply switching operations. Drawbacks for schottky diodes include much higher reverse bias leakage current ratings. Because p-n recombination is not a factor in switching delay time, only capacitance affects the reverse switching time.These diodes are generally used to rectify voltages for power supply output. Their quick response time and low voltage consumption make them ideal for this purpose and it is assumed that they perform this function. As such, we will look primarily at the effects of temperature on forward bias voltage drop, capacitance, and reverse current leakage.To provide a case study to the derating of schottky diodes, three parts were selected as examples •40L15CT InternationalRectifier•MBR4015CTL ON Semiconductor•STPS40L15CT ST MicroelectronicsManufacturer InternationalRectifierONSemiSTMicroPart Number 40L15CT MBR4015CTL STP40L15CTJunction Temp -55C to 125C -65C to 125C -55C to 125CForward Voltage 0.25V* 0.34V** 0.25V* Working PeakReverse Votlage15V 15V 15V Working ForwardCurrent40A 40A 40A* 19A peak at Junction Temp. of 125°C**20A peak at Case Temp of 125°C1.1 Temperature vs. Forward BiasElevated temperature decreases forward voltage drop across schottky rectifiers at currents below about 50A. Above this point, elevated temperatures increase the amount of voltage used by the device.As the rated maximum working current is 40A for all selected rectifiers, temperature increase willonly be considered as decreasing the forward voltage drop throughout the working range of the rectifiers. Lower voltage usage by schottky rectifiers is generally desirable and so is not a concern when operating at elevated temperatures. Derating for forward current is not required until case temperature reaches 85°C, which is outside environmental specifications.V f vs. I f at various junction temperatures from MBR4015CTL datasheet. This is typical of all three parts.11.2 Temperature vs. Reverse BiasIncreasing temperature while maintaining a reverse bias of the rectifier diodes leads to an increase in reverse current through the diode. For every 25°C increase in junction temperature there is a corresponding increase in reverse current of an order of magnitude. Schottky diodes are generally mounted on heat sinks to mitigate these effects. Heat dissipation may become a factor, however, when ambient temperatures increase, leading to even higher reverse current and greater heat generation.Heat dissipation will be critical, and dependent on ambient conditions local to the diodes, influenced mainly by overall ambient conditions and device proximity to other heat generatingdevices.1 2 International Rectifier1.3 Functional Parameters (Not Specified in Datasheet)Junction capacitance is given only for ambient temperatures of 25°C, and is not shown as it varies with temperature. However, junction capacitance may increase as temperature increases. This may increase the switching time for the rectifiers, though not critically, as there is little to no p-n recombination to slow the time further. Thus, as the recovery time increases due to an increase in electrical capacitance, it will still be sufficiently short so as to preclude a thermal runaway condition.3 If the circuit is constructed with little tolerance with regard to switching time, this may become a problem, allowing reverse current to flow while the diodes reverse bias, leading to damage of sensitive devices downstream.1.4 Electrical Overstress (Robustness)Failure of schottky diodes during overstress conditions is usually a result of electrostatic discharge(ESD). Buildup of as little as 1000V – 1500V and the subsequent discharge are enough to damage these parts. Reverse bias is the most prevalent condition under which ESD takes place. The result of which is a shift in the I- E curve that varies in degree from slight to a complete short. As capacitance is not expected to increase by more than 5% at 85°C, the increased risk of charge buildup and ESD is considered negligible.1.5 Wearout behaviorSchottky diode failure is seldom due to wearout mechanisms. This is especially the case with schottky diodes used on the output of power supplies, where failure is normally due to a single reverse current effect. Reliability studies have been published on SiC schottky’s that indicate