摘要:
An adaptive bias power amplifier including an amplifier, a signal coupler, a power detector and a bias control circuit is provided. The signal coupler is connected to an input terminal of the amplifier. The power detector is connected to the signal coupler, and detects an input power of the amplifier via the signal coupler. The bias control circuit is connected to an output terminal of the power detector and the input terminal of the amplifier. The bias control circuit adjusts a gate bias of the amplifier in accordance with a detecting result of the power detector.
摘要:
A multi-frequency and multi-mode power amplifier is provided. The amplifier has a carrier power amplifier and a peaking power amplifier. The carrier power amplifier receives a first signal and outputs a first amplified signal, in which a first transistor size adjusting unit is included to adjust an equivalent transistor size based on a mode indication signal. The peaking power amplifier receives a second signal and outputs a second amplified signal, in which a second transistor size adjusting unit is included to adjust an equivalent transistor size based on the mode indication signal.
摘要:
Provided are a method, system, and program for handling a fabric failure. A module intercepts a signal indicating a failure of a path in a fabric providing a connection to a shared device. The module generates an interrupt to a device driver in an operating system providing an interface to the shared device that is inaccessible due to the path failure. The device driver requests information from the module on a status of a plurality of devices that are not accessible due to the path failure and receives information indicating the inaccessible device. The device driver reconfigures to discontinue use of the inaccessible device.
摘要:
A self-setting security guarding system and method for protecting against unauthorized access to data stored in a data processing apparatus, comprising setting various items used to guard data, wherein the items consist of protected areas with access control for data storage and access therein, authorized types of files with access controls, and access rules of safety regulations enabling the data processing apparatus to verify access to data contents stored therein or in the protected area thereof; and detecting access events of the protected area or types of files using the access control and generating a request for analysis when an access event is detected, and further analyzing whether the detected access event complies with the access rules and the analysis request to permit or deny execution of said access event depending on whether it complies or not with safety regulations.
摘要:
A plurality of processing nodes in a storage system are partitioned into a plurality of logical processing units, wherein the plurality of logical processing units can respond to I/O requests from a host coupled to the storage system. At least two logical processing units are grouped, wherein data in a first storage coupled to a first logical processing unit of the least two logical processing units is mirrored by data in a second storage coupled to the second logical processing unit of the at least two logical processing units. In response to a failure of the first logical processing unit, an I/O request from the host is responded to via the second logical processing unit.
摘要:
Provided are a method, system, and program for an adaptor to read and write to system memory. A plurality of blocks of data to write to storage are received at an adaptor. The blocks of data are added to a buffer in the adaptor. A determination is made of pages in a memory device and I/O requests are generated to write the blocks in the buffer to the determined pages, wherein two I/O requests are generated to write to one block split between two pages in the memory device. The adaptor executes the generated I/O requests to write the blocks in the buffer to the determined pages in the memory device.
摘要:
A determination is made as to whether a configuration indicator associated with a resource indicates a delayed configuration of the resource, wherein the resource is shared by a plurality of processing complexes via a bus, and wherein if the delayed configuration of the resource is indicated then the resource is prevented from being configured during initial program loads of the plurality of processing complexes. The resource is configured by only one of the of plurality of processing complexes that shares the resource, in response to determining that the configuration indicator associated with the resource indicates the delayed configuration of the resource.
摘要:
An apparatus, system, and method are disclosed for storing and retrieving compressed data. A compression module compresses a data file organized in logical tracks. A ratio module determines a track compression ratio. The track compression ratio is a ratio of an integer value n to one. A destage module destages a single directory entry for the data file to a directory. The directory entry points to a zeroth track on a hard disk drive. The destage module further destages the data file sequentially to tracks of the hard disk drive from the zeroth track with n logical tracks of the data file stored on one physical track of the hard disk drive. A stage module stages a kth logical track from a physical track of the hard disk drive. The physical track is specified by an integer value of k divided by n.
摘要:
Provided are a system and article of manufacture for dumping data in processing systems to a shared storage. A plurality of processing systems receive a signal indicating an event. Each of the processing systems write data used by the processing system to a shared storage device in response to receiving the signal, wherein each processing system writes the data to the shared storage device.
摘要:
Provided are a method, system and article of manufacture, wherein a request to access data is received from a requestor. A determination is made as to whether the requestor is authorized to access the data. In response to determining that the requestor is authorized to access the data, a determination is made as to whether the data is encrypted. An encryption key is requested from the requester, in response to determining that the data is not encrypted.