摘要:
Techniques are described for reducing write operations in memory. In use, write operations to be performed on data stored in memory are identified. A difference is then determined between results of the write operations and the data stored in the memory. Difference information is stored in coalescing memory buffers. To this end, the write operations may be reduced, utilizing the difference information.
摘要:
A packet data session release method for ultra mobile broadband access network is disclosed, and which includes: S402, when releasing the packet data session, an access gateway sends a proxy mobile IP registration revocation message to the data attachment point of the ultra mobile broadband access network and the evolved base station which has one reverse proxy mobile IP tunnel to the access gateway, respectively; S404, after receiving the proxy mobile IP registration revocation message, the data attachment point and the evolved base station which has one reverse proxy mobile IP tunnel to the access gateway, delete their proxy mobile IP tunnels between them and the access gateway, respectively, and send a proxy mobile IP revocation ACK message to the access gateway, respectively, so as to confirm the reception of the registration request messages; and S406, the data attachment point notifies the session reference network controller that the packet data session has been released, via sending a IP tunnel notification message to the session reference network controller.
摘要:
A client computer and/or a user is authenticated via installation of an agent, permitting access to previously inaccessible resources. All users are initially denied access to a resource via a permission list, such as a by being a member of a group that is denied access. The user, once authenticated, is permitted to access the resource, e.g. by being temporarily removed from a cached copy of the group, by being temporarily added to a cached copy of a group allowed to access the resource, or both. Authentication is revoked when the agent is uninstalled. Subsequent accesses to the resource are not permitted, e.g. by undoing the temporary removal or addition. An optional resource firewall proxy server between client computers and a resource filters requests for the resource, and until a user is authenticated via an out-of-band communication from an agent, the user is denied access to the resource.
摘要:
A system, method, and computer program product are provided for inserting a gap in information sent from a drive to a host device. In operation, one or more commands are received at a drive from a host device. Additionally, information is queued to send to the host device. Furthermore, a gap is inserted in the information to send to the host device such that the host device is capable of sending additional commands to the drive.
摘要:
A system, method, and computer program product are provided for reducing write operations in memory. In use, write operations to be performed on data stored in memory are identified. A difference is then determined between results of the write operations and the data stored in the memory. Difference information associated with the difference is stored in the memory. To this end, the write operations may be reduced, utilizing the difference information.
摘要:
Storage gateway remote and local access to storage devices is provided in part via a target implementing bandwidth-controlled access to the devices. The target may be iSCSI-compatible, and may also optionally implement protection, security, and performance features. The protection and security features include any combination of VLANs, zoning, Logical Unit Number (LUN) masking, and encryption. The performance features include any combination of HW-accelerated Remote Direct Memory Access (RDMA), prioritized I/O operations, and service priority (such as strict priority and straight or weighted round-robin priorities). An initiator may be implemented in a Processor Memory Module (PMM) coupled to a switch fabric that is in turn coupled to a target implemented in a Fibre Channel Module (FCM). Storage traffic may be communicated as Small Computer System Interface (SCSI)- and SCSI over Transmission Control Protocol/Internet Protocol (iSCSI)-compatible information (data and commands) on the switch fabric via cellifying input/output interface devices.
摘要:
Enhanced mesh network performance is provided by computation of a path metric with respect to multi-hop paths between nodes in a mesh network and determination of a path through the mesh network that is optimal according to the path metric. Information is communicated in the mesh network according to the determined path. Nodes in the mesh network are enabled to communicate via one or more wireless links and/or one or more wired links. The path metric optionally includes an effective bandwidth path metric having elements (listed from highest to lowest conceptual priority) including an inverse of a sustainable data rate, a number of wireless links, and a number of wireless and wired links. The sustainable data rate is a measure of communication bandwidth that is deliverable by a path for a period of time. Accounting is made for interference between contiguous wireless links operating on the same channel.
摘要:
An apparatus, method, and computer program product are provided for identifying at least one aspect associated with a lifetime of each of a plurality of memory devices. Further, data is moved between the plurality of memory devices, based on the at least one aspect.
摘要:
Increased confidence in, and acceptance of, cordless hand-held scanners may be obtained through a cordless hand-held scanner with improved user feedback. In an illustrative embodiment, the state of one or more indicators is changed as a result of feedback from a coupled host processor. The indicators are set to a first (or pending) state when a scan is performed, and remain in the first state up until the time the host feedback is received. The indicators are set to a second (or successful) state if the feedback indicates the host successfully received the scan data. The indicators are set to a third (or failure) state if the feedback indicates the host failed to properly receive the scan data. Obtaining timely confirmation that the host processor has received the scan successfully leads to increased confidence in, and acceptance of, the cordless hand-held scanner.
摘要:
High-speed reliable parallel data transmission between a computer and a parallel peripheral is provided by a peripheral controller by way of a virtual parallel UART (VPU). The VPU provides a novel parallel interface for higher speed parallel interface operation. The VPU is included in the peripheral controller along with a conventional RS-232 UART. The peripheral-side interface of the peripheral controller provides full bidirectional handshaking with the parallel peripheral. The host-side interface of the peripheral controller provides a legacy serial port compatible interface. Mode information selectively configures operation in either a VPU (parallel) or a UART (serial) mode. Both modes appear identical to software executing on the computer, enabling the use of standard serial I/O drivers without modification, and providing transparent legacy mode compatibility even when the hardware is configured for VPU mode.