lifetime of >50yrs4. Due to the majority of failures due to electrical overstress, long term failure mechanisms of Schottky diodes are not known to have been historically significant.1.6 ConclusionSchottky diode failure as a result of increased temperature is almost entirely dependent on proper heat dissipation of the diode through its heat sink and can be mitigated by the placement of the diodes away from other heat generating devices. Assembly failure due to altered operating characteristics of the diode (ie greater reverse current) is more likely than direct failure of the diodes themselves.3 /technical-info/designtp/temp001.pdf4 Dr. Allan Ward, SiC Power Diode Reliability – March 2006CPWR-RS03AppendixInternational Rectifier, 40L15CTThe listed device is rated for operation within a junction temperature range of -55°C to +125°C. Corollary: Some parametric performance is defined by case temperature (max. of 100ºC)Performance issues: There are several parameters of concern with diodes, including reverse current, forward current, surge current, voltage drop behavior, junction capacitance, and power loss. The primary focus tends to be on maximum allowable forward current and leakage current in the reverse bias direction. Forward current is not a concern as derating is not required until the case temperature reaches 85ºC, which is within environmental specifications. The reverse current does experience increase by orders of magnitude with increasing temperature and needs to be considered.Reliability issues: Long-term degradation at the die-level is not expected to be an issue. Elevated temperature combined with repeated power cycling could drive fatigue at the die attach.ON Semi, MBR4015CTLThe listed device is rated for operation within a junction temperature range of -65°C to +125°C. Corollary: Some parametric performance is defined by case temperature (max. of 125ºC)Performance issues: There are several parameters of concern with diodes, including reverse current, forward current, surge current, voltage drop behavior, junction capacitance, and power loss. The primary focus tends to be on maximum allowable forward current and leakage current in the reverse bias direction. Forward current is not a concern as derating is not required until the case temperature reaches 90ºC, which is within environmental specifications. The reverse current does experience increase by orders of magnitude with increasing temperature and needs to be considered.Reliability issues: Long-term degradation at the die-level is not expected to be an issue. Elevated temperature combined with repeated power cycling could drive fatigue at the die attach.ST Micro, STP40L15CTThe listed device does not provide a temperature range. Several maximum temperatures are listed Maximum junction temperature of +125°C on the first page of the specificationMaximum junction temperature of +150°C on some parametric chartsMaximum ambient temperature of +150°C for forward currentPerformance issues: There are several parameters of concern with diodes, including reverse current,forward current, surge current, voltage drop behavior, junction capacitance, and power loss. Theprimary focus tends to be on maximum allowable forward current and leakage current in thereverse bias direction. Forward current may be a concern as derating may be required at ambient temperatures as low as 50ºC. The reverse current does experience increase by orders of magnitudewith increasing temperature and needs to be considered.Reliability issues: Long-term degradation at the die-level is not expected to be an issue. Elevated temperature combined with repeated power cycling could drive fatigue at the die attach.DISCLAIMERDfR represents that a reasonable effort has been made to ensure the accuracy and reliability of the information within this report. However, DfR Solutions makes no warranty, both express and implied, concerning the content of this report, including, but not limited to the existence of any latent or patent defects, merchantability, and/or fitness for a particular use. DfR will not be liable for loss of use, revenue, profit, or any special, incidental, or consequential damages arising out of, connected with, or resulting from, the information presented within this report.。

