摘要:
A transaction processing system comprising a transaction log, a log management policy, a profile and a log manager, and method for managing the transaction log are provided. The method comprises maintaining a transaction log of recoverable changes made by transaction processing tasks; storing a log management policy including at least one log threshold and a plurality of possible actions associated therewith; and generating a historical profile comprising a set of acceptable values for characteristics of the log resource usage of tasks. Such log resource usage characteristics may include time taken for a task to complete, CPU resource consumed, number of log records made, etc. From a comparison of the profile behaviour to the actual behaviour of a task which has been identified as holding up trimming of the log, the likelihood that the identified task has entered an invalid loop and represents a ‘bad’ transaction instance, rather than simply just taking a long time to complete, can be inferred. Thus the most appropriate action can be selected and taken.
摘要:
A ternary content addressable memory (TCAM) cell circuit formed in a TCAM memory cell array having cells arranged in rows and columns can include a first storage circuit with first and second data path, a second storage circuit with a third and fourth data path, and a compare circuit. No more than four conductive lines in a column wise direction have a direct electrical connection to the TCAM cell. Such conductive lines can include a first bit line coupled to the first data path and the third data path and a second bit line coupled to the second data path and the fourth data path.
摘要:
A method and system are provided for in-doubt resolution in transaction processing involving at least two distributed transaction processing systems. The method includes a resynchronization method when re-establishing a connection between two distributed transaction processing systems. The method includes re-establishing a connection between a first transaction processing system and a second transaction processing system following a failure; the first transaction processing system searching for any unresolved units of recovery and resynchronizing each unresolved unit of recovery with the second transaction processing system; and when the first transaction processing system has finished processing its unresolved units of recovery, the second transaction processing system then searches for any unresolved units of recovery and resynchronizes each unresolved unit of recovery with the first transaction processing system.
摘要:
A smaller sized flip dot display utilizes a magnetically actuated pixel that rotates between two orientations. The orientations display two different optical states. A simulated dot matrix design improves the aesthetics and consumer appeal, and also permits a flip dot display capable of producing a positive contrast display image with darker colored “ON” pixels contrasting with brighter background and “OFF” pixels by reducing the visibility of the spacing gap between each rotating pixel and the surrounding background. An interwoven configuration of magnetic actuators with a coil around each arm of a U-shaped core may result in lower power consumption, low production cost, and small size required for use in consumer and small mobile devices such as watches and mobile phones.
摘要:
Built-in self-test (BIST) devices and methods are disclosed. A BIST section (100) according to one embodiment can include a built-in seed value memory (150) that stores multiple seed values. In a BIST operation, a seed value can be transferred from a built-in seed memory (150) to a test pattern generator (106) to generate multiple test patterns for scan chains (104-0 to 104-n). Successive seed values can be transferred to generate multiple test patterns sets at a clock speed and/or to achieve a desired test coverage.
摘要:
To generate a recovery time estimate in a transaction environment, a system includes a recovery manager, a recovery file containing recovery data, a store of historical restart data, and a recovery time estimation component. The recovery manager includes a component which is operable to measure the volume of active data on the recovery file, and to generate a recovery time estimate based on the measured volume and the historical restart data. This recovery time estimate can then be used as a characteristic of the system's keypointing policy to provide a more flexible and efficient keypointing procedure.
摘要:
A memory/logic cell layout structure includes a pair of memory/logic cells formed on a substrate. Each memory/logic cell (102, 104) can include a pair of memory areas to store data (106-0/106-1, 106-2/106-3), and a logic portion (108-0, 108-1) that receives the data stored therein. Memory areas and the logic portions of each memory/logic cell can be arranged on the substrate in a shape of an L, U, S, T, or Z to form a pair of interlocking memory/logic cells.
摘要:
A tubing string rotator for rotating a tubing string in a well having a downhole pump. The tubing string rotator includes a housing having a first portion and a second portion. At least the second portion of the housing is adapted to be operatively connected to the end of a length of the tubing string such that rotational torque applied to the tubing string through the operation of the pump is transferred to the second portion of the housing. The rotator further includes means to permit the controlled rotation of the second portion, together with the tubing string connected thereto, relative to the first portion of the housing when the ability of the first portion to rotate is retarded or eliminated, and when rotational torque is supplied to the tubing string through the operation of the pump.
摘要:
Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.
摘要:
At least one set of two nested magnetic arrays is provided, each nested magnetic array having an outer magnet, a middle magnet, and an inner magnet. The outer magnet has a magnetization pointing in an at least partially axial direction. The middle magnet has a magnetization substantially perpendicular to the magnetization of the outer magnet. The inner magnet has a magnetization directed substantially anti-parallel to the magnetization of the outer magnet. The apparatus also includes at least one electrically conductive coil positioned at least partially between the two nested magnetic arrays. At least one substantially magnetically permeable object is positioned at least partially between the two nested magnetic arrays. A rod is integral with the substantially magnetically permeable object.