Patent application number | Description | Published |
20130295788 | ELECTRICAL CORD WITH TAMPER RESISTANT MECHANISM - An electrical cord including a plug on a first end and at least one socket on a second end opposite the first end, a protective shutter assembly disposed within the at least one socket, the shutter assembly including a first and second shutter members positioned proximate the cover assembly and each of the first and second shutter members is at least partially aligned with separate cover openings in the cover assembly and being configured to move from a closed position to an open position in response to engaging at least one plug blade, a third shutter member positioned behind the first shutter member, a fourth shutter member positioned behind the second shutter member, and wherein the first and second shutter members pivot from the closed position to the open position and the third and fourth shutter members slide from the closed position to the open position. | 11-07-2013 |
20140030898 | ELECTRICAL CORD WITH TAMPER RESISTANT MECHANISM - An electrical cord including a plug on a first end and at least one socket on a second end opposite the first end, a protective shutter assembly disposed within the at least one socket, the shutter assembly including a first and second shutter members positioned proximate the cover assembly and each of the first and second shutter members is at least partially aligned with separate cover openings in the cover assembly and being configured to move from a closed position to an open position in response to engaging at least one plug blade, a third shutter member positioned behind the first shutter member, a fourth shutter member positioned behind the second shutter member, and wherein the first and second shutter members pivot from the closed position to the open position and the third and fourth shutter members slide from the closed position to the open position. | 01-30-2014 |
20140162479 | ELECTRICAL CORD WITH TAMPER RESISTANT MECHANISM - An electrical cord including a plug on a first end and at least one socket on a second end opposite the first end, a protective shutter assembly disposed within the at least one socket, the shutter assembly including a first and second shutter members positioned proximate the cover assembly and each of the first and second shutter members is at least partially aligned with separate cover openings in the cover assembly and being configured to move from a closed position to an open position in response to engaging at least one plug blade, a third shutter member positioned behind the first shutter member, a fourth shutter member positioned behind the second shutter member, and wherein the first and second shutter members pivot from the closed position to the open position and the third and fourth shutter members slide from the closed position to the open position. | 06-12-2014 |
20140273563 | ELECTRICAL CORD WITH TAMPER RESISTANT MECHANISM - A protective shutter assembly is disposed within the at least one socket, the shutter assembly including a first and second shutter members positioned proximate the cover assembly. Each shutter member is at least partially aligned with a separate cover opening in the cover assembly and is movable between a closed position and an open position in response to engaging at least one plug blade by an electric motor. | 09-18-2014 |
20150060441 | EXTENDABLE ELECTRICAL BOX - An extendable electrical box comprises an electrical box having two open ends to an internal box space having a first depth. The electrical box comprises a mounting structure attached to at least one wall of the electrical box. The mounting structure is configured to mount the electrical box to a vertical wall structure such that the open end faces substantially parallel to the vertical wall structure. At least two extendable first rings each continuously surround one of the two open ends of the electrical box. The at least two extendable first rings are each slidably coupled with the electrical box via the sliding mechanical cooperation of one or more guides with one or more tracks, such that sliding either of the at least two extendable first rings in relation to the open ends of the electrical box expands the electrical box from the first depth to a larger second depth. | 03-05-2015 |
Patent application number | Description | Published |
20100049928 | COMMAND SEQUENCE NUMBERING APPARATUS AND METHOD - A method, system, and computer program product to preserve data integrity in a mirror and copy environment is disclosed herein. In one embodiment, a method may include receiving a write command and data from a host device. The method may further include writing the data to a primary storage device and attaching a primary sequence number associated with the primary storage device to the write command, thereby providing a numbered write command with a command sequence number. The numbered write command may then be transmitted to a secondary storage device. The method may further include comparing the command sequence number to a secondary sequence number associated with the secondary storage device. If the command sequence number matches the secondary sequence number, then the command may be executed. Otherwise, it may be ignored. | 02-25-2010 |