用白纸绘画农场英语作文

用白纸绘画农场英语作文

用白纸绘画农场英语作文下载温馨提示:该文档是我店铺精心编制而成,希望大家下载以后,能够帮助大家解决实际的问题。

文档下载后可定制随意修改,请根据实际需要进行相应的调整和使用,谢谢!并且,本店铺为大家提供各种各样类型的实用资料,如教育随笔、日记赏析、句子摘抄、古诗大全、经典美文、话题作文、工作总结、词语解析、文案摘录、其他资料等等,如想了解不同资料格式和写法,敬请关注!Download tips: This document is carefully compiled by theeditor. I hope that after you download them,they can help yousolve practical problems. The document can be customized andmodified after downloading,please adjust and use it according toactual needs, thank you!In addition, our shop provides you with various types ofpractical materials,such as educational essays, diaryappreciation,sentence excerpts,ancient poems,classic articles,topic composition,work summary,word parsing,copyexcerpts,other materials and so on,want to know different data formats andwriting methods,please pay attention!Painting a Farm on White Paper: A Colorful Journey。

第一代沙箱网络已超出其容量:白皮书2,执行总结说明书

第一代沙箱网络已超出其容量:白皮书2,执行总结说明书

WHITE PAPER2. Administration Overheadof available skilled staff. Security teams are stretched and they need to improveproductivity wherever possible. Many outdated sandboxing products require manualadministration, which adds to the strain on human resources. In fact, 57% of CISOsnamed “too many manual processes” as one of their top challenges—followed by“missed malware and attacks.”15 Following are key considerations:Manual security management. Outdated sandboxes that lack integration cannot sharezero-day intelligence to other in-line security controls that enables them to automaticallyapply protection across the network. This lack of robust security automation means thatmanual processes must be used to perform these controls, which increases the burdenon human staff.Manual malware reporting processes. Disaggregated security that relies on multiplepoint solutions creates complexity in terms of multiple, nonstandard languages in use formalware reporting. This creates a burden on security teams having to learn the varioussolution languages, increases manual workflows, and distracts staff from other criticalsecurity tasks.3. ScalabilityMany traditional sandboxes also struggle with scaling to accommodate increasingtraffic or infrastructural changes resulting from DX initiatives. Lacking the latest technicalcapabilities may require the purchase of additional devices, which adds CapEx costs,along with infrastructural complexity that increases operating expense (OpEx) and cyberrisk to the process of sandbox scaling. Insufficient performance capacity, architecturallimitations, and physical deployment limits are also common scalability concerns for many sandboxing solutions.Clustering. A sandbox that lacks a sufficient number of nodes per cluster limits the solution’s ability to support network growth,which increases traffic demands and expands security needs in the future. And many sandbox solutions on the market do not have an architectural foundation to support any clustering capabilities at all.Form factors. Ease of integration is the second most important consideration for U.S. enterprises during security product purchase decisions (after cost).18 Outdated solutions with “on-premises only” form factors may limit the options of where and how sandboxing can be used. Also, solutions that use physical connectors—such as test access point (TAP) network components—can significantly increase the time and cost to deploy sandboxing across an organization.4. Total Cost of Ownership (TCO)Implementation of sandboxing can be complex, with numerous factors impacting the overall cost of deployment, maintenance, and upkeep.19 Many sandbox solutions require multiple devices and/or subscriptions, which leads to a high TCO. Following are key areas of consideration:Attack surface. Many previous-generation sandboxes cannot cover the entire attack surface (network, endpoints, web, email, and cloud) without additional licenses and costs. They also may lack integrated access to other important security solution functions, such as secure sockets layer (SSL) and transport layer security (TLS) encryption inspection.Cost per protected Mbps. Organizations should look for replacement sandboxes that reduce cost per protected Mbps (as measured by third-party testing organizations like NSS Labs) and eliminate supplemental subscription costs.To Avoid Sandbox Problems, Choose a Next-generation SolutionPrevious-generation sandboxes cannot keep up with the speed and sophistication oftoday’s threat landscape, as well as the transformative changes to network infrastructuresbrought on by increasing digitalization. At the same time, sandboxing remains a criticalneed within an integrated security architecture. When evaluating an existing sandbox,security leaders should consider security effectiveness, administrative overhead,scalability, and cost of the solution as factors for upgrading to a more fully featured,third-generation solution.201“The Cost of Cybercrime: Ninth Annual Cost of Cybercrime Study ,” Accenture and Ponemon Institute, March 6, 2019.2Ibid.3“Malware ,” AV-TEST, accessed November 12, 2019.4Kevin Williams, “Threat Spotlight: Advanced polymorphic malware ,” SmarterMSP .com, June 13, 2018.5“AI-driven Cyber Crime Brings New Challenges to CISOs: Too Fast, Too Agile, Too Dangerous for Traditional Security Approaches,” Fortinet, June 21, 2019.6“The Cost of Cybercrime: Ninth Annual Cost of Cybercrime Study ,” Accenture and Ponemon Institute, March 6, 2019.7“The Security Architect and Cybersecurity: A Report on Current Priorities and Challenges ,” Fortinet, November 12, 2019.8“The Cost of Cybercrime: Ninth Annual Cost of Cybercrime Study ,” Accenture and Ponemon Institute, March 6, 2019.9 “2019 Data Breach Investigations Report ,” Verizon, April 2019.10 According to internal data from FortiGuard Labs.11 Jessica Williams, et al., “Breach Prevention Systems Test Report ,” NSS Labs, August 7, 2019.12 “The Security Architect and Cybersecurity: A Report on Current Priorities and Challenges ,” Fortinet, November 12, 2019.13 “The Cost of Cybercrime: Ninth Annual Cost of Cybercrime Study ,” Accenture and Ponemon Institute, March 6, 2019.14 Jessica Williams, et al., “Breach Prevention Systems Test Report ,” NSS Labs, August 7, 2019.15 “The CISO and Cybersecurity: A Report on Current Priorities and Challenges ,” Fortinet, May 23, 2019.16“2019 Cost of a Data Breach Report ,” Ponemon Institute and IBM Security, July 2019.17“Strategies for Building and Growing Strong Cybersecurity Teams: (ISC)2 Cybersecurity Workforce Study 2019,” (ISC)2, October 2019.18Jason Pappalexis, “Breach Prevention Systems and the Importance of Interoperability ,” NSS Labs, February 6, 2018.19Jessica Williams, et al., “Breach Prevention Systems Test Report ,” NSS Labs, August 7, 2019.20 “2019 Global Encryption Trends Study ,” Ponemon Institute, March 28, 2019.Copyright © 2019 Fortinet, Inc. All rights reserved. Fortinet , FortiGate , FortiCare and FortiGuard , and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet’s General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be December 2, 2019 7:55 AM。

