Abstract:
A system for balancing multiple memory buffer sizes includes a memory partitioned into a plurality of subgroups, each subgroup containing similarly sized buffers. The system further includes a memory manager which manages requests for buffer space by storing and accessing buffer steal history records in a buffer steal history queue.
Abstract:
A double level ant-proof pet food bowl includes a top food container having a first recess at a center of a bottom side of a base of the food container; bottom water container having a second recess at a center of an upper side of a base of the water container; and a central post having an upper end inserted into the first recess, and a lower end inserted into the second recess. The top food container resides on top of the central post and above the bottom water container.
Abstract:
The present invention provides for authenticating code and/or data and providing a protected environment for execution. The present invention provides for dynamically partitioning and un-partitioning a local store for the authentication of code or data. The local store is partitioned into an isolated and non-isolated section. Code or data is loaded into the isolated section. The code or data is authenticated in the isolated section of the local store. After authentication, the code is executed. After execution, the memory within the isolated region of the attached processor unit is erased, and the attached processor unit de-partitions the isolated section within the local store.
Abstract:
A processing unit includes a read-only encryption key. Loader code image is loaded into system memory from non-volatile storage. Loader code image includes a prefix value and a suffix value. The prefix value is combined with the master key from the processing unit to create a random value that is the seed for a hashing algorithm. The hashing algorithm uses the seed value with a signature formed from the blocks of code to form a result. During the hashing algorithm, intermediate key values are generated and stored in a memory area inaccessible by the user. The intermediate key values are used by the loader code after the loader has been authenticated and loaded. The loader combines one or more of the intermediate key values with prefix and suffix values that correspond to other software modules to authenticate the software, using a hashing algorithm, and load the software upon authentication.
Abstract:
An operator for a latch system. The operator has a main body, a control unit, and a retainer. The control unit has at least a portion that is selectively repositionable relative to the main body by a user with the control unit in an operative position on the main body to change the state of a latch system with which the operator is associated. A retainer is placeable in an assembled position on the main body wherein the retainer maintains the control unit in the operative position. The main body has a first shoulder, with the retainer element having a second shoulder. The first and second shoulders face and abut each other with the retainer in the assembled position to prevent the retainer from being moved out of the assembled position such that the control unit could be moved out of the operative position. There are cooperating surfaces on the main body and retainer which guide the retainer and main body each against the other to allow the retainer to be guidingly moved against and relative to the main body from a first position relative to the main body into the assembled position. At least a part of at least one of the main body and retainer is deformable and is deformed as an incident of the retainer moving from the first position into the assembled position whereupon the first and second shoulders face and abut each other to prevent the retainer from being moved out of the assembled position.
Abstract:
Embodiments are directed to maintaining versions of data within a solid state memory. One or more embodiments create at least one data structure associated with at least one logical page of a solid state memory. The logical page is associated with at least one physical page in a data block of the solid state memory. A first set of information associated with the logical page is stored in the data structure. A second set of information associated with the physical page is stored in the data structure. The second set of information includes at least versioning information identifying which version of the logical page is represented by a dataset is stored within the physical page.
Abstract:
One or more embodiments are directed a solid state storage device for maintaining versions of data. The solid state storage device comprises a processor and a solid state memory communicatively coupled to the processor. A flash translation layer receives at least one request from a file system to write at least one dataset to a logical page of the solid state memory. At least one physical page in a data block of the solid state memory associated with the logical page is identified. At least one dataset in the physical page is stored. At least one data versioning tag is associated with the dataset in a data structure associated with the logical page. The data versioning tag identifies the dataset as a given version of the logical page. The dataset is maintained as accessible from the physical page irrespective of subsequent write operations to the logical page.
Abstract:
One or more embodiments are directed to managing data in a solid state memory supporting data versioning. At least one request to perform an operation on at least one logical page of a solid state memory is received from a file system. A data structure associated with the at least one logical page is identified. The data structure at least identifies one or more physical pages associated with the at least one logical page, and a version of the at least one logical page represented by a dataset stored in each of the one or more physical pages. The operation is performed on the at least one logical page based on the data structure that has been identified.
Abstract:
A system and method for determining a desired portion of a subject to receive a radiation dose includes iteratively choosing weight vectors to run to gradually build up a Pareto surface (PS). BY examining the current points that have been found on the PS along with the weights used to produce those points, a new vector is produced and run. This process is repeated until a geometric stop tolerance is met.
Abstract:
A processing unit includes a read-only encryption key. Software is loaded into a system memory area from a non-volatile storage device. Software code image that resides in the system storage area includes a prefix value and a suffix value. The prefix value is combined with the master key from the processing unit to create a random value that is the seed for a hashing algorithm. The hashing algorithm uses the seed value with a signature formed from the blocks of code to form a result. Finally, after the last block has been processed, a final result remains. The suffix value is combined with the master key, this hash result is compared with the result that was created using the hashing algorithm on the code. If the two results match, the code is authenticated and is executed. If the results do not match, the code is not loaded.