会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Techniques for adjusting priorities associated with servicing requests
    • 调整与服务请求相关联的优先级的技术
    • US08584128B1
    • 2013-11-12
    • US11900062
    • 2007-09-10
    • Arieh DonJames L. DavidsonAlexander VeprinskyYechiel YochaiPatrick Brian Riordan
    • Arieh DonJames L. DavidsonAlexander VeprinskyYechiel YochaiPatrick Brian Riordan
    • G06F9/46
    • G06F9/5011G06F11/3442G06F11/3485
    • Described are techniques for servicing data requests in a data storage system. One or more data requests from an application executing on the host are received. The data storage system allocates a first amount of resources for use in servicing data requests from the application. Behavior of the host is monitored for occurrences of I/O failure. In accordance with criteria and the occurrences of I/O failure, it is determined whether at least one of the host or the application is in a state of pending failure. If it is determined that at least one of the host or the application is in a state of pending failure, a second amount of resources larger than the first amount are allocated for a time period when servicing data requests from the application. After the time period, data requests from the application are serviced in accordance with the first amount of resources.
    • 描述了用于维护数据存储系统中的数据请求的技术。 接收来自在主机上执行的应用程序的一个或多个数据请求。 数据存储系统分配用于服务来自应用的数据请求的第一数量的资源。 主机监视I / O故障的发生。 根据标准和I / O故障的发生,确定主机或应用程序中的至少一个是否处于等待故障的状态。 如果确定主机或应用程序中的至少一个处于等待故障的状态,则在服务来自应用的数据请求的时间段内分配大于第一数量的第二数量的资源。 在该时间段之后,根据第一资源量来服务来自应用的数据请求。
    • 2. 发明授权
    • Restricted access devices
    • 受限访问设备
    • US06842810B1
    • 2005-01-11
    • US09982492
    • 2001-10-18
    • John T. FitzgeraldAlexander VeprinskyPhilip E. TamerJonathan I. KrasnerArieh Don
    • John T. FitzgeraldAlexander VeprinskyPhilip E. TamerJonathan I. KrasnerArieh Don
    • G06F3/06G06F13/00G06F21/00H04L29/06
    • H04L63/101G06F3/0622G06F3/0637G06F3/0689G06F21/78
    • Described are techniques in connection with restricting access to devices within a computer system. Access to a device may be restricted to one or more particular hosts within the computer system, and also further restricted to a particular software program executing within the particular hosts. The restricted access device (RAD) may be recognized by one or more hosts only having access to specific portions of the RAD unless special RAD I/O opcodes are used in connection with performing I/O operations. Access to a device may be obtained by enabling a particular use of the special RAD I/O opcodes. Subsequently, access to the same device may be disabled by stopping use of the special RAD I/O opcodes by a particular host and/or software executing in the host. RADs may be used in a variety of applications including, for example, restricting access to shared logs or journals and protecting a database.
    • 描述了与限制对计算机系统内的设备的访问有关的技术。 对设备的访问可以限于计算机系统内的一个或多个特定主机,并且还进一步限于在特定主机内执行的特定软件程序。 受限访问设备(RAD)可以被一个或多个仅能访问RAD的特定部分的主机识别,除非在执行I / O操作时使用特殊的RAD I / O操作码。 可以通过使用特殊的RAD I / O操作码来获得对设备的访问。 随后,可以通过由主机中执行的特定主机和/或软件停止使用特殊的RAD I / O操作码来禁用对同一设备的访问。 RAD可以用于各种应用,包括例如限制对共享日志或日志的访问和保护数据库。