Patent application number | Description | Published |
20080209304 | Convolution-Encoded RAID with Trellis-Decode-Rebuild - A Redundant Array of Independent Devices uses convolution encoding to provide redundancy of the striped data written to the devices. No parity is utilized in the convolution encoding process. Trellis decoding is used for both reading the data from the RAID and for rebuilding missing encoded data from one or more failed devices, based on a minimal, and preferably zero, Hamming distance for selecting the connected path through the trellis diagram. | 08-28-2008 |
20080253273 | Computer Program Product for Controlling an Apparatus for Accessing Dual-Path Optical Recording Media - A dual-path optical recording medium and an apparatus for accessing such are disclosed. The dual-path optical recording medium includes a substrate, an intermediate recording layer, a holographic recording layer and a dichronic mirror layer. The intermediate recording layer is a rewritable data storage layer with a relatively low storage capacity. The holographic recording layer is a write-once data storage layer with a relatively high storage capacity. The dichronic mirror layer is located between the holographic recording layer and the intermediate recording layer. The apparatus for accessing the dual-path optical recording medium includes a first light module capable of generating a first laser light, and a second light module capable of generating a second laser light. | 10-16-2008 |
20080256566 | Dual-Path Optical Recording Media and an Apparatus for Accessing Thereof - A dual-path optical recording medium and an apparatus for accessing such are disclosed. The dual-path optical recording medium includes a substrate, an intermediate recording layer, a holographic recording layer and a dichronic mirror layer. The intermediate recording layer is a rewritable data storage layer with a relatively low storage capacity. The holographic recording layer is a write-once data storage layer with a relatively high storage capacity. The dichronic mirror layer is located between the holographic recording layer and the intermediate recording layer. The apparatus for accessing the dual-path optical recording medium includes a first light module capable of generating a first laser light, and a second light module capable of generating a second laser light. | 10-16-2008 |
20080259485 | System and Method for Cleaning a Tape Drive - A system, a method, and article of manufacture are employed to clean the input/output transducers on tape drives, verified by the tape drives reading alphanumeric information from data tracks and servo tracks of a cleaner tape. An aggressive cleaning frontcoat section of the cleaner tape can be used to provide additional cleaning action, and the cleanliness of the data read elements, data write elements, and the servo heads. A less-abrasive cleaning section may be used to clean less difficult types of contaminants. In this manner, the cleanliness of the data read elements, the data write elements, and the servo heads can be verified. A cleaning section may also be used as a leader section of a self-characterization section. Alternatively, a magnetic data tape section may be included for self-characterization. | 10-23-2008 |
20080270843 | CONVOLUTION-ENCODED DATA STORAGE ON A REDUNDANT ARRAY OF INDEPENDENT DEVICES - A method, system and article of manufacture for the storing convolution-encoded data on a redundant array of independent storage devices (RAID) is described. The convolution-encoded data comprises error correction coded data to eliminate the need for parity as used in conventional RAID data storage. The number of storage devices may vary to accommodate expansion of storage capacity and provide on demand storage. | 10-30-2008 |
20090006891 | Apparatus, System, and Method for Hard Disk Drive Redundancy - An apparatus, system, and method are disclosed for hard disk drive redundancy. A demarcation module demarks a parity data block in each set of a specified number of data blocks on a hard disk drive. An association module associates a PBA of each un-demarked data block with a LBA. A write module writes the data to the un-demarked data blocks. A parity module calculates parity data for the data written to the un-demarked data blocks and the write module writes the parity data to the parity data block. | 01-01-2009 |
20090048798 | Method for Performing Write Calibrations on Holographic Storage Media - A method for performing write calibrations on holographic storage media is disclosed. Initially, five identical and known calibration holograms are written on a holographic storage medium, in which three of the five calibration holograms are written with different laser power and three of the five calibration holograms are written with different time durations. A matched filter is then utilized to determine a cross-correlation between the five calibration holograms read from the holographic storage medium and their corresponding ideal calibration holograms previously stored within a memory device within the holographic storage drive. A least-squares fit of an ellipsoidal parabola to the cross-correlations is subsequently calculated to yield an optimal laser write power level and an optimal duration for a laser write pulse. | 02-19-2009 |
20090063410 | Method for Performing Parallel Data Indexing Within a Data Storage System - A method for performing parallel data indexing within a data storage system is disclosed. After the receipt of a group of data objects, the data objects are copied to an indexing module. Next, the copy of data objects within the indexing module are indexed by the indexing module while the data objects are being stored within a storage medium. The indices of the copy of data objects within the indexing module are stored in an index repository within the indexing module. | 03-05-2009 |
20090157747 | Administering A Digital Media File Having One Or More Potentially Offensive Portions - Methods, digital media files, apparatus, and products for administering a digital media file having one or more potentially offensive portions are described that include inserting in the digital media file at least one tag identifying as potentially offensive a portion of the digital media file, the tag also identifying a location of the potentially offensive portion in the digital media file; and transmitting the digital media file with the tag to a playback device. | 06-18-2009 |
20090185309 | Method for Minimizing Contaminant Levels Within a Tape Drive System - A method for minimizing dust level within a tape drive system is disclosed. A dust concentration level within the tape drive system is initially determined. A head brush interval is subsequently adjusted according to the determined dust concentration level within the tape drive system. | 07-23-2009 |
20090185310 | Method for Providing Contaminant Prevention and Removal from a Tape Drive System - A method for preventing dust from entering a tape drive system is disclosed. Initially, a cooling fan is allowed to rotate in one direction to provide airflow to the tape drive system. In response to a detection of a loading or unloading of a tape cartridge or a head brush operation, the cooling fan is allowed to rotate in a different direction to provide airflow in an opposite direction in order to blow any dust and debris, which may be introduced from a tape cartridge or may already be resident on a tape head, out the front of the tape drive system. | 07-23-2009 |
20090190674 | METHOD AND APPARATUS TO INJECT NOISE IN A NETWORK SYSTEM - An apparatus, system, and method are disclosed for injecting noise onto a link of a network. The apparatus, system, and method include, providing a noise injector card, connecting the noise injector card to the link, receiving a control signal to activate the noise injector card, switching a switch of the noise injector card, and injecting noise onto the link. | 07-30-2009 |
20090196143 | Method and System for Command-Ordering for a Disk-to-Disk-to-Holographic Data Storage System - A system, method and computer program product for managing command ordering for a host-Disk-to-intermediate-Disk-to-Holographic (D2D2H) data storage system. Specifically, a command ordering detects a command from a host system. A hologram segment associated with the detected command is identified and a determination is made whether the hologram segment is an open hologram segment or a closed hologram segment. A determination is made whether the detected command is to be prioritized. If the detected command is prioritized, the detected command is added to a prioritized command queue. Moreover, if the detected command is not prioritized, the detected command is added to a normal command queue. The detected commands addressing the same hologram segment are then grouped. The execution of one or more grouped commands (prioritized or normal) is deferred for a predetermined period to allow for additional commands to be received for a same command group. | 08-06-2009 |
