摘要:
A system and method for managing parallel SCSI device functionality is presented. A user sends a request to a vendor whereby the request corresponds to the user changing the functionality of one of the user's SCSI devices. The vendor generates and sends a key that includes a password and a functionality value to the user. The user extracts the password, extracts the functionality value, and includes them in a command descriptor block. The user includes the command descriptor block in a SCSI command, and sends the SCSI command to the user's SCSI device whereupon the SCSI device validates the password and reconfigures itself based upon the functionality value. The SCSI device returns a message to the user indicating whether the reconfiguring process was successful. In turn, the user forwards the message to the vendor so the vendor may bill the user accordingly.
摘要:
A mechanism for multiple instant messaging (IM) sessions associated with a single user name is provided. A frontend server receives user login requests and routes the instant messaging system to a back-end server. Each login associated with a particular user name is routed to the same backend server (or IM host). Messages targeted to a recipient having a plurality of active IM sessions are broadcast to all the active sessions. Messages targeted to recipients having a single IM session are unicast.
摘要:
A plurality of data packets encoded according to a first protocol are received which encapsulate data encoded according to a second protocol. A first source address is extracted from the packets according to the first protocol, it is determined whether or not the first source address is a substantial duplicate of a known assigned address. If it is a duplicate, a second source address is extracted from the encapsulated data according to the second protocol, and the first source address and said second source address are provided in an enhanced error log so that a system administrator may correct the duplicate assigned address. Enhanced embodiments of the invention included analysis of data encapsulated by a third, fourth and subsequent protocols, and automatic determination of each protocol encoding format.
摘要:
The present invention provides an anti-theft security method and system for portable electronic devices. This invention shifts the locking step from the external security device that engages the electronic device to the actual electronic device. This system comprises a portable electronic device having a opening therein for the purpose of engaging a securing device that will security the electronic device to some stationary object such as a desk. The securing device is typically a cable. This cable has one end that engages the electronic device through the opening the electronic device. Once engaged, a shutter activated by the electronic device reconfigures the opening in the electronic device to prevent the disengagement of the cable from the electronic device.
摘要:
A method, apparatus, and computer program product are disclosed for permitting access to a data storage device while the device is being formatted. A format command is received within the device from the host. A command complete response is then transmitted to the host before the device has completed being formatted. The host waits for the command complete response before the host transmits any read or write command to the device. Read and write commands that are transmitted to the device from the host are executed while the device is still being formatted.
摘要:
A unique identification number is stored in the electronic card that is attached to a disk drive, as well as in a reserved location on the disk itself. This ID number is initialized at head-disk assembly and a match between the two ID numbers is necessary for access to the data on the disk, although not for repairs to the mechanisms themselves. When a disk containing sensitive data is to be removed from a customer site, a technician briefly removes the disk and applies a jumper to specific contacts on the drive, then reinserts the drive and powers it up. This causes the ID on the electronic card to be erased, rendering the data on the drive unreadable. When the drive reaches a repair facility, the erased ID number ensures that the disk will be reformatted before being reused.
摘要:
A system, method, and product are disclosed for verifying a condition of a storage drive's media. A command is received within the storage drive to verify the condition of the storage drive's media. In response to a receipt of the command, the storage drive attempts to read each one of the logical block addresses included in the storage drive. The condition of the media is verified by the storage drive by determining ones of the logical block addresses that are not in a readable condition.
摘要:
A telephone answering system associated with a telephone receiving terminal, either wired or mobile wireless, including an implementation for predetermining a set of different types of incoming telephone calls; the type of calls may be based on who the caller is and/or based upon the identifier of the incoming call. This is combined with a calendar listing time of day segments of the schedule of the recipient of an incoming telephone call. Storage is provided for a set of different vocal responses, for each time segment, to each of said set of different types of telephone calls. Then, responsive to an incoming call, there is provided the appropriate stored vocal for the type of said incoming call based upon the type or nature of the caller and the recipient's calendar.
摘要:
A method and apparatus is provided for allocating a portion of the OD zone of a hard drive disk to be a non-volatile (NV) caching space, where all writes to the disk are carried out. These write operations can be performed much faster than with conventional techniques, and storage costs may be significantly reduced. The disk drive controller manages the cache, and the host system sees improved throughput, especially for write intensive operations. In one embodiment a method is provided for writing specified data to a disk drive in a computer configuration, the disk drive having a magnetic disk and a volatile cache memory. A specified portion of the OD zone of the disk is reserved for an NV cache space, and the specified data is initially stored in the volatile memory, in response to a write command. The method further includes writing the specified data from the volatile memory to the NV cache space at the disk OD, and subsequently writing the specified data from the NV cache space to a selected longer-term storage location on the disk.
摘要:
A system, method, and computer program product for recovering from data errors. In a SCSI hard drive system, when a unrecoverable data error condition is encountered, the logical block address is reassigned using information provided by the data scrubbing functionality of the SCSI hard drive.