摘要:
A mobile wireless device (302) can include a first processor (614) for establishing a first communication link using a first wireless communication protocol, a second processor (615) for establishing a second communication link using a second wireless communication protocol different from the first wireless communication protocol, and an interprocessor communication link (620) between the first processor and the second processor enabling communication between the first communication link and the second communication link. The mobile wireless device can serve as a dispatcher coupling a first mobile radio 112 using the first wireless communication protocol with a second mobile radio 116 using the second wireless communication protocol. The first wireless communication protocol can be a cellular communication protocol and the second wireless communication protocol can be a dispatch radio communication protocol. The first wireless communication protocol and the second wireless communication protocol can also utilize a wireline communication link (104).
摘要:
A multi-receiver satellite positioning system (SPS) wireless device (101) and system (100) or method (200) can include a plurality of SPS receivers co-located with each other, and a processor (114). The processor can be coupled to a first SPS receiver (102) and at least a second SPS receiver (104). The processor can be programmed to select (202) a measurement from the first SPS receiver or from at least the second SPS receiver having a desired characteristic, and use (212) the calculated measurement selected for having the desired characteristic for a predetermined application. For example, the processor can select the measurement by comparing (206) a possible error in position (EPE) reported by the first SPS receiver with a possible error in position reported by the at least second SPS receiver and selecting the measurement with the least amount of EPE when accuracy is a desired characteristic.
摘要:
A method (100) in a multi-transmitter mobile device (201) can include transmitting (102) a signal in a first mode causing an interrupting signal to a transmission in a second mode, receiving (104) commands to increase power in the second mode as a result of the interrupting signal, and circumventing (106) the commands to increase power in the second mode when transmitting the signal in the first mode interrupts the signal in the second mode. The method can circumvent commands to increase power by alternating (108) a power control bit up and down and masking a true bit coming from a base station to the multi-transmitter mobile device. In another alternative, the method can circumvent by storing (110) a power control setting prior to the interrupting signal with a stored value, waiting for a removal of the interrupting signal, and overwriting a calculated power control setting with the stored value.
摘要:
A system (100) and method (200) of controlling transmit power in a mobile wireless device (101) can include a plurality of transmitters (103, 105, 107), a plurality of antennas (102,104,116) correspondingly coupled to the plurality of transmitters, and a processor (114) coupled to the plurality of transmitters. The processor can be programmed to measure (202) a loading characteristic on a first antenna (102) coupled to a first transmitter (103) and modify (206) a transmitter power on at least a second transmitter (107) based on the loading characteristic measured on the first antenna. The processor can be further programmed to limit (208) the transmitter power on the second transmitter (105) if the loading characteristic measured on the first antenna exceeds a predetermined threshold and to enable (210) a tuned power setting for the second transmitter if the loading characteristic measured on the first antenna falls below a predetermined threshold.
摘要:
A method and system for conducting an integrity check of system and user metadata when the metadata is mounted. A filesystem reviewer is embedded within software of a server node. A mutual exclusion lock is obtained on the selected metadata. An automated verification of the locked metadata is conducted while the filesystem is mounted. In addition, an automated salvage of the locked metadata may be conducted while the filesystem is mounted. The verification and/or salvage of the locked metadata can be applied to system, user, and/or a portion of the user metadata.
摘要:
A system for data base management using memory devices holding a database containing tables of data occupying extents. A database engine reviews each query to determine an extents list of extents containing the data needed by that said query. A query monitor then re-orders the extents lists so that extents are retrieved and stored in a buffer cache for more efficient use when executing the queries. The database engine retrieves needed extents from the memory devices, as ordered in the extents lists, and stores those extents in the buffer cache. The database engine then executes one or more queries on the data in the extents in the buffer cache to determine respective results.
摘要:
A technique for implementing policy-aware backup and restore capability in a tiered storage system. If a data set's contents are backed up from the tiered storage system to a backup storage system, metadata for the data set may also be backed up. Prior to the data set being restored from the backup storage system to the tiered storage system, the backed up metadata is restored and processed to determine a tier among the tiered storage pools to which the data set will be restored.
摘要:
A system for limiting the amount of time for a database server to perform a crash recovery process. A maximum recovery time for the database server to perform the crash recovery process is specified. An estimated recovery time for the crash recovery process that is less than the maximum recovery time is calculated, based on at least one of a deterministic analysis of cost accumulation during prior instances of the crash recovery process or an empirical analysis of cost accumulation during regular transaction processing in the database server. The crash recovery process is then conformed to the estimated recovery time.
摘要:
Provided are a method, system, and program maintaining information on a namespace comprised of filesets shared by clients over a network. Zone information is maintained on at least one zone, wherein each zone associates at least one client system, at least one fileset, and at least one storage pool. For one zone, the associated at least one fileset and at least one storage pool are accessible to the at least one client system. Clients are provided information on filesets included in a namespace, wherein each of a plurality of clients receive information on the at least one fileset associated with the client in the at least one zone including the client.
摘要:
Provided are techniques for determining whether content of an object has changed. Under control of a backup system, opaque object attributes and a data identifier are received, wherein the data identifier is generated based on one or more relevant object attributes of the opaque object attributes that indicate whether at least one of the content of the object and one or more of the relevant object attributes has changed. The received data identifier is compared with a previously stored data identifier. In response to determining that the received data identifier and the previously stored data identifier do not match, it is determined that the content of the object has changed.