摘要:
A system is provided for rebooting a computer having a volatile memory device capable of storing operating information. The system reboots the computer using the operating information stored in the memory device if the memory device contains a valid copy of the operating information. The computer reboots the computer by reloading the operating information into the memory device if the memory device does not contain a valid copy of the operating information. The system determines whether the memory device contains a valid copy of the operating information by calculating a checksum for the operating information stored in the memory device and compares the checksum to a previously calculated checksum.
摘要:
A method, apparatus, and software for efficiently allocating discontiguous stack space without requiring compiler changes are described. In one aspect, a method is provided for executing a compiled function that is located in a first computer memory stack chunk such that additional memory is allocated efficiently if a determination is made that such additional memory is necessary for execution of the compiled function. In one embodiment, the method includes calling a stack checking function that includes the compiled function. A determination is made if additional memory is required for executing the compiled function. If no additional memory is required, then the compiled function is called and executed. However, if additional memory is necessary, then additional memory is allocated that is discontiguous with the original memory stack.
摘要:
The invention involves transmission download of data to plural, mass storage medium-based remote users of content or software upgrades or multiple versions. Optionally provided are pre-download scheduling of one or more future download sessions and post-download remote scripted software execution by the remote clients. For purposes of more efficient use of the transmission link, low-volume scheduling information or content are transmitted within designated narrow-bandwidth sub-channels or trickle streams allocated within the broad bandwidth of the transmission channel and such allocation may be dynamic to vary the allocation based upon relative high-volume, high-speed and low-volume, low-speed demands. The invention is implemented in software residing primarily in the server computer connected with the transmission provider. The software schedules allotted bandwidth within the broadcast band of the transmission link and formats high-volume data for transmission within sub-allocation channels logically devised therein. Client software at the plural distributed home entertainment device sites reserves capacity on disk and receives such transmission data for storage thereon, optionally executing a downloaded execution script that may reconfigure the client software so that new options and features are available at the client site for operational enhancements as well as video program or content enhancements. Client software at the plural distributed home entertainment device sites reserves capacity on disk and receives such broadcast data for storage thereon, optionally executing a downloaded execution script that may reconfigure the client software.
摘要:
In a computing device, both an address of a first device and a secret are graphically encoded to generate one or more images that can be captured by a second device. The second device captures and decodes the one or more images, and sends a communication initiation request to the address of the first device. The communication initiation request includes the address of the second device and identifies the secret. Communication between the first and second device continues only if the first device verifies, based on the communication initiation request, that the second device knows the secret.
摘要:
A first software program executing on a computing device emulates a second computing device executing a software program using emulated memory. The first software program permits the second software program to perform an operation on a contiguous portion of the emulated memory only when a pointer and a table entry both contain the same identifier, thus protecting against common types of memory usage errors in the second software program. The pointer has an address to the contiguous portion. The table entry maps to the contiguous portion. A plurality of table entries map to a respective plurality of contiguous portion of the emulated memory. A plurality of the pointers each contain the address to a respective contiguous portion of the emulated memory as well as containing an identifier corresponding to the respective contiguous portion of the emulated memory. The second computing device can be high or low in resources.
摘要:
The invention involves storing data on a storage medium without fragmentation. A data conveyance system configures data for delivery to a data storage system and associates a storage instruction with the data. The storage instruction instructs the data storage system to store the data without fragmentation. The data conveyance system then conveys the data and the storage instruction to the data storage system. The data storage system receives the conveyance and a controller reads the storage instruction. The controller stores the data in contiguous storage locations on the storage medium in accordance with the storage instruction. If the storage medium is a disk, the data conveyance system may configure the data for delivery to the data storage system by generating a filesystem and combining the data and the filesystem to form a partition file. The data conveyance system then associates the storage instruction with the partition file and conveys the storage instruction and partition file to the data storage system. The data storage system controller formats the storage disk to include a new disk partition and stores the partition file in the new disk partition. Alternatively, the controller may first read the data storage disk to find contiguous storage locations which are empty, and store the partition file only if sufficient available storage locations are found. As a further alternative, the controller may first de-fragment the storage disk to increase the number of contiguous storage locations available for storage.
摘要:
A first software program executing on a computing device emulates a second computing device executing a software program using emulated memory. The first software program permits the second software program to perform an operation on a contiguous portion of the emulated memory only when a pointer and a table entry both contain the same identifier, thus protecting against common types of memory usage errors in the second software program. The pointer has an address to the contiguous portion. The table entry maps to the contiguous portion. A plurality of table entries map to a respective plurality of contiguous portion of the emulated memory. A plurality of the pointers each contain the address to a respective contiguous portion of the emulated memory as well as containing an identifier corresponding to the respective contiguous portion of the emulated memory. The second computing device can be high or low in resources.
摘要:
In a computing device, both an address of a first device and a secret are graphically encoded to generate one or more images that can be captured by a second device. The second device captures and decodes the one or more images, and sends a communication initiation request to the address of the first device. The communication initiation request includes the address of the second device and identifies the secret. Communication between the first and second device continues only if the first device verifies, based on the communication initiation request, that the second device knows the secret.
摘要:
A first software program executing on a computing device emulates a second computing device executing a software program using emulated memory. The first software program permits the second software program to perform an operation on a contiguous portion of the emulated memory only when a pointer and a table entry both contain the same identifier, thus protecting against common types of memory usage errors in the second software program. The pointer has an address to the contiguous portion. The table entry maps to the contiguous portion. A plurality of table entries map to a respective plurality of contiguous portions of the emulated memory. A plurality of the pointers each contain the address to a respective contiguous portion of the emulated memory as well as containing an identifier corresponding to the respective contiguous portion of the emulated memory. The second computing device can be high or low in resources.
摘要:
A distributed object oriented computer system that has two classes of object references: strong references and weak references. Weak references (or pointers) allow users to refer to an object, but does not prevent the object manager from deleting the object. A weak object reference can be converted into a strong object reference by execution of a "MakeStrong" operation, which generates a strong reference, and then deleting the weak reference. A strong object reference can be converted into a weak object reference by execution of a "MakeWeak" operation, which returns a weak reference to the object referred to in the operation's argument, and then deleting the strong reference. When an object no longer has any outstanding strong object references, deletion of the object is enabled. In another aspect of the invention, a portion of the computer's memory is set aside for a primary linker cache and a secondary linker image cache. Linker images, generated while loading programs for execution, are stored in the primary and secondary linker caches. Each linker image in the primary linker cache has strong object references to objects included in corresponding ones of the loaded programs, and each linker image in the secondary linker cache has weak object references to objects included in corresponding ones of the loaded programs.