摘要:
According to various illustrative embodiments of the present invention, a method for adaptive cluster input/output control includes starting a nonessential input/output operation using a first controller in a first node of a cluster, informing at least a second controller in a second node of the cluster about starting the nonessential input/output operation, and increasing the nonessential input/output operation by a predetermined utilization percentage. The method also includes waiting for a predetermined amount of time, determining whether the nonessential input/output operation has been completed, and determining whether the at least the second controller in the second node has substantially decreased performance. The method also includes decreasing the nonessential input/output operation by the predetermined utilization percentage if the nonessential input/output operation utilization percentage is greater than the predetermined utilization percentage and if the at least the second controller in the second node has substantially decreased performance, and informing the at least the second controller in the second node of the cluster about the completion of the nonessential input/output operation if the nonessential input/output operation has been completed.
摘要:
A SAN-based cluster backup system and method are provided. The system and method are automated, do not use a LAN for backup data, and are made aware of application failover events. The system and method are composed of two main components: a backup service, and a primary coordinator. The backup service performs the backup of the applications that are hosted on a particular node. The backup service periodically checkpoints the state of the backup job and communicates the status to the primary coordinator. The primary coordinator controls all backup operations in the cluster. The user submits backup jobs for the applications through the primary coordinator. If a node fails during a backup operation, the primary coordinator can ensure that the failed backup job can be resumed from the last checkpoint on the failed-over node. In this way, repetitive backups can be avoided, thereby increasing efficiency.
摘要:
A protective circuit compares at least two different signals and asserts a control node toward respective logic states accordingly. At least one of the signals is derived from a voltage on a power rail within a computer or other device. A switching element passes or isolates an enable signal based on the logic state of the control node, enabling or preventing operation of a power supply, accordingly. Central processing units (CPUs) or other elements are protected against electrically caused damage in the event that a fault is detected by the protective circuit.
摘要:
Inverse search systems and methods operate on identifiers of content items in a corpus such as the World Wide Web In an inverse search, the user submits a query that includes an identifier of a target content item in the corpus and receives information (metadata) about the target content item being returned to the user. Many types of metadata can be returned, including ratings or other metadata related to the target content item obtained from users, popularity data specific to the target content item, information about previously submitted forward search queries that led to the target content item being identified as a hit, and metadata extracted from the target content item.
摘要:
Inverse search systems and methods operate on identifiers of content items in a corpus such as the World Wide Web In an inverse search, the user submits a query that includes an identifier of a target content item in the corpus and receives information (metadata) about the target content item being returned to the user. Many types of metadata can be returned, including ratings or other metadata related to the target content item obtained from users, popularity data specific to the target content item, information about previously submitted forward search queries that led to the target content item being identified as a hit, and metadata extracted from the target content item.
摘要:
A system and method for authentication of a communication device is disclosed. A system that incorporates teachings of the present disclosure may include, for example, a communication device having a controller element to compute a shared secret key based at least in part on a communication device (CD) private key and a cryptography algorithm, wherein the CD private key is stored in an identity module of the communication device and is unknown to an authentication center, and wherein the communication device is authenticated by the authentication center based at least in part on the shared secret key. Additional embodiments are disclosed.
摘要:
A system and method is disclosed for failure recovery and communications in a shared storage system. The shared storage system includes at least two host nodes, each of which includes two ports. Each of the ports of each of the nodes is coupled to input ports of a storage enclosure. The input ports of the storage enclosures are in turn coupled to one another to form communications links between each of the host nodes. When the communications links between the host nodes fail, the host nodes are able to pass configuration information to each other by saving configuration information to a central location in a shared storage, such as a dedicated location in one of the storage drives of the storage enclosure that is directly coupled to both host nodes. The host nodes are able to force their peer nodes to read configuration changes before accessing possibly corrupted data from a previous configuration.
摘要:
A system and method for recovering from a server failure in a computer network, wherein the network contains several stand-alone, non-clustered, servers, and a cluster, wherein a clustered server also serves as the spare server, is disclosed. This cluster will have one standby recovery group for each non-clustered server in the computer network. Each recovery group contains the IP address and network name of the associated stand-alone server. The cluster monitors the health of the stand-alone servers, preferably through the use of a heartbeat mechanism. If the cluster detects a failure, it will reassign the LUNs owned by the failing server to the cluster. After the cluster has reassigned the LUNs, it will activate the recovery group containing the IP address and network name of the failing server. Subsequently, the cluster will assume the identity of the failing server and serve its users, until the failing server is repaired or replaced.
摘要:
An image-guided radiotherapy system for tumor treatment featuring obtaining a three-dimensional visualized tumor image, identifying the boundary of the tumor, and designating and applying a boosted radiation dose of treatment for a boost region within the tumor boundary. A predetermined safety region is between the boosted region and the tumor boundary with a predetermined minimum distance between the boosted region boundary and tumor boundary.
摘要:
Examples disclosed herein relate to a direction based user interface and digital sign display. A processor may detect a facing direction of a display device. The processor may cause a user interface to be displayed on the display device if the display device is detected to be facing a first direction. The processor may cause a digital sign image to be displayed on the display device if the display device is detected to be facing a second direction.