20090196144 | Method and System for Command-Ordering and Command-Execution Within a Command Group for a Disk-to-Disk-to-Holographic Data Storage System - A system, method and computer program product for managing command ordering and command execution for a host-Disk-to-intermediate-Disk-to-Holographic (D2D2H) data storage system. Specifically, a command ordering and execution (COE) utility selects the command group from a command queue. A determination is made whether the command group includes a write command for writing an entire hologram segment. Responsive to a determination that the command group does not include the write command for writing the entire hologram segment, the entire hologram segment is read to an intermediate system disk. Conflicting commands are then sorted from non-conflicting commands. Specifically, all conflicting write commands are executed before all conflicting read commands. After execution, the entire hologram segment of the intermediate system disk is closed and written in holographic medium. | 08-06-2009 |
20090196988 | HOLOGRAPHIC DISK WITH 2P TRACK-BEARING LAYER - A method for forming a holographic storage media, including: applying a liquid photopolymer to a substrate of glass, quartz, or polycarbonate, the substrate having a first surface; engaging a stamper with a negative of desired tracks on the liquid photopolymer; curing the liquid photopolymer with ultraviolet light creating a plurality of tracks; applying a reflective layer to the plurality of tracks; applying a gap layer to the plurality of tracks; applying a dichronic mirror layer to the gap layer; and applying a holographic storage layer to the dichronic mirror layer. | 08-06-2009 |
20090201243 | METHODS AND SYSTEMS INVOLVING DIURNAL COMPUTING - A method for controlling a computer system comprising, determining an ambient light level, starting a lighting device operative to illuminate an input device responsive to determining that the ambient light level is below a threshold value, and stopping the lighting device responsive to determining that the ambient light level is above the threshold value. | 08-13-2009 |
20090201782 | HOLOGRAPHIC DISK WITH OPTICAL-NOTCH-FILTER LABEL - A holographic disk, including: a holographic recording layer and a servo-tracking layer, the holographic recording layer separated from the servo-tracking layer by a dichroic mirror that prevents a data I/O laser from accessing the servo-tracking layer while allowing a servo-tracking laser to access embedded servo tracks; a transparent cover layer including at least one layer of optical notch filter that forms a label, the optical notch filter blocking light at a wavelength different from the data I/O laser and the servo-tracking laser; where the label is a color label including at least one of numbers, letters, descriptive figures, pictures, and barcodes. | 08-13-2009 |
20090243800 | MEDIA PASSPORT SYSTEM - A media passport system including a radio frequency identification (RFID) transponder attached to a removable medium a plurality of RFID readers installed in rooms, wherein each RFID reader has a unique identification (ID), and a security server connected to the plurality of RFID readers via a network. The security server hosts a zone-table including a unique ID information of the removable medium, and a zone information determined as a subset of the unique IDs of the plurality of RFID readers. Based on this the security server sends an alarm when a removable medium is transported inside or outside a zone. | 10-01-2009 |
20090249003 | METHOD AND SYSTEM FOR MULTIPLEXING CONCATENATED STORAGE DISK ARRAYS TO FORM A RULES-BASED ARRAY OF DISKS - A method, system and computer-readable medium are disclosed for efficiently multiplexing concatenated storage devices. An intelligent storage controller continuously monitors data access of a number of concatenated storage devices. In response to a request to write new data, the controller writes a primary data copy to the concatenated storage device having the lowest data access. Then the controller writes a secondary data copy to the device having the next lowest data access. In response to a read request, the controller reads data from the data copy located on the concatenated storage device having the lower data access. In response to an update request, the controller, after determining that data access does not exceed a predetermined threshold, the controller updates the data copy having the lowest data access, set that copy as the new primary copy and subsequently updates the other copy, setting that copy as the new secondary copy. | 10-01-2009 |
20090249255 | Method of and System for Adaptive Suggestion of Directories When Saving Files - A method of adaptively suggesting directories when saving files receives a request to save a file. The file has a file name and the file was prepared with an application. If a portion of the file name and the application with which the file was prepared are associated in the table with a single directory, the method suggests the single directory for saving the file in the single directory. If the portion of the file name and the application are associated in a table with multiple directories, the method suggests one of the multiple directories having a greatest count value for saving the file. If a user saves the file in the single directory, the method increments a count value in the table for the single directory and updates a time and date in the table for the single directory. If the user saves the file in the one of the directories having the greatest count value, the method increments the count value in the table for the one of the directories having the greatest count value and updates the date and time in the table for the one of the directories having the greatest count value a date and time. | 10-01-2009 |
20090249474 | SYSTEM AND METHOD FOR ADJUSTING THE SECURITY LEVEL OF A REMOVABLE MEDIUM - A method of adjusting a security level of a removable medium, including receiving a unique identification (ID) of a removable medium, a name of a file being processed, and a requested operation, determining the security level of the removable medium, determining a security level of the file being processed, and one of increasing and decreasing the security level of the removable medium based on the determined security level of the file being processed. Further, security levels of removable media are mapped to security zones which are subsequently used to allow or prevent transportation of a removable medium inside or outside of certain boundaries. | 10-01-2009 |
20090278654 | Method of and System for Controlling Access to an Automated Media Library - A method of controlling access to an automated media library receives a request for access to the library from an individual having an identity. Access may include importing media to the library, exporting media from the library, and opening a locked door to a cabinet containing the library. If the access includes the importing media, the method moves a robotic media handler to a locked import/export station. If the access includes exporting media, the method moves the requested media to the locked import/export station. If the access includes the opening the door, the method takes a first inventory of the media in the library. The method authenticates the identity of the individual and determines an access level associated with the individual. If the access level is insufficient for the requested access, the method denies the requested access and issues an alert. If the access level is sufficient for the requested access, the method determines if the requested access requires a second authentication. If a second authentication is required, the method prompts the individual to perform the second authentication. If the second authentication is verified, the method logs the access by the individual and grants the access. If the access is granted and the access is importing or exporting media, the method unlocks the import/export station. If the access is granted and the access is opening the door, the method unlocks the door. The method closes and locks the import/export station a predetermined length of time after unlocking the import/export station. The method locks the door a predetermined length of time after unlocking the door and takes a second inventory of the media. The method issues an alert if the second inventory differs from the first inventory. | 11-12-2009 |
