摘要:
A computer system includes a system memory (SM) and a non-volatile memory (NVM). The computer system is arranged to copy at least a part of the system state, stored in the system memory during a clean boot-up procedure, into the non-volatile memory (209, 329). During subsequent start-ups of the computer system, the system state is copied from the non-volatile memory into the system memory (205, 305), resulting in a significantly faster system start-up. In case the configuration of the computer system has changed, the complete boot-up procedure is executed again and the new system state is copied into the non-volatile memory, overwriting the previously stored system state.
摘要:
The present invention relates to a method for managing memory space of a persistent-memory device and to a memory management device. The memory management method of the invention comprises a step of allocating (S14) at least one first part of said memory space to a file system (74) upon request from said file system (74) or from an application (70). The method and the device of the present invention enable a dynamical allocation of persistent-memory space to a file system. This way, the memory space of a persistent memory is effectively used also for write-caching. At the same time, write-caching and storing steps can be accelerated.
摘要:
A digital television system includes a first tuner and first decoder for tuning to and decoding a selected digital television signal. A second tuner and second decoder are included for tuning to and decoding a separate digital television signal containing mosaic views of the receivable television signals. Upon a channel change command, first tuner is tuned to the new channel. Simultaneously, the output from the second decoder corresponding to the new channel is applied to the display. As such, the new channel is available for immediate viewing without waiting during the typical decoder delay.
摘要:
Data, stored in MRAM-cells (12) should be protected against misuse or read-out by unauthorised persons. The present invention provides an array (10) of MRAM-cells (12) provided with a security device (14) for destroying data stored in the MRAM-cells (12) when they are tampered with. This is achieved by placing a permanent magnet (16) adjacent the MRAM-array (10) in combination with a soft-magnetic flux-closing layer (18). As long as the soft-magnetic layer (18) is present, the magnetic field lines (20) from the permanent magnet (16) are deviated and flow through this soft-magnetic layer (18). When somebody is tampering with the MRAM-array (10), e.g. by means of reverse engineering, and the flux-closing layer (18) is removed, the flux is no longer deviated and affects the nearby MRAM-array (10), thus destroying the data stored in the MRAM-cells (12).
摘要:
The invention relates to a method of writing data to and reading data from a memory (102) by a host. By limiting processing time, time restrictions regarding the data to be processed can be met. However, this is at the expense of data integrity. By setting time limits for a group (300) of multiple processing assignments and dynamic allocation of time, reserved for error recovery and retries, data integrity can be improved, while time limits can still be met. Furthermore, by attaching priorities to the assignments, multiple types of data can be handled in one group of assignments. For example, assignments with real-time requirements can be put in a group with assignments with best effort requirements. In this way, more flexible planning of processing assignments is possible. The invention also relates to a system for writing data to and reading data from a memory.
摘要:
A system (100, 300) like a video on demand server has a storage medium (106) with a number of files (200) from which data can be fetched or in which data can be stored. A file contains a number of clusters (202, 204, 206) and each cluster contains a number of storage sectors (208) that are physically successively organized on the storage medium. When a new stream is requested, either for reading or writing, a block size (210) is determined for the new stream. The block size is large enough to support the rate of the stream and is chosen such that a cluster can be read with an integer number of blocks by evenly partitioning the size of the cluster into the size of the blocks reading the cluster.
摘要:
A method is disclosed for distributing information content. The content is encoded into a plurality of layers comprising a base layer and an enhancement layer, such that the base layer is needed for reconstructing said information content. The enhancement layer is transmitted by means of superdistribution. Optionally, an accessible sample of the base layer can also be provided. When receiving the layer(s) users will become interested in purchasing the content. Thus, according to the method a request for purchase is received from a user, and upon such a request the base layer is transmitted to the user. Not until the user holds both the base layer and the enhancement layer the content can be satisfactorily used. A system, a server, and a computer program product, providing corresponding distribution capabilities are also disclosed.
摘要:
A method for breathing of scheduling algorithms for a storage device (110). The method including: (a) computing a worst-case duration of a breathing cycle (P) for the storage device (110); (b) starting a breathing cycle; (c) determining if one of the following becomes true before the end of P: (i) a number of real-time requests is at least a predetermined threshold based on a number of data streams and performance parameters of the storage device; and (ii) a number of pending requests for any single stream becomes more than one; (d) if at least one of (i) and (ii) remain true during the duration of P, starting a subsequent breathing cycle after completion of the breathing cycle; and (e) if both of (i) and (ii) are not true during the duration of P, waiting P time units from the start of the breathing cycle before starting the subsequent breathing cycle.
摘要:
In a file system and in particular in a real-time file system it might not be possible to write a data to disc completely. Nevertheless the data that has been written to disc is often still useful, for example in case of an MPEG-stream. Marking parts of the file defective in the file system providing meta-data enables an application to perform application specific error correction or error concealment. By using a filter driver, the file system can be extended with this error handling, thus making this functionality available to every application.
摘要:
Non-contiguous storage of data objects seriously hampers retrieval speed of said data objects (202). Furthermore, when multiple data objects are retrieved of which some are fragmented, retrieval time of all data objects gets less predictable. Therefore, it is desirable to retrieve non-fragmented data objects only. For certain cases, this is possible, as not necessarily one specific data object has to be retrieved. In such cases, retrieval of a similar data object, of the same type, is sufficient. To this, the invention provides among others a method and circuit (124) for retrieval of data. The invention is especially suitable for retrieving audiovisual data for trickplay. When a first frame selected for rendering is stored fragmented, a second, not fragmented frame is selected and retrieved instead of the first frame.