摘要:
A method and system that provides a pass through block device that is utilized to redirect all the writes bound to the system drive(s) to an overlay skin device. Reads are performed on overlay device contents and the overlay device contents take precedence over the contents of the base device. Applications of a particular theme may be installed on the overlay device. The overlay device is provided on a removable media and thus allows for creation of a set of exchangeable skins. Nested overlays are utilized to create separation of the OS data, application data, and user data. Switchable user skins enable writes into overlays and allow a user to create operating environments which can be utilized to change the use of a computer system. Since the overlays are provided on a removable media, the user only needs to substitute the overlay to switch the user's operating environment.
摘要:
Methods, systems, and products are provided that display memory statistics for a keydrive that do not require the keydrive to be plugged into another device. Displaying memory statistics according to embodiments of the present invention include receiving a command resulting in a change to the memory usage of the keydrive, calculating memory statistics describing the current state of memory usage of the keydrive, storing the memory statistics in memory on the keydrive, and displaying the memory statistics on a display on the keydrive. Calculating memory statistics describing the current state of memory usage of the keydrive may be carried out by calculating a total memory usage of the keydrive. Calculating memory statistics describing the current state of memory usage of the keydrive may also be carried out by calculating a percent of total memory used.
摘要:
A method and system that reduces the length of time required to complete antivirus scans. An enhanced journal file system (JFS) includes an antivirus utility function, which utilizes a low level log of the JFS to store a history of transactions that occur since a previous scan operation. The log is immune from normal purge operations by the JFS and cannot be circumvented without driver level access. Thus, a virus that changes the timestamp on the file or otherwise attempts to hide its viral activity does not affect the log. When the antivirus scanning utility initiates an antivirus scan of the system, the antivirus scanning utility obtains the history since the last scan from the persistent log. The antivirus scanning utility “replays” the log and carries out the antivirus scan on all files, directories, etc. associated with any transactions that occurred since the last scan.
摘要:
Methods, systems, and products are provided that display memory statistics for a keydrive that do not require the keydrive to be plugged into another device. Displaying memory statistics according to embodiments of the present invention include receiving a command resulting in a change to the memory usage of the keydrive, calculating memory statistics describing the current state of memory usage of the keydrive, storing the memory statistics in memory on the keydrive, and displaying the memory statistics on a display on the keydrive. Calculating memory statistics describing the current state of memory usage of the keydrive may be carried out by calculating a total memory usage of the keydrive. Calculating memory statistics describing the current state of memory usage of the keydrive may also be carried out by calculating a percent of total memory used.
摘要:
A technique for storing or backing up data to a removable media such as a CD or DVD with an enhanced probability that such data can be successfully read or recovered from such media subsequent to the writing/storing/backing-up of the data. This enhanced probability is achieved by storing the data to be copied to the media in multiple different physical locations of the media, such that a plurality of duplicate copies of the data exists on the media. Because there are multiple copies of the data stored on the media, the probability of being able to successfully read at least one good copy of the data is enhanced. For example, if one of the copies cannot be successfully read due to an unrecoverable error, another of the copies can be used to satisfy the read or restore operation. It is also possible to read all copies of the data in response to a read/restore operation, and any differences in the read data will indicate an error with at least one of the copies. Selection of which copy to select and use to satisfy the read request is based on a vote, where the copies are matched against one another, and the copy having the most matches with other copies is deemed to be the good copy and is used to satisfy the read or restore operation.
摘要:
A technique for storing or backing up data to a removable media such as a CD or DVD with an enhanced probability that such data can be successfully read or recovered from such media subsequent to the writing/storing/backing-up of the data. This enhanced probability is achieved by storing the data to be copied to the media in multiple different physical locations of the media, such that a plurality of duplicate copies of the data exists on the media. Because there are multiple copies of the data stored on the media, the probability of being able to successfully read at least one good copy of the data is enhanced. For example, if one of the copies cannot be successfully read due to an unrecoverable error, another of the copies can be used to satisfy the read or restore operation. It is also possible to read all copies of the data in response to a read/restore operation, and any differences in the read data will indicate an error with at least one of the copies. Selection of which copy to select and use to satisfy the read request is based on a vote, where the copies are matched against one another, and the copy having the most matches with other copies is deemed to be the good copy and is used to satisfy the read or restore operation.
摘要:
A computer implemented method for sampling call stack information. Responsive to identifying a set of interrupts, a determination is made as to whether all processors in a plurality of processors have generated the set of interrupts. A number of addresses are identified for a set of interrupted threads identified by the set of interrupts response to a determination that all of the processors have generated the set of interrupts. A determination is made as to whether the identified address falls within a set of address ranges. Responsive to a determination that the identified address falls within the set of address ranges, a sampler thread is notified to obtain call stack information.
摘要:
A computer implemented method, apparatus, and computer program code for profiling an application. Execution of an application is monitored. A set of metrics relating to execution of the application occurring during monitoring execution of the application are collected to form a set of observed metrics. An execution environment overhead occurring with respect to the set of observed events is identified to form an identified execution environment overhead. The set of observed metrics is adjusted using the identified execution environment overhead to form a set of calibrated metrics.
摘要:
An apparatus and method for providing access rights information on computer accessible content are provided. The apparatus and method provide a mechanism through which access rights information is provided in association with information and content such that use of the information and content is controlled based on the access rights information. The apparatus and method include access rights information tags being associated with information and content. A web browser is provided with code, either in the web browser, or as a plugin application or browser extension, to process the access rights information and thereby control the usage of the associated information and content. In addition, an interface is provided through which a user may gain access to content that is associated with access rights information. The interface is generated based on the access rights information associated with the content and the access level of the user. Through this interface, the user may temporarily or permanently agree to terms for increasing the user's access level in order to have access to associated content.
摘要:
A computer implemented method for sampling call stack information. Responsive to identifying a set of interrupts, a determination is made as to whether all processors in a plurality of processors have generated the set of interrupts. A number of addresses are identified for a set of interrupted threads identified by the set of interrupts response to a determination that all of the processors have generated the set of interrupts. A determination is made as to whether the identified address falls within a set of address ranges. Responsive to a determination that the identified address falls within the set of address ranges, a sampler thread is notified to obtain call stack information.