Abstract:
A system and method for providing multiple virtual private networks from a computer system. The computer system communicates with a remote computer system in order to allow encrypted data traffic to flow between the respective systems. Two phases are used to authenticate the computer systems to one another. During the first phase, digital certificates or pre-shared keys are used to authenticate the computer systems. A phase 1 ID rules list contains authentication rules for local-remote computer pairs. During the second phase, a hash value is used to authenticate the computer systems and a security association payload is created. The remote system's IP address is used for connecting. The phase 1 ID rules list corresponds to one or more phase 2 ID rules lists. If the remote ID is not found in the phase 2 ID rules list, a default rule is used based upon the phase 1 ID rules list.
Abstract:
A system and method for advanced warning of severe weather for general aviation aircraft is presented. An aircraft includes an onboard weather tracker which monitors atmospheric condition changes. The weather tracker uses data from an onboard barometric altimeter and a GPS device to calculate air pressure changes in order to identify when the aircraft is flying into a low-pressure zone. The weather tracker uses the air pressure's rate of change and the aircraft's speed to determine the criticality of a situation and appropriately notifies a pilot. The weather tracker provides the pilot with local airport information and alternative flight pattern information per the pilot's request.
Abstract:
An off-screen buffer manager controls when the off-screen buffer is destroyed and re-created improving system performance. A screen request is received for a Java screen component and a determination is made whether there is already an off-screen buffer. If there is not an off-screen buffer, a new off-screen buffer is created and the component requesting the screen request is associated with the off-screen buffer. If an off-screen buffer already exists, a determination is made as to whether the off-screen buffer is large enough to handle the incoming request. If the off-screen buffer is large enough to handle the request, the existing off-screen buffer is used to handle the request, otherwise, the existing off-screen buffer is deleted and a new off-screen buffer is created and the component identifier of the deleted off-screen buffer is associated with the new off-screen buffer.
Abstract:
An improved system and method for improving complex storage locks that manage access to a shared resource. A FIFO queue is maintained for processes waiting to read or write to the shared resource. When the shared resource is available, the first item is read from the queue. If the first item is a write requestor, the requestor is woken up in order to request the lock. If the first item on the queue is a read requestor, then that read requestor is woken up along with any other read requestors read from the queue until a write requestor is encountered or the end of the queue is reached. When the write wanted flag is set, new read requestors are denied access to the read lock, however any read requestors that were woken up in order to use the read lock are granted a read lock.
Abstract:
In traditional Fiber Channel systems, remote devices connected to the Fiber Channel network using a bridge or included in a storage enclosure are not tracked. If a remote device, such as a SCSI disk device, is removed or swapped, data errors such as data corruption can result. A device identifier corresponding to the remote device is obtained from the remote device. The device identifier may include the remote device's serial number and other identifying information pertaining to the device. The first time the remote device is used, the device identifier is obtained and stored by the Fiber Channel device using the remote device. This device identifier is compared with subsequently obtained identifiers. If the identifiers match, communication with the remote device occurs. However, if the identifiers do not match, an error condition is raised indicating that the remote device has been removed or swapped.
Abstract:
An extended attribute data page includes extended attribute information about a number of files. The page is divided into areas, each area corresponding to a different file. A given area is further divided into a number of lines containing information about the extended attribute data. Areas include bitmaps indicating available space in the data space and address information for addressing off-page data areas. A directory is included of data types stored in the data area, and additional lines store extended attribute data. The extended attribute directory maintains a list of data types currently stored and related information. Including availability information about each line along with addresses to areas storing extended attribute data enables the extended attribute manager to efficiently determine where to place extended attribute data, mark deleted lines as being available, retrieve data being requested by a process, and modify the contents of a given extended attribute data type.
Abstract:
A client state object, such as a “cookie,” allows a server to save client state information on the client. This information is returned when the client requests information from the server. A server includes two identifiers—a primary name and an alternate name. Web pages on the server are modified so that links to server resources, such as files, that need client state information reference the primary name, while other links that do not need client state information reference the alternate name. In this manner, it does not matter which directory on the server is used to store files and files can be intermingled with one another regardless of whether the individual files use client state information. A method is provided for modifying existing web pages based on whether server resources addressed by the hyperlinks use client state information.