Patent classifications
G06F11/006
Wear Test Device and Method
A wear testing method includes setting a rotational speed of a rotary drum with a rubber sample attached to an outer surface thereof to a desired speed; setting a pressing load imparted by a contact member to a desired pressing load via a weight member; selecting as the contact member a desired contact member from a plurality of contact members with varying specifications for a contact surface that comes into contact with the surface of the rubber sample; attaching an arm portion that composes a pressing mechanism; rotating the rotary drum; and pressing the contact member against the surface of the rubber sample with the contact member being moveable in a tangent line direction of a rotation direction of the rotary drum, and detecting an amount of displacement in a pressing direction of the contact member pressing against the surface of the rubber sample via a displacement sensor.
SOFTWARE COMPONENT ASSIGNING SYSTEM FOR VEHICLE
A software component assigning system for a vehicle includes electronic control units connected to a common network in the vehicle, one of the electronic control units being an integrated control electronic control unit which is configured to: acquire a first rank value of each of the electronic control units, the first rank value becoming higher as a probability of occurrence of a malfunction is higher; acquire a second rank value of an additional software component that is additionally arranged in any one of the electronic control units, the second rank value becoming higher as a level of importance; and decide an electronic control unit to arrange the additional software component from among the electronic control units such that the additional software component is arranged in the electronic control unit of which the first rank value is lower as the second rank value of the additional software component is higher.
Instantiating an application based on connection with a device via a universal serial bus
An apparatus for managing telemetry sensor controllers identified by their communication port identifiers is disclosed. The apparatus may include a memory that stores telemetry sensor controller mappings, where a telemetry sensor controller mapping associates an equipment identifier for a telemetry sensor controller with a communication port identifier, and equipment identifier mappings, where an equipment identifier mapping associates an equipment identifier with a telemetry monitoring application. The apparatus may detect a connection with a telemetry sensor controller and receive an equipment identifier. The apparatus may then instantiate a telemetry monitoring application for managing the connected telemetry sensor controller by accessing the plurality of equipment identifier mappings with the received equipment identifier, where the telemetry monitoring application may instruct the connected telemetry sensor controller to perform a requestable operation.
Identifying virtual machines and errors for snapshots
Identifying virtual machines and errors for snapshots is described. A system receives, from a volume snapshot service, an error message and a corresponding component identifier associated with a backup operation. The system requests a corresponding snapshot status from each component participating in the backup operation. The system receives a corresponding snapshot status from each component participating in the backup operation. The system requests an error identifier from a component corresponding to a snapshot failure status. The system receives the error identifier from the component corresponding to the snapshot failure status. The system identifies a virtual machine based on the component identifier. The system outputs, via a user interface, a report identifying the virtual machine and the error identifier.
Systems and methods for restoring applications
A method for restoring applications may include: 1) identifying an installation file that includes an application; 2) monitoring the installation file to identify a set of application files generated as a result of installing the application from the installation file; 3) assigning, to each application file in the set of application files, an application identifier that associates each application file in the set of application files with the application; 4) backing up the application by copying each application file in the set of application files to a backup storage system; 5) receiving a request to restore each application file in the set of application files; and 6) restoring the application by using the application identifier to locate each application file in the set of application files within the backup storage system. Various other methods, systems, and computer-readable media are also disclosed.
Cartridge interdependence switch
Techniques for identifying interdependent cartridges are described herein. In one example, a method can detect a signal from an indication switch on a first cartridge, wherein the signal results from a user manually actuating the indication switch. The method can also detect a second interdependent cartridge based on interdependence information. Furthermore, the method can activate an interdependence indicator on the first cartridge and an interdependence indicator on the second cartridge.
Failover detection and treatment in checkpoint systems
A method for treatment of a hypervisor call sequence, in a system having a plurality of hosts, includes assigning a host ID to a plurality of hosts in the system; identifying a first host ID for a host from which a first hypervisor call of a hypervisor call sequence originates; identifying a second host ID for a host from which a second hypervisor call of the hypervisor call sequence originates, wherein the second hypervisor call is a call subsequent to the first hypervisor call; and determining whether the second host ID is equal to the first host ID.
Method for error management in bus communication and bus communication system
A method for error management in bus communication is disclosed. A first bus subscriber generates a first bus message and writes a bus error code into a bus data area of a first bus message. The second bus subscriber identifies the error by evaluating the bus error code. The first bus subscriber stores an error identification of the error, generates a first bus message and writes the bus error code into the bus data area of the first bus message. A second bus message with a request for transmission of the error identification is generated by the second bus subscriber. A third bus message is generated by the first bus subscriber and the stored error identification is written into the bus data area of the third bus message. The second bus subscriber identifies the errors by evaluating the bus error code and the error identification.
HARDWARE-LOCKED ENCRYPTED BACKUP
A hardware-locked encrypted backup (HWLE-BU) that is locked to a single hardware device using the device's unique hardware identity, based on a Physically-Unclonable Function (PUF) or other suitable means providing a unique hardware identity. The HWLE-BU is bound to a specific hardware identity such that only the physical device that created the HWLE-BU can decrypt it, i.e., restoring HWLE-BU data requires utilizing the same physical hardware device in the decryption process.
GENERALIZED WRITE OPERATIONS VERIFICATION METHOD
A verification architecture described according to embodiments of the present invention validates changes made to metadata and may comprise one or more subsystems and phases. According to some embodiments, the “mkfs” volume creation utility works in cooperation with the device driver to create a file system volume by means of reservation and initialization space for metadata structures inside the device's partition that is reserved for the specific file system volume. The storage device uses a verified area legend when checking write requests after the file system volume has been created. The verified area legends may be stored in a dedicated partition or inside the master boot record (MBR) or Globally Unique Identifier (GUID) partition table (GPT) or special memory chip (NAND flash, for example). Write requests that overlap with any extent of reserved metadata area must be verified to prevent metadata corruption.