20090282461 | METHOD OF AND SYSTEM FOR CONTROLLING ACCESS TO AN AUTOMATED MEDIA LIBRARY - A method of controlling access to an automated media library receives a request for access to the library from an individual having an identity. Access may include importing media to the library, exporting media from the library, and opening a locked door to a cabinet containing the library. If the access includes the importing media, the method moves a robotic media handler to a locked import/export station. If the access includes exporting media, the method moves the requested media to the locked import/export station. If the access includes the opening the door, the method takes a first inventory of the media in the library. The method authenticates the identity of the individual and determines an access level associated with the individual. If the access level is insufficient for the requested access, the method denies the requested access and issues an alert. If the access level is sufficient for the requested access, the method determines if the requested access requires a second authentication. If a second authentication is required, the method prompts the individual to perform the second authentication. If the second authentication is verified, the method logs the access by the individual and grants the access. If the access is granted and the access is importing or exporting media, the method unlocks the import/export station. If the access is granted and the access is opening the door, the method unlocks the door. The method closes and locks the import/export station a predetermined length of time after unlocking the import/export station. The method locks the door a predetermined length of time after unlocking the door and takes a second inventory of the media. The method issues an alert if the second inventory differs from the first inventory. | 11-12-2009 |
20090310462 | FRUSTUM-SHAPED HOLOGRAPHIC DISC AND MATCHING TRAY IN A HOLOGRAPHIC DRIVE - A holographic disc comprises a multilayer right-circular frustum. The frustum includes a substrate layer having an inner surface and an outer surface. A reflective track layer is formed on the inner surface of the substrate layer. A first gap layer overlies the reflective track layer. A dichroic mirror layer overlies the first gap layer. A second gap layer overlies the dichroic mirror layer. A holographic recording layer overlies the second gap layer. A cover layer overlies the holographic recording layer. The cover layer has an inner surface in contact with the holographic recording layer and an outer surface. The frustum has a major diameter and a minor diameter. In one embodiment of the multilayer right-circular frustum, the outer surface of the said outer surface of the cover layer defines the minor diameter and the outer surface of the substrate layer defines the major. In another embodiment, the outer surface of the substrate layer defines the minor diameter and the outer surface of said the cover layer defines the major diameter. | 12-17-2009 |
20100032530 | AUGMENTED TRACK TO FACILITATE REMOVAL OF STIFFENING LAYERS FROM A CABLE RETAINED IN THE TRACK - An apparatus to support a cable is provided and includes a channel shaped track, in which the cable is retained, which is formed to define a plurality of pairs of holes on opposing sides of the track at substantially equal intervals and slots that each extend from respective tops of each of the holes to an exterior surface of the track, and a plurality of support members, each of which extends across the track and between at least a portion of adjacent pairs of the holes, to thereby be respectively positioned to prevent the cable from propagating toward the exterior surface of the track. | 02-11-2010 |
20100177885 | METHODS TO FACILITATE ENCRYPTION IN DATA STORAGE DEVICES - Methods are provided for managing data encryption for a data storage library. An implementation assessment is performed for a customer and, in response to the implementation assessment, a set of customizations are generated for an encryption command communications appliance to enable the appliance to communicate with an encryption-capable storage device and a data storage library controller within the data storage library and with an encryption key manager (EKM) coupled to the data storage library. The encryption command communications appliance is configured with the set of customizations and the configured encryption command communications appliance is installed in the data storage library coupled to the library controller, the storage device and the EKM. | 07-15-2010 |
20100177901 | SYSTEM AND SERVICE TO FACILITATE ENCRYPTION IN DATA STORAGE DEVICES - An encryption communications appliance provides data encryption management for a data storage library. The appliance is coupled to an encryption-capable storage device, a data storage library controller within the data storage library and with an encryption key manager (EKM). The encryption command communications appliance intercepts encryption key requests from the data storage device and transparently forwards the requests to the EKM. The appliance also forwards transparently communications between the library controller and the data storage device. | 07-15-2010 |
20100188776 | SYSTEM AND METHOD FOR CLEANING A TAPE DRIVE - A system, a method, and article of manufacture are employed to clean the input/output transducers on tape drives, verified by the tape drives reading alphanumeric information from data tracks and servo tracks of a cleaner tape. An aggressive cleaning frontcoat section of the cleaner tape can be used to provide additional cleaning action, and the cleanliness of the data read elements, data write elements, and the servo heads. A less-abrasive cleaning section may be used to clean less difficult types of contaminants. In this manner, the cleanliness of the data read elements, the data write elements, and the servo heads can be verified. A cleaning section may also be used as a leader section of a self-characterization section. Alternatively, a magnetic data tape section may be included for self-characterization. | 07-29-2010 |
20100318820 | STORAGE SYSTEM POWER MANAGEMENT - A method for managing power consumed by storage systems and other devices is disclosed herein. In certain embodiments, such a method may include initially monitoring conditions (such as data traffic conditions) on a communication link between a first device and a second device. The method may further include determining whether the conditions on the communication link warrant powering down or powering up the second device. In the event the conditions warrant powering down the second device, a power-down command may be generated and transmitted from the first device to the second device. In the event the conditions warrant powering up the second device, a power-up command may be generated and transmitted from the first device to the second device. In selected embodiments, the power-up and power-down commands are one of SCSI commands and FICON commands. A corresponding apparatus, system, and computer-usable medium are also disclosed and claimed herein. | 12-16-2010 |
20110038639 | POWER-UP OF DEVICE VIA OPTICAL SERIAL INTERFACE - An optical communication serial interface is employed to power up a device from a powered down state to a powered on state. An optical receiver element receives serial optical signals transmitted by at least one optical fiber and converts the received serial optical signals to electrical signals. A low level reception converter detects and decodes the electrical signals to provide data and control words from detected and decoded normal electrical signals for a high level command processor. A power supply maintains low level power to at least the optical receiver element and the low level reception converter of the optical communication serial interface while the device is in the powered down state. The low level reception converter detects a particular abnormal sequence of electrical signals; and in response to detecting the particular abnormal sequence of electrical signals, asserts a control signal to power up the device controllable power supply. | 02-17-2011 |