高性能安全缩放6个选择标准:下一代防火墙白皮书说明书

高性能安全缩放6个选择标准:下一代防火墙白皮书说明书

WHITE PAPERExecutive SummaryAs the guardians of their enterprises’ ever-expanding attack surfaces, security architects look for more effective ways to deliver threat protection and to coordinate it with threat detection and remediation. Next-generation firewalls (NGFWs), which typically anchor security architectures, are the linchpins of these capabilities, so architects should choose carefully.Comprehensive threat protection includes firewalling, intrusion prevention, antivirus, and application control. Advanced NGFWs also inspect secure sockets layer (SSL)-encrypted traffic. In some NGFWs, though, the combination of these processes can severely hamper network throughput. That’s why, as application counts and traffic volumes grow, security teams may resort to turning off some threatprotection controls to maintain acceptable levels of network service.This is a compromise that organizations cannot afford. According to a recent report, the total average organizational cost of data breaches in the U.S. has already reached $7.35 million.1 NGFWs must offer bestof-breed threat protection at the enterprise edge andin the data center without sacrificing performance. Operating within a broad, integrated, and automated security architecture, NGFWs must also satisfy the scalability, cost of ownership, and environmental concerns of the digitally transforming enterprise. Evaluating Your NGFW RequirementsNGFWs play an important role in threat protection, from the network edge to the data center, between internal segments, and in the cloud. Security teams rely on their NGFWs to gain visibility into users, devices, applications, and threats on the network, and to apply advanced threat protection wherever it is needed.Six key criteria should guide the evaluation and selection of enterprise edge or data-center NGFWs:1. Threat protection performance. Threat protection performance is a measurement of how well an NGFW performs while runningfull threat protection (firewalling, intrusion prevention, antivirus, and application control). Ideally, the NGFW can sustain performance when full threat protection is turned on. In some cases, however, performance degradation is substantial. As an example, based on internal Fortinet research, signature-matching (a function of IPS) can reduce some NGFWs’ speed by as much as 30%.Many NGFW providers are ambiguous in how they represent their threat protection performance claims. Documented performance claims should be examined carefully to ensure they reflect testing under load, with threat protection fully engaged.2. SSL inspection across the entire enterprise. An enterprise NGFW must also be able to perform well with SSL inspectionengaged. Most enterprise network traffic is now encrypted.2 Cyber criminals are taking advantage of the inherent trust and low inspection priority given to SSL traffic by some and are inserting malware into encrypted packets. Such malware can be ferreted out through SSL decryption and inspection. The penalty for SSL inspection, though, is reduced throughput. In some cases, the slowdown is significant enough to impact applications in ways that hamper business productivity and customer experience.While all NGFWs experience some impact on throughput with SSL turned on, the best will have predictable performance and see minimal speed degradation. When comparing data sheets, look for transparency in the vendor’s SSL performance specifications.They should cite testing with industry-mandated ciphers (standardized algorithms used for encrypting and decrypting sensitive information) such as AES256-SHA and TLS 1.2 that have preferably been validated by objective third parties.3. Session capacity. Session capacity for most NGFW appliances tops out at a few million sessions. As traffic volume and the numberof devices connecting to the network continue to skyrocket, session capacity is critical to accommodate peak connectivity, which may exceed 100 million concurrent sessions in large enterprises.To deliver high-throughput performance, NGFWs designed for enterprise-scale traffic have a load-balancing architecture that supports high connection rates as well as offering failover for resiliency. This is a more cost-efficient alternative to routingtrafficthrough several low-capacity firewalls.2Copyright © 2019 Fortinet, Inc. All rights reserved. Fortinet , FortiGate , FortiCare and FortiGuard , and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet’s General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be September 9, 2019 10:17 PM Untitled-1WHITE PAPER | Scaling for High-Performance Security1“2017 Cost of Data Breach Study: United States ,” Ponemon Institute LLC, June 2017. 