Files
claudetools/clients/dataforth/session-logs/MEMORY.md
OC-5070 ece3222d3a Add AD1 session data, memory entries for datasheet pipeline and security incident
- Imported AD1 Claude session files to clients/dataforth/session-logs/
- Created memory: project_datasheet_pipeline.md (full pipeline architecture)
- Created memory: project_dataforth_incident_2026-03-27.md (security incident + MFA)
- Updated MEMORY.md index
- Updated session log with AD1 pipeline rebuild findings

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-03-27 20:07:20 -07:00

1.3 KiB

  • AD2 crypto wipe context — This machine is AD2, wiped due to crypto attack, many files missing
  • ENGR share exploration — Progress exploring \AD1\Engineering\ENGR for test datasheet pipeline
  • Test datasheet pipeline map — Full 5-stage pipeline: DOS stations -> NAS -> AD2 sync -> DFWDS -> web upload
  • Pipeline rebuilt 2026-03-27 — New server-side pipeline replaces CTONWTXT/DFWDS/Uploader; 1470 model specs; exact-match TXT generation
  • CTONWTXT.BAT gap — Current AUTOEXEC doesn't call CTONWTXT.BAT; now bypassed by server-side generation
  • New product lines — MAQ20 (XLS), PWRM10 (XLS), 10D (JSON, ~May 2026), DSCMHV — different formats from legacy QB pipeline
  • Haubner machine backup — D: drive on HGHAUBNER (192.168.0.148) has pre-crypto backups; firewall was blocking, fixed
  • SN from data not filenames — Always extract serial numbers from DAT record data, never from 8.3 encoded filenames
  • Mike Swanson - user profile — External IT consultant (azcomputerguru.com) managing Dataforth recovery; contacts: John Lehman, Peter Iliya