摘要:
In a system including an application subsystem node having an application RSID table and a logging subsystem node having a logging RSID table, the application subsystem node makes a determination of a registration status of a ALSI string relative to the application RSID table during a logging operation of the ALSI string. The application subsystem node further transfers a RSID package from the application subsystem node across a network to the logging subsystem node, wherein the RSID package includes a RSID encoding of the ALSI string and conditionally includes the ALSI string based on the registration status of the ALIS string relative to the application RSID table as determined by the application subsystem node.
摘要:
A method, system, and program product for a VTS subsystem's logging server to optimize applications' logging data entries where applications use the logging service. More specifically, in certain embodiments, the system comprises logic executed within a VTS subsystem to which a tape library subsystem is attached. The logic controls VTS subsystem applications' logging data entry strategy through applications' configured logging level, log entry category, and a cache buffer. The logic not only dynamically balances applications' logging request but also maximizes the availability of system information.
摘要:
A method, system, and program product for a VTS subsystem's logging server to optimize applications' logging data entries where applications use the logging service. More specifically, in certain embodiments, the system comprises logic executed within a VTS subsystem to which a tape library subsystem is attached. The logic controls VTS subsystem applications' logging data entry strategy through applications' configured logging level, log entry category, and a cache buffer. The logic not only dynamically balances applications' logging request but also maximizes the availability of system information.
摘要:
A method to sequentially deduplicate data, wherein the method receives a plurality of computer files, wherein each of the plurality of computer files comprises a label comprising a file name, a file type, a version number, and file size, and stores that plurality of computer files in a deduplication queue. The method then identifies a subset of the plurality of computer files, wherein each file of the subset comprises the same file name but a different version number, and wherein the subset comprises a maximum count of version numbers, and wherein the subset comprises a portion of the plurality of computer files. The method deduplicates the subset using a hash algorithm, and removes the subset from said deduplication queue.
摘要:
Embodiments of the disclosure relate to a biosample cartridge that includes storage slots for holding biosample plates. The cartridge has the same form factor as data tape cartridges to allow the cartridge to be handled by the same robotic mechanisms that handle data cartridges in an automated tape library. One aspect of the disclosure concerns a biosample storage cartridge that has a movable door to provide access to inside the cartridge and a plate holder disposed inside the cartridge. The plate holder includes a plurality of slots for receiving biosample plates that are scanned and processed by the automated tape library.
摘要:
Network traffic encoded in a first protocol is transmitted across a first communications link, wherein the first protocol allows a first plurality of simultaneous logical connections. The transmitted network traffic is received at a first interface between the first communications link and a second communications link. The received network traffic is encapsulated within frames at the first interface, wherein the frames are generated in accordance with a second protocol, and wherein the second protocol does not allow any plurality of simultaneous logical connections that are allowed by the first protocol. The frames are transmitted from the first interface to a second interface across the second communications link. The frames are received and then unencapsulated network traffic is generated from the frames at the second interface, wherein the second interface is between the second communications link and a third communications link. The unencapsulated network traffic is routed to a selected logical connection of a second plurality of simultaneous logical connections across the third communications link, wherein transmission across the third communications link is in the first protocol.
摘要:
Described are embodiments of an invention for blocking write access to memory modules of a solid state drive. The solid state drive includes a controller access module or a memory access module that controls write access to the solid state drive and the memory modules of the solid state drive. Upon determining that a memory module has failed, the failed memory module or the entire solid state memory device is configured to be read only to prevent an errant write of data over critical data. Further, a failed memory module, or solid state device memory having a failed memory module, may be replaced upon failure.
摘要:
Network traffic encoded in a first protocol is transmitted across a first communications link, wherein the first protocol allows a first plurality of simultaneous logical connections. The transmitted network traffic is received at a first interface between the first communications link and a second communications link. The received network traffic is encapsulated within frames at the first interface, wherein the frames are generated in accordance with a second protocol, and wherein the second protocol does not allow any plurality of simultaneous logical connections that are allowed by the first protocol. The frames are transmitted from the first interface to a second interface across the second communications link. The frames are received and then unencapsulated network traffic is generated from the frames at the second interface, wherein the second interface is between the second communications link and a third communications link. The unencapsulated network traffic is routed to a selected logical connection of a second plurality of simultaneous logical connections across the third communications link, wherein transmission across the third communications link is in the first protocol.
摘要:
A method to store information in a holographic data storage medium, wherein the method supplies a holographic data storage medium comprising an encoded focusing hologram and one or more encoded data holograms. The method disposes the holographic data storage medium in a holographic data storage system, and disposes a rotatable imaging lens at an (i)th orientation. The method illuminates the encoded focusing hologram to generate an (i)th reconstructed focusing image, projects that (i)th reconstructed focusing image through the rotatable imaging lens, and onto at optical detector array. The method then calculates an (i)th measured focusing metric, and determines if the (i)th measured focusing metric is greater than or equal to the threshold focusing metric. If the (i)th measured focusing metric is greater than or equal to the threshold focusing metric, then the method decodes the one or more encoded data holograms.
摘要:
A circuit for detecting antigens on biosample tracks comprising a processor, an electromagnetic write head for magnetizing nanoparticles attached to the antigens via antibodies in response to a write signal from the processor, and a first amplifier for supplying power to the write head. The circuit further comprises a magneto-resistive read sensor for detecting the magnetized nanoparticles upon receiving a read signal from the processor, and a second amplifier for supplying power to the read sensor. The write head and read sensor may be part of a head module in a magnetic tape drive. Nanoparticles of differing magnetic properties may be selectively paired with antibodies associated with different antigens to allow different antigens to be detected upon a single scan by the read-sensor.