Files
claudetools/clients/dataforth/session-logs/MEMORY.md
OC-5070 ece3222d3a Add AD1 session data, memory entries for datasheet pipeline and security incident
- Imported AD1 Claude session files to clients/dataforth/session-logs/
- Created memory: project_datasheet_pipeline.md (full pipeline architecture)
- Created memory: project_dataforth_incident_2026-03-27.md (security incident + MFA)
- Updated MEMORY.md index
- Updated session log with AD1 pipeline rebuild findings

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-27 20:07:20 -07:00

10 lines
1.3 KiB
Markdown

- [AD2 crypto wipe context](project_ad2_context.md) — This machine is AD2, wiped due to crypto attack, many files missing
- [ENGR share exploration](project_engr_share_exploration.md) — Progress exploring \\AD1\Engineering\ENGR for test datasheet pipeline
- [Test datasheet pipeline map](project_test_datasheet_pipeline.md) — Full 5-stage pipeline: DOS stations -> NAS -> AD2 sync -> DFWDS -> web upload
- [Pipeline rebuilt 2026-03-27](project_pipeline_rebuilt.md) — New server-side pipeline replaces CTONWTXT/DFWDS/Uploader; 1470 model specs; exact-match TXT generation
- [CTONWTXT.BAT gap](project_ctonwtxt_gap.md) — Current AUTOEXEC doesn't call CTONWTXT.BAT; now bypassed by server-side generation
- [New product lines](project_new_product_lines.md) — MAQ20 (XLS), PWRM10 (XLS), 10D (JSON, ~May 2026), DSCMHV — different formats from legacy QB pipeline
- [Haubner machine backup](reference_haubner_backup.md) — D: drive on HGHAUBNER (192.168.0.148) has pre-crypto backups; firewall was blocking, fixed
- [SN from data not filenames](feedback_sn_from_data.md) — Always extract serial numbers from DAT record data, never from 8.3 encoded filenames
- [Mike Swanson - user profile](user_mike_swanson.md) — External IT consultant (azcomputerguru.com) managing Dataforth recovery; contacts: John Lehman, Peter Iliya