access

Modifying a dispersed storage network memory data access response plan

A dispersed storage network memory includes a pool of storage nodes, where the pool of storage nodes stores a multitude of encoded data files. A storage node obtains and analyzes data access response performance data for each of the storage nodes to produce a modified data access response plan that includes identity of an undesired performing storage node and an alternative data access response for the undesired performing storage node. The storage nodes receive corresponding portions of a data access request for at least a portion of one of the multitude of encoded data files. The undesired performing storage node or another storage node processes one of the corresponding portions of the data access request in accordance with the alternative data access response.




access

Vertex array access bounds checking

Aspects of the invention relate generally to validating array bounds in an API emulator. More specifically, an OpenGL (or OpenGL ES) emulator may examine each array accessed by a 3D graphic program. If the program requests information outside of an array, the emulator may return an error when the graphic is drawn. However, when the user (here, a programmer) queries the value of the array, the correct value (or the value provided by the programmer) may be returned. In another example, the emulator may examine index buffers which contain the indices of the elements on the other arrays to access. If the program requests a value which is not within the range, the emulator may return an error when the graphic is drawn. Again, when the programmer queries the value of the array, the correct value (or the value provided by the programmer) may be returned.




access

System and method for a workload management and scheduling module to manage access to a compute environment according to local and non-local user identity information

A system, method and computer-readable media for managing a compute environment are disclosed. The method includes importing identity information from an identity manager into a module performs workload management and scheduling for a compute environment and, unless a conflict exists, modifying the behavior of the workload management and scheduling module to incorporate the imported identity information such that access to and use of the compute environment occurs according to the imported identity information. The compute environment may be a cluster or a grid wherein multiple compute environments communicate with multiple identity managers.




access

Method and system for heterogeneous filtering framework for shared memory data access hazard reports

A system and method for detecting, filtering, prioritizing and reporting shared memory hazards are disclosed. The method includes, for a unit of hardware operating on a block of threads, mapping a plurality of shared memory locations assigned to the unit to a tracking table. The tracking table comprises initialization information for each shared memory location. The method also includes, for an instruction of a program within a barrier region, identifying a potential conflict by identifying a second access to a location in shared memory within a block of threads executed by the hardware unit. First information associated with a first access and second information associated with the second access to the location is determined. Filter criteria is applied to the first and second information to determine whether the instruction causes a reportable hazard. The instruction is reported when it causes the reportable hazard.




access

Managing access to a shared resource by tracking active requestor job requests

The technology of the present application provides a networked computer system with at least one workstation and at least one shared resource such as a database. Access to the database by the workstation is managed by a database management system. An access engine reviews job requests for access to the database and allows job requests access to the resource based protocols stored by the system.




access

Interleaving data accesses issued in response to vector access instructions

A vector data access unit includes data access ordering circuitry, for issuing data access requests indicated by elements of earlier and a later vector instructions, one being a write instruction. An element indicating the next data access for each of the instructions is determined. The next data accesses for the earlier and the later instructions may be reordered. The next data access of the earlier instruction is selected if the position of the earlier instruction's next data element is less than or equal to the position of the later instruction's next data element minus a predetermined value. The next data access of the later instruction may be selected if the position of the earlier instruction's next data element is higher than the position of the later instruction's next data element minus a predetermined value. Thus data accesses from earlier and later instructions are partially interleaved.




access

System for accessing a register file using an address retrieved from the register file

A data processing system and method are disclosed. The system comprises an instruction-fetch stage where an instruction is fetched and a specific instruction is input into decode stage; a decode stage where said specific instruction indicates that contents of a register in a register file are used as an index, and then, the register file pointed to by said index is accessed based on said index; an execution stage where an access result of said decode stage is received, and computations are implemented according to the access result of the decode stage.




access

Information processing apparatus for restricting access to memory area of first program from second program

A processor determines whether a first program is under execution when a second program is executed, and changes a setting of a memory management unit based on access prohibition information so that a fault occurs when the second program makes an access to a memory when the first program is under execution. Then, the processor determines whether an access from the second program to a memory area used by the first program is permitted based on memory restriction information when the fault occurs while the first program and the second program are under execution, and changes the setting of the memory management unit so that the fault does not occur when the access to the memory area is permitted.




access

Data accessing method for flash memory storage device having data perturbation module, and storage system and controller using the same