20110102938 | POWER MODE OPERATION OF A MAGNETIC TAPE DRIVE - A magnetic tape drive having a tape drive system for moving magnetic tape, tape read/write and servo system, tape cartridge load/unload systems, I/O communications, memory; and a control system, operates in three modes to conserve energy consumption. A first low power mode powers the I/O communications, the memory, and the control system. If a magnetic tape cartridge is in loaded position in the magnetic tape drive, the second low power mode powers the same as the first low power mode, and additionally powers the tape drive system to apply tension to a magnetic tape of the magnetic tape cartridge. In the first and the second low power modes, the control system operates the I/O communications, the memory and the control system to respond to and execute commands received at the I/O communications if the commands are executable without magnetic tape access. The third, full power mode, is entered if a command received at the I/O communications requires magnetic tape access. | 05-05-2011 |
20110239097 | DATA DEDUPLICATION USING CRC-SEED DIFFERENTIATION BETWEEN DATA AND STUBS - Various embodiments for differentiating between data and stubs pointing to a parent copy of deduplicated data are provided. Undeduplicated data is stored with a first cyclic redundancy check (CRC) seed. A stub pointing to the parent copy of the deduplicated data is stored with a second CRC seed. Subsequent to reading the deduplicated data, the first CRC seed is associated with the undeduplicated data, and the second CRC seed is associated with the stub. A CRC check is performed using one of the first and second CRC seeds. If the CRC check is positive, an I/O operation is allowed to proceed. If the CRC check is negative, an additional CRC check is performed using another one of the first and second CRC seeds. | 09-29-2011 |
20120008506 | DETECTING INTERMITTENT NETWORK LINK FAILURES - An apparatus, system, and method are disclosed for detecting intermittent network link failures. A tracking module tracks link failures of a network link of a network over a specified time interval. A failure module determines the network link is failing in response to a number of link failures exceeding a specified failure threshold. A mitigation module mitigates communications over the network link. | 01-12-2012 |
20120016618 | MATCHED FILTER TESTING OF DATA TRANSMISSION CABLES - In one embodiment, a method for testing a cable includes receiving a read-signal profile read at a receiving-end of a cable upon an initial test signal being input to a sending end of the cable, calculating a cross-correlation function between the read-signal profile and a matched filter output, and determining a peak value of the cross-correlation function. In another embodiment, a system includes a device, the device including logic for receiving a read-signal profile read at a receiving-end of the cable upon an initial test signal being input to a sending end of the cable, logic for calculating a cross-correlation function between the read-signal profile and a matched filter output, logic for determining a peak value of the cross-correlation function, and logic for storing the peak value to a computer readable medium. Other methods, systems, and computer program products are also described according to various embodiments. | 01-19-2012 |
20120039331 | STORAGE AREA NETWORK PATH MANAGEMENT - A path selection module selects at least two fibre channel paths between a fibre channel host and a fibre channel destination. A trace route module performs one or more fibre channel trace route procedures for each of the at least two fibre channel paths. The trace route module provides a set of fibre channel links between the fibre channel host and the fibre channel destination for each of the at least two fibre channel paths. A record registration module registers with one or more event servers to receive link incident records for the fibre channel links in the sets of fibre channel links. | 02-16-2012 |
20120039604 | PRIORITY DATA TRANSMISSION USING FIBRE CHANNEL OVER ETHERNET - An apparatus, system, and method are disclosed for handling data being communicated over lossless Ethernet that is sensitive to delays. Fibre Channel over Ethernet (FCoE) is one example of an environment where data may be subject to unacceptable delays. The method involves designating certain data as low latency data that is sensitive to delays in transmission. The low latency data is then transmitted in such a manner that the receiving devices are aware that they are receiving low latency data. If a delay in the transmission of low latency is detected, commands are issued that pause or slow standard data in order to free up bandwidth for the low latency data. The commands may be, for example, backward congestion notifications and priority flow control. Low latency data is exempted from backward congestion notifications and priority flow control. Priority | 02-16-2012 |
20120044084 | CABLE MANAGEMENT DISPLAY - An approach to cable management is presented. A bi-stable liquid crystal display that requires no power to maintain an image is attached to a communications cable. A bi-stable liquid crystal display may be attached to each end of the cable. The bi-stable liquid crystal displays may be built into the connectors. A display module connects to the bi-stable liquid crystal display and receives signals associated with a message about the communications cable. The display module causes messages to be shown on the bi-stable liquid crystal display in response to receiving the signal. The signal may be generated by a user with a hand held driver. The signal may also be generated automatically by computing devices (such as switches) that are attached to the communications cable. Users may easily determine information about the communications cable by looking at the messages on the bi-stable liquid crystal displays. | 02-23-2012 |
20120106558 | BRIDGE FOR IMPLEMENTING A CONVERGED NETWORK PROTOCOL TO FACILITATE COMMUNICATION BETWEEN DIFFERENT COMMUNICATION PROTOCOL NETWORKS - Provided are a computer program product, system, and method for a bridge for implementing a converged network protocol to facilitate communication between different communication protocol networks. A first adaptor implements a first communication protocol and a second adaptor implementing a converged network protocol, wherein the converged network protocol facilitates communication of packets encoded with a second communication protocol with a third communication protocol network. Parameters are configured in a memory for communication between the first adaptor and the second adaptor in the converged network protocol to indicate to the second adaptor that the converged network protocol is supported, wherein the first adaptor does not support the converged network protocol. A packet is received at the first adaptor encoded in the second communication protocol directed to the third communication protocol network. The packet is forwarded to the second adaptor to forward to the third communication protocol network. A command is received at the second adaptor, directed to the first adaptor, to implement a function in the converged network protocol for communication between the first and second adaptors. Operations are performed to implement the function using the parameters in the memory to support transmission of packets between the first and the second adaptors. | 05-03-2012 |
20120117350 | POWER ECONOMIZING BY POWERING DOWN HUB PARTITIONS - An approach to power economization in a spoke and hub environment is presented. When a hub receives a data set from a first spoke, the hub writes the data set to a first partition that is associated with the first spoke. After the data transfer is complete, the hub powers down the first partition. If the first spoke sends additional data transfers to the hub while the first partition is powered down, the hub stores the additional data transfers in a second partition. When the first partition is powered up again, the hub moves the data intended for the first partition and that was stored in the second partition. The data is moved from the second partition to the first partition. The hub may monitor the size of the addition data transfers. If the data transfer is large, the hub may power up the first partition, write the data in the first partition, and move to the first partition any data that was intended for the first partition but written to the second partition while the first partition was powered down. | 05-10-2012 |
