摘要:
Servers attached to a data communications network, such as a wavelength division multiplexed network, are made aware of events on the network, such as a protection switch for scheduled maintenance to reduce latency and improve performance, etc. Switching data paths on the data communications network is no longer transparent to the server. A message from the network equipment is received and decoded by a holographic enterprise interface coupled to the server and to a virtual network operation centers. The network equipment reports network switch conditions to the holographic enterprise interface and other connected servers. In response to the network switch conditions, the holographic enterprise interface may automatically reprovision data traffic on the network quickly enough to prevent server timeouts and workload interruptions. The switching is then shown in real time in the virtual network operations center.
摘要:
A method to identify information technology resources whereby a locator device is inserted into a communication port of each information technology resource, such as a computers, router, cable endpoints, etc. When activated, the device passively receives wireless RF transmissions from broadcast units in the vicinity while actively receiving and storing configuration and other predetermined information from the resource. The device can calculate the exact position of the information technology resource and store the location in memory. The location and the identifying data of the information technology resource can be used in an asset management database, to locate a lost or missing resource, or can be used for billing for service level agreements. The method and device herein is particularly useful in secure facilities.
摘要:
A computerized method, program product, and a service to protect critical data by first splitting the data into N streams. A partitioning algorithm is applied to each stream to remove a portion of the data, the portion removed from one stream being included in another stream. Each stream is then encrypted with its own encryption key. Each encrypted stream plus at least two encryption keys not used to encrypt a particular encrypted stream are stored in a separate and unique memory location, such as a different server having its own security access procedures that are different from other servers and which may be located in different cities or countries. Retrieval of the data requires a program to know the memory locations of the data streams, and the inverse of the partitioning algorithm. Accessing one memory location may yield an encrypted stream and at least one encryption key for a different stream at a different memory location. By applying the inverse of the partitioning algorithm, the missing portions of each stream can be ascertained and the original data stream can be reconstructed.
摘要:
A virtual network operating center (VNOC) automatically and in real time obtains and validates the configuration of a data communications network, such as a wavelength division multiplexed network. The VNOC acquires network configuration data using SNMP commands and server configuration information from the hardware management console. The VNOC collates this data and validates configuration requirements for working and backup fiber paths, client protocols, data rates, regeneration requirements, and other considerations. Both ends of a network can be automatically provisioned and commissioned from a single location wherein the ends may be separated by 100 kilometers or more.
摘要:
Parallel, coordinated, and optimized access of real Base and Alias DASDs by one or more virtual machines, each utilizing one or more virtual Base and Alias DASDs. Each of a plurality of virtual machines defines a virtual Base DASD device and a modified operating system may coordinate the virtual machine activity on real Base and Alias devices to maximize overall system throughput. In more complex embodiments, one or more virtual machines define one or more virtual Bases and associated virtual Alias devices in which case wherein the embodiments described coordinate their activity on one or more real Base and Alias devices to maximize overall system throughput.
摘要:
A method for marking hyperlinks, for creating an associated link spelling table, and for accessing the address of a marked hyperlink. A portion of text is selected and the hyperlinks of the selected text are identified. Then a link spelling table is created and a set of discrimination letter subsets characterizing each of the identified hyperlink is determined. Each discrimination letter subset is associated to the address of the corresponding hyperlink in the link spelling table, and the discrimination letter subset in each hyperlink of the selected text portion are marked. Then, to access the hyperlink, the user spells the discrimination letters that are then converted to extract the discrimination letter subset. The link spelling table is accessed to determine if the extracted discrimination letter subset belongs to the link spelling table. If the extracted discrimination letter subset belongs to the link spelling table, the address associated with the extracted discrimination letter subset is recovered and the data localized at that address are accessed.
摘要:
A hardware/software design tool converts an electronic design specification and zero or more technology specifications into realization of the electronic design in computer hardware, software and firmware. It compiles design and logic technology specifications into a model which can be utilized for behavioral analysis of logical characteristics. It translates partitions of the design and one or more logic technologies into one or more processor intermediates or binaries suitable for execution on multi-purpose processing units. It translates partitions of the design and logic technology into a collection of cells and interconnects suitable for input to physical design processes such as is required to target a FPGA, ASIC, system-on-a-chip or custom logic. It analyzes behavior of the embedded binaries running on processing units and implementations augmented by additional physical technology and parameters, yielding a more detailed prediction of the resulting hardware/software system behavior when realized through manufacturing.
摘要:
A watercraft transport system having a trailer hinged to a floatable body. The trailer comprises a frame, an axle and wheels and is hinged at the front to the front of the floatable body. The hinge has a limited degrees of freedom for roll, pitch and yaw motion to allow the floatable body to float in the water but still substantially retain its position so that a personal watercraft can be loaded and unloaded from the trailer. The floatable body of the personal watercraft transport system floats on the surface of the water and easily allow the user of the personal watercraft to maneuver in and out of the floatable body. As the personal watercraft transport system is removed from the water, channels on the underside of the floatable body drop into the frame for self-alignment. The floatable body is molded in its interior periphery to accommodate the hull of a personal watercraft, and its upper surface may be coated with skid-proof material. Locking mechanisms are provided to secure the floatable body to the trailer and to secure the personal watercraft to the floatable body.