摘要:
In one embodiment, the present invention includes a method for determining if an entry corresponding to a prediction address is present in a first predictor, and overriding a prediction output from a second predictor corresponding to the prediction address if the entry is present in the first predictor. Other embodiments are described and claimed.
摘要:
In one embodiment, the present invention includes a method for determining if an entry corresponding to a prediction address is present in a first predictor, and overriding a prediction output from a second predictor corresponding to the prediction address if the entry is present in the first predictor. Other embodiments are described and claimed.
摘要:
In an embodiment, a processor includes a decode logic to receive and decode a first memory access instruction to store data in a cache memory with a replacement state indicator of a first level, and to send the decoded first memory access instruction to a control logic. In turn, the control logic is to store the data in a first way of a first set of the cache memory and to store the replacement state indicator of the first level in a metadata field of the first way responsive to the decoded first memory access instruction. Other embodiments are described and claimed.
摘要:
An apparatus, system, and method are disclosed for auditing access to secure data. A detection module detects an access to the secure data. A record module records an encrypted log entry describing the access to the secure data. A verification module verifies the secure data is securely stored.
摘要:
A method and system for localizing and resolving a fault in a cluster environment. The cluster is configured with at least one multi-homed node, and at least one gateway for each network interface. Heartbeat messages are sent between peer nodes and the gateway in predefined periodic intervals. In the event of loss of a heartbeat message by any node or gateway, an ICMP echo is issued to each node and gateway in the cluster for each network interface. If neither a node loss not a network loss is validated in response to the ICMP echo, an application level ping is issued to determine if the fault associated with the absence of the heartbeat message is a transient error condition or an application software fault.
摘要:
One aspect provides a method including: identifying a task to be scheduled for execution on an information handling device having two or more cores of different size; determining an appropriate scheduling of the task for execution on the two or more of cores of different size, wherein the appropriate scheduling of the task is determined via a core signature for the task; directing the task to an appropriate core for execution based on the appropriate scheduling determined; and executing the task on the appropriate core. Other aspects are described and claimed.
摘要:
Systems and methods described herein provide for a process for managing continuity of experience between operation of a hybrid computer system in the connected state and the slate component independently in the disconnected state. Embodiments further provide for the continuity of experience for devices operating under multiple processors or multiple platforms. According to embodiments, one or more states and conditions of the connected hybrid computer system may be synchronized with the slate component when the slate component is disconnected from the hybrid computer system. Alternatively, embodiments provide for the synchronization of one or more states and conditions of the independent slate component with the hybrid computer system responsive to connecting the slate component to the hybrid computer system. Non-limiting examples of states and conditions according to embodiments are web pages, applications, documents, lists of recently opened files and web pages, and web browser active tabs.
摘要:
Embodiments operating shared peripherals in a hybrid computing system are described. Embodiments control one or more shared peripheral devices variously between a primary system and a secondary system via one or more communication links, where the secondary system is detachable from the primary system and operates as an independent computing device in the disconnected state, while operating as a display device in the connected state.
摘要:
A method for preventing malicious software from execution within a computer system is disclosed. Before any actual execution of an application program on a computer system, the application program needs to be cross-compiled to yield a set of cross-compiled code of the application program. The set of cross-compiled code of the application program can then be executed in an execution module that is capable of recognizing and translating the set of cross-compiled code of the application program to the actual machine code of the processor.
摘要:
Systems and methods described herein provide for communication between a base component and a tablet component of a hybrid computing system. The hybrid computing system is in a connected state when the base component and tablet component are connected. Systems and methods provide for a switch for determining control of the hybrid computing system when in a connected state. Embodiments provide that the base component may control the tablet component when the hybrid computing system is in a connected state and the switch is set to base control. According to embodiments, the display component may control the hybrid computing system when the hybrid computing system is in a connected state and the switch is set to tablet control. In addition, embodiments provide that a server module running on the display component and a client module running on the base component facilitate communication between the hybrid computing system components. Furthermore, systems and methods described herein provide that the base component may control hardware devices, peripheral devices, or software applications of the display component through communications between the server module and client module.