摘要:
A method for media processing includes providing a source media clip, which includes at least source audio data, via a network to a client device. A media recording, including client video and client audio data recorded by a user of the client device while playing the source audio data, is received via the network from the client device. The received media recording is synchronized with the source media clip and is mixed with the source media clip to generate a mixed media clip. The mixed media clip is transmitted to client devices over the network for playback by users of the client devices.
摘要:
A method for media processing includes providing a source media clip, which includes at least source audio data, via a network to a client device. A media recording, including client video and client audio data recorded by a user of the client device while playing the source audio data, is received via the network from the client device. The received media recording is synchronized with the source media clip and is mixed with the source media clip to generate a mixed media clip. The mixed media clip is transmitted to client devices over the network for playback by users of the client devices.
摘要:
A method includes tagging, by a processor executing a first operating system kernel, a region of a volatile memory used by a first storage area network (SAN) adapter driver coupled to a SAN adapter, and decoupling the first SAN adapter driver from the SAN adapter. A boot of a second operating system kernel is then initiated while preserving in the tagged region of the volatile memory contents stored therein. After the boot, a second SAN adapter driver is then coupled to the SAN adapter.
摘要:
A processor, executing a first operating system kernel, tags a region of volatile memory used by a first storage area network (SAN) adapter driver coupled to a SAN adapter, and decouples the first SAN adapter driver from the SAN adapter. A boot of a second operating system kernel is then initiated while preserving in the tagged region of the volatile memory contents stored therein. After the boot, a second SAN adapter driver is then coupled to the SAN adapter.
摘要:
For facilitating data verification using a checksum in conjunction with a sidefile by a processor device in a computing environment, first block signatures having a first size are calculated for first blocks of a first volume stored on a storage device. The first block signatures are stored to a sidefile. Second block signatures having a second size different from the first size are calculated for second blocks of a second volume stored on the storage device. The second block signatures are stored to the sidefile.
摘要:
Exemplary methods, system, and computer program product embodiments for managing services within a data storage subsystem using a processor in communication with a memory device during a startup sequence are provided. At least one service facilitated by a provider is provided. At least one requirement is linked to the at least one service. The at least one service and the at least one requirement are incorporated into a specification file. A directed acyclic graph, interrelating the at least one service and an additional service based on the at least one requirement, is constructed. The directed acyclic graph is traversed using an initialization process to generate a determination which of an available plurality of services to provide. The determination further includes an analysis of the which of the available plurality of services to provide in view of at least one hardware resource in the data storage subsystem.
摘要:
A planned system configuration is stored to a volatile memory coupled to a processor executing a first operating system kernel. The planned system configuration is tagged. A boot of a second operating system kernel is initiated while preserving in the volatile memory contents stored therein, and following the boot of the second operating system kernel, a set of parameters referencing the tagged planned system configuration is retrieved from the volatile memory. The planned system configuration is then used, based on the retrieved set of parameters.
摘要:
Exemplary method, system, and computer program product embodiments for data verification in a storage system are provided. A read of data is asynchronously submitted to nonvolatile storage media. A read of a first checksum signature is submitted to a solid state, sidefile memory location of a storage controller in the storage subsystem. The first checksum signature is representative of the data previously written to the nonvolatile storage media. A second checksum signature is calculated from the read of the data. The first and second checksum signatures are compared. If a match is not determined, a critical event is reported.
摘要:
Methods and computer program products for enabling reflection capability in the C programming language are provided. One method includes generating a database for a program written in the C programming language when compiling the program, wherein the database is based on structures included within the program. The method further includes storing the database in memory and utilizing the database during run-time to enable the program to observe and modify its own structure and behavior. One computer program product includes executable portions for performing the above method. Another method includes creating a database for a program written in the C programming language, wherein the type database is based on structures included within the program and is created prior to the program being compiled. This method further comprises storing the database in memory and utilizing the database during run-time to enable the program to observe and modify its own structure and behavior.
摘要:
A planned system configuration is stored to a volatile memory coupled to a processor executing a first operating system kernel. The planned system configuration is tagged. A boot of a second operating system kernel is initiated while preserving in the volatile memory contents stored therein, and following the boot of the second operating system kernel, a set of parameters referencing the tagged planned system configuration is retrieved from the volatile memory. The planned system configuration is then used, based on the retrieved set of parameters.