摘要:
A database system is capable of executing a database application that transfers a logical object in multiple fragments. The database system comprises a main storage site, a remote storage site, a main protocol executable on the main storage site, and a remote protocol executable on the remote storage site. The remote storage site is capable of linking to the main storage site and mirroring information stored in the main storage site. The remote storage site includes a storage and a cache sidefile divided into a plurality of array sidefile recordsets. The main protocol is capable of including information indicative of logical object fragment commencement and completion in the multiple fragment database application transfer. The remote protocol is capable of controlling the cache sidefile to cache the multiple fragments as received and to enable destaging of the logical object to the storage on receipt of all fragments.
摘要:
A system for granting access to resources includes a client machine, a collection agent, a policy engine, and a broker server. The client machine requests access to a resource. The collection agent gathers information about the client machine. The policy engine receives the gathered information and assigns one of a plurality of levels of access responsive to application of a policy to the received information. The broker server establishes, responsive to the assigned level of access, a connection between the client machine and a computing environment providing the requested resource, the computing environment provided by a virtual machine.
摘要:
One embodiment of the present invention provides a system that facilitates transferring data between a data device and a data terminal across a network. The system initializes itself by establishing connections between the controller, multiplexer, and data device. The system operates by receiving a request at a multiplexer from a controller to transfer data from the data device to the data terminal. The multiplexer forwards this request to the data device that has the requested data. The multiplexer then receives a set of parameters from the data device, including the location of the outgoing data within the data device. The multiplexer moves the data from the data device into an outgoing data stream, thereby removing the necessity of first copying the data into the controller.
摘要:
A computer implemented method, apparatus, and computer usable program code for collecting data. The data is collected from a particular data source by an application portion of agent to form collected data. The application portion is associated with the particular data source in response to an event. The collected data stored in a temporary data store for transfer to a data storage system to form stored data. The stored data sent to the data storage system using a generic portion of the agent, wherein the generic portion of the agent is configured to send data to the data storage system.
摘要:
A file is striped across multiple filers, file servers or other devices, to create a sparsely striped multi-component file. Each filer stores one sparse component. In particular, each component physically stores only those stripes allocated to that component. The other stripes are represented as holes. Thus, instead of contiguously packing each component's stripes at the block level, each component is a file having the same logical structure. A component of a sparsely striped multi-component file can be easily converted to a mirror by filling in its holes. Similarly, a mirror can be easily converted to one component of a sparsely striped multi-component file by removing or ignoring it unallocated stripes. In either case, the layout or logical of the component does not need to be reconfigured.
摘要:
A contextual fault handling method and apparatus in a printing system replaces a first diagnostic message with a second diagnostic message based on a frequency of occurrence of an underlying fault. The first message includes information relating to a symptom of a first fault and the second message includes information relating to a root cause of the first fault. Printer usage log data is collected during operation of the printing apparatus. A trend analysis is performed on the print usage log data. Then, in response to a second occurrence of a first fault event and based on a result of the trend analysis, a second diagnostic message is displayed for providing information to the operator or end user relating to a root cause of the fault. The second diagnostic message could be displayed together with the first message or as a replacement for the first message
摘要:
The present invention discloses an adaptable cushion system comprising a first and second cushion member each having a first side and a second side parallel to the first side, wherein the first side and second side each has at least two connector straps operably connected thereto, wherein each connector strap has a female fastener and a complementary male fastener, wherein the connector straps of the first cushion member are configured to attach to the connector straps of the second cushion member to form a plurality of fastener assemblies.
摘要:
A seat adjustment mechanism for a vehicle seat including a seat bottom supported by the vehicle and a seatback coupled to the seat bottom is provided. The seat adjustment mechanism includes a first kneel mechanism connected to the vehicle seat and a powered motor operably connected to the first kneel mechanism. The powered motor drives the first kneel mechanism to translate the seatback and seat bottom relative the vehicle to manipulate the seat assembly into a desired configuration.
摘要:
A method is provided of enabling respective users (A, B) of first and second devices (12, 2) of a trusted network to perform a secure transaction between them. A communications channel, such as a telephone conversation, is established between the users (A, B). A verification identifier for the transaction is communicated between the users (A, B) using the communications channel (A6). The verification identifier is stored (A3) at the first device (12) as a reference identifier for the transaction. A secure connection is opened between the two devices (12, 2) over the trusted network (A10), the secure connection being different to the communications channel between the users (A, B). The verification identifier is sent (A11) from the second device (2) to the first device (12) over the secure connection. The verification identifier received over the secure connection is compared (A12) with the reference identifier at the first device (12). The secure transaction is performed over the secure connection (A15) in dependence upon the comparison.
摘要:
In a method according to an embodiment of the invention, it is determined whether there is an attempt by a device to access data representing music. If there is such an attempt by the device one of various actions may be performed, such as providing an offer to purchase an item. Determining whether there is such an attempt by the device may include reading data and determining whether the read data includes data representing music.