20110063983 | SELF-HEALING FIBRE CHANNEL LINK - A method for verifying the integrity of a communication link is disclosed herein. In selected embodiments, such a method may include detecting, during normal operation of a communication link, a condition indicative of a high failure rate (HFR) on the communication link. The method may further include placing the communication link in an HFR state as a result of the condition. While in HFR state, the method may repeatedly transmit test I/Os over the communication link. The method may then automatically exit HFR state and resume normal operation on the communication link when one or more of the following has occurred: a selected number of test I/Os have been successfully transmitted over the communication link, and a number of test I/Os have been successfully transmitted over the communication link for a selected period of time. A corresponding system, apparatus, and computer program product are also disclosed and claimed herein. | 03-17-2011 |
20110225374 | SELF-ADJUSTING SCSI STORAGE PORT QUEUE - A method for managing storage space in a storage port queue includes establishing a watermark for the storage port queue. The method further receives, at the storage port associated with the storage port queue, a command having an initiator-target-LUN (ITL) nexus associated therewith. Upon receiving the command, the method determines whether the used space in the storage port queue has reached the watermark. In the event the used space has not reached the watermark, the method processes the command. In the event the used space has reached the watermark and a specified number of commands for the ITL nexus are already present in the storage port queue, the method rejects the command. Otherwise, the method may process the command. A corresponding apparatus and computer program product are also disclosed herein. | 09-15-2011 |
20120087242 | SYSTEMS AND METHODS FOR THROTTLING A FABRIC LOGIN IN A FIBRE CHANNEL ADAPTER - Systems and methods for throttling a fabric login (FLOGI) in a Fibre Channel (FC) adapter are provided. One system includes a first tracking mechanism, a second tracking mechanism, a switch, and a FC adapter. The FC adapter comprises three or more FLOGIs and a controller configured to perform the below method. One method includes transmitting first and second FLOGI requests to the switch and indicating, via a first tracking mechanism, that a first FLOGI associated with the first FLOGI request and a second FLOGI associated with the second FLOGI request are active. The method further includes queuing a third FLOGI request until the first FLOGI request or the second FLOGI request is processed by the switch and indicating, via a second tracking mechanism, that a third FLOGI associated with the third FLOGI request is queued. Also provided are computer storage mediums including computer code for performing the above method. | 04-12-2012 |
20120096190 | SYSTEMS AND METHODS FOR DETECTING SUPPORTED SMALL FORM-FACTOR PLUGGABLE (SFP) DEVICES - Systems and methods for detecting supported small form-factor pluggable (SFP) devices in an adapter are provided. One system includes multiple ports, each port configured to be coupled to a SFP device, a tracking device configured to store data representing a list of supported SFP devices for the adapter, and a processor coupled to each of the plurality of ports and the tracking device. The processor is configured to scan each port at start-up, determine if any of the ports is coupled to a non-supported SFP device, and disable any ports that are coupled to a non-supported SFP device. One method includes scanning each port at start-up, determining if any of the ports is coupled to a non-supported SFP device, and disabling any ports that are coupled to a non-supported SFP device. Also provided are computer storage mediums including computer code for performing the above method. | 04-19-2012 |
20120096469 | SYSTEMS AND METHODS FOR DYNAMICALLY SCANNING A PLURALITY OF ACTIVE PORTS FOR WORK - Systems and methods for scanning ports for work are provided. One system includes one or more processors, multiple ports, a first tracking mechanism, and a second tracking mechanism for tracking high priority work and low priority work, respectively. The processor(s) is/are configured to perform the below method. One method includes scanning the ports, finding high priority work on a port, and accepting or declining the high priority work. The method further includes changing a designation of the processor to TRUE in the first tracking mechanism if the processor accepts the high priority work such that the processor is allowed to perform the high priority work on the port. Also provided are computer storage mediums including computer code for performing the above method. | 04-19-2012 |
20120110222 | APPARATUS AND METHOD FOR DYNAMICALLY ENABLING AND DISABLING WRITE XFR_RDY - A method for dynamically enabling and disabling use of XFR_RDY is disclosed herein. In one embodiment of the invention, such a method includes receiving a write command at a target and determining whether XFR_RDY is enabled or disabled for the write command. In the event XFR_RDY is disabled, the method determines whether one or more buffers are available at the target. If at least one buffer is available, the method processes the write command by writing data associated with the write command to the one or more buffers. The method then returns information indicating the number of buffers that are still available at the target after completing the write command. A corresponding apparatus and computer program product are also disclosed and claimed herein. | 05-03-2012 |
20120203935 | SELF-ADJUSTING SCSI STORAGE PORT QUEUE - A method for managing storage space in a storage port queue includes establishing a watermark for the storage port queue. The method further receives, at the storage port associated with the storage port queue, a command having an initiator-target-LUN (ITL) nexus associated therewith. Upon receiving the command, the method determines whether the used space in the storage port queue has reached the watermark. In the event the used space has not reached the watermark, the method processes the command. In the event the used space has reached the watermark and a specified number of commands for the ITL nexus are already present in the storage port queue, the method rejects the command. Otherwise, the method may process the command. | 08-09-2012 |
