Patent classifications
G06F13/102
System for providing remote interoperation between devices
The invention provides an alternative applications programming interface (API) for a software application to interface with and to control and coordinate the operation of a variety of specialty devices, including a barcode scanning device and a label printing device. In some embodiments, this alternative API is provided via a software application interface module (SAIM) that is remotely accessible to a software application module (SAM) via a computer network. The SAIM provides for interface and control of specialty devices that would otherwise be un-accessible to a software application module (SAM), via employment of a device specific interface module (DSIM), which functions like a device driver to specialty devices that can be geographically distributed away from the software application module (SAM) and sway from the software application interface module (SAIM), and also function in circumstances where the software application module (SAM) is mobile.
Method and system for automatically configuring I/O port
The present disclosure provides a method and a system for automatically configuring an I/O port. The method applied to a central processor includes: receiving request information from a controlled device, the request information carrying a type of a signal required by the controlled device, and sending, according to the type of the signal, a configuration instruction to a control device, and instructing the control device to configure the I/O port according to the configuration instruction. The controlled device is connected to the central processing unit, or the controlled device is connected to the central processor by means of the control device.
Using machine executing on a NIC to access a third party storage not supported by a NIC or host
Some embodiments provide a method of providing distributed storage services to a host computer from a network interface card (NIC) of the host computer. At the NIC, the method accesses a set of one or more external storages operating outside of the host computer through a shared port of the NIC that is not only used to access the set of external storages but also for forwarding packets not related to an external storage. In some embodiments, the method accesses the external storage set by using a network fabric storage driver that employs a network fabric storage protocol to access the external storage set. The method presents the external storage as a local storage of the host computer to a set of programs executing on the host computer. In some embodiments, the method presents the local storage by using a storage emulation layer on the NIC to create a local storage construct that presents the set of external storages as a local storage of the host computer.
PIN ASSIGNMENTS BASED ON BANDWIDTH
In example implementations, an apparatus is provided. The apparatus includes a cable interface, a video interface, an integrated chip, and a controller. The cable interface is to connect a host device via a cable. The video interface is to output video signals corresponding to visual data. The controller is communicatively coupled to the cable interface, the video interface, and the integrated chip. The controller assigns pairs of pins of the cable to transmit video signals based on the bandwidth used by the video signals. The controller also causes the host device to re-assign the pairs of pins of the cable to transmit the video signals.
BLUETOOTH PERIPHERAL AND CENTRAL APPARATUSES AND VERIFICATION METHOD
A Bluetooth central apparatus encrypts a piece of verification data according to a secret-key system to generate a first encrypted verification parameter, and transmits the first encrypted verification parameter to a Bluetooth peripheral apparatus. The Bluetooth peripheral apparatus decrypts the first encrypted verification parameter according to the secret-key system to obtain a piece of decrypted verification data. The Bluetooth peripheral apparatus also encrypts the piece of decrypted verification data according to the secret-key system to generate a second encrypted verification parameter, and transmits the second encrypted verification parameter to the Bluetooth central apparatus. After that, the Bluetooth central apparatus decrypts the second encrypted verification parameter according to the secret-key system to obtain the piece of decrypted verification data, and verify whether the Bluetooth peripheral apparatus is valid according to the piece of verification data and the piece of decrypted verification data.
Software framework and development platform for Wi-Fi chipsets
A wireless network device comprises a wireless signal driver, an application-driver framework that includes a bidirectional interface and an application interface. The application-driver framework is configured for application-agnostic and driver-agnostic communication. The bidirectional interface communicatively couples the wireless signal driver to the application-driver framework. The bidirectional interface includes an abstraction layer via which driver-agnostic command signals and driver-agnostic event signals are communicated with the application-driver framework and via which driver-specific command signals and driver-specific event signals are communicated with the wireless signal driver. The application interface is configured to interface with applications and with the application-driver framework. The application interface is configured to communicate application-agnostic command signals and application-agnostic event signals with the application-driver framework and to communicate application-specific event signals and application-specific command signals with the one or more applications and the application-driver framework.
Dual mode carriage system translation
A carriage system on an aircraft determines the type of each store attached to the carriage system. The carriage system detects stores attached to the carriage system and determines whether a first interlock signal formatted according to a first interface format is present for each store. If the first interlock signal is present, then the dual mode carriage system determines that a store interface for the store is the first interface format. If the first interlock signal is not present for the store, the carriage system determines whether a second interlock signal formatted according to a second interface format is present on a predetermined set of connection pins of the first interface format. If the second interlock signal is present, then the carriage system determines that the store interface for the store is the second interface format. The carriage system reports the store interface of each store to the aircraft.
I/O SCHEDULING METHOD BASED ON SYSTEM CALL ORDER CONSIDERING FILE FRAGMENTATION, SYSTEM FOR PERFORMING SAME AND COMPUTER READABLE STORAGE MEDIUM INLCUDING EXECUTIONS CAUSING PROCESSOR TO PERFORM SAME
There is provided a method for an I/O (input/output) scheduling method, the method comprises: assigning a system call identifier to each of a plurality of I/O requests derived from at least one system call requested by at least one application; sorting the plurality of I/O requests in order of the system call identifier; and transferring the sorted plurality of I/O requests to a computer-readable storage medium. Accordingly, in a mobile or desktop environment in which an application that frequently interacts with the user is executed, it is possible to minimize the read delay time increased due to file fragmentation, and moreover, it is possible to improve the user experience (UX).
System and method for polling-based storage command processing
A method, computer program product, and computing system for assigning a first set of interrupts for exclusive processing by a first set of central processing units (CPU) cores. A second set of interrupts may be assigned for processing by a second set of CPU cores. The first set of interrupts may be processed using the first set of CPU cores. The second set of interrupts may be converted to a set of polling operations, thus defining a set of converted polling operations. The set of converted polling operations may be processed using the second set of CPU cores.
Semiconductor devices including command priority policy management and related systems
Provided is a semiconductor device and a semiconductor system. A semiconductor device can include a command priority policy manager circuit which generates command priority policy information including a command priority compliance policy for a command directed to a device. A host interface circuit can be coupled to the command priority policy manager circuit to receive the command priority policy information from the command priority policy manager circuit, where the host interface circuit operable to transmit the command priority policy information via an electrical interface to the device.