摘要:
A wireless communication device (50) can include a radio frequency transceiver (52), an audio drive circuit (58) coupled to the transceiver, a speaker (10) having a voice coil (16) coupled to the audio drive circuit, and an antenna feed or radiating circuit (20) such as an RFID or NFID circuit coupled to the voice coil for at least radiating or receiving an electromagnetic signal via the voice coil. Such radiating circuits can be coupled to the voice coil using a band pass circuit designed to substantially prevent a radiating signal from the radiating circuit from interfering with audio drive circuit driving the speaker. The wireless communication device can further include an antenna (54) coupled to the radio frequency transceiver. Note, this arrangement can be designed to avoid problems involving electrostatic discharge sensitivity, electromagnetic interference coupling between the antenna and the voice coil, total radiated power, and specific absorption rate.
摘要:
A method and system for conducting an integrity check of system and user metadata when the metadata is mounted. A filesystem reviewer is embedded within software of a server node. A mutual exclusion lock is obtained on the selected metadata. An automated verification of the locked metadata is conducted while the filesystem is mounted. In addition, an automated salvage of the locked metadata may be conducted while the filesystem is mounted. The verification and/or salvage of the locked metadata can be applied to system, user, and/or a portion of the user metadata.
摘要:
A system for data base management using memory devices holding a database containing tables of data occupying extents. A database engine reviews each query to determine an extents list of extents containing the data needed by that said query. A query monitor then re-orders the extents lists so that extents are retrieved and stored in a buffer cache for more efficient use when executing the queries. The database engine retrieves needed extents from the memory devices, as ordered in the extents lists, and stores those extents in the buffer cache. The database engine then executes one or more queries on the data in the extents in the buffer cache to determine respective results.
摘要:
A technique for implementing policy-aware backup and restore capability in a tiered storage system. If a data set's contents are backed up from the tiered storage system to a backup storage system, metadata for the data set may also be backed up. Prior to the data set being restored from the backup storage system to the tiered storage system, the backed up metadata is restored and processed to determine a tier among the tiered storage pools to which the data set will be restored.
摘要:
A multi-receiver satellite positioning system (SPS) wireless device (101) and system (100) or method (200) can include a plurality of SPS receivers co-located with each other, and a processor (114). The processor can be coupled to a first SPS receiver (102) and at least a second SPS receiver (104). The processor can be programmed to select (202) a measurement from the first SPS receiver or from at least the second SPS receiver having a desired characteristic, and use (212) the calculated measurement selected for having the desired characteristic for a predetermined application. For example, the processor can select the measurement by comparing (206) a possible error in position (EPE) reported by the first SPS receiver with a possible error in position reported by the at least second SPS receiver and selecting the measurement with the least amount of EPE when accuracy is a desired characteristic.
摘要:
A system for limiting the amount of time for a database server to perform a crash recovery process. A maximum recovery time for the database server to perform the crash recovery process is specified. An estimated recovery time for the crash recovery process that is less than the maximum recovery time is calculated, based on at least one of a deterministic analysis of cost accumulation during prior instances of the crash recovery process or an empirical analysis of cost accumulation during regular transaction processing in the database server. The crash recovery process is then conformed to the estimated recovery time.
摘要:
Provided are a method, system, and program maintaining information on a namespace comprised of filesets shared by clients over a network. Zone information is maintained on at least one zone, wherein each zone associates at least one client system, at least one fileset, and at least one storage pool. For one zone, the associated at least one fileset and at least one storage pool are accessible to the at least one client system. Clients are provided information on filesets included in a namespace, wherein each of a plurality of clients receive information on the at least one fileset associated with the client in the at least one zone including the client.
摘要:
A method (100) in a multi-transmitter mobile device (201) can include transmitting (102) a signal in a first mode causing an interrupting signal to a transmission in a second mode, receiving (104) commands to increase power in the second mode as a result of the interrupting signal, and circumventing (106) the commands to increase power in the second mode when transmitting the signal in the first mode interrupts the signal in the second mode. The method can circumvent commands to increase power by alternating (108) a power control bit up and down and masking a true bit coming from a base station to the multi-transmitter mobile device. In another alternative, the method can circumvent by storing (110) a power control setting prior to the interrupting signal with a stored value, waiting for a removal of the interrupting signal, and overwriting a calculated power control setting with the stored value.
摘要:
Provided are techniques for determining whether content of an object has changed. Under control of a backup system, opaque object attributes and a data identifier are received, wherein the data identifier is generated based on one or more relevant object attributes of the opaque object attributes that indicate whether at least one of the content of the object and one or more of the relevant object attributes has changed. The received data identifier is compared with a previously stored data identifier. In response to determining that the received data identifier and the previously stored data identifier do not match, it is determined that the content of the object has changed.
摘要:
Embodiments of the invention relate to a method and system to implement a DDR interface, such as a high-speed encode/decode interface. In one embodiment, a method of encoding data comprises the acts of (1) receiving a first signal, a second signal, and a first clock signal common to the first and second signals; (2) detecting rising edges and falling edges of the first clock signal; and (3) generating a composite signal based at least in part on the first and second signals and the detected rising and falling edges. The composite signal is associated with a second clock signal that is generated based at least in part on the detected rising and falling edges and on a time delay relative to the first clock signal.