A data accessing method, and a storage system and a controller using the same are provided. The data accessing method is suitable for a flash memory storage system having a data perturbation module. The data accessing method includes receiving a read command from a host and obtaining a logical block to be read and a page to be read from the read command. The data accessing method also includes determining whether a physical block in a data area corresponding to the logical block to be read is a new block and transmitting a predetermined data to the host when the physical block corresponding to the logical block to be read is a new block. Thereby, the host is prevented from reading garbled code from the flash memory storage system having the data perturbation module.




access

Accessing model specific registers (MSR) with different sets of distinct microinstructions for instructions of different instruction set architecture (ISA)

A microprocessor capable of running both x86 instruction set architecture (ISA) machine language programs and Advanced RISC Machines (ARM) ISA machine language programs. The microprocessor includes a mode indicator that indicates whether the microprocessor is currently fetching instructions of an x86 ISA or ARM ISA machine language program. The microprocessor also includes a plurality of model-specific registers (MSRs) that control aspects of the operation of the microprocessor. When the mode indicator indicates the microprocessor is currently fetching x86 ISA machine language program instructions, each of the plurality of MSRs is accessible via an x86 ISA RDMSR/WRMSR instruction that specifies an address of the MSR. When the mode indicator indicates the microprocessor is currently fetching ARM ISA machine language program instructions, each of the plurality of MSRs is accessible via an ARM ISA MRRC/MCRR instruction that specifies the address of the MSR.




access

Managed access to media services

Methods, apparatuses and systems directed to account-based access to media services are described. A media access controller server validates a voucher for an offer of network content and issues a token permitting access to the content. A media access manager server validates the token and invokes a playlist-generation step at a publishing point, and returns the content to a user's media player. A custom plug-in on the media access manager may enforce terms of service imposed by the publisher, such as a maximum number of simultaneous streams permitted by a single voucher, or a time window for use of the voucher. Streams whose voucher's end time has expired are terminated by the plug-in.




access

Software-based aliasing for accessing multiple shared resources on a single remote host

In order to allow a single user registered on a single local host or other machine to access multiple shared resources on a remote host, an aliasing mechanism is employed so that multiple concurrent connections can be established by the user to a single remote host, with each connection using a different identity. Each connection can therefore be used to access a different shared resource on the remote host. In some illustrative examples, a user's identifier such as his or her machine log-in identification may be associated with two or more resource sharing aliases. As a result, two or more resource sharing sessions can be established by the user with a single remote host, with each of the sessions using a different one of the aliases. The resource sharing sessions are usually established in accordance with a resource sharing protocol such as the Server Block Message (SBM) protocol.




access

Secured wireless access system and related method

The disclosure is directed to a system and method for establishing a secured wireless connection allowing the exchange of information between a wireless device and aircraft equipment. The secured wireless access system may require a user controlling the wireless device to interact with an onboard interface to initiate a connection. The user may be further required to enter a randomly generated security passcode to pair the mobile device to the aircraft equipment. Further security measures may be implemented, such as tiered user access levels restricting certain equipment and/or information based upon a user identity of the user requesting access.




access

Acrylic resin composition, method of manufacturing the same, and architectural material, fashion accessory, and optical material formed using the same

The present invention provides an acrylic resin composition containing a polycrystal of colloidal particles of silicon oxide in an acrylic resin that is formed by curing an acrylic monomer liquid at room temperature and/or an acrylic oligomer liquid at room temperature, wherein a mean distance between the colloidal particles in the polycrystal is 140 to 330 nm. The size of the single crystal that constitutes the polycrystal can be controlled by adjusting the content of silicon oxide and/or the additive amount of impurities. An architectural material, a fashion accessory, and an optical material are provided that are formed by using the acrylic resin composition.




access

Method and apparatus for efficient zone switch operation in a broadband wireless access system

A wireless access system and, more particularly, a method and apparatus for more efficiently performing zone switch are disclosed. The method of performing zone switch by an advanced mobile station (AMS) in a mixed-mode advanced base station (ABS) which operates in a mixed mode of a broadband wireless access system includes receiving a ranging response (RNG-RSP) message including system information of an AMS support zone from a legacy zone (LZone) of the ABS, and performing ranging to the AMS support zone using the system information.




access

Virtual local area network (vlan) coordinator providing access to vlans

A virtual computer system includes virtualization software, and one or more physical network interfaces for connecting to one or more computer networks. The virtualization software supports one or more virtual machines (VMs), and exports one or more virtual network interfaces to the VM(s) to enable the VM(s) to access the computer network(s) through the physical network interface(s). The virtualization software modifies and filters network data frames from the VM(s) and from the physical network interface(s) to restrict one or more VMs to one or more virtual local area networks (VLANs) that are implemented within a VLAN topology. Restricting a VM to a VLAN limits the broadcast domain to which the VM belongs, which may reduce security risks facing the VM. Implementing the VLAN functionality within the virtualization software provides the functionality to every VM in the computer system, without requiring every VM to provide the functionality.