20120151355 | DISCOVERY AND MANAGEMENT MECHANISM FOR SAN DEVICES - Exemplary method, system, and computer program embodiments for managing a network are provided. In one embodiment, at least one of an available plurality of network components is polled, including devices, hosts and virtual devices, an interconnected plurality of communication paths, and quality of service (QoS) information in a discovery process for network information. A graphical representation of the at least one of the available plurality of network components is created for presentation by a graphical user interface (GUI) to a user. Based on a selection of the user of at least one attribute of the at least one of the available plurality of network components as displayed by the GUI to the user, a zone is created for the at least one of the available plurality of network components. | 06-14-2012 |
20120157330 | Trenched Sample Assembly for Detection of Analytes with Electromagnetic Read-Write Heads - Described are embodiments of an invention for a sample assembly with trenches for detection of analytes with electromagnetic read heads. The sample assembly includes an outer layer with at least one sample trench. The sample trench includes a first set of antibodies that are bonded on a first surface of a base layer. Target antigens are bonded with the first set of antibodies, and a second set of antibodies are bonded to the target antigens. Further, the sample trench includes nanoparticles that are bonded to the second set of antibodies. A head module includes a write head for magnetizing nanoparticles and a read sensor for detecting the magnetized nanoparticles, and thus, the target antigens. The sample trench constrains the biological sample, and thus the target antigen, during the preparation and subsequent analysis of the biological sample. Accordingly, the target antigen is aligned with read elements of a head module such that the target antigen is reliably and accurately detected. Further, to ensure reliable and accurate detection, the outer layer is formed with a low friction material allowing the read head to remain in contact with the upper surface of the outer layer during the process of detection. | 06-21-2012 |
20120173934 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR GATHERING DEVICE INFORMATION TO ENABLE IDENTIFICATION OF POTENTIAL RISKS IN A NETWORK ENVIRONMENT - According to one embodiment, a system for creating a list of related defects in a network environment includes a processor, and a computer readable storage medium having computer readable program code embodied therewith. The computer readable program code includes computer readable program code that, when executed by the processor, causes the system to acquire a device list related to devices in multiple paths of a network, computer readable program code that, when executed by the processor, causes the system to query one or more information sources using the device list to retrieve defect data from the one or more information, sources, computer readable program code that, when executed by the processor, causes the system to create a list of related defects based on the retrieved defect data, and computer readable program code that, when executed by the processor, causes the system to output the list of related defects. | 07-05-2012 |
20120207468 | POWER-UP OF DEVICE VIA OPTICAL SERIAL INTERFACE - An optical communication serial interface is employed to power up a device from a powered down state to a powered on state. An optical receiver element receives serial optical signals transmitted by at least one optical fiber and converts the received serial optical signals to electrical signals. A low level reception converter detects and decodes the electrical signals to provide data and control words from detected and decoded normal electrical signals for a high level command processor. A power supply maintains low level power to at least the optical receiver element and the low level reception converter of the optical communication serial interface while the device is in the powered down state. The low level reception converter detects a particular abnormal sequence of electrical signals; and in response to detecting the particular abnormal sequence of electrical signals, asserts a control signal to power up the device controllable power supply. | 08-16-2012 |
20120212850 | SYSTEM AND METHOD FOR RETENTION MANAGEMENT AND REORDERING THEDATA BASED ON RETENTION TIMES ON TAPE - Retention management for data stored in data blocks on a tape is provided. A block mapping table has entries each of which include an expiration date for data blocks stored on the tape. The entries of the block mapping table may be sorted in accordance with at least one sorting criterion. Data blocks on the tape are rearranged according to the block mapping table. The block mapping table is then stored, either on the tape or in a memory associated with the tape. | 08-23-2012 |
20120254452 | BRIDGE FOR IMPLEMENTING A CONVERGED NETWORK PROTOCOL TO FACILITATE COMMUNICATION BETWEEN DIFFERENT COMMUNICATION PROTOCOL NETWORKS - A first adaptor implements a first communication protocol and a second adaptor implements a converged network protocol, which facilitates communication of packets encoded with a second communication protocol with a third communication protocol network. Parameters are configured in a memory for communication between the first adaptor and the second adaptor in the converged network protocol to indicate to the second adaptor that the converged network protocol is supported, wherein the first adaptor does not support the converged network protocol. A packet is received at the first adaptor encoded in the second communication protocol and forwarded to the second adaptor to forward to the third communication protocol network. A command is received at the second adaptor, directed to the first adaptor, to implement a function in the converged network protocol using the parameters in the memory to support transmission of packets between the first and the second adaptors. | 10-04-2012 |
20130006695 | AUTOMATED SETUP OF PRESENTATION EVENT AGENDA AND LOGISTICS - An artifact repository can be queried for a set of different pre-existing presentation artifacts based on requirements and constraints of a presentation event to produce a query result. The query result can comprise a set of presentation artifacts suitable for satisfying at least a portion of the requirements and constraints. The querying can match the artifact specific metadata against the requirements and constraints to produce the query result. An agenda comprising a set of different agenda items can be automatically constructed utilizing the query result. Each of the different agenda items can occupy a time slot of the presentation event. Creation of agenda items can be a non-manual effort automatically determined by a computing device in a data driven manner given the requirements, the constraints, and the pre-existing presentation artifacts of the artifact repository. Resources for the different agenda items can be automatically booked. | 01-03-2013 |
20130024401 | Apparatus and Method to Store Information - A data storage facility comprising a plurality of data storage media, an automated data storage library comprising a first plurality of storage cells, one or more data storage devices in communication with the controller, and a controller in communication with one or more host computers, a vault comprising a second plurality of storage cells, wherein the vault does not comprise any data storage devices, and a robotic accessor in communication with the controller, wherein the accessor comprises a gripper mechanism, and wherein the robotic accessor can bidirectionally transport each of the plurality of portable data storage media between the first plurality of storage cells and the one or more data storage devices. | 01-24-2013 |
20130138883 | Optimizing Migration/Copy of De-Duplicated Data - A mechanism is provided for optimizing migration/copying of de-duplicated data from an internal storage system to a removable storage system. A preliminary number of clusters to be generated are determined for sets of data objects stored on the internal storage system based on a number of the sets of data objects. The preliminary number of clusters is generated based on shortest distances between the sets of data objects, each cluster comprising one or more sets of data objects and each set of data objects comprising one or more chunks of data. A chosen cluster is identified from a set of clusters by identifying a cluster having a greatest number of common chunks within as few sets of data objects. Responsive to an export-size of the chosen cluster failing to exceed the available storage capacity of the removable storage system, the chosen cluster is exported to the removable storage system. | 05-30-2013 |
