会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 5. 发明授权
    • Video compression system
    • 视频压缩系统
    • US09560371B2
    • 2017-01-31
    • US10629855
    • 2003-07-30
    • Timothy A. JohnsonSteven R. Blackwell
    • Timothy A. JohnsonSteven R. Blackwell
    • H04N19/507H04N19/503H04N19/176
    • H04N19/507H04N19/176H04N19/503
    • A improvement to video compression techniques is described in which blocks of video input information are compared in their respective pixel values to corresponding blocks of immediately preceding frames. The blocks are analyzed to determine whether change has occurred in accordance with two tests. First, the pixel values of the block are compared to the pixel values of a preceding block and if a threshold number of pixel values in the block exceed their counterparts by a threshold amount, then the block is assumed to have changed and is communicated via a standard communication protocol, compression technique and media. Second, even if the threshold number of pixels in the block has not changed, the pixel values are compared with their prior frame counterparts to determine if any one pixel value has changed in magnitude more than a second threshold amount. Again, one such pixel is identified, then the block is assumed to have changed and is communicated.
    • 描述了对视频压缩技术的改进,其中视频输入信息块在其各自的像素值中被比较到紧接在前帧的相应块。 分析块以确定是否根据两次测试发生了变化。 首先,将块的像素值与先前块的像素值进行比较,并且如果块中的像素值的阈值数量超过其对应值阈值量,则假定块已经改变并且经由 标准通信协议,压缩技术和媒体。 第二,即使块中的像素阈值没有改变,也将像素值与其先前的帧对应物进行比较,以确定是否有任何一个像素值的幅度大于第二阈值量。 再次,一个这样的像素被识别,则该块被假设已经改变并被传送。
    • 6. 发明授权
    • Storage system power management
    • 存储系统电源管理
    • US08954768B2
    • 2015-02-10
    • US12483443
    • 2009-06-12
    • Louie A. DickensTimothy A. JohnsonCraig A. KleinGregg S. LucasDaniel J. Winarski
    • Louie A. DickensTimothy A. JohnsonCraig A. KleinGregg S. LucasDaniel J. Winarski
    • G06F1/00G06F1/26G06F1/30G06F13/00G06F3/06G06F1/32
    • G06F3/0625G06F1/3221G06F3/0634G06F3/0688G06F3/0689Y02D10/154
    • A method for managing power consumed by storage systems and other devices is disclosed herein. In certain embodiments, such a method may include initially monitoring conditions (such as data traffic conditions) on a communication link between a first device and a second device. The method may further include determining whether the conditions on the communication link warrant powering down or powering up the second device. In the event the conditions warrant powering down the second device, a power-down command may be generated and transmitted from the first device to the second device. In the event the conditions warrant powering up the second device, a power-up command may be generated and transmitted from the first device to the second device. In selected embodiments, the power-up and power-down commands are one of SCSI commands and FICON commands. A corresponding apparatus, system, and computer-usable medium are also disclosed and claimed herein.
