Abstract:
Systems, apparatuses and methods may provide for firmware access wrapper technology that includes a plurality of input registers communicatively coupled to a hardware power controller, a plurality of output registers communicatively coupled to the hardware power controller, and a processor communicatively coupled to the input registers and the output registers. The processor may include configurable logic to identify a control policy change with respect to the hardware power controller, detect input signal information in one or more of the input registers, and conduct a modification of one or more values in the output registers based on the control policy change and the input signal information.
Abstract:
A device, method, machine-readable medium, and system are disclosed. In one embodiment the device is a memory controller capable of modifying a reference voltage to a persistent moving read reference (MRR) voltage level for use during one or more subsequent reads to a non-volatile memory array. This modification is in response to a change in a reference voltage supplying the non-volatile memory array from a previous reference voltage level to a temporary MRR voltage level.
Abstract:
In various embodiments, the reference voltage used for read operations in a non-volatile memory may be adjusted up or down in an attempt to read data from an area that previously produced at least one uncorrectable error. The direction and amount of this adjustment may be based on the number and direction of correctable errors in surrounding data.
Abstract:
In a non-volatile memory that reads a binary value from a storage cell by comparing the voltage level of a stored charge in that cell against a reference voltage, the accumulated errors in a range of memory locations may be analyzed to determined if there are more errors in one direction than the other (for example, more 0-to-1 errors than 1-to-0 errors). If so, the reference voltage may be adjusted up or down so that subsequent reads from that range may produce approximately the same number of errors in each direction. For multiple-bits-per-cell memories, where there are multiple reference voltages for each cell, each reference voltage may be adjusted separately by keeping track of the errors related to that particular threshold.
Abstract:
Embodiments of the present disclosure describe device, methods, computer-readable media and system configurations for dividing error correcting code (“ECC”) codewords into portions and storing the portions among multiple die of non-volatile memory (“NVM”). For example, a device may include memory including a first die and a second die, and a memory controller configured to store a first portion of a codeword for use with an error correcting code in a first segment of the first die and to store a second portion of the codeword in a first segment of the second die. In various embodiments, the first segment of the second die may be offset from the first segment of the first die. Other embodiments may be described and/or claimed.
Abstract:
In various embodiments, the reference voltage used for read operations in a non-volatile memory may be adjusted up or down in an attempt to read data from an area that previously produced at least one uncorrectable error. The direction and amount of this adjustment may be based on the number and direction of correctable errors in surrounding data.
Abstract:
A system, method, and computer readable medium for communicating at least one real-time specially-composed bulletin message to at least one subscriber of a provider of Internet services, comprising a first device, and a second device communicably coupled to the first device, wherein the first device: accesses only subscriber upstream traffic to a destination web site requested by the subscriber, wherein the first device inter-connects between the at least one subscriber and the destination web site, identifies the at least one subscriber's identification based on the accessed subscriber upstream traffic automatically provided by the subscriber, and provides the unique subscriber identification to the second device located at the provider of Internet services providing data services and management control to the first device, wherein the second device determines the subscriber associated with the unique subscriber identification.
Abstract:
An internet service provider (ISP) is configured to provide notification messages such as service updates to subscribers via redirected web pages. In order for the web pages to be treated as originating from the ISP, the ISP provides a shared secret in the browser message. The shared secret may be a secret not derivable by viruses or trojans in the subscriber computer, such as a MAC address of the subscriber modem.
Abstract:
A system, method, and computer readable medium for communicating at least one real-time specially-composed bulletin message to at least one subscriber of a provider of Internet services, comprising a first device, and a second device communicably coupled to the first device, wherein the first device: accesses only subscriber upstream traffic to a destination web site requested by the subscriber, wherein the first device inter-connects between the at least one subscriber and the destination web site, identifies the at least one subscriber's unique identification based on the accessed subscriber upstream traffic automatically provided by the subscriber, and provides the unique subscriber identification to the second device located at the provider of Internet services providing data services and management control to the first device, wherein the second device determines the subscriber associated with the unique subscriber identification, and if the specially-composed bulletin message for the subscriber is desired to be communicated: the second device sends policy information related to the data services and management control, to the first device, wherein the policy information includes an IP address of the subscriber's device, and at least one of: the specially-composed bulletin message, a modification of the message to be performed for the IP address, a reference to the message, and a redirection to the message, the first device examines the accessed upstream traffic to determine if it is possible to send a redirection, wherein the examining occurs without modifying the accessed upstream traffic, and the first device sends the redirection if it is possible to do so.
Abstract:
An Internet service provider (ISP) is configured to analyze a subscriber's sent e-mail packets to determine a subscriber identity associated with the e-mail packets. A database is then queried to determine a current sending rate of e-mails by the subscriber. A sending rate above an allowed threshold causes the upstream transmission of the e-mail packets to be blocked, optionally by injecting connection destroying packets. A subscriber remains blocked from upstream transmission of e-mails until the sending rate as determined by the ISP drops below a second, more stringent threshold. This automatic process is also accompanied by automated messaging to the subscriber with information as to the measures taken and remedial options.