摘要:
Embodiments of the present invention provide a magnetic memory. In one embodiment, the magnetic memory comprises an array of memory cells configured to provide resistive states, and a read circuit. The read circuit is configured to sense a resistance through a memory cell in the array of memory cells to obtain a sense result and categorize the sense result into one of at least three different categories comprising a middle category situated between the resistive states.
摘要:
A system for error correction coding and decoding information is disclosed. In one embodiment, the first and second encoders are each configured to encode the information, wherein the second encoder has a higher capability than the first encoder. First and second decoders are configured to recover the information, wherein the second decoder recovers the information encoded by the second encoder only if the first decoder cannot recover the information.
摘要:
In a Reed-Solomon decoder handling both errors and erasures, an uncorrectable codeword is identified when any one or more of six conditions (a) to (f) is satisfied: (a) no solution to key equation σ(x)T(x)≡(x)modx2T; (b) degσ(x)≠nerrors; (c) error and erasure locations coincide; (d) deg ω(x)≧nerrors+nerasures; (e) nerasures+2*nerrors>2T; and (f) an error location has a zero correction magnitude. Nerrors and nerasures represent, respectively, a number of errors and erasures, with respect to an error locator polynomial σ(x) and an erasure locator polynomial Λ(x), 2T is the strength of a Reed-Solomon code, ω(x) is an errata evaluator polynomial, and T(x) is a modified syndrome polynomial. A detector circuit 300 comprises a logic unit 350 which tests for the conditions (a) to (g), and an indicator unit 360 which provides a corresponding output.
摘要:
A system for configuring solid-state storage devices comprises a solid-state storage device and an error correction code (ECC) selection system. The ECC selection system is configured to automatically select a set of error correction code based on an error rate of the storage device. The ECC selection system is further configured to install the selected set of error correction code in the solid-state storage device.
摘要:
A system for configuring solid-state storage devices comprises a solid-state storage device and an error correction code (ECC) selection system. The ECC selection system is configured to automatically select a set of error correction code based on an error rate of the storage device. The ECC selection system is further configured to install the selected set of error correction code in the solid-state storage device.
摘要:
A memory card comprising an magnetic random access memory (MRAM) array that comprises a plurality of magnetic memory cells and a controller coupled to the MRAM array. The controller is configured to communicate with a host device, and the controller is configured perform an error correction function associated with at least one of the plurality of magnetic memory cells.
摘要:
A memory card comprising an magnetic random access memory (MRAM) array that comprises a plurality of magnetic memory cells and a controller coupled to the MRAM array. The controller is configured to communicate with a host device, and the controller is configured perform an error correction function associated with at least one of the plurality of magnetic memory cells.
摘要:
Enhanced safety is provided in the event of an information handling system catastrophic battery failure by extending a flame container outward from the battery to vent flammable gases through holes having a quenching distance that retards transfer of flames from the battery. For example, telescoping cylinder sections disposed proximate the casing of a battery cell are forced outward as a telescoping assembly when pressure within the casing exceeds a predetermined safety threshold. The flame container vents flammable gases away from other cells of the battery and may direct the vented gases to the exterior of an information handling system housing or to the interior of the housing.
摘要:
A site controller adapted to be used in an automated monitoring system for monitoring and controlling a plurality of remote devices via a host computer connected to a first communication network is provided. The site controller is configured for controlling communication with the host computer and a plurality of communication devices that define a second communication network associated with the plurality of remote devices. Briefly described, in one embodiment, the site controller comprises a transceiver configured to communicate with the plurality of communication devices via the second communication network; a network interface device configured to communicate with the host computer via the first communication network; and logic configured to: manage communication with each of the plurality of communication devices, via a first communication protocol, based on one or more communication paths for each of the plurality of communication devices, each communication path comprising one or more communication devices involved in the communication link between the transceiver and each of the plurality of communication devices; and manage communication with the host computer via a second communication protocol. Other aspects, features, and embodiments are also claimed and described.
摘要:
An apparatus and method using a program protection engineering (P2E) toolkit to provide program protection engineering, security management, and report preparation for sensitive and classified projects. The P2E toolkit is an implementation of security policies, procedures, and methodologies associated with acquisition programs. Acquisition programs may range from large-scale classified systems for the government to sensitive corporate acquisition programs focusing on company proprietary or intellectual property issues. Specifically, the P2E toolkit provides end-to-end program protection engineering, security management, and report preparation for sensitive and classified programs throughout the program lifecycle, and assists security professionals and program managers to make appropriate decisions to protect their acquisition programs from compromise due to foreign intelligence threats or corporate/industrial espionage. The P2E toolkit enhances the traditional program management concerns of technical performance, schedule, and cost, by adding lifecycle protection as in integral component.