access

Orthopedic device providing access to wound site

Orthopedic device for treating neuropathic ulcers and other injuries while allowing easy access to the wound site on the plantar surface of a patient's foot includes a base portion and a sole that is either movably connected or removably connected to either the base or to a strut member. The base or strut is maintained in position on the lower leg while the sole may be rotated, slid, or completely removed for allowing inspection and access to the plantar surface of the patient's foot.




access

Apparatus, system, and method for optimally positioning an idle robotic accessor in a tape library

In one embodiment, a system includes a robotic accessor for transporting media between multiple storage slots and one or more data storage drives; a controller for controlling the robotic accessor; a memory in communication with and/or integrated with the controller for storing information about the media and the storage slots, the information including data corresponding to a physical distribution of the media in the storage slots; and logic integrated with and/or executable by the controller, the logic being adapted to: position the robotic accessor at a computed optimal position during an idle period of the robotic accessor, the computed optimal position being based at least in part on the physical distribution of the media in the storage slots.




access

Methods for analyzing, limiting, and enhancing access to an internet API, web service, and data

The invention includes an API gateway server that monitors and controls the distribution of API elements from API sources to application developers based on a distribution rule set.




access

Virtual machine migration with direct physical access control

A data processing system facilitates virtual machine migration with direct physical access control. The illustrative data processing system comprises a software-programmable trap control associated with hardware registers of a computer that selectively vectors execution control of a virtual machine (VM) between a host and a guest. The data processing system further comprises a logic which is configured for execution on the computer that programs the trap control to enable the virtual machine to directly access the hardware registers when the virtual machine is not migrated and to revoke direct access of the hardware registers in preparation for virtual machine migration.




access

Providing by one program to another program access to a warning track facility

A program (e.g., an operating system) is provided a warning that it has a grace period in which to perform a function, such as cleanup (e.g., complete, stop and/or move a dispatchable unit). The program is being warned, in one example, that it is losing access to its shared resources. For instance, in a virtual environment, a guest program is warned that it is about to lose its central processing unit resources, and therefore, it is to perform a function, such as cleanup.




access

Providing by one program to another program access to a warning track facility

A program (e.g., an operating system) is provided a warning that it has a grace period in which to perform a function, such as cleanup (e.g., complete, stop and/or move a dispatchable unit). The program is being warned, in one example, that it is losing access to its shared resources. For instance, in a virtual environment, a guest program is warned that it is about to lose its central processing unit resources, and therefore, it is to perform a function, such as cleanup.




access

Transportable vehicle access control system

A vehicle access control system includes an elongate, generally hollow, generally planar base platform having a first and a second distal end. A generally hollow enclosure is atop the base platform. A first lift gate is intermediate the enclosure and the first distal end of the base platform, while a second lift gate is intermediate the enclosure the second distal end of the base platform. A first lift arm is pivotally coupled to the first lift gate and extends generally perpendicularly away from a longitudinal axis of the base platform. Likewise, a second, opposing lift arm is pivotally coupled to the second lift gate and extends generally perpendicularly away from the longitudinal axis of the base platform. The base platform is configured for direct contact with a mounting surface. In addition, the vehicle access control system is transportable as a unit.




access

Management systems for multiple access control entities

Methods and apparatus for managing multiple user access control entities or clients. For example, in one embodiment, a “wallet” of electronic subscriber identity modules (eSIMs) may be stored and used at a user device and/or distributed to other devices for use thereon. In another embodiment, a networked server may store and distribute eSIM to a plurality of user devices in communication therewith. A database of available eSIM is maintained at the wallet entity and/or at the network which enables request for a particular eSIM to be processed and various rules for the distribution thereof to be implemented. Security precautions are implemented to protect both user and network carrier specific data as the data is transmitted between networked entities. Solutions for eSIM backup and restoration are also described.