20130138902 | Optimizing Migration/Copy of De-Duplicated Data - A mechanism is provided for optimizing migration/copying of de-duplicated data from an internal storage system to a removable storage system. A preliminary number of clusters to be generated are determined for sets of data objects stored on the internal storage system based on a number of the sets of data objects. The preliminary number of clusters is generated based on shortest distances between the sets of data objects, each cluster comprising one or more sets of data objects and each set of data objects comprising one or more chunks of data. A chosen cluster is identified from a set of clusters by identifying a cluster having a greatest number of common chunks within as few sets of data objects. Responsive to an export-size of the chosen cluster failing to exceed the available storage capacity of the removable storage system, the chosen cluster is exported to the removable storage system. | 05-30-2013 |
20130173548 | METHOD AND SYSTEM FOR BACKUP AND RECOVERY - For data backup and recovery based on linked file repositories with each of the linked file repositories representing an individual file system capable of storing at least one version of a file and being connected to at least one server system, each of the linked file repositories are placed in a certain position for storing a certain version of the file. Each position of each of the linked file repositories is continuously numbered. A number of the versions of the file are determined by the position of the one of the linked file repositories. A version-movement process over each of the linked file repositories is implemented to perform a read operation of the at least one version of the file. | 07-04-2013 |
20130175954 | DYNAMIC RECONFIGURATION-SWITCHING OF WINDINGS IN AN ELECTRIC MOTOR USED AS A GENERATOR IN AN ELECTRIC VEHICLE - For an electric motor used as a generator in an electric vehicle for dynamic braking, employing a dynamic reconfiguration-switching of motor windings upon the generator exceeding one of a maximum usable constraint of a first rechargeable battery in order to reduce a voltage constant of the electric motor thereby limiting one of a produced voltage and a produced power. | 07-11-2013 |
20130175966 | DYNAMIC RECONFIGURATION-SWITCHING OF WINDINGS IN A MOTOR USED AS A GENERATOR IN A TURBINE - For a motor used as a generator, employing a dynamic reconfiguration-switching of motor windings upon the generator, used in a turbine, exceeding a maximum usable constraint of a first direct current (DC)-to-alternating current (AC) inverter in order to reduce a voltage constant of the motor thereby limiting one of a produced voltage and a produced power. | 07-11-2013 |
20130176642 | SELECTIVELY LOWERING RESISTANCE OF A CONSTANTLY USED PROTION OF MOTOR WINDINGS IN DISK DRIVE - Dynamic reconfiguration-switching of motor windings in a disk drive is optimized between winding-configurations by selectively lowering resistance of a constantly used portion of one of the motor windings. Acceleration is traded off in favor of higher velocity upon detecting the electric motor in the electric vehicle is at an optimal angular-velocity for switching to an optimal lower torque constant and voltage constant. The total back electromotive force (BEMF) is prohibited from inhibiting further acceleration to a higher angular-velocity. | 07-11-2013 |
20130198861 | VIRTUAL AVATAR AUTHENTICATION - In one general embodiment, a method for determining a controlling entity of a first avatar in a virtual world includes: receiving a request for access to a resource via a first avatar; providing a challenge to the first avatar in response to receiving the request; receiving a challenge response via the first avatar in response to the challenge; determining an identity confidence level based on the challenge response; making an identity determination for a controlling entity of the first avatar based on the identity confidence level; and providing or denying access to the resource based on the identity determination. | 08-01-2013 |
20130229136 | SELECTIVELY LOWERING RESISTANCE OF A CONSTANTLY USED PORTION OF MOTOR WINDINGS IN AN ELECTRIC MOTOR - Dynamic reconfiguration-switching of motor windings in a motor is optimized between winding-configurations by selectively lowering resistance of a constantly used portion of one of the motor windings. Acceleration is traded off in favor of higher velocity upon detecting the electric motor in the electric vehicle is at an optimal angular-velocity for switching to an optimal lower torque constant and voltage constant. The total back electromotive force (BEMF) is prohibited from inhibiting further acceleration to a higher angular-velocity. | 09-05-2013 |
20130238571 | ENHANCING DATA RETRIEVAL PERFORMANCE IN DEDUPLICATION SYSTEMS - Various embodiments for processing data in a data deduplication system are provided. In one embodiment, a method for processing such data is disclosed. For data segments previously deduplicated by the data deduplication system, a supplemental hot-read link is established for those of the data segments determined to be read on at least one of a frequent and recently used basis. Other system and computer program product embodiments are disclosed and provide related advantages. | 09-12-2013 |
20130262422 | DATA DEDUPLICATION USING CRC-SEED DIFFERENTIATION BETWEEN DATA AND STUBS - Various embodiments for differentiating between data and stubs pointing to a parent copy of deduplicated data are provided. Undeduplicated data is stored with a checksum of an initial value as a first cyclic redundancy check (CRC) seed. A stub pointing to the parent copy of the deduplicated data is stored with an additional checksum of a differing, additional initial value as a second CRC seed. | 10-03-2013 |
20130300753 | CABLE MANAGEMENT DISPLAY - For cable management, a bi-stable liquid crystal display is positioned on an exterior segment of a communications cable. A display module that connects to the bi-stable liquid crystal display, connects to the communications cable with one or more pins, and receives the signal associated with one or more messages about the communications cable. The display module further causes the one or more messages to be shown on the bi-stable liquid crystal display in response to the display module receiving the signal. | 11-14-2013 |
20140018265 | CARTRIDGE FOR STORING BIOSAMPLE PLATES AND USE IN AUTOMATED DATA STORAGE SYSTEMS - In one embodiment, a biosample storage cartridge includes an enclosure having a same form factor as a data tape cartridge configured for use in an automated tape library; and a holder disposed in the enclosure. In another embodiment, a biosample storage cartridge includes an enclosure and a holder disposed in the enclosure; the holder is configured to receive one or more biosamples, the cartridge is structurally configured to be picked by a picker of an access robot that is configured to pick a data tape cartridge in an automated tape library. In still another embodiment, an analytical system includes a bioanalysis drive configured to perform bioanalysis on one or more biosamples received from at least one biosample storage cartridge. | 01-16-2014 |
20140019813 | ARRANGING DATA HANDLING IN A COMPUTER-IMPLEMENTED SYSTEM IN ACCORDANCE WITH RELIABILITY RATINGS BASED ON REVERSE PREDICTIVE FAILURE ANALYSIS IN RESPONSE TO CHANGES - Re-arranging data handling in a computer-implemented system that comprises a plurality of existing physical entities. At least one reliability rating is assigned to each of various existing physical entities of the computer-implemented system; and in response to change. Reverse predictive failure analysis uses the assigned reliability ratings to determine cumulative reliability rating(s) for at least one arrangement of the system. Data handling is re-arranged with respect to at least a portion of the existing computer-implemented system to provide a designated cumulative reliability rating. | 01-16-2014 |
