摘要:
A billing process is disclosed for a information dispersal system or digital data storage system. In one embodiment of the invention, the original data to be stored is separated into a number of data “slices” or shares in such a manner that the data in each subset is less usable or less recognizable or completely unusable or completely unrecognizable by itself except when combined with some or all of the other data subsets. These data subsets are stored on separate digital data storage devices as a way of increasing privacy and security. As dispersed file shares are being stored or removed from a grid of distributed storage locations, a set of metadata tables are created, separate from the dispersed file share storage, to maintain information about the original data size of each block, file or set of file shares dispersed on the grid. The original data size information in these separate metadata tables is used to determine usage information based upon the original file size even though the file has been dispersed onto a storage grid that contains file slices who size may not relate to the original file size and the file slices may have been compressed by the system in order to reduce storage space or improve transmission time. As such, the billing process is able to enable a broad range of commercial billing options for billing for commercial data services on an information dispersal grid.
摘要:
A system which enables a plurality of wireless interface devices to be interfaced with a server. The server is configured to communicate with a plurality of wireless interface devices over a radio link. The server may be connected to wither a wired or wireless local area network (LAN).
摘要:
A wireless interface device for interfacing with a host computer connected in either a wired or wireless local area network (LAN). The wireless interface device includes a display that mirrors whatever is being displayed on the host computer to which it is connected. In order to reduce unnecessary LAN traffic, any screen savers running on the host computer are automatically disabled when a radio connection is made between the host computer and the wireless interface device. When the wireless interface device is disconnected from the host computer, the screen saver running on the host computer is automatically re-enabled.
摘要:
A pen-based portable personal computer can emulate the functions of a standard two-button mouse. In particular the system can emulate standard movement and clicking of a mouse buttons as well as emulate both left and right mouse buttons of a two-button mouse. In order to be compatible with various application programs, the system can also emulate the double clicking of the mouse button. By providing a pen-based computer system which can emulate the functions of a standard two-button mouse, the system is compatible with various application programs available on the market
摘要:
The present invention relates to a wireless interface device and more particularly to a wireless interface device for interfacing with a host computer connected in either a wired or wireless local area network. Once a connection is made between the wireless interface device and a host computer, the host computer is under the control of the wireless interface device. In order to provide a convenient way to return control back to the host computer, a hot icon is provided on the wireless interface device which, in response to a pen-down event, automatically returns the control back to the host computer.
摘要:
A wireless interface device is adapted to be interfaced with a host computer. While the wireless interface device is connected to the host computer, the keyboard and mouse input devices of the host computer are locked out to prevent unauthorized access. Should the situation occur in which the user needs to access the host computer to which the wireless interface device is connected, the keyboard and mouse input devices can be re-enabled by way of a password.
摘要:
A method begins by a dispersed storage (DS) processing module determining whether to complete downloading of a data segment of multi-media content to an accessing device that possess a partial set of encoded data slices. When the downloading is to be completed, the method continues with the DS processing module determining a user set of encoded data slices, wherein the user set of encoded data slices includes first and second sub-sets of encoded data slices of the set of encoded data slices, determining whether encoded data slices of the partial set of encoded data slices substantially matches encoded data slices of the first sub-set of encoded data slices, and when the encoded data slices of the partial set of encoded data slices substantially matches encoded data slices of the first sub-set of encoded data slices, sending the second sub-set of encoded data slices to the accessing device.
摘要:
A method begins by a dispersed storage (DS) processing module determining storage device failure information for a plurality of storage devices within a maintenance free storage container, wherein the maintenance free storage container allows for multiple storage devices of the plurality of storage devices to be in a failure mode without replacement and wherein the storage device failure information indicates storage devices of the plurality of storage devices that are in the failure mode. The method continues with the DS processing module maintaining a dynamic container address space of the maintenance free storage container based on the storage device failure information. The method continues with the DS processing module managing mapping of container addresses of the dynamic container address space to dispersed storage network (DSN) addresses of an assigned DSN address range.
摘要:
A method begins by a processing module determining failure mode information for a plurality of storage modules of a maintenance-free storage container. The method continues with the processing module managing storage mapping information of data content within the plurality of storage modules based on the failure mode information and receiving a data access request. The method continues with the processing module interpreting the data access request based on the storage mapping information to identify one or more of the plurality of storage modules to produce one or more identified storage modules and generating an in-container data access request based on the data access request and the one or more identified storage modules. The method continues with the processing module sending the in-container data access request to the one or more identified storage modules.