access

Integrated structural slab and access floor HVAC system for buildings

A heat exchange and ventilation system integrated with a hollow core concrete floor having an air passage therethrough with an inlet and outlet for receiving air and permitting relative heat exchange therebetween; a raised floor supported by said hollow core concrete floor, defining a floor plenum between said hollow core concrete floor and said raised floor, said floor plenum communicating with said outlet so as to receive air from said air passage through said hollow core concrete floor; and adjustable terminal means carried by said raised floor for delivering a portion of said air from said floor plenum into a space above said floor. A method of conditioning air through a hollow core medium supporting a raised floor is also disclosed.




access

Surgical puncture access

A surgical device mitigates over-puncture with a bias spring that biases a leading, cutting edge in the opposite direction of the anticipated over-puncture. An associated locking mechanism is configured to release the force of the bias spring in a direction counter to the direction of insertion when the tension force of tissue against the cutting edge is released. Thus, when an opening in the tissue forms, the tension is released and the cutting edge can move opposite to the direction of insertion of the surgical device at the same time that an applied force drives the instrument in the direction of insertion. In this manner, the spring and locking mechanism cooperate to move the cutting edge opposite to the direction of insertion as soon as an incision is made.




access

Data distributing and accessing method and system

A data distributing and accessing method for sharing a file via a network system includes steps of: dividing the file into a plurality of blocks; distributing the blocks in a plurality of data hosts interconnected via the network system; one of the data hosts receiving a file-reading request from a user host and issuing collecting requests to other data hosts to collect the blocks from the data hosts; and transferring the collected blocks from the data hosts to the user host to be combined into the file.




access

Controlling resource access based on resource properties

Described is a technology by which access to a resource is determined by evaluating a resource label of the resource against a user claim of an access request, according to policy decoupled from the resource. The resource may be a file, and the resource label may be obtained by classifying the file into classification properties, such that a change to the file may change its resource label, thereby changing which users have access to the file. The resource label-based access evaluation may be logically combined with a conventional ACL-based access evaluation to determine whether to grant or deny access to the resource.




access

Method and system for providing conditional access to encrypted content

A method and system of providing conditional access to encrypted content includes receiving unsolicited multiply encrypted video content and first decryption data over a broadcast network. Partially decrypted video content is obtained by decrypting a first layer of encryption of the encrypted video content using the first decryption data. The partially decrypted video content is stored. A request for viewing the encrypted video content is transmitted and second decryption data is received. A second layer of encryption of the encrypted video content is decrypted using the second decryption data.




access

Selective management controller authenticated access control to host mapped resources

An information handling system includes a host mapped general purpose input output (GPIO), a shared memory, a board management controller, and a cryptography engine. The host mapped GPIO includes a plurality of registers. The board management controller is in communication with the host mapped GPIO and with the shared memory, and is configured to control accessibility to the plurality of registers in the GPIO, and to control write accessibility of the shared memory based on a private key received from a basic input output system requesting accessibility to the plurality of registers and write accessibility of the shared memory. The cryptography engine is in communication with the board memory controller, and is configured to authenticate the private key received from the board management controller.




access

Access management system

An access rights management system is presented in which a mobile device may be allowed to access corporately held data in a flexible manner but in which the security and integrity of the data is maintained. The mobile device is provided with a rights adjustment module which modifies the access rights for locally stored corporate data in dependence on the connectivity of the mobile device with a corporate server.




access

Mobile host using a virtual single account client and server system for network access and management

A Virtual Single Account (VSA) system and method that provides a mobile user with automatic authentication and connection to a remote network via local access networks with a single password, where the local access networks may be independent of the remote network. A mobile user has a single authentication credential for one VSA that is utilized by a VSA client installed on a mobile computing device. The VSA client provides for automatically authenticating and connecting the user's mobile device to a current local access network, and the target remote network such as the user's office network. All authentication credentials are encrypted using a key generated from the user's VSA password that is generated from the user's single password. The VSA client derives the key from the submitted VSA password and decrypts all authentication credentials that are required in order to connect the mobile device to the current local access network and thereafter to the office network.




access

System and method of lawful access to secure communications

The present disclosure relates to systems and methods for secure communications. In some aspects, one or more values used to generate an encryption key used to encrypt a packet are stored in a header of the packet. The packet is transmitted with the encrypted data portion in a communication. In some aspects, one or more values used to generate an encryption key are received. The encryption key is regenerated using the one or more values.




access

Automated storage accessories

Kit of improved accessories suitable for automated storage structures (20) comprising an automatic clamping system adapted to lock in position workpieces stored during transport on a truck, plant conveyor or any other vehicle and supporting elements (11) for the workpieces stored each formed by bending of iron wire according to the workpiece profile.