    • 本文公开了一种用于管理由存储系统和其他设备消耗的功率的方法。 在某些实施例中,这种方法可以包括在第一设备和第二设备之间的通信链路上初始地监视条件(诸如数据业务条件)。 该方法还可以包括确定通信链路上的条件是否保证关闭第二设备的电源或上电。 在条件允许关闭第二设备的情况下,可以产生掉电命令并从第一设备发送到第二设备。 在条件允许上电第二设备的情况下,可以产生上电命令并从第一设备发送到第二设备。 在选定的实施例中,上电和断电命令是SCSI命令和FICON命令之一。 本文还公开并要求对应的装置,系统和计算机可用介质。
    • 7. 发明授权
    • Serial attached SCSI and serial ATA wide port tunnelling through a fibre channel connection
    • 串行连接SCSI和串行ATA宽端口通过光纤通道连接隧道
    • US08516154B2
    • 2013-08-20
    • US13195642
    • 2011-08-01
    • Louie Arthur DickensTimothy A. JohnsonCraig Anthony KleinDaniel James Winarski
    • Louie Arthur DickensTimothy A. JohnsonCraig Anthony KleinDaniel James Winarski
    • G06F15/16
    • H04L12/4633
    • Network traffic encoded in a first protocol is transmitted across a first communications link, wherein the first protocol allows a first plurality of simultaneous logical connections. The transmitted network traffic is received at a first interface between the first communications link and a second communications link. The received network traffic is encapsulated within frames at the first interface, wherein the frames are generated in accordance with a second protocol, and wherein the second protocol does not allow any plurality of simultaneous logical connections that are allowed by the first protocol. The frames are transmitted from the first interface to a second interface across the second communications link. The frames are received and then unencapsulated network traffic is generated from the frames at the second interface, wherein the second interface is between the second communications link and a third communications link. The unencapsulated network traffic is routed to a selected logical connection of a second plurality of simultaneous logical connections across the third communications link, wherein transmission across the third communications link is in the first protocol.
    • 在第一通信链路中传送以第一协议编码的网络业务,其中第一协议允许第一多个同时的逻辑连接。 所发送的网络流量在第一通信链路和第二通信链路之间的第一接口处被接收。 所接收的网络流量被封装在第一接口的帧内,其中根据第二协议生成帧,并且其中第二协议不允许由第一协议允许的任何多个同时的逻辑连接。 帧通过第二通信链路从第一接口发送到第二接口。 接收帧,然后从第二接口的帧生成未封装的网络业务,其中第二接口位于第二通信链路和第三通信链路之间。 未封装的网络流量被路由到跨越第三通信链路的第二多个并行逻辑连接的选定逻辑连接,其中穿过第三通信链路的传输处于第一协议中。
    • 9. 发明授权
    • Serial attached SCSI and serial ATA wide port tunnelling through a fibre channel connection
    • 串行连接SCSI和串行ATA宽端口通过光纤通道连接隧道
    • US08019895B2
    • 2011-09-13
    • US12054855
    • 2008-03-25
    • Louie Arthur DickensTimothy A. JohnsonCraig Anthony KleinDaniel James Winarski
    • Louie Arthur DickensTimothy A. JohnsonCraig Anthony KleinDaniel James Winarski
    • G06F15/16
    • H04L12/4633
    • Network traffic encoded in a first protocol is transmitted across a first communications link, wherein the first protocol allows a first plurality of simultaneous logical connections. The transmitted network traffic is received at a first interface between the first communications link and a second communications link. The received network traffic is encapsulated within frames at the first interface, wherein the frames are generated in accordance with a second protocol, and wherein the second protocol does not allow any plurality of simultaneous logical connections that are allowed by the first protocol. The frames are transmitted from the first interface to a second interface across the second communications link. The frames are received and then unencapsulated network traffic is generated from the frames at the second interface, wherein the second interface is between the second communications link and a third communications link. The unencapsulated network traffic is routed to a selected logical connection of a second plurality of simultaneous logical connections across the third communications link, wherein transmission across the third communications link is in the first protocol.
    • 在第一通信链路中传送以第一协议编码的网络业务,其中第一协议允许第一多个同时的逻辑连接。 所发送的网络流量在第一通信链路和第二通信链路之间的第一接口处被接收。 所接收的网络流量被封装在第一接口的帧内,其中根据第二协议生成帧,并且其中第二协议不允许由第一协议允许的任何多个同时的逻辑连接。 帧通过第二通信链路从第一接口发送到第二接口。 接收帧,然后从第二接口的帧生成未封装的网络业务,其中第二接口位于第二通信链路和第三通信链路之间。 未封装的网络流量被路由到跨越第三通信链路的第二多个并行逻辑连接的选定逻辑连接,其中穿过第三通信链路的传输处于第一协议中。