20120236721 | SYSTEMS AND METHODS FOR THROTTLING A FABRIC LOGIN IN A FIBRE CHANNEL ADAPTER - A fabric login (FLOGI) in a Fibre Channel (FC) adapter is throttled. The system includes a first tracking mechanism, a second tracking mechanism, a switch, and an FC adapter. The FC adapter comprises three or more FLOGIs and a controller. First and second FLOGI requests are transmitted to the switch and indicate, via a first tracking mechanism, that a first FLOGI associated with the first FLOGI request and a second FLOGI associated with the second FLOGI request are active. A third FLOGI request is queued until the first FLOGI request or the second FLOGI request is processed by the switch and indicates, via a second tracking mechanism, that a third FLOGI associated with a third FLOGI request is queued. | 09-20-2012 |
20130238817 | INPUT/OUTPUT PORT ROTATION IN A STORAGE AREA NETWORK DEVICE - In one aspect of the present description, in an input/output (I/O) device having multiple CPUs and multiple I/O ports, a cycle of I/O port rotations is initiated in which each port rotation of the cycle includes rotating an assignment of at least one I/O port from one CPU to a different CPU of a plurality of the CPUs. In the illustrated embodiment, an I/O port assignment for each CPU of the plurality CPUs is rotated for at least a portion of the cycle. Other features and aspects may be realized, depending upon the particular application. | 09-12-2013 |
20130238818 | INPUT/OUTPUT PORT ROTATION IN A STORAGE AREA NETWORK DEVICE - In one aspect of the present description, in an input/output (I/O) device having multiple CPUs and multiple I/O ports, a cycle of I/O port rotations is initiated in which each port rotation of the cycle includes rotating an assignment of at least one I/O port from one CPU to a different CPU of a plurality of the CPUs. In the illustrated embodiment, an I/O port assignment for each CPU of the plurality CPUs is rotated for at least a portion of the cycle. Other features and aspects may be realized, depending upon the particular application. | 09-12-2013 |
20140195708 | DETERMINING WHEN TO THROTTLE INTERRUPTS TO LIMIT INTERRUPT PROCESSING TO AN INTERRUPT PROCESSING TIME PERIOD - Provided are a computer program product, system, and method for determining when to throttle interrupts to limit interrupt processing to an interrupt processing time. Upon receiving interrupts from the hardware device, a determination is made as to whether a number of received interrupts exceeds an interrupt threshold during a interrupt tracking time period. If so, an interrupt throttling state is set to a first value indicating to only process interrupts during an interrupt processing time period. Interrupts from the hardware device are processed during the interrupt time period when the interrupt throttling state is set to the first value. Interrupts received from the hardware are masked during a processing of a scan loop of operations while the interrupt throttling has the first value and the interrupt processing time period has expired, wherein the masked interrupts are not processed while processing the scan loop of operations. | 07-10-2014 |
20140351461 | INPUT/OUTPUT PORT ROTATION IN A STORAGE AREA NETWORK DEVICE - In one aspect of the present description, in an input/output (I/O) device having multiple CPUs and multiple I/O ports, a cycle of I/O port rotations is initiated in which each port rotation of the cycle includes rotating an assignment of at least one I/O port from one CPU to a different CPU of a plurality of the CPUs. In the illustrated embodiment, an I/O port assignment for each CPU of the plurality CPUs is rotated for at least a portion of the cycle. Other features and aspects may be realized, depending upon the particular application. | 11-27-2014 |
20150071069 | INJECTING CONGESTION IN A LINK BETWEEN ADAPTORS IN A NETWORK - Provided are a computer program product, system, and method for injecting congestion in a link between adaptors in a network. A congestion request is sent to a selected adaptor in a containing network component comprising one of a plurality of network components. The selected adaptor is in communication with a linked adaptor in a linked network component comprising one of the network components. The congestion request causes a delay in servicing the selected adaptor to introduce congestion on a link between the selected adaptor and the linked adaptor. | 03-12-2015 |
20150071070 | INJECTING CONGESTION IN A LINK BETWEEN ADAPTORS IN A NETWORK - Provided are a computer program product, system, and method for injecting congestion in a link between adaptors in a network. A congestion request is received for the selected adaptor at a containing network component comprising one of the network components. In response to the received congestion request, servicing the selected adaptor is delayed to introduce congestion on a link between the selected adaptor and the linked adaptor. | 03-12-2015 |
20150178005 | SYSTEMS AND METHODS FOR MIGRATING DATA - Various embodiments provide systems and methods for migrating data. One system includes a small computer system interface logical unit number (SCSI LUN) configured to store protected data, a processor, and memory configured to store a peer-to-peer remote copy (PPRC) application. The processor is configured to check a block cyclic redundancy check (CRC) for the protected data when the processor receives a request to read the protected data. One method includes receiving unprotected data, utilizing, by a second processor, a peer-to-peer remote copy (PPRC) application to add protection to the data to generate protected data, checking a CRC for the protected data when a request to migrate the protected data is received, and storing the protected data in a protected SCSI LUN. | 06-25-2015 |
