摘要:
A deaerator includes a case defining a vortex chamber, a fluid inlet for allowing a mixture of lubricating liquid and air to pass through the case into the vortex chamber, an air outlet for allowing air flow out of the deaerator, and a liquid outlet for allowing lubricating liquid flow out of the deaerator. A porous diffuser is positioned proximate the liquid outlet. A plate is positioned adjacent the porous diffuser and has a first surface in contact with the porous diffuser.
摘要:
A deaerator includes a case defining a vortex chamber and a fluid inlet for allowing a mixture of lubricating liquid and air to pass through the case into the vortex chamber. An air outlet allows air flow out of the deaerator, and a liquid outlet allows lubricating liquid flow out of the deaerator. A porous diffuser is positioned proximate the liquid outlet for slowing the flow of lubricating liquid.
摘要:
A deaerator includes a case defining a vortex chamber and a fluid inlet for allowing a mixture of lubricating liquid and air to pass through the case into the vortex chamber. An air outlet allows air flow out of the deaerator, and a liquid outlet allows lubricating liquid flow out of the deaerator. A porous diffuser is positioned proximate the liquid outlet for slowing the flow of lubricating liquid.
摘要:
A improvement to video compression techniques is described in which blocks of video input information are compared in their respective pixel values to corresponding blocks of immediately preceding frames. The blocks are analyzed to determine whether change has occurred in accordance with two tests. First, the pixel values of the block are compared to the pixel values of a preceding block and if a threshold number of pixel values in the block exceed their counterparts by a threshold amount, then the block is assumed to have changed and is communicated via a standard communication protocol, compression technique and media. Second, even if the threshold number of pixels in the block has not changed, the pixel values are compared with their prior frame counterparts to determine if any one pixel value has changed in magnitude more than a second threshold amount. Again, one such pixel is identified, then the block is assumed to have changed and is communicated.
摘要:
A method for managing power consumed by storage systems and other devices is disclosed herein. In certain embodiments, such a method may include initially monitoring conditions (such as data traffic conditions) on a communication link between a first device and a second device. The method may further include determining whether the conditions on the communication link warrant powering down or powering up the second device. In the event the conditions warrant powering down the second device, a power-down command may be generated and transmitted from the first device to the second device. In the event the conditions warrant powering up the second device, a power-up command may be generated and transmitted from the first device to the second device. In selected embodiments, the power-up and power-down commands are one of SCSI commands and FICON commands. A corresponding apparatus, system, and computer-usable medium are also disclosed and claimed herein.
摘要:
Network traffic encoded in a first protocol is transmitted across a first communications link, wherein the first protocol allows a first plurality of simultaneous logical connections. The transmitted network traffic is received at a first interface between the first communications link and a second communications link. The received network traffic is encapsulated within frames at the first interface, wherein the frames are generated in accordance with a second protocol, and wherein the second protocol does not allow any plurality of simultaneous logical connections that are allowed by the first protocol. The frames are transmitted from the first interface to a second interface across the second communications link. The frames are received and then unencapsulated network traffic is generated from the frames at the second interface, wherein the second interface is between the second communications link and a third communications link. The unencapsulated network traffic is routed to a selected logical connection of a second plurality of simultaneous logical connections across the third communications link, wherein transmission across the third communications link is in the first protocol.
摘要:
Described are embodiments of an invention for blocking write access to memory modules of a solid state drive. The solid state drive includes a controller access module or a memory access module that controls write access to the solid state drive and the memory modules of the solid state drive. Upon determining that a memory module has failed, the failed memory module or the entire solid state memory device is configured to be read only to prevent an errant write of data over critical data. Further, a failed memory module, or solid state device memory having a failed memory module, may be replaced upon failure.
摘要:
Network traffic encoded in a first protocol is transmitted across a first communications link, wherein the first protocol allows a first plurality of simultaneous logical connections. The transmitted network traffic is received at a first interface between the first communications link and a second communications link. The received network traffic is encapsulated within frames at the first interface, wherein the frames are generated in accordance with a second protocol, and wherein the second protocol does not allow any plurality of simultaneous logical connections that are allowed by the first protocol. The frames are transmitted from the first interface to a second interface across the second communications link. The frames are received and then unencapsulated network traffic is generated from the frames at the second interface, wherein the second interface is between the second communications link and a third communications link. The unencapsulated network traffic is routed to a selected logical connection of a second plurality of simultaneous logical connections across the third communications link, wherein transmission across the third communications link is in the first protocol.
摘要:
Systems and methods for determining when a fluid supply container of a blood processing apparatus becomes empty. The system uses a scale to monitor and detect when a fluid supply container is empty based on the rate of change of the container weight, and a controller receives a signal from the scale and controls the operation of a pump to stop pumping when the fluid supply container is empty.
摘要:
An apparatus, system, and method are disclosed for simulating multiple hosts. An object module creates a plurality of host object instances. Each host object instance simulates a host to a storage device connection. In addition, each host object instance includes a unique identifier. A traffic generator serially establishes communications between each host object instance and a storage device using the unique identifier. The traffic generator serially establishes communications until a number of host object instances in communication with the storage device is greater than a host threshold. A verification module verifies that the storage device established communications with each host object instance according to a specified connection protocol. The verification module communicates a pass if each host object instance communication is verified.