摘要:
To permit multiple unsynchronized processors to update the file-modification time attribute of a file during concurrent asynchronous writes to the file, a primary processor having a clock manages access to metadata of the file. A number of secondary processors service client request for access to the file. Each secondary processor has a timer. When the primary processor grants a range lock upon the file to a secondary, it returns its clock time (m). Upon receipt, the secondary starts a local timer (t). When the secondary modifies the file data, it determines a file-modification time that is a function of the clock time and the timer interval, such as a sum (m+t). When the secondary receives an updated file-modification time (mp) from the primary, if mp>m+t, then the secondary updates the clock time (m) to (mp) and resets its local timer.
摘要:
To permit multiple unsynchronized processors to update the file-modification time attribute of a file during concurrent asynchronous writes to the file, a primary processor having a clock manages access to metadata of the file. A number of secondary processors service client request for access to the file. Each secondary processor has a timer. When the primary processor grants a range lock upon the file to a secondary, it returns its clock time (m). Upon receipt, the secondary starts a local timer (t). When the secondary modifies the file data, it determines a file-modification time that is a function of the clock time and the timer interval, such as a sum (m+t). When the secondary receives an updated file-modification time (mp) from the primary, if mp>m+t, then the secondary updates the clock time (m) to (mp) and resets its local timer.
摘要:
A network file server has storage for storing a file system, and a computer programmed for access to the file system in accordance with a file access protocol and in accordance with a storage access protocol. The computer receives a file access request from a network client for access to a file in the file system in accordance with the network file access protocol. The computer decides whether it should finish the file access using the file access protocol or the client should finish the file access using the storage access protocol. Upon deciding that the client should finish the file access using the storage access protocol, the computer returns to the client metadata of the file including metadata specifying addresses of logical blocks of storage allocated to the file, and then the computer responds to storage access requests from the client by performing read-write access to the file.
摘要:
A storage object such as a virtual disk drive or a raw logical volume is contained in a UNIX compatible file so that the file containing the storage object can be exported using the NFS or CIFS protocol and shared among UNIX and MS Windows clients or servers. The storage object can be replicated and backed up using conventional file replication and backup facilities without disruption of client access to the storage object. For client access to data of the storage object, a software driver accesses the file containing the storage object. For example, a software driver called a virtual SCSI termination is used to access a file containing a virtual SCSI disk drive. Standard storage services use the SCSI over IP protocol to access the virtual SCSI termination. An IP replication or snapshot copy facility may access the file containing the virtual SCSI disk drive using a higher-level protocol.
摘要翻译:存储对象(如虚拟磁盘驱动器或原始逻辑卷)包含在UNIX兼容文件中,以便可以使用NFS或CIFS协议导出包含存储对象的文件,并在UNIX和MS Windows客户端或服务器之间共享。 可以使用传统的文件复制和备份功能来复制和备份存储对象,而不会中断对存储对象的客户端访问。 为了客户机访问存储对象的数据,软件驱动程序访问包含存储对象的文件。 例如,称为虚拟SCSI终端的软件驱动程序用于访问包含虚拟SCSI磁盘驱动器的文件。 标准存储服务使用SCSI over IP协议来访问虚拟SCSI终端。 IP复制或快照复制功能可以使用更高级别的协议访问包含虚拟SCSI磁盘驱动器的文件。
摘要:
A storage object such as a virtual disk drive or a raw logical volume is contained in a UNIX compatible file so that the file containing the storage object can be exported using the NFS or CIFS protocol and shared among UNIX and MS Windows clients or servers. The storage object can be replicated and backed up using conventional file replication and backup facilities without disruption of client access to the storage object. For client access to data of the storage object, a software driver accesses the file containing the storage object. For example, a software driver called a virtual SCSI termination is used to access a file containing a virtual SCSI disk drive. Standard storage services use the iSCSI protocol to access the virtual SCSI termination. An IP replication or snapshot copy facility may access the file containing the virtual SCSI disk drive using a higher-level protocol.
摘要:
Software applications are enabled with multimodal communication capabilities and features associated with enhanced communication systems through a communication application programming interface (API). Applications for document processing, scheduling, audio/video data processing, and/or business operations can exchange communication system data and parameters bi-directionally with components of an enhanced communication system, initiate communication sessions through the application's user interface, and preserve post-communication updates.
摘要:
A wall-mountable mirror support unit including at least one box having a rear face attachable to a wall is provided. A light permeable cover extends over and seals the front of the box to prevent the ingress of water or dirt therein. The box contains at least one light and associated circuitry therein. The support unit includes means to enable a mirror having light-permeable regions to be attached thereto over the front of the box so that the light emitted by each light is transmitted through the light permeable cover and the light permeable regions of the mirror.
摘要:
The present invention relates to certain tetrazole derivatives of Formula (I), and pharmaceutically acceptable salts thereof, which exhibit useful pharmacological properties, for example, as agonists for the RUP25 receptor. Also provided by the present invention are pharmaceutical compositions containing compounds of the invention, and methods of using the compounds and compositions of the invention in the treatment of metabolic-related disorders, including dyslipidemia, atherosclerosis, coronary heart disease, insulin resistance, type 2 diabetes, Syndrome-X and the like. In addition, the present invention also provides for the use of the compounds of the invention in combination with other active agents such as those belonging to the class of α-glucosidase inhibitors, aldose reductase inhibitors, biguanides, HMG-CoA reductase inhibitors, squalene synthesis inhibitors, fibrates, LDL catabolism enhancers, angiotensin converting enzyme (ACE) inhibitors, insulin secretion enhancers and the like.
摘要:
Mechanisms and techniques disclose a system that provides access to data using a two part cache. The system receives a data access request containing a first data reference, such as an open systems request to access data. The system then obtains a history cache entry from a history cache based on the first data reference and obtains a partition cache entry from a partition cache based on the first data reference. Cache entries contain mappings between open systems reference locations and non-open systems references to locations in the data to be accessed. The system then performs a data access operation as specified by the data access request using a second data reference based upon either the history cache entry or the partition cache entry. Upon performance of the data access operation, the system then updates the history and partition caches with new cache entries and can resize the partition and history caches as needed.
摘要:
Glucagon receptor antagonist compounds of formula I are disclosed: The compounds are useful for treating type 2 diabetes and related conditions. Pharmaceutical compositions and methods of treatment are also included.