access

OHT accessible high density stocker and method

A storage system for items such as substrate carriers includes at least one stocker including a plurality of storage areas each adapted to store at least one storage device. At least one movable support is arranged on the at least one stocker. A control controls movement of the at least one movable support at least between a first position wherein the at least one movable support receives the at least one storage device outside one of the storage areas and a second position wherein the at least one movable support is arranged substantially within the one of the storage areas.




access

Grain bin access door and discharge chute system and method

A grain bin access door and chute system that can be retrofitted into existing grain bins or installed in new grain bins. The access panel includes an outer door and an inner door and allows a user to quickly access and assess the grain within a bin without fear of falling into the grain or through the crust of grain which can form a bridge on the top of grain. The access door includes a lever-controlled chute door and pipe-chute connection. This allows grain to be gravity fed into awaiting grain trucks or rail cars without using a more dangerous grain auger and without relying on outside energy sources. Additionally, grain transferred through a gravity-fed method is less likely to become damaged than grain transferred through a grain auger. An optional grain agitator may likewise be installed within the grain bin.




access

Method and system for locating a wireless access device in a wireless network

A wireless access device in a wireless network, whether a known or unknown entity, can be located using a geolocation system according to the present invention. A signal strength is determined by a wireless intrusion detection system (WIDS) node in a wireless network for each wireless access device that it detects. Based on the signal strength, an approximate distance from the node is determined, which, in one embodiment corresponds to a radius of a circle around the node. To account for error, an approximation band of the circle is calculated that will allow a user to determine the approximate location of the device within the wireless network.




access

Action figure with accessories

A toy is provided, the toy having: an action figure with a pair of appendages movably secured thereto for movement between a first separated position and a second un-separated position; a pair of accessories removably secured to the pair of appendages; and wherein the pair of accessories are configured to be secured to each other and form an item when the pair of appendages are in the second un-separated position and the pair of accessories are secured to the pair of appendages.




access

Payment or other transaction through mobile device using NFC to access a contactless transaction card

A mobile device utilizes an embedded near field communication (NFC) capability to interact with a contactless transaction card to automatically obtain information from the card, e.g. reducing or eliminating the burden of manual user entry of the account information or the like into the mobile device. The mobile device, for a financial account transaction example, may read the information from the card at the time of a transaction, e.g. to facilitate an on-line purchase, an in-store purchase, ATM transaction or the like. The mobile device may store the information from one or more contactless transaction cards, for use in future transactions of various types. The mobile device and/or a server in communication with the mobile device may track various user activities on the mobile device that also utilize information obtained from the contactless transaction card.




access

Screwless carrying frame for data access devices

A screwless carrying frame for data access devices is fixed to a bottom board and includes a first frame body having an upper structure with an upper vertical plate and an upper transverse plate connected into a step shape. The upper vertical plate has elastic packing elements, and the upper transverse plate has elastic support elements. A second frame body is installed at the bottom board and connected to the first frame body and includes an upper structure with an upper riser plate and an upper horizontal plate connected into a step shape. An upper carrying space is formed between two upper structures of the first and second frame bodies for accommodating the data access device. The elastic packing element is elastically packed at a lateral side of the data access device and the elastic support element is elastically supported at a bottom side of the data access device.




access

System and methods for variable distribution and access control for purchased event tickets

A system and methods for providing variable distribution and access control for purchased event tickets are described. In one embodiment, a network-based system receives an order for electronic tickets purchased by a buyer, receives one or more recipients other than the buyer for one or more of the electronic tickets, receives delivery options for the recipients from the buyer, receives delivery information for the recipients from the buyer, and delivers electronic ticket information to the recipients. Other embodiments are described and claimed.




access

Bag with detachable hanging accessory portion

In an embodiment of the disclosed technology, a bag is used for transporting and organizing items. The bag is generally formed of a removably attachable upper and a lower portion. The upper portion forms at least a portion of one side of the bag and is attached to the lower portion by a fastening mechanism. The lower portion forms the bottom and at least a portion of the sides of the bag. The upper portion is detachable to provide a hanging accessory organizer, having pockets and suspension device. In embodiments of the disclosed technology, access to the bag may be provided by an additional fastenable opening. Zippers may be used as the fasteners, and may run parallel to one another, completely or partially surrounding the perimeter of the upper portion.




access

Container system adapted to be accessed by a user riding a horse

Disclosed is a container system that is adapted to be accessed by horse mounted users. The container system finds particular application in storing equestrian implements, such as riding crops. The container is mounted at an elevated height upon a fence and additionally includes rounded forward faces. Thus, the container is easy to access by riders and presents less of a danger to the horse and its rider. Furthermore, the container is advantageously formed from a weather resistant plastic material.




