摘要:
A method for validating an eligibility for verification of a memory device (110) within an embedded demand paged memory operating system environment is provided. The method includes receiving a request from an application being executed by a processor (115) coupled to the memory device (110), the request to utilize at least one memory location (150). The method includes identifying, by the processor (115), at least one memory block (160) corresponding to at least one memory location (150) within the memory device (110), determining, by the processor (115), whether the at least one memory block (160) is eligible for verification, and producing an eligibility result based on the determination by the processor (115). A system for validating an eligibility for verifying memory device (110) integrity is also disclosed.
摘要:
A system for isolating faults in emergency systems, the system including first and second power lines, and one or more zones. Each zone has first and second zone line isolators, the first zone line isolator is connected between the first power line and the respective zone, and the second line isolator is connected between the second power line and the respective zone. Each first line isolator is configured to disconnect the zone from the first power line upon occurrence of a short circuit in the zone. Each second line isolator is configured to connect power from the second power line upon occurrence of an open circuit in the zone.
摘要:
A control system (16) is provided. The control system includes a radio frequency (RF) transmitter-receiver module (26) configured to transmit and receive first RF signals (30) within a first RF range (104), the RF transmitter-receiver module including at least one RF transmitter-receiver (42), an RF receiver module (24) configured to receive second RF signals (22) within a second RF range (102) that at least partially overlaps the first RF range, the RF receiver module including at least one RF receiver (40), and a processor (28) coupled in communication with the RF transmitter-receiver module and the RF receiver module. The processor is configured to engage (302) in a first communication session (402) with a remote RF device (14) using the RF transmitter-receiver module to transmit a first outgoing message within the first RF signals and detect (304) a second communication session (406) within the second RF signals using the RF receiver module, the second RF signals transmitted by a system RF device (12) and including an incoming message encoded therein. The processor is further configured to, when the second communication session is detected, interrupt (306) the first communication session for a time period (408), receive (308) the second RF signals during the time period using the RF receiver module, and after the time period expires, resume (314) the first communication session.
摘要:
A method of transferring data includes connecting a mobile device to each of a plurality of network devices at separate respective times and via a respective network connection for each network device. Each of the network devices is connected to a separate respective logical computing network. The method also includes transferring a different respective portion of a data file from the mobile device to each respective network device via the respective network connection and storing the respective portion of the data file on the respective logical computing network. The method further includes disconnecting the mobile device from each respective network connection before connecting to any other one of the network devices. It is also contemplated that the method can account for instances where disconnection of the mobile device from a network device results in incomplete or corrupt transfer of data.
摘要:
A system for security panel content management is disclosed. A security panel can request and receive text files with content information from a content management server. The security panel can parse the text files and use the content information to populate a content store. The content store can display the content information for a security panel user, and the security panel can retrieve content from a remote file server based on a user request via the content store.
摘要:
A digital video system comprises a plurality of recorders and a client device. The recorders are configured to store digital video from a common source. The client device comprises a screen, an input device, and a processor configured to run a graphical user interface (GUI). The GUI comprises a timeline, a selection indicator, availability indicators, and event tags. The timeline is adjustable by user input via the input device. The selection indicator is movable on the timeline by user input via the input device, and designates a time of interest. The availability indicators indicate aggregate availability statuses of video at each time on the timeline, from the plurality of recorders. The event tags indicate types and times or time ranges of events on the timeline. The client device is configured to receive video availability information from the plurality of recorders, and the processor is configured to update the GUI as the aggregate availability status of video changes.
摘要:
A method for verifying memory device integrity includes identifying at least one memory block corresponding to at least one memory location within a memory device. The memory block is associated with a prior checksum. It is determined whether the first memory block is designated read-only. A current checksum is calculated based at least in part on data within the memory block. When the first memory block is designated read-only, and the prior checksum represents expected data within the first memory block, it is determined whether the current checksum is equal to the prior checksum. When the current checksum is not equal to the prior checksum, a verification failure for the first memory block is indicated via a notification interface. A system for verifying memory device integrity is also disclosed.
摘要:
A system and method for operating a security system include a device control module configured for electronic communication with a plurality of devices and a user interface coupled in electronic communication with the device control module. The user interface includes a voice memory and a first speaker. The user interface is configured to receive a first system event from the device control module identifying a first condition detected by the security system. The user interface is further configured to retrieve a voice message from the voice memory corresponding to the first system event and transmit the voice message via the first speaker.