20150331818 | DETERMINING WHEN TO THROTTLE INTERRUPTS TO LIMIT INTERRUPT PROCESSING TO AN INTERRUPT PROCESSING TIME PERIOD - Provided are a computer program product, system, and method for determining when to throttle interrupts to limit interrupt processing to an interrupt processing time. Upon receiving interrupts from the hardware device, a determination is made as to whether a number of received interrupts exceeds an interrupt threshold during a interrupt tracking time period. If so, an interrupt throttling state is set to a first value indicating to only process interrupts during an interrupt processing time period. Interrupts from the hardware device are processed during the interrupt time period when the interrupt throttling state is set to the first value. Interrupts received from the hardware are masked during a processing of a scan loop of operations while the interrupt throttling has the first value and the interrupt processing time period has expired, wherein the masked interrupts are not processed while processing the scan loop of operations. | 11-19-2015 |
20150370658 | ALTERNATIVE PORT ERROR RECOVERY WITH LIMITED SYSTEM IMPACT - Various embodiments for troubleshooting a network device in a computing storage environment by a processor. In response to an error in a specific port, an alternative error recovery operation is initiated on the port by performing at least one of initiating a silent recovery operation by reloading a failed instruction, taking the port offline, cleaning up any active transactions associated with the port, performing a hardware reset operation port, and bringing the port online. | 12-24-2015 |
Patent application number | Description | Published |
20080256385 | OPTIMIZATION OF PORT LINK RECOVERY - Provided are techniques for determining a link speed. When a link between two computing devices is operational, a link speed for use in communicating across the link is stored and a remembered indicator is set to TRUE. After any event occurs that causes the link to become inoperational, in response to determining that the remembered indicator is TRUE, the stored link speed is used when attempting to make the link become operational. | 10-16-2008 |
20100088434 | FCP COMMAND-DATA MATCHING FOR WRITE OPERATIONS - A method for performing a data exchange between an initiator and a receiver in a fibre channel protocol (FCP) is provided. A control flag is set in a write command to indicate the presence of an identifier. The identifier is copied into a command descriptor block (CDB) of the write command and appended to a data frame. The write command and data frame, including the identifier, is sent from the initiator to the receiver. | 04-08-2010 |
20100325376 | Apparatus and Method to Maintain Write Operation Atomicity Where a Data Transfer Operation Crosses a Data Storage Medium Track Boundary - A method to maintain write operation atomicity where a write operation crosses a data storage medium track boundary. The method supplies a storage controller comprising a host adapter, a processor, and a NVS. The primary host adapter receives from a host computer a write request and data. The method determines if the write request will cross a data storage medium track boundary. If the write request will cross a data storage medium track boundary, the method indicates to the host adapter that the write request comprises a two-track transfer, and writes the data to the primary NVS as the data is received. If the host computer fails prior to providing all the data to the storage controller, the method discards the data written to the NVS to ensure write operation atomicity. | 12-23-2010 |
20130279898 | SELF-HEALING FIBRE CHANNEL LINK - A method for verifying the integrity of a communication link is disclosed herein. In selected embodiments, such a method may include detecting, during normal operation of a communication link, a condition indicative of a high failure rate (HFR) on the communication link. The method may further include placing the communication link in an HFR state as a result of the condition. While in HFR state, the method may repeatedly transmit test I/Os over the communication link. The method may then automatically exit HFR state and resume normal operation on the communication link when one or more of the following has occurred: a selected number of test I/Os have been successfully transmitted over the communication link, and a number of test I/Os have been successfully transmitted over the communication link for a selected period of time. A corresponding system, apparatus, and computer program product are also disclosed and claimed herein. | 10-24-2013 |
20130282996 | SYSTEMS AND METHODS FOR MIGRATING DATA - Various embodiments provide systems and methods for migrating data. One system includes a small computer system interface logical unit number (SCSI LUN) configured to store protected data, a processor, and memory configured to store a peer-to-peer remote copy (PPRC) application. The processor is configured to execute the PPRC application to modify the protection in transmitted data and received data. One method includes receiving unprotected data, utilizing a PPRC application to add protection to the data to generate protected data, and storing the protected data in a protected SCSI LUN. Another method includes receiving, at a protected SCSI LUN, a request to transmit protected data, utilizing a PPRC application to strip the protection from the protected data to generate unprotected data, and transmitting the unprotected data to an unprotected SCSI LUN. | 10-24-2013 |