Patent classifications
G06F11/3041
METHOD FOR ERROR HANDLING OF AN INTERCONNECTION PROTOCOL, CONTROLLER AND STORAGE DEVICE
A method for error handling of an interconnection protocol, a controller, and a storage device are provided. The method includes receiving a frame error position indication signal to indicate whether an error occurs in a frame in each clock cycle and a symbol position corresponding to the error, and receiving a frame correction position indication signal to indicate whether the frame in each clock cycle is correct and a symbol position corresponding to the frame that is correct; according to the frame error position indication signal and the frame correction position indication signal, determining that a frame error occurs in a first clock cycle, and after requesting for NAC frame transmission, sending a request for disabling the NAC frame transmission; and after the first clock cycle, comparing the frame error position indication signal and the frame correction position indication signal.
NETWORK INSPECTION SYSTEM AND NETWORK INSPECTION METHOD
A network (101) is composed of a bus branched at one or more points, and one or more nodes are connected to each branch line. An inspection control unit (220) outputs a base signal. An amplification control unit (210) determines an amplification period and an amplification factor based on a parameter, and amplifies the base signal with the determined amplification factor during the determined amplification period. The inspection control unit (220) accepts, as an inspection signal, the base signal whose waveform has changed as a result of flowing though the bus, and judges whether or not there is a new node connected to the bus based on a waveform of the inspection signal.
Synchronized console data and user interface playback
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for providing user interface development tools. In one aspect, a method includes receiving console logs that specify sequences of user interface events that occurred during user sessions. For each of multiple user sessions, a received console log for the user interface events that occurred during that user session is identified. Playback data that presents visual changes of one or more user interfaces of the publisher that occurred during that user session is generated. An interactive interface is generated and provided. The interface includes session replay area in which the playback data presents the visual changes of the one or more user interfaces of the publisher that occurred during that user session and a console log area that presents console entries from the console log for the user interface events that occurred during that user session.
Telemetry Push Aggregation
Systems, apparatuses, and methods for implementing telemetry push aggregation techniques are described. A computing system includes one or more input/output (I/O) agents interposed between functional units and a communication fabric. A given I/O agent receives a set of aggregation rules from a power management unit. The I/O agent monitors traffic from the functional units, and the I/O agent generates telemetry data from the traffic data based on the set of aggregation rules. The telemetry data is used by the power management unit to make adjustments to one or more power settings.
Data encoding using spare channels in a memory system
Implementations of encoding techniques are disclosed. The encoding technique, such as a Data bus Inversion (DBI) technique, is implementable in a vertically-stacked memory module, but is riot limited thereto. The module can be a plurality of memory integrated circuits which are vertically stacked, and which communicate via a bus formed in one embodiment of channels comprising Through-Wafer Interconnects (TWIs), but again is not limited thereto. One such module includes spare channels that are normally used to reroute a data signal on the bus away from faulty data channels. In one disclosed technique, the status of a spare channel or channels is queried, and if one or more are unused, they can be used to carry a DBI bit, thus allowing at least a portion of the bus to be assessed in accordance with a DBI algorithm. Depending on the location and number of spare channels needed for rerouting, DBI can be apportioned across the bus in various manners. Implementations can also be used with other encoding techniques not comprising DBI.
Method and apparatus of establishing customized network monitoring criteria
A method and apparatus of monitoring computer devices operating on a network is disclosed. Computer devices are all different and require monitoring settings that are tailored to their specific requirements. One example of the present invention may include a method of monitoring at least one computer device operating on a network. The method may include receiving audit information representing attributes of the computer device and storing the audit information in memory. The method may also include comparing the audit information to a predefined monitor set of objects to be monitored. The method may further include creating a new monitor set based on the comparison of the audit information and the predefined monitor set. The new monitor set is different from the predefined monitor set and is generally used to monitor objects which are included in the audited device. The method may also include monitoring the at least one computer device based on the new monitor set.
Terminal use pattern information collection management method and system
The present disclosure relates to a method and a system for collecting and managing terminal use pattern information generated during a process of controlling screen display of a user terminal for eye protection and management. The method, according to the present disclosure, comprises the steps of: measuring a distance between a user terminal and a user; measuring a use time of the user terminal; converting and processing image information displayed on a screen of the user terminal by a predetermined image processing method, when the distance and/or the use time satisfy/satisfies a predetermined condition; and collecting terminal use pattern information comprising at least one of image conversion processing information, distance, and use time when a predetermined reaction is sensed from a user.
APPLICATION-SPECIFIC COMPUTER MEMORY PROTECTION
Systems and methods herein secure computer memory from potential hacks. In one embodiment, a system includes a computer memory, and a memory protection module communicatively coupled to the computer memory. The memory protection module is operable to assign a counter value to a write Input/Output (I/O) request, to encrypt data of the write I/O request based on the counter value, and to write the encrypted data to a location of the computer memory. The counter value comprises a version number of the write I/O request and, for example, the location of the computer memory to where the data of the write I/O request is being written in the computer memory. The memory protection module is further operable to compute the version number based on memory access patterns of an application writing to the computer memory.
INTERRUPT LATENCY AND INTERVAL TRACKING
Secure circuitry detects a latency between when an interrupt occurred and when the interrupt was released in correspondence with handling of the interrupt. The secure circuitry detects an interval between consecutive occurrences of the interrupt. In response to either or both of the latency exceeding a latency limit and the interval exceeding an interval limit, the secure circuitry performs an action.
Methods for handling input/output expansion power faults in a telematics device
A method for handling input/output (I/O) expansion power faults in a telematics device is provided. The method includes setting an I/O expander power-off duration to an initial value and powering on an I/O expander interface. In response to detecting a power fault at the I/O expander interface, the I/O expander interface is powered-off dur the power-off duration and the power-off duration is increased. If the power-off duration is greater than the power-off duration limit, the I/O expander interface is permanently powered-off. The steps are repeated until either the power fault does not recur, or the I/O expander interface is permanently powered-off.