- Imported AD1 Claude session files to clients/dataforth/session-logs/ - Created memory: project_datasheet_pipeline.md (full pipeline architecture) - Created memory: project_dataforth_incident_2026-03-27.md (security incident + MFA) - Updated MEMORY.md index - Updated session log with AD1 pipeline rebuild findings Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
1.3 KiB
1.3 KiB
- AD2 crypto wipe context — This machine is AD2, wiped due to crypto attack, many files missing
- ENGR share exploration — Progress exploring \AD1\Engineering\ENGR for test datasheet pipeline
- Test datasheet pipeline map — Full 5-stage pipeline: DOS stations -> NAS -> AD2 sync -> DFWDS -> web upload
- Pipeline rebuilt 2026-03-27 — New server-side pipeline replaces CTONWTXT/DFWDS/Uploader; 1470 model specs; exact-match TXT generation
- CTONWTXT.BAT gap — Current AUTOEXEC doesn't call CTONWTXT.BAT; now bypassed by server-side generation
- New product lines — MAQ20 (XLS), PWRM10 (XLS), 10D (JSON, ~May 2026), DSCMHV — different formats from legacy QB pipeline
- Haubner machine backup — D: drive on HGHAUBNER (192.168.0.148) has pre-crypto backups; firewall was blocking, fixed
- SN from data not filenames — Always extract serial numbers from DAT record data, never from 8.3 encoded filenames
- Mike Swanson - user profile — External IT consultant (azcomputerguru.com) managing Dataforth recovery; contacts: John Lehman, Peter Iliya