摘要:
System and methods are provided. In one embodiment, a system includes a master data archiver configured to store a data related to a turbomachine system and a first data collector service system configured to collect the data from the master data archiver. The system also includes a second data collector service system communicatively coupled to the first data collector service system and configured to pull or to push the data from the first data collector service system and a first data archiver configured to receive at least some of the data from the second data collector service system. The system further includes an asset model database storing a plurality of turbomachine tags, wherein the turbomachine tags are configured to categorize the data and a data access system (DAS) configured to provide data access to the first data archiver, the asset model database, or a combination thereof.
摘要:
System and methods are provided. In one embodiment, a system includes a master data archiver configured to store a data related to a turbomachine system and a first data collector service system configured to collect the data from the master data archiver. The system also includes a second data collector service system communicatively coupled to the first data collector system and configured to pull or to push the data from the first data collector system and a first data archiver configured to receive at least some of the data from the second data collector system. The system further includes an asset model database storing a plurality of turbomachine tags, wherein the turbomachine tags are configured to categorize the data and a data access system (DAS) configured to provide data access to the first data archiver, the asset model database, or a combination thereof.
摘要:
A system for background image subtraction includes a computing device coupled with a 3D video camera, a processor of the device programmed to receive a video feed from the camera containing images of one or more subject that include depth information. The processor, for an image: segments pixels and corresponding depth information into three different regions including foreground (FG), background (BG), and unclear (UC); categorizes UC pixels as FG or BG using a function that considers the color and background history (BGH) information associated with the UC pixels and the color and BGH information associated with pixels near the UC pixels; examines the pixels marked as FG and applies temporal and spatial filters to smooth boundaries of the FG regions; constructs a new image by overlaying the FG regions on top of a new background; displays a video feed of the new image in a display device; and continually maintains the BGH.
摘要:
System and computer program product are provided to configure a path between nodes through a fabric in a fibre channel storage area network (SAN). A node name is provided for a target node on the SAN and a port name is provided for each port in the target node. A relationship is established in a data structure between each port name and a slot in which each port is physically located in the target node. Prior to configuring a path between a source node and a port in the target node, the ports which are physically connected and logged in to the fabric are identified by port address. The port names corresponding to the port addresses are then identified. The port names are used to generate interface_ids of the ports corresponding to the physical slots in which the ports are located. A data structure is created to maintain the relationship between interface_ids and port names. To establish a path connection between a port in the source node and a selected port in the target node, the node name of the target node and the interface_id of the selected port are input to the data structure and the port name of the selected port is output. The port name is then used to obtain the address of the selected port and an I/O session path opened between the source and target nodes.
摘要:
A method, apparatus and program storage device for providing asynchronous status messaging in a data storage system Asynchronous events are returned from a target to an initiator in response to a Read Message from the initiator. The return status message may or may not be associated with a previously given command or Logical Unit (LUN).
摘要:
Methods, system and computer program product are provided to improve the efficiency of data transfers in a PPRC environment. Any or all of three features may be implemented, each of which reduces the number of round trips required for the exchange of handshaking, data and control information. A first feature includes disabling the “transfer ready” acknowledgment which normally occurs between a primary storage controller and a secondary storage controller. A second feature includes pre-allocating payload and data buffers in the secondary storage controller. A third feature includes packaging write control information with a write command in an extended command descriptor block (CDB). Such a step eliminated the need for a separate transmission of the write control information. The CDB is transmitted along with a data block from the primary storage controller to the secondary storage controller and placed in the respective, pre-allocated buffers. Data may also be pipelined to the secondary. By decreasing the response time for data transfers, the distance separating the primary and secondary storage controllers may be increased.
摘要:
Provided are a method for monitoring paths between a first controller and second controller. A determination is made as to whether one path has been unavailable for a predetermined time period in response to detecting that the path is unavailable. Indication is made that the path is in a first failed state if the path has been unavailable for more than the predetermined time period and indication is made that the path is in a second failed state if the path has not been unavailable for the predetermined time period.
摘要:
Provided are a method, system and article of manufacture for bidirectional data transfer. In certain embodiments a link layer login is sent from a first port to a second port. Subsequently, an application layer login is sent from the first port to the second port to establish a first data path, wherein the first data path is from the first port to the second port. Subsequently, another application layer login is sent from the second port to the first port to establish a second data path, wherein the second data path is from the second port to the first port. In certain other embodiments, a first data path is established from a first port to a second port. A determination is made at the first port, whether the second port has a second data path established from the second port to the first port. An application layer logout is sent from the first port to the second port, in response to determining that the second port has the second data path established from the second port to the first port. The first data path is terminated from the first port to the second port in response to receiving the application layer logout at the second port.
摘要:
Provided are a method, system, and program monitoring paths between a first controller and second controller. A determination is made as to whether one path has been unavailable for a predetermined time period in response to detecting that the path is unavailable. Indication is made that the path is in a first failed state if the path has been unavailable for more than the predetermined time period and indication is made that the path is in a second failed state if the path has not been unavailable for the predetermined time period.
摘要:
A processor is used to evaluate information regarding the number, size, and priority level of data transfer requests sent to a plurality of communication ports. Additional information regarding the number, size, and priority level of data requests received by the communication ports from this and other processors is evaluated as well. This information is applied to a control algorithm that, in turn, determines which of the communication ports will receive subsequent data transfer requests. The behavior of the control algorithm varies based on the current utilization rate of communication port bandwidths, the size of data transfer requests, and the priority level of the these transfer requests.