Patent classifications
G06F13/366
SYSTEM AND METHOD FOR DETECTING TYPES OF STORAGE DRIVES CONNECTED TO BACKPLANE CONTROLLER OR ENCLOSURE MANAGEMENT CONTROLLER
Systems and methods for detecting types of storage drives connected to a controller, which performs backplane or enclosure management. The controller has multiple pins, which includes N analog pins, such as the PRSNT# pins. Each of the N analog pins is electrically connected to a corresponding detecting circuits. Further, 2*N storage drives may be connected to and controlled by the controller in a way such that each analog pin may be connected to two storage drives via a corresponding detecting circuit for detecting a drive type of each storage drive. Each storage drive may be a SATA/SAS storage drive, or a NVMe storage drive. In operation, the controller receives a voltage from each of the N analog pins, and determines the drive type of each of the two of the 2*N storage drives based on the voltage received from each of the N analog pins.
SYSTEM AND METHOD FOR DETECTING TYPES OF STORAGE DRIVES CONNECTED TO BACKPLANE CONTROLLER OR ENCLOSURE MANAGEMENT CONTROLLER
Systems and methods for detecting types of storage drives connected to a controller, which performs backplane or enclosure management. The controller has multiple pins, which includes N analog pins, such as the PRSNT# pins. Each of the N analog pins is electrically connected to a corresponding detecting circuits. Further, 2*N storage drives may be connected to and controlled by the controller in a way such that each analog pin may be connected to two storage drives via a corresponding detecting circuit for detecting a drive type of each storage drive. Each storage drive may be a SATA/SAS storage drive, or a NVMe storage drive. In operation, the controller receives a voltage from each of the N analog pins, and determines the drive type of each of the two of the 2*N storage drives based on the voltage received from each of the N analog pins.
Methods and apparatus for a conducted electrical weapon
A conducted electrical weapon (CEW) launches wire-tethered electrodes from multiple cartridges to provide a current through a human or animal target to impede locomotion of the target. The CEW includes a handle and one or more deployment units. A handle and each deployment unit include a processing circuit and memory. A handle may provide operation and usage records to a deployment unit for storage. The information stored on a deployment unit may be unalterable once written. A handle may log a record of usage, deployment units, and other deployment information. The log file may be available to an electronic device through a secure wireless protocol.
Methods and apparatus for a conducted electrical weapon
A conducted electrical weapon (CEW) launches wire-tethered electrodes from multiple cartridges to provide a current through a human or animal target to impede locomotion of the target. The CEW includes a handle and one or more deployment units. A handle and each deployment unit include a processing circuit and memory. A handle may provide operation and usage records to a deployment unit for storage. The information stored on a deployment unit may be unalterable once written. A handle may log a record of usage, deployment units, and other deployment information. The log file may be available to an electronic device through a secure wireless protocol.
Methods and apparatus for a conducted electrical weapon
A conducted electrical weapon (CEW) launches wire-tethered electrodes from multiple cartridges to provide a current through a human or animal target to impede locomotion of the target. The CEW includes a handle and one or more deployment units. A handle and each deployment unit include a processing circuit and memory. A handle may provide operation and usage records to a deployment unit for storage. The information stored on a deployment unit may be unalterable once written. A handle may log a record of usage, deployment units, and other deployment information. The log file may be available to an electronic device through a secure wireless protocol.
Methods and apparatus for a conducted electrical weapon
A conducted electrical weapon (CEW) launches wire-tethered electrodes from multiple cartridges to provide a current through a human or animal target to impede locomotion of the target. The CEW includes a handle and one or more deployment units. A handle and each deployment unit include a processing circuit and memory. A handle may provide operation and usage records to a deployment unit for storage. The information stored on a deployment unit may be unalterable once written. A handle may log a record of usage, deployment units, and other deployment information. The log file may be available to an electronic device through a secure wireless protocol.
Methods and apparatus for a conducted electrical weapon
A conducted electrical weapon (CEW) launches wire-tethered electrodes from multiple cartridges to provide a current through a human or animal target to impede locomotion of the target. The CEW includes a handle and one or more deployment units. A handle and each deployment unit include a processing circuit and memory. A handle may provide operation and usage records to a deployment unit for storage. The information stored on a deployment unit may be unalterable once written. A handle may log a record of usage, deployment units, and other deployment information. The log file may be available to an electronic device through a secure wireless protocol.
Methods and apparatus for a conducted electrical weapon
A conducted electrical weapon (CEW) launches wire-tethered electrodes from multiple cartridges to provide a current through a human or animal target to impede locomotion of the target. The CEW includes a handle and one or more deployment units. A handle and each deployment unit include a processing circuit and memory. A handle may provide operation and usage records to a deployment unit for storage. The information stored on a deployment unit may be unalterable once written. A handle may log a record of usage, deployment units, and other deployment information. The log file may be available to an electronic device through a secure wireless protocol.
ADAPTER SELECTION BASED ON A QUEUE TIME FACTOR
A method, system, and computer program product are described for a machine selecting a selected adapter among two or more adapters that perform a same function. The method includes generating a request, at the machine, for the function, and calculating a time indicator associated with each of the two or more adapters based on a respective adapter queue time factor (QTF) associated with each of the two or more adapters, the adapter QTF associated with each of the two or more adapters being a computed value. The method also includes selecting the selected adapter and submitting one or more requests to the selected adapter of the two or more adapters to perform the function based on a comparison of the time indicator associated with each of the two or more adapters.
ADAPTER SELECTION BASED ON A QUEUE TIME FACTOR
A method, system, and computer program product are described for a machine selecting a selected adapter among two or more adapters that perform a same function. The method includes generating a request, at the machine, for the function, and calculating a time indicator associated with each of the two or more adapters based on a respective adapter queue time factor (QTF) associated with each of the two or more adapters, the adapter QTF associated with each of the two or more adapters being a computed value. The method also includes selecting the selected adapter and submitting one or more requests to the selected adapter of the two or more adapters to perform the function based on a comparison of the time indicator associated with each of the two or more adapters.