摘要:
Real time provisioning and management of fabric-backplane enterprise servers includes monitoring system status and configuration, displaying monitoring results, accepting user commands, and providing hardware and software management and configuration commands to the system. In one embodiment, an event is generated when a pluggable module is inserted into the system. In response to the event, the availability of the pluggable module is displayed to a system operator, and the operator enters a command to provision a server that includes the pluggable module. The server provisioning command is processed, resulting in a hardware configuration command being issued to the system, and an event indicating a status associated with processing the command is returned. The recognition of the inserted module, the display to the operator, and the processing of the server provisioning command occur in real time.
摘要:
A wireless-enabled memory module provides host devices access to a memory via a standard memory expansion interface and further incorporates embedded processing capability and a wireless network capability. The wireless-enabled memory module can be used in any host device providing a compatible memory card controller and interface. Host devices so equipped become wireless-memory enabled devices and can provide memory access to any other remote device enabled for compatible wireless communications. It is thereby possible for a remote device to access the memory content of the memory module, and cause transfers of either full-size or scaled versions of the content to the remote device through a first network, and optionally further transfer the content from the remote device through a second network to the Internet in the form of an e-mail message or MMS attachment.
摘要:
In a first variation, a thermally aware design automation suite integrates system-level thermal awareness into design of semiconductor chips, performing fine-grain thermal simulations of the chips based on thermal models and boundary conditions. The suite uses results of the simulations to modify thermally significant structures to achieve desired thermal variations across a chip, meet design assertions on selected portions of the chip, and verify overall performance and reliability of the chip over designated operating ranges and manufacturing variations. In a second variation, a discretization approach models chip temperature distributions using heuristics to adaptively grid space in three dimensions. Adaptive and locally variable grid spacing techniques are used to efficiently and accurately converge for steady state and/or transient temperature solutions. The modeling optionally reads a mesh initialization file specifying selected aspects and parameters associated with controlling use and behavior of the variable grid spacing techniques.
摘要:
A hybrid server and multi-layer switch system architecture, referred to hereinafter as the Enterprise Fabric (EF) architecture, forms the basis for a number of Enterprise Server (ES) chassis embodiments. Each ES embodiment generally includes one or more Processor Memory Modules (PMMs, each generally having one or more symmetric multiprocessor complexes), one or more Network Modules, and a System Control Module (SCM). The SCM includes a cellified switching-fabric core (SF) and a System Intelligence Module (SIM). Each PMM has one or more resident Virtual IO Controller (VIOC) adapters. Each VIOC is a specialized I/O controller that includes embedded layer-2 forwarding and filtering functions and tightly couples the PMM to the SF. Thus the layer-2 switch functionality within the ES chassis is distributed over all of the SCM, NM, and PMM modules. Through the use of VIOC/VNIC device drivers, host operating system software (Host O/S) running on the PMMs is presented with a plurality of Virtual Network Interface Cards (VNICs). In some embodiments, each VNIC behaves as a high-performance Ethernet interface at the full disposal of the Host O/S. In other embodiments, at least some of the VNICs behave as high-performance Fiber Channel Host Bus Adapters.
摘要:
Monitored content is analyzed to determine full and partial matches to previously classified content. Monitored content matching previously classified public content is classified as public, even if the monitored content is also found to match previously classified private content. In other words, public classification “overrides” potentially private classification. Monitored content matching only previously classified private content is classified as private. All remaining otherwise unclassified monitored content is classified as unknown. Monitored content is analyzed with respect to a session. If any content in a session is private, then the session is classified as private. If all content in a session is public, then the session is classified as public. Otherwise, the session is classified as unknown. In a related aspect, a set of policies are searched for a first match in part according to the classification, and a designated action taken if the first match is found.
摘要:
In one embodiment, documents accessible via a designated public account are classified as public. In another embodiment, documents accessible according to a designated public access control list are classified as public. In some embodiments, all documents not classified as public are classified as private. Content in the public documents is linguistically analyzed, resulting in a set of keys for use in subsequent full and partial content matching. The keys and associated file names are stored in a public-content identification repository. Similarly, content in the private documents is linguistically analyzed, and the results are stored in a private-content identification repository. Subsequently, full and partial content matching is performed on monitored content according to information in the public and private repositories. In a related aspect, monitored content found to correspond to private content is selectively flagged during electronic transmission or optionally prevented from distribution according to a set of defined monitoring policies.
摘要:
An improved way to add a wireless peripheral to existing digital systems is taught. A small adapter is suitable for use suspended inline with the cables attached to it. The adapter has an embedded wireless port for receiving data from a wireless peripheral. The adapter further has an input connector for communicating with an existing wired peripheral and an output connector for communicating with the existing system unit. To add a wireless peripheral, the adapter is merely inserted between a wired peripheral and the system unit. The adapter may be plugged directly into the system unit where the cable of the wired peripheral formerly attached. Compared to prior art solutions, the concepts taught ease the installation of the wireless peripherals, lower the cost of the addition, and expand the placement freedom for the wireless peripheral's charging cradle.
摘要:
The present invention permits deferring the final provisioning of the Card Information Structure (CIS) in the attribute memory space of expansion cards (or modules) for portable hosts. This enables expansion cards to be distributed, sold, and installed by their end-users prior to the final provisioning, which is performed during their initial use. A temporary default CIS image is provided that permits baseline functionality of the expansion card with a host device. Providing the default CIS data enables provisional installation and operation of the card in the host, including accessing the card by way of default card services and socket software layers, as provided in the standard software environment of the host. The provisional operation enables higher level software to program the final CIS values in the peripheral controller internal CIS data-structure, EEPROM on the card, or any combination of the two.
摘要:
Portable computing hosts, such as PDAs, are customized for use in diverse applications, such as media and game players, through use of a first-level removable expansion module having player-specific circuitry and a slot for a second-level removable module, such as a removable memory. For example, in combination with a connected or attached user interface device (e.g., earphones), these modules provide a host with external-interface circuitry and/or application-specific functions as well as second-level removable memory functions. The removable memory may be used to store and playback digitally encoded media such as music, audio, or video. The removable memory may also be used directly or predominantly by the player's application specific circuitry within the first-level removable expansion module. In illustrative embodiments, an industry standard physical and electrical interface couples the application specific module to the portable computing host, which provides user interface functions for the application.