Abstract:
A method for controlling a denial of service attack involves receiving a plurality of packets from a network, identifying an attacking host based on a severity level of the denial of service attack from the network, wherein the attacking host is identified by an identifying attack characteristic associated with one of the plurality of packets associated with the attacking host, analyzing each of the plurality of packets by a classifier to determine to which of a plurality of temporary data structures each of the plurality of packet is forwarded, forwarding each of the plurality of packets associated with the identifying attack characteristic to one of the plurality of temporary data structures matching the severity level of the denial of service attack as determined by the classifier, requesting a number of packets from the one of the plurality of temporary data structures matching the severity level by the virtual serialization queue, and forwarding the number of packets to the virtual serialization queue.
Abstract:
Some embodiments of the present invention provide a system that generates a utilization charge for a computer system. First, a set of performance parameters of the computer system are monitored. Next, a power utilization of the computer system is inferred based on the set of performance parameters and a power-utilization model. Then, a utilization charge is generated based on the power utilization of the computer system.
Abstract:
A hard disk drive bracket includes a bezel, a lever arm attached to the bezel rotatably between a closed position against the bezel and an open position apart from the bezel, a release mechanism attached to the bezel including a locking member that latches the lever arm in the closed position and a release button arranged to unlatch the lever arm from the locking member when the release button is depressed, and a horn attached to the bezel translatably between a natural position apart from the release mechanism and a forced position that allows the horn and release mechanism to interact to unlatch the lever arm from the locking member. The horn and lever arm of the hard disk drive bracket may be adapted to serve as a cam that automatically depress the release button as the lever arm is being closed.
Abstract:
Embodiments of an integrated circuit that includes a debug circuit are described. This debug circuit is configured to test an asynchronous circuit by performing analog measurements on asynchronous signals associated with the asynchronous circuit, and includes a triggering module configured to gate the debug circuit based on one or more of the asynchronous signals. This triggering module has a continuous mode of operation and a single-shot mode of operation. A timing module within the debug circuit has a timing range exceeding a pre-determined value, and is configured to provide signals corresponding to a first time base or signals corresponding to a second time base. Furthermore, control logic within the debug circuit is configured to select a mode of operation and a given time base for the debug circuit, which is either the first time base or the second time base.
Abstract:
A mechanism is disclosed for enabling new task types to be added to a management server without changing the source code of the management server. To add a new task type, a descriptor file is provided. This descriptor file specifies all of the particulars of the new task type. Any mechanisms referred to in the descriptor file are also provided. At startup time, the management server processes the descriptor file and forms associations between the various aspects of the task type with the mechanisms that are responsible for implementing those various aspects. At runtime, these associations are used to manage the definition and execution of tasks of that task type. By doing so, the management server enables new task types to be added, and enables task instances of the new task types to be defined and executed, without changing the source code of the management server.
Abstract:
A method for reconstructing corrupted data, which includes determining a number of non-parity disks (n), selecting a first combination of n-1 non-parity disks, obtaining a first set of physical blocks from the first combination of n-1 non-parity disks, obtaining a parity block associated with the first set of physical blocks, reconstructing a first physical block using the first set of physical blocks and the parity block, combining the first physical block and the first set of physical blocks to obtain a first reconstructed logical block, checksuming the first reconstructed logical block to obtain a first calculated checksum, and determining whether the first calculated checksum is equal to a stored checksum associated with the first reconstructed logical block.
Abstract:
A method for automatic extraction of design properties of a hardware design, is provided. The method includes running a hardware design simulation to generate simulation results for the hardware design. The simulation results are then analyzed to extract properties. The extracted properties can be a powerful tool for the design engineers and the test-writers to learn more about the functional coverage of the test suites.
Abstract:
A method for generating authentication code for web service resources. The method includes receiving a selection of a resource method, where the resource method defines a method for interacting with a resource associated with a web service. The method further includes determining an authentication scheme for the resource method, where the authentication scheme defines an authentication mechanism required during execution of the resource method to enable interaction with the resource. The method further includes generating authentication code for the resource method using the authentication scheme, where the authentication code enables a user executing the resource method to interact with the resource.
Abstract:
A method for authentication. The method includes receiving a re-directed access request for a resource associated with a second authentication level, where a user has requested, the user is associated with a session, and the session associated with a first authentication level. The method further includes identifying a second authentication context using the second authentication level, generating an authentication request using the second authentication context, and sending the authentication request to an identity provider. In response the identity provider identifies an authentication scheme corresponding to the second authentication context, obtains authentication information from the user, authenticates the user using the authentication information, and generates an assertion, in response to successful authentication, using the second authentication level, and the authentication scheme. The method further includes receiving the assertion, associating the session with the second authentication level to generate an upgraded session to the user access to the resource.
Abstract:
A storage array includes at least one target and a logical unit having a logical unit number. The storage array is configured to receive input defining a host group comprising at least one initiator and receive input defining a target group comprising the at least one target. The host group, target group and logical unit number define a view entry. The storage array is further configured to apply the view entry to the logical unit to provide a logical unit inventory that is provisioned for the at least one initiator.