20140022667 | TIMING-BASED SERVO FOR DETERMINING LATERAL HEAD VELOCITY - A servo track has identical servo pattern frames including two pairs of parallel magnetic transitions, the transitions of each pair spaced apart an equal distance, the transitions of the first pair at an azimuth angle to the longitudinal axis of the tape, the transitions of the second pair at an opposite azimuth angle. A servo channel receives signals at first times corresponding to when a servo read head detects the first and second transitions of the first pair of parallel transitions of a servo pattern frame, and second times corresponding to when the servo read head detects the first and second transitions of the second pair of parallel transitions. The servo channel determines a relative lateral movement and velocity between the tape and the tape head based on the azimuth angle and the ratio of the difference of the first and the difference of the second times. | 01-23-2014 |
20140036386 | TIMING-BASED SERVO FOR DETERMINING LATERAL HEAD VELOCITY - A servo track has servo pattern frames including two pairs of parallel transitions, the transitions of each pair spaced apart an equal distance, the first pair at an azimuth angle, the second pair at the opposite azimuth angle. A servo channel receives signals at first times corresponding to a servo read head detecting the transitions of the first pair of parallel transitions of a servo pattern frame, and second times corresponding to the servo read head detecting the transitions of the second pair of parallel transitions. The servo channel determines a relative lateral movement and velocity between the tape and the tape head based on respective functions of the ratio (T | 02-06-2014 |
20140080118 | SAMPLE ASSEMBLY WITH AN ELECTROMAGNETIC FIELD TO ACCELERATE THE BONDING OF TARGET ANTIGENS AND NANOPARTICLES - Described are embodiments of an invention for a sample assembly with an electrical conductor for generating an electromagnetic field to speed up the tagging of target antigens with antiparticles for detection of the antigens by electromagnetic read heads. A sample assembly includes a surface with a first set of antibodies bonded thereon. Target antigens are bonded with the first set of antibodies. A second set of antibodies bonded to nanoparticles are exposed to the sample surface to bond with the target antigens. The electrical conductor generates an electromagnetic field that moves the nanoparticle-labeled antibodies toward the antigens to shorten the time to complete their bonding process. | 03-20-2014 |
20140081472 | POWER GRID DATA MONITORING AND CONTROL - A method for identifying conditions that correlate with one ore more events related to operation of a power grid. The method includes the determining one or more distinguishing characteristics of a first chunk. The first chunk includes data elements relevant to operating a power grid. The method also includes determining whether a distinguishing characteristic of the first chunk correlates with a distinguishing characteristic of one or more of a plurality of second chunks. Each second chunk includes a plurality of data elements corresponding with the data of the first chunk. The method further includes determining whether a second chunk, having a distinguishing characteristic equivalent to a distinguishing characteristic of the first chunk, is associated with the one or more events. In addition, the method includes determining whether a second chunk, having an association with the one or more events and a distinguishing characteristic equivalent to a distinguishing characteristic of the first chunk, is substantially identical to the first chunk. | 03-20-2014 |
20140094114 | BIOSAMPLE CARTRIDGE WITH RADIAL SLOTS FOR STORING BIOSAMPLE CARRIERS AND USING IN AUTOMATED DATA STORAGE SYSTEMS - Embodiments of the disclosure relate to a biosample cartridge that includes radial slots for storing biosample carriers. The biosample cartridge has the same form factor as data tape cartridges used in automated tape libraries to allow the biosample cartridge to be handled by the same robotic mechanisms that handle the data tape cartridges. One aspect of the disclosure concerns a biosample cartridge that includes a rotatable biosample carrier holder. The biosample carrier holder includes radial slots for receiving biosample carriers which contain biosamples scanned and analyzed by automated tape libraries. | 04-03-2014 |
20140163722 | Apparatus and Method to Store Information - A data storage facility comprising a plurality of data storage media, an automated data storage library comprising a first plurality of storage cells, one or more data storage devices in communication with the controller, and a controller in communication with one or more host computers, a vault comprising a second plurality of storage cells, wherein the vault does not comprise any data storage devices, and a robotic accessor in communication with the controller, wherein the accessor comprises a gripper mechanism, and wherein the robotic accessor can bidirectionally transport each of the plurality of portable data storage media between the first plurality of storage cells and the one or more data storage devices. | 06-12-2014 |
20140195575 | DATA FILE HANDLING IN A NETWORK ENVIRONMENT AND INDEPENDENT FILE SERVER - According to one embodiment, an independent file server connected to a wide area network (WAN) includes local file storage, a file system comprising information about directory structures, path, and file names of other file systems of other file servers connected to the WAN, and a deduplication module configured to communicate with other deduplication modules of other file servers connected to the WAN, perform data deduplication of data objects stored locally in the local file storage, and create and maintain a deduplication table mapping data chunks of locally stored data objects to identification characteristics and storage location in the local file storage, and construction plans of data files including locations of data chunks within the data files. Other systems, methods, and computer program products are presented according to more embodiments. | 07-10-2014 |
20140201539 | AUTHORIZING REMOVABLE MEDIUM ACCESS - For authorizing removable medium access, a reassembly module retrieves a medium portion of an encryption key from a removable medium. The encryption key encrypts encrypted data stored on the removable medium and includes a plurality of portions. The reassembly module further retrieves the user portion of the encryption key assigned to a user requesting the removable medium. The reassembly module reassembles the encryption key using at least the medium portion and the user portion of the plurality of portions. The decryption module decrypts the encrypted data with the reassembled encryption key. | 07-17-2014 |
20140244598 | INTEGRITY CHECKING AND SELECTIVE DEDUPLICATION BASED ON NETWORK PARAMETERS - An approach for managing a data package is provided. Network utilization is determined to exceed a threshold. A sender computer determines a hash digest of the data package by using a hash function selected based on central processing unit utilization. If the hash digest is in a sender hash table, then without sending the data package, the sender computer sends the hash digest and an index referring to the hash digest so that a recipient computer can use the index to locate a matching hash digest and the data package in a recipient hash table. If the hash digest is not in the sender hash table, then the sender computer adds the data package and the hash digest to the sender hash table and sends the data package and the hash digest to the second computer to check the integrity of the data package based on the hash digest. | 08-28-2014 |
20140255021 | OPTICAL CABLE TESTING AND MANAGEMENT - A method and apparatus for testing an optical cable is provided. In one embodiment, the apparatus may include a receiver for receiving a received pulse train through the optical cable. The apparatus may further include a cross-correlation system in communication with the receiver. The cross-correlation system may be adapted to determine a cross-correlation of the received pulse train and matched filter to an expected pulse train. The apparatus may further include a comparator in communication with the cross-correlation system. The comparator may be adapted to compare the cross-correlation to a threshold. The apparatus may also include an output transmitter, in communication with the comparator. The output transmitter may be able to output a comparison-result output that includes the results of the comparator comparison of the cross-correlation against a threshold. | 09-11-2014 |
