摘要:
A method and apparatus for controlling accesses to DMA control registers, specifically operating according to a Distributed Direct Memory Access (DDMA) protocol. When an access to a peripheral device ends in a Master Abort due to the failure of the peripheral device to respond to the DDMA Master component during a DDMA transaction, a System Management Interrupt (SMI#) is generated to the central processing unit. In the resulting execution of the System Management Mode code by the CPU, the cause of the peripheral component not responding (e.g., that the peripheral is in a low power mode, the connection between the DDMA master and the peripheral is interrupted, etc.) is determined. The CPU, executing SMM code, takes steps to correct the problem. For example, if the peripheral is powered down, the CPU will power it up so that the DDMA transaction can subsequently occur. Alternatively, when BIOS is used to power down a peripheral device, the DDMA Master component can determine the peripheral's power status prior to trying the DMA access. If the peripheral device is powered down, the DDMA Master component issues an SMI# to the CPU to cause the peripheral to be powered up prior to the DDMA transaction.
摘要:
A method and apparatus for implementing a corporate directory and service center is described. The method includes and the apparatus performs querying for common characteristics, displaying information in a varied manner of displays and switching between the manners of displaying, maintaining data integrity and changing data, and defining types of data with forms of display or treatments for handling the data. The method may be embodied in various media as instructions which a machine may execute to perform the method.
摘要:
A network infrastructure element such as a router or switch performs brokering network user identity and credential information. An application or administrative user can declare a policy for user identity information extraction, authentication and authorization. Based on the policy, the network element extracts user identity information or credentials from a transport-layer message header, application-layer message header, and message body. Based on the policy, the network element performs one or more authentication or authorization operations with the user identity information or credentials. As a result, a network element can broker identity information among incompatible applications and perform identity operations for the applications.
摘要:
A method of determining conditioning pulse parameters for an optical element includes directing a pump pulse to impinge on the optical element and directing a probe pulse to impinge on the optical element. The method also includes determining a first time associated with an onset of electronic excitation leading to formation of an absorbing region of the optical element and determining a second time associated with expansion of the absorbing region of the optical element. The method further includes defining a turn-off time for a conditioning pulse between the first time and the second time. According to embodiments of the present invention, pulse shaping of the conditioning pulse enables laser conditioning of optical elements to achieve improvements in their laser induced damage threshold.
摘要:
A method of determining conditioning pulse parameters for an optical element includes directing a pump pulse to impinge on the optical element and directing a probe pulse to impinge on the optical element. The method also includes determining a first time associated with an onset of electronic excitation leading to formation of an absorbing region of the optical element and determining a second time associated with expansion of the absorbing region of the optical element. The method further includes defining a turn-off time for a conditioning pulse between the first time and the second time. According to embodiments of the present invention, pulse shaping of the conditioning pulse enables laser conditioning of optical elements to achieve improvements in their laser induced damage threshold.
摘要:
A method and apparatus for implementing a corporate directory and service center is described. The method includes and the apparatus performs querying for common characteristics, displaying information in a varied manner of displays and switching between the manners of displaying, maintaining data integrity and changing data, and defining types of data with forms of display or treatments for handling the data. The method may be embodied in various media as instructions which a machine may execute to perform the method.
摘要:
The present invention discloses a method and apparatus for processing a packet of data received by a first-in-first-out (FIFO). In one embodiment, a message in the packet of data is recognized. Based on a plurality of control bits encoded in the message, a delimiting condition in the packet of data is determined. An operation is performed which is responsive to the delimiting condition. The operation controls the transfer of the packet of data from the FIFO to a memory.
摘要:
An innovative method and system for calculating realistic current and power of a circuit prior to silicon utilizes simulation and test vectors to determine a number of variables to accurately perform current calculations close to actual silicon results. Input test vectors which preferably are similar in function to applications utilized with the circuit are used to drive a model of the circuit. The simulator operating the model maintains the toggle count for each device of the circuit. A characterization table is generated which contains an average switching current value of a type of a device for different values of capacitive loads. Typically, this table is generated once and is used for a multiplicity of calculations. An activity factor can then be generated based on the number of the toggle count during a sample time period and the number of clock cycles during the sample period. Using the activity factor, the current is determined from the average switching current for the device times the activity factor. The current can then be used to perform such calculations as power consumption and electromigration testing.
摘要:
A network infrastructure element such as a router or switch performs brokering network user identity and credential information. An application or administrative user can declare a policy for user identity information extraction, authentication and authorization. Based on the policy, the network element extracts user identity information or credentials from a transport-layer message header, application-layer message header, and message body. Based on the policy, the network element performs one or more authentication or authorization operations with the user identity information or credentials. As a result, a network element can broker identity information among incompatible applications and perform identity operations for the applications.
摘要:
A method and apparatus for implementing a corporate directory and service center is described. The method includes and the apparatus performs querying for common characteristics, displaying information in a varied manner of displays and switching between the manners of displaying, maintaining data integrity and changing data, and defining types of data with forms of display or treatments for handling the data. The method may be embodied in various media as instructions which a machine may execute to perform the method.