2 Siggi Stefnisson, “Private, But Not Secure: HTTPS is Hiding Cybercrime ”, SecurityWeek, September 22, 2017.170332-A-0-EN 1. Price/performance and other operational considerations. Some vendors scale performance by increasing the size, andconsequently, the price of their NGFWs. This may not align with enterprise trends toward shrinking technology footprints. Aim for an NGFW that delivers the required performance in the most compact form factor. This not only reduces total cost of ownership (TCO) but it also saves space and reduces energy consumption, both important objectives for environmentally conscious enterprises.Maintenance and support costs for the NGFW should be factored into TCO, too. Mature technology has an edge in this respect, as does an offering from a vendor with deep investments in research and design. Owners of NGFWs that fall into this category can expect smoother deployments and fewer support calls.When considering the NGFW hardware, pay attention to power redundancy and support for 40 GbE and 100 GbE networkinterfaces. These will support resiliency and accommodate migration to higher-capacity networks.2. Independent third-party validation. Although network security is a rapidly evolving industry, no enterprise can afford the risk ofuntested security innovations. Architects should not rely on vendor claims alone but seek third-party evaluation from recognized bodies such as NSS Labs. The latter offers detailed test results and recommendations for NGFWs in a variety of use cases, such as data-center security gateway (DCSG), data-center firewall (DCFW), data-center intrusion prevention system (DCIPS), and next-generation intrusion prevention system (NGIPS).3. Single-pane-of-glass management. The management interface is where many security architects are stymied in their selectionprocess. Careful attention may have been paid to the management system’s user interface and functionality, but if it is limited to the NGFW, security teams will have to toggle between multiple dashboards to assess vulnerabilities and respond to threats. Endto-end visibility and control is possible only if the NGFW is part of a broad, integrated security architecture, across which it can share threat information with other network devices and receives threat intelligence automatically.Single-pane-of-glass management is not only more effective from a security standpoint but it is also operationally more efficient, reducing administrative time and training costs.Building Your NGFW Priority ChecklistAs security architects evaluate NGFW solutions, potential trade-offs between security and performance may be top of mind. And it’s true—the ability to provide full threat protection and SSL inspection with minimal performance impact is critical.There are other considerations, however. Given power and space restrictions, preference should be given for compact NGFW solutions that minimize space requirements while being flexible enough to deploy in the data center or on the network edge.Finally, security architects should consider the capability to integrate the NGFW into the overall security architecture, providing end-toend visibility and the ability to automatically share threat intelligence between devices.The NGFW is at the heart of every enterprise security solution and plays a critical role in protecting corporate and customer data. Security architects reviewing their options will be pleased to learn that one NGFW stands out clearly from its peers.。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Scott Stanton, Ansys 机电产品技术总监Sandeep Sovani, Ansys 全球汽车战略经理随着空气污染及石油短缺问题的日益严重,利用混合动力车和电动汽车替代传统汽油车和柴油车已成为摆在人们面前的问题。