access

Computer-controlled common access cabinet

A control system for a common access cabinet having a plurality of drawers and electrically controlled latches. Each latch corresponds to one drawer and is configured to receive an electrical signal. The electrical signal contains an address assigned to a particular drawer. When a latch receives a signal that defines the address of the drawer to which that latch corresponds, the latch unlocks that corresponding drawer. The latches receive the signals over an asynchronous serial interface bus. A user input device receives user identification data that is processed by a processor device to determine if the user is authorized to access any of the drawers. If the user is authorized, the processor device generates a signal that contains an address that corresponds to a drawer identified in the user identification data. The signal is converted to an asynchronous serial signal which is routed to the asynchronous serial interface bus.




access

Wire access line drum assembly

One aspect of the disclosed subject matter is seen in a wire access line drum assembly, comprising a tubular drum, first and second end portions, and a shaft. The tubular drum includes a first end, a second end, and an inner diameter of a first preselected size. The first and second end portions are coupled to the first and second ends of the tubular drum, and the shaft extends at least partially within the tubular drum. The shaft has an outer diameter of a second preselected size substantially similar to the first preselected size. Another aspect of the disclosed subject matter is seen in a drum storage system. The drum storage system is comprised of a plurality of wire access line drums and a rack. The plurality of wire access line drums each have a wire access line pre-spooled thereon, and the rack is designed to receive the plurality of wire access line drums in a configuration to permit one or more of the wire access lines to be retrieved from the rack and transported to a job site.




access

Accessory cart

In the specification and drawings an accessory cart is described and shown with a base, a housing element that is connected to the base and extends upward from the base, and a platform, which is connected to the housing element with the height of the platform being automatically adjustable.




access

Clipboard with mounting accessories

A clipboard having a board assembly with a front face and a rear face. A clip assembly is mounted onto the board assembly. The board assembly docks onto a docking assembly. The front face is defined by a top edge, a bottom edge, and first and second lateral edges. The rear face has first and second lower interior channel guide edges and first and second higher interior channel guide edges. The board assembly tapers from the top edge towards the bottom edge. The first and second higher interior channel guide edges terminate forming a channel neck. The channel neck is a channel to receive the docking assembly. The rear face further has at least one grip section that extends from the first or second lateral edge. The front face has a recessed face, and the clip assembly has a docking station, a spring assembly, and a writing instrument holder.




access

Universal accessories for oscillating power tools

An accessory for coupling to an attachment mechanism of an oscillating power tool includes a working end, an opposite rear end, and a fitment portion adjacent the rear end portion. The fitment portion includes a generally U-shaped opening having a central portion and a rearward portion open to the rear end, and configured to receive a post of a tool clamping mechanism. The fitment portion further includes a first plurality of openings in communication with and extending radially outward from the central portion, a second plurality of openings not in communication with and positioned radially outward from the central portion. The central portion, the first plurality of openings, and the second plurality of openings are configured to couple the fitment portion to a plurality of different configurations of attachment mechanisms for oscillating power tools.




access

Shelf accessory for a dishwasher rack

A shelf accessory for a dishwasher rack is provided, comprising a spine extending in parallel with a structural member of the rack. A plurality of loops extends perpendicularly from the spine, and the loops are spaced apart in relation to each other along the spine, and cooperate therewith to define a shelf member. A clip member is operably engaged between the shelf member and the structural member, and is configured to be capable of rotating about the structural member such that the shelf member correspondingly orbits about the structural member. The clip member further comprises at least one retention member operably engaged therewith. The at least one retention member is configured to cooperate with the rack so as to retain and support the shelf member in at least one of a plurality of angular positions with respect to and about the structural member. Associated apparatuses are also provided.




access

Self-contained automatic access port unit for a countertop, with methods of use thereof

A self-contained automatic access port unit having a sensor that recognizes when refuse is approaching the cover, and to activate a direct current motor, solenoid, or drive cylinder which in turn moves a drive arm to open a cover to permit refuse to drop through the access port unit into a trash container therebelow, thereby avoiding the need for a user to make contact with the trash access port. A switch or timer causes the access port unit to close its cover. Motion of the drive arm is initiated by the motor, solenoid or drive cylinder, but continues through momentum imparted to the drive arm and cover. The cover engages a seal ring to provide a uniform impervious countertop surface.