20140257737 | MATCHED FILTER TESTING OF DATA TRANSMISSION CABLES - In one embodiment, a method for testing a cable includes receiving a read-signal profile read at a receiving-end of a cable upon an initial test signal being input to a sending end of the cable, calculating a cross-correlation function between the read-signal profile and a matched filter output, and determining a peak value of the cross-correlation function. In another embodiment, a system includes a device, the device including logic for receiving a read-signal profile read at a receiving-end of the cable upon an initial test signal being input to a sending end of the cable, logic for calculating a cross-correlation function between the read-signal profile and a matched filter output, logic for determining a peak value of the cross-correlation function, and logic for storing the peak value to a computer readable medium. Other methods, systems, and computer program products are also described according to various embodiments. | 09-11-2014 |
20140339131 | SOLID STATE STORAGE MEDIA CARTRIDGE - According to embodiments of the invention, a tape cartridge adapted to house solid state storage may be provided. The cartridge may include a cartridge housing. The cartridge may also include a reel located within the cartridge housing, wherein the reel includes one or more radial grooves adapted to hold one or more solid state storage elements. According to other embodiments, the cartridge may also include one or more solid state storage elements held within the reel, wherein each solid state storage element includes a first electrical connector. | 11-20-2014 |
20140344629 | ARRANGING DATA HANDLING IN A COMPUTER-IMPLEMENTED SYSTEM IN ACCORDANCE WITH RELIABILITY RATINGS BASED ON REVERSE PREDICTIVE FAILURE ANALYSIS IN RESPONSE TO CHANGES - Re-arranging data handling in a computer-implemented system that comprises a plurality of existing physical entities. At least one reliability rating is assigned to each of various existing physical entities of the computer-implemented system; and in response to change. Reverse predictive failure analysis uses the assigned reliability ratings to determine cumulative reliability rating(s) for at least one arrangement of the system. Data handling is re-arranged with respect to at least a portion of the existing computer-implemented system to provide a designated cumulative reliability rating. | 11-20-2014 |
20140362061 | SYSTEM AND METHOD TO DISPLAY INFORMATION ON A HARD DISK DRIVE ASSEMBLY - Methods and systems are provided for displaying information on a hard disk drive assembly. One hard disk drive assembly includes a hard disk drive that includes a driver circuit coupled to a display and to a display memory. The driver circuit activates the display mounted on the hard disk drive assembly. In response to the activation of the display the driver circuit obtains information from the display memory of the hard disk drive. The driver circuit displays at least a portion of the information obtained from the display memory on the display mounted on the hard disk drive assembly. | 12-11-2014 |
20140365791 | REMOTE POWER DOWN CONTROL OF A DEVICE - In remote power down control of a device configured for externally initiated remote power down, such as over a network, activity of all externally connected sources of valid power down requests for the device is monitored; and the device is powered down in response to a combination of one of a received power down request and an inactivity time out with respect to each of the sources of valid power down requests for the device. | 12-11-2014 |
20140380099 | BASE PROTOCOL LAYER TESTING DEVICE - Embodiments relate to testing of a computing system using a base protocol layer testing device. An aspect includes, based on determining, by the base protocol layer testing device, that a current test comprises a test of a base protocol layer of the computing system, enabling a low level test assist device of the base protocol layer testing device for the current test, wherein the low level test assist device comprises a hardware device that is directly attached to an input/output (I/O) card of the computing system. Another aspect includes storing base protocol layer traffic that passes through the I/O card by the low level test assist device during performance of the current test by the base protocol layer testing device. Yet another aspect includes analyzing the stored base protocol layer traffic after completion of the current test to determine a result of the current test. | 12-25-2014 |
20150015246 | CALIBRATING READ SENSORS OF ELECTROMAGNETIC READ-WRITE HEADS - Described are embodiments to calibrate read sensors, which in turn may ensure that the equipment utilized to detect antigens is reliable and accurate. If it is determined that a read sensor is degraded a method of calibrating a read sensor of a read head may be used. | 01-15-2015 |
20150019914 | BASE PROTOCOL LAYER TESTING DEVICE - Embodiments relate to testing of a computing system using a base protocol layer testing device. An aspect includes, based on determining, by the base protocol layer testing device, that a current test comprises a test of a base protocol layer of the computing system, enabling a low level test assist device of the base protocol layer testing device for the current test, wherein the low level test assist device comprises a hardware device that is directly attached to an input/output (I/O) card of the computing system. Another aspect includes storing base protocol layer traffic that passes through the I/O card by the low level test assist device during performance of the current test by the base protocol layer testing device. Yet another aspect includes analyzing the stored base protocol layer traffic after completion of the current test to determine a result of the current test. | 01-15-2015 |
20150058457 | BRIDGE FOR IMPLEMENTING A CONVERGED NETWORK PROTOCOL TO FACILITATE COMMUNICATION BETWEEN DIFFERENT COMMUNICATION PROTOCOL NETWORKS - Provided are a computer program product, system, and method for implementing a converged network protocol to facilitate communication between different communication protocol networks. There are configuration parameters in a memory for communication between the first adaptor implementing a first communication protocol and the second adaptor in a converged network protocol to indicate to the second adaptor that the converged network protocol is supported. A packet is received at the first adaptor encoded in a second communication protocol directed to a third communication protocol network, forwarded to the second adaptor, and then forwarded to the third communication protocol network. A command is received at the second adaptor, directed to the first adaptor, to implement a first function in the converged network protocol for communication between the first and second adaptors. A second function in the first communication protocol to implement the first function is transmitted to the first adaptor. | 02-26-2015 |
20150069947 | DYNAMIC RECONFIGURATION-SWITCHING OF WINDINGS IN AN ELECTRIC MOTOR - Dynamic reconfiguration-switching of motor windings is optimized between winding-configurations. Acceleration is traded off in favor of higher velocity upon detecting an electric motor is at an optimal angular-velocity for switching to an optimal lower torque constant and voltage constant. The total back electromotive force (BEMF) is prohibited from inhibiting further acceleration to a higher angular-velocity. | 03-12-2015 |
20150074065 | Data Access in a Storage Infrastructure - The present invention relates to a method for data access in a storage infrastructure. The storage infrastructure comprises a host system connected to at least a first storage system and a second storage system. The first storage system receives, from the host system, a write request for storing a data chunk, the write request is indicative of a first identifier of the data chunk. The first storage system calculates a hash value of the received data chunk using a hash function. The first storage system determines a first storage location in the first storage system of the data chunk and sends a write message including the hash value, the first identifier and the first storage location to the de-duplication module. The de-duplication module determines whether the hash value exists in the data structure. | 03-12-2015 |