摘要:
When an application activation instruction is input, it is decided whether the application is expected to access a high-level protection resource or low-level protection resource (step S31). If the decision is affirmative, display is done to prompt the user to select whether to permit activation of the application (step S32). When the user inputs an activation permission instruction, the application is activated (steps S33 to S36). As a result, only when the user permits an application, which is expected to access a high-level protection resource or low-level protection resource, to access a predetermined resource immediately before its execution, the application is executed. Hence, the basic processing part and application can operate in cooperation with each other while limiting access to various kinds of resources by the application in a reasonable range.
摘要:
During iSCSI communication, according to the contents of commands issued by a host computer, the command response time is increased due to the influence of the TCP Delayed ACK. Thus, a command issued by the host computer is analyzed, the number of TCP/IP packets required for transmitting the data requested by this command is calculated, and a precedence packet is transmitted, so that no influence is experienced due to the Delayed ACK.
摘要:
When an application activation instruction is input, it is decided whether the application is expected to access a high-level protection resource or low-level protection resource (step S31). If the decision is affirmative, display is done to prompt the user to select whether to permit activation of the application (step S32). When the user inputs an activation permission instruction, the application is activated (steps S33 to S36). As a result, only when the user permits an application, which is expected to access a high-level protection resource or low-level protection resource, to access a predetermined resource immediately before its execution, the application is executed. Hence, the basic processing part and application can operate in cooperation with each other while limiting access to various kinds of resources by the application in a reasonable range.
摘要:
During iSCSI communication, according to the contents of commands issued by a host computer, the command response time is increased due to the influence of the TCP Delayed ACK. Thus, a command issued by the host computer is analyzed, the number of TCP/IP packets required for transmitting the data requested by this command is calculated, and a precedence packet is transmitted, so that no influence is experienced due to the Delayed ACK.
摘要:
In one embodiment of a method for controlling an exit tray according to the invention, a controller controls an extension tray drive motor and controls the effective length of an extension tray of an image forming apparatus or a finisher employed with the image forming apparatus, based on a signal from a sensor for detecting the position of an extension tray, a signal from a sensor for detecting the presence or absence of a long size recording sheet of paper on an exit tray, and information on the size of a recording sheet of paper on which an image is printed.
摘要:
A virtualization switch virtualizes a data storage area provided by a server device and provides it to a server device with. This virtualization switch processes a priority control and a bandwidth control also on the output side to packets which make an access to a virtual volume and which have different demands for a QoS but identical IP headers according to a discrimination result of a TCP connection. Here, the TCP connection is discriminated by managing a TCP source port on the side of the virtualization switch.
摘要:
An apparatus for supplying molten steel and a continuous casting method therewith are described. The apparatus is equipped with a tundish 1 having an upper nozzle 2 at the bottom, a flow control mechanism 3 disposed below the upper nozzle 2, an immersion nozzle 4 formed by a refractory material having a good electrical conductivity, one electrode 5 disposed in the inner space of the tundish 1, the other electrode 6 disposed in the immersion nozzle 4, and a power supply 7 connected to the electrodes 5 and 6. In the method, the molten steel is supplied into a mold in the state of supplying an electric current between the inner surface of the immersion nozzle 4 and the molten steel 8 passing through the inside thereof by utilizing the apparatus for supplying molten steel. The deposition of the Al oxide or the like in the molten steel onto the inner surface of the immersion nozzle and others can be prevented, and thereby the generation of the surface defects in the products can also be prevented.
摘要:
A method is provided with which a name of a virtual port is not changed when virtualized storage is moved among switches. Information about a creator and a borrower of name information is added to a table including name information and address information of a virtual port of a name server managing the name information and the address information. The name information is provided to plural switches and managed. In addition, name information, which can be used commonly among name servers managing the name information and the address information is pooled in advance, and the name information of the virtual port is borrowed from there.
摘要:
There is provided a session management method for a computer system including an initiator, and a storage system coupled to the initiator via a network. The initiator includes an interface coupled to the network, a processor and a memory. The storage system includes an interface coupled to the network, a memory and a processor. The session management method comprising the steps of: executing, by the initiator, health check for diagnosing a status of a session established between the initiator and the storage system in the case of which no data is input/output to/from the storage device for a first predetermined period; and cutting off and re-establishing, by the initiator, the session with the storage system at a timing of executing the health check in the case of which no data is input/output to/from the storage system for a second predetermined period.
摘要:
An image forming method includes receiving a private print job with a password and related information, acquiring, as reception date and time, date and time, storing the password, the related information, and the reception date and time in a private print job data base, editing and displaying information related to the print job, selecting at least one private print job, and printing the selected private print job, wherein the editing and displaying information related to at least one private print job includes classifying, on the basis of job priority time, private print jobs into a new job group and an old job group, and changing display order to display jobs belonging to the new job group in order from one having the earliest reception date and time and subsequently display jobs belonging to the old job group in order from one having the latest reception date and time.