摘要:
A method according to one embodiment includes determining to move an extent from a source-tier in a storage system to a destination-tier in the storage system; determining whether any track from the set of tracks is presently being written to; designating to a write-stack associated with the source-tier each track that is presently being written to and designating to a read-stack associated with the source-tier remaining tracks from the set of tracks; removing oldest tracks from the read-stack and the write-stack until the read-stack and the write-stack have been depleted of tracks; when a parameter of the extent exceeds a migration threshold: populating a destination-tier cache with the tracks as they are removed from the read-stack and the write-stack using a predetermined read-to-write ratio and removing tracks from a source-tier cache that were removed from the read-stack and the write-stack; and migrating the extent from the source-tier to the destination-tier.
摘要:
Provided are techniques for migrating a first extent, determining a spatial distance between the first extent and a second extent, determining a ratio of a profiling score of the second extent to the spatial distance, and, in response to determining that the ratio exceeds a threshold, migrating the second extent.
摘要:
An internal combustion engine includes a combustion chamber at least partially defined within a cylinder bore by a reciprocating piston having a piston crown. An intake plenum is fluidly connectable with the combustion chamber and at least one intake port is configured to fluidly connect the intake plenum with the combustion chamber. At least one intake valve is configured to selectively fluidly connect the intake plenum with the combustion chamber. The combustion chamber is configured to receive a lean air/fuel mixture therein to substantially fill the combustion chamber. The combustion chamber is further configured to receive a rich air/fuel mixture therein that yields a stratified total air/fuel mixture within the combustion chamber.
摘要:
A storage system according to one embodiment includes logic adapted for determining to move an extent from a source-tier in a storage system to a destination-tier in the storage system, wherein a set of tracks of the extent is presently being accessed; logic adapted for determining whether any track from the set of tracks is presently being written to; logic adapted for designating to a write-stack associated with the source-tier each track that is presently being written to and designating to a read-stack associated with the source-tier remaining tracks from the set of tracks; logic adapted for removing oldest tracks from the read-stack and the write-stack until the read-stack and the write-stack have been depleted of tracks; logic adapted for populating a destination-tier cache with the tracks as they are removed from the read-stack and the write-stack using a predetermined read-to-write ratio when a parameter of the extent exceeds a migration threshold; logic adapted for removing any tracks from a source-tier cache that were removed from the read-stack and the write-stack; and logic adapted for migrating the extent from the source-tier to the destination-tier.
摘要:
A method for migrating extents between extent pools in a tiered storage architecture maintains a data access profile for an extent over a period of time. Using the data access profile, the method generates an extent profile graph that predicts data access rates for the extent into the future. The slope of the extent profile graph is calculated and used to determine whether the extent will reach a migration threshold within a specified “look-ahead” time. If so, the method calculates a migration window that allows the extent to be migrated prior to reaching the migration threshold. In certain embodiments, the method determines the overall performance impact on the source extent pool and destination extent pool during the migration window. If the overall performance impact is below a designated impact threshold, the method migrates the extent during the migration window. A corresponding apparatus and computer program product are also disclosed herein.
摘要:
A method for scheduling the migration of extents between extent pools of a storage system is disclosed herein. In certain embodiments, such a method includes periodically profiling an extent pool to generate a historical data access profile of the extent pool. Using this historical data access profile, the method determines an optimal migration window for migrating an extent to the extent pool. The method then identifies an actual extent for migration to the extent pool. Once the actual extent is identified, the method schedules the extent for migration to the extent pool during the optimal migration window. A corresponding apparatus and computer program product are also disclosed herein.
摘要:
A method of preparing a pharmaceutical composition is described, comprising 1) atomizing a liquid formulation of a therapeutic agent to produce an atomized formulation; 2) freezing said atomized formulation to form solid particles; and 3) drying said solid particles at about atmospheric pressure to produce a powder, wherein said drying is performed in the presence of vibration, internals, mechanical stirring, or a combination thereof. Another method is described, comprising 1) atomizing a liquid formulation of a therapeutic agent to produce an atomized formulation; 2) freezing said atomized formulation to form solid particles; and 3) drying said solid particles to produce a powder; wherein the atomized formulation comprises droplets having an average mean diameter of between about 35μ and about 300μ, and/or the powder comprises dried particles having an average mean diameter of between about 35μ and about 300μ. Compositions made by the above methods, and methods of using the compositions, are also described.
摘要:
Methods and apparatus, including computer program products, for generating a shot list for a physical environment based on fields of view of virtual cameras. A 3D virtual environment is created by texture mapping one or more photographs of the physical environment onto a representation of the physical environment's 3D topography. One or more virtual cameras is placed in relation to the virtual environment so that each virtual camera's field of view captures a portion of the virtual environment. Virtual camera fields of view are presented and input accepted to modify one or more parameters of the virtual cameras. The fields of view of the virtual cameras are updated based on the modifying.
摘要:
The present disclosure includes, among other things, methods and apparatus, including computer program products, for providing an electronic game utilizing photographs.
摘要:
An apparatus and method collects, for a community of interest, at least one cross certificate associated with an anchor certificate issuing unit, and obtains at least one certificate issuing unit public key and an associated unique identifier for a cross-certified certificate issuing unit identified by the at least one cross certificate. For example, a certificate issuing unit, client unit, or other suitable unit, searches for one or up to all certification authorities or certificate issuing units that it can trust based on cross certificate chains. This is done, for example, from a given trust anchor. The apparatus selects those obtained certificates that satisfy, for example, some search criteria, such as what policy must be enforced in each certificate, for example, the allowed path length or depth that the apparatus is allowed to evaluate, and creates a signed certificate set, such as a list of all trusted certificate issuing units from the perspective of a given trust anchor. Accordingly, the apparatus and method creates a signed certificate set identifying certificate issuing units determined to be trusted by the anchor certificate issuing unit based on the cross certificates that the apparatus obtained. The signed certificate set includes at least a unique identifier of each trusted certificate issuing unit, such as the distinguished name (DN) of the certificate issuing unit, and public key of each trusted certificate issuing unit.