世界各国政府都在推动混合动力/纯电动汽车的研究。

美国政府已宣布财政支出24亿美元用于资助电池组、电机及其它零部件的全新设计,并制订了在2015年前路上有100万辆混合动力车的目标[1]。

美国能源部预测,到2030年,新能源汽车将占整个轻型汽车和卡车市场28%的份额,这将比2005年增加20%[2]。

为满足对混合动力/纯电动汽车不断增长的需求,研发性能更好、价格更经济的电气传动系统的竞争日益激烈。

研发新的电气传动系统具有巨大的商业回报潜力,但与此同时,将有缺陷的、不适合市场的、尚不完善的产品推向市场也存在着商业风险。

显然,汽车技术正在经历一场革命。

领导这一革命的重任已落在汽车工程师的肩上,他们必须重新思考如何进行动力传动系统的设计。

无论是整车生产企业的工程师还是零部件生产企业的工程师都面临着一项挑战,即如何在一个非常有限的时间内,研发出新一代的动力传动系统。

为了满足上述需求,具有混合动力车/电动汽车创新能力的主要汽车公司集中全力于仿真驱动式的研发,而不是过时的反复样机试验法。

事实上,在下一代电气传动系统的设计竞赛中,能否有效实施先进的数值仿真技术有可能将优胜者与不精于此道的竞争者区别开来。

有许多软件解决方案可用于动力系统开发中的各种性能分析,包括机械分析、电气分析、电磁分析、电化学分析、流体分析、热管理应用方面的分析等。

通常,这些独立的分析软件不能完全兼容,因而妨碍工程师全面、有效地实现电气传动系统的优化设计。

本文对一款业界领先的、可在统一集成环境下实现多学科全面分析的一流软件的价值做了论述。

ANSYS 白皮书混合动力车及电动汽车的先进数值仿真——利用无缝集成的多物理域仿真软件工程化汽车工业的未来1混合动力系统设计者面临的主要挑战当前,汽车工程师通常面临必须从头开始设计电气传动系统的技术挑战,其关键部件包括:动力电池组、牵引电动机及发电机、功率电子器件。

混合动力汽车部件的设计涉及到复杂的物理问题和极具挑战性的系统集成问题,其单个部件开发过程中面临的挑战以及系统集成时电磁部件之间的电磁兼容/电磁干扰问题将在下文进行探讨。

• 电池组电池组为车辆提供主动力,同时也为众多的电动辅助系统提供能量。

因此,电池组必须符合与燃油汽车相同的可靠性、耐久性和经济性标准和期望值,甚至超过这些标准和期望值。

此外,车用电池组还必须提供比常规电池高几个数量级的能量。

在设计更大容量和更大输出功率电池组的时候,工程师必须考虑热、结构、电磁因素对电池组及电池单体的影响。

例如,当充、放电时电池组产生热,电池模块中所有电池单体之间的温差必须严格控制在几度之内,否则,电池组内部单体之间就会形成有害的电流回路而缩短电池的寿命。

要解决电池组发热问题,就需要一个风冷或水冷的冷却系统,但有时候却会导致乘客车仓周围噪声增加,从而增加了一定的设计挑战,因为混合动力/纯电动汽车的驾驶员都期望有一个超静音的驾驶体验,冷却系统的噪声与之不谐调。

工程师在对电池组进行设计和仿真分析时,还必须考虑到一系列驾驶条件下电池的安装位置和各种应力,以及电池必须能够安全承受多种工况变化对其性能的影响,例如:外加热、过充、过放、针刺、重压及外部短路。

