摘要:
An apparatus, system, and method are disclosed for handling data being communicated over lossless Ethernet that is sensitive to delays. Fiber Channel over Ethernet (FCoE) is one example of an environment where data may be subject to unacceptable delays. The method involves designating certain data as low latency data that is sensitive to delays in transmission. The low latency data is then transmitted in such a manner that the receiving devices are aware that they are receiving low latency data. If a delay in the transmission of low latency is detected, commands are issued that pause or slow standard data in order to free up bandwidth for the low latency data. The commands may be, for example, backward congestion notifications and priority flow control. Low latency data is exempted from backward congestion notifications and priority flow control. Priority 7 priority group 15 may be reserved exclusively for low latency data.
摘要:
An apparatus, system, and method are disclosed for handling data being communicated over lossless Ethernet that is sensitive to delays. Fibre Channel over Ethernet (FCoE) is one example of an environment where data may be subject to unacceptable delays. The method involves designating certain data as low latency data that is sensitive to delays in transmission. The low latency data is then transmitted in such a manner that the receiving devices are aware that they are receiving low latency data. If a delay in the transmission of low latency is detected, commands are issued that pause or slow standard data in order to free up bandwidth for the low latency data. The commands may be, for example, backward congestion notifications and priority flow control. Low latency data is exempted from backward congestion notifications and priority flow control. Priority 7 priority group 15 may be reserved exclusively for low latency data.
摘要:
An battery end cap is disclosed for limiting current flow of a battery. The battery end cap includes a cap terminal, the cap terminal comprising an external conductive surface and an internal conductive surface. The battery end cap further includes a pressure sensitive switch, wherein when the battery end cap is installed on a battery, the pressure sensitive switch is configured to bias the internal conductive surface of the cap terminal from being in electrical communication with an electrical source of the battery. Electrical communication between the cap terminal and the electrical source is created or maintained when a sufficient external pressure is applied to the battery end cap and electrical contact between the cap terminal and the internal electrical source is broken without the sufficient external pressure.
摘要:
A lock and modular system for securing an electronic device. The system includes a device security module that couples to an electronic device and secures the electronic device to its location. A monitor module ensures that the device security module is coupled to the electronic device before a data security module allows the electronic device to operate. The monitor module may also require that the device security module be recognized before the electronic device will operate. If the device security module is coupled and recognized, the user is prompted to provide an encryption key. If the key is correct, the electronic device will operate. The user may have a limited number of attempts to provide the encryption key. If the user makes too many attempts, the electronic device is disabled and the data thereon destroyed. If the device security module is uncoupled during operation, the electronic device is shut down.
摘要:
A lock for securing an electronic device includes a tamper module and a destruction module. The tamper module determines whether a component of the lock has been compromised. The tamper module may determine whether a cable securing the electronic device has been cut. If the tamper module determines that a lock component has been compromised, a destruction module may destroy an enabling component that enables the electronic device to operate. The destruction module may destroy a transmitter in the lock that communicates an authentication code if the electronic device will not function without the authentication code.
摘要:
A lock for securing an electronic device includes a tamper module and a destruction module. The tamper module determines whether a component of the lock has been compromised. The tamper module may determine whether a cable securing the electronic device has been cut. If the tamper module determines that a lock component has been compromised, a destruction module may destroy an enabling component that enables the electronic device to operate. The destruction module may destroy a transmitter in the lock that communicates an authentication code if the electronic device will not function without the authentication code.
摘要:
A lock and modular system for securing an electronic device. The system includes a device security module that couples to an electronic device and secures the electronic device to its location. A monitor module ensures that the device security module is coupled to the electronic device before a data security module allows the electronic device to operate. The monitor module may also require that the device security module be recognized before the electronic device will operate. If the device security module is coupled and recognized, the user is prompted to provide an encryption key. If the key is correct, the electronic device will operate. The user may have a limited number of attempts to provide the encryption key. If the user makes too many attempts, the electronic device is disabled and the data thereon destroyed. If the device security module is uncoupled during operation, the electronic device is shut down.
摘要:
An battery end cap is disclosed for limiting current flow of a battery. The battery end cap includes a cap terminal, the cap terminal comprising an external conductive surface and an internal conductive surface. The battery end cap further includes a pressure sensitive switch, wherein when the battery end cap is installed on a battery, the pressure sensitive switch is configured to bias the internal conductive surface of the cap terminal from being in electrical communication with an electrical source of the battery. Electrical communication between the cap terminal and the electrical source is created or maintained when a sufficient external pressure is applied to the battery end cap and electrical contact between the cap terminal and the internal electrical source is broken without the sufficient external pressure.
摘要:
Embodiments of the present invention address deficiencies of the art in respect to data backup and archival tools and provide a method, system and computer program product for securing fragments in a peer-to-peer data backup and archival network. In an embodiment of the invention, a method for securing fragments in a peer-to-peer data backup and archival network can include partitioning a file into multiple, different fragments in a byte stream for storage in a peer-to-peer data backup and archival network, encrypting each of the fragments in the byte stream individually, and storing the encrypted fragments for the byte stream in different peer hosts in the peer-to-peer data backup and archival network.
摘要:
Embodiments of the present invention address deficiencies of the art in respect to data backup and archival tools and provide a method, system and computer program product for the dispersal and retrieval of fragments in a peer-to-peer data backup and archival network. In an embodiment of the invention, a method for the dispersal and retrieval of fragments in a peer-to-peer data backup and archival network can include partitioning a file into multiple, different fragments for storage in a peer-to-peer data backup and archival network, selecting different peer hosts in the peer-to-peer data backup and archival network to store different ones of the fragments, and storing each of the fragments in at least one of the selected different peer hosts. Optionally, the fragments can be encrypted before storage in the different peer hosts.