此外,电池设计时还要考虑在碰撞情况下电池的安全性,必须保护乘客在车辆碰撞中免受电池释放出的有毒酸液的危险。

• 电动机/发电机多年来,由于内燃机的广泛应用,汽车制造商在电机(牵引电动机/发电机)设计上投入的时间和资金相对较少。

传统发动机已经被完善到了随心所欲的程度:完全满足消费者的需求,排放法规也不再那么严峻地不可达到,石油价格也不成问题。

但现在一切都已发生改变,在新式发动机的巨大收益和市场压力的驱使下,很多公司开始进行高效率和高效益的电气发动机设计。

人才和资金不断的流向这个行业,电动机和电池一样,其设计也面临着一系列挑战。

电动机/发电机在汽车驱动系统中必不可少,同时也可以通过再生制动给蓄电池充电。

与其它电动机不同,混合动力/纯电动汽车用牵引电动机必须可靠地工作在非常严苛的环境中。

电动机必须持续工作在极端温度条件、剧烈振动、大工作循环及崎岖路面条件下;在混合动力汽车中,电动机也受发动机产生的高温影响。

上述所有的因素在电动机设计的时候都必须考虑。

对汽车消费者来说,可靠性是汽车的关键卖点,而且差的发动机性能既增加了维修成本,又降低了汽车的品牌价值。

消费者都期望混合动力/纯电动汽车具有高的燃油效率。

汽车的高燃油效率、低排放、安全性和动力性等方面影响着消费者的购买决策,因此直接影响汽车市场的成功与否。

由于电动机的设计决定了将多少蓄电池的电能转化为机械能驱动车辆,设计高燃油效率的电动机就成为当今混合动力/纯电动汽车动力传动系统工程师面临的最重要挑战之一。

2混合动力车电池组的冷却液流动路径及各个电池单体的温度分布混合动力车电池组的冷却液流动路径及各个电池单体的温度分布Courtesy Kato 工程公司共轴电机-发电机有限元网格剖分图• 电力电子电力电子相当于电气传动系统的心脏与大脑,它们必须精确地控制蓄电池与电动机/发电机之间的能量传输,并根据路况和驾驶员指令做出逻辑判断来调节动力传动系统。

为了在各种驾驶条件下都能以最高效率工作,供给牵引电动机的电能需要根据传感器监测到的位置、速度、温度等反馈信号,通过高频开关器件(如绝缘栅双极型晶体管,IGBT )严格控制。

热管理是混合动力汽车电力电子设计所关注的一个主要问题。

由动力传动系统传递到车轮和再生制动充入电池的所有能量都需要通过电力电子器件完成。

因此,即使电子器件极微小的功率损失也能产生大量的热。

各种工作环境下(如炎热的沙漠或者冬天零度以下)的热量都需要严格管理并做好散热,避免电子元器件及其周边部件的热损坏。

因此,需要对电力电子中的电气损耗做精确计算,为了确保有效的冷却,还要确定和设计散热通路。

• 电磁干扰/电磁兼容电力电子开发中的主要挑战之一是电磁干扰及电磁兼容。

由于供给电动机的能量通过高频开关功率器件的控制进行传递,因此各种电气元件之间的电磁干扰就成为一个重要的问题。

如果不考虑这些问题,电磁干扰就会破坏信号传递和检测并影响电动机正常工作。

因此,电磁干扰的影响必须仔细研究并在逻辑控制中有所考虑,这就需要全面地研究电动机、母线及周围电磁部件内和周边的电磁场,且这些部件工作时是相互连通、相互耦合的。

仿真技术的应用即使在没有样机的条件下,工程师也可以使用多物理仿真软件研究不同载荷条件下产品的设计性能。

不仅实体和真实载荷情况可以通过准确的仿真而建模,而且流体、机械、热物理、电化学、电磁力的影响及其相互之间的作用也可以模拟,并且可以通过仿真模型来调整设计。

这样,产品设计可以更快,并且可以在设计的前期进行性能优化,以避免在产品开发的后期发生意外和问题。

用于混合动力/纯电动汽车的仿真工具涵盖范围宽,包括机械、流体动力学、热学、电气和电磁等领域。

这些工具既可以用于解决动力传动系统单个部件开发的问题——电池组、牵引电动机/发电机、电力电子等,也可以用于由这些子系统集成的、复杂动力传动系统的设计和研究。

电池组仿真为了避免过热造成电池能效降低以及使用寿命缩短,电池热管理是混合动力/纯电动汽车开发的重中之重。

对圆柱形电池单体,工程师通常采用风冷策略,其中包括电池组外壳的形状设计,由鼓风机和导流片形成足够的气流以实现最佳的冷却。

对矩形电池单体,冷却一般通过与电池单体相接触的热交换器中液体循环来实现。

电池热管理的控制算法则根据温度和充电器状态来改变每个电池单体的负荷。

3IGBT 的电磁干扰/电磁兼容分析电机控制器电子电路图将参数化法和实验设计法与计算流体力学求解器相结合,可分析复杂的三维冷却液流动和多媒质联合(从固体到液体)传热,以评估和优化不同的热管理系统配置。

为了评估电池组的长驾驶循环性能,线性时不变法可实现高效的实时仿真。

工程师可以借助电路仿真技术评估控制算法,来研究降低电池寿命和导致电池爆炸的影响因素,如过充、大电流充/放电、外部短路或其它的电路问题。

研究此类算法时,采用能够将三维物理模型(流体动力学和机械)无缝集成到控制电路仿真中的软件显然是最理想的。

为了解决如碰撞和异物穿透电池等事故造成的电池组结构问题,结构力学软件可用于评估结构的完整性,以防止电池组有毒内容物的溢出以及可能造成热失控与电池爆炸问题的单体损坏。

这种虚拟样机设计软件也同样适用于研究振动,耐久性和疲劳寿命。

电动机/发电机仿真在电动机/发电机研发中,设计者必须重点考虑电机的电磁问题。

根据最初的CAD 图纸及装配体的相关工程设计指标,电子设计优化软件可定义电动机/发电机的主要设计参数,包括永磁材料、绕组分布图、绕组匝数、气隙等,而寄生参数提取工具则可用于计算电动机的电气特性。

这些软件输出的模型和设计数据可以输入到电磁仿真软件中,从而可计算电动机的转矩曲线——在电动模式驱动车辆时,转矩如何随时间上升;在停车制动模式时,电气阻力矩如何随时间变化。

电动机/发电机电磁性能分析时,还需要引入车辆的质量以确定各种情况下的加速时间及制动时间。

基于这些输出结果,设计者可以改变某些设计参数(例如:永磁体的尺寸)来调整设计,通过参数化、优化设计,在电动机的性能与电动机的尺寸、重量或成本之间做出折中选择,优选设计方案。

电磁仿真输出的转矩可进一步输入到结构力学软件中,用于分析动力传动系统中其它部件(包括驱动轴、齿轮等)的应力、载荷、变形及振动。

人们总是希望电动汽车可以静音,因而对电动汽车的主要噪声源,驱动系统进行振动分析就变得非常重要了。

此外,流体动力学可用于研究热管理问题,分析损耗的分布,以确定电动机/发电机组的热分布。

无缝集成的多物理场设计软件纵贯整个电磁和机械开发过程,在不同载荷情况的性能计算和不同设计方案比较时,可协调多个工具的动作,在不同工具之间交换数据。

多物理场联合仿真程序有助于软件在一个统一的环境中实现不同程序之间顺畅的数据传递。

电力电子仿真为了对混合动力汽车电力电子器件进行热管理,工程师在电力电子电路仿真软件的设计界面上放置IGBT 器件模型并输入其特性(通断电压,电流波形等),控制算法器件模型(IGBT 的通断逻辑)和电动机/发电机器件模型等,以建立电力电子器件系统仿真分析模型,实现整个系统的虚拟设计和仿真分析。

通过各种仿真数据,软件可确定出车辆在加速、巡航和制动过程中任意给定时刻、整个系统内电流的变化情况。

利用电子热流分析工具,工程师可以指定动力传动系统中主要热源(IGBT 和电机/发电机的载流部件)的几4风冷圆柱型电池模块网格(左)及冷却液流速图(右)何尺寸。

相关文档
最新文档