摘要:
A facility for annotating media files is described. In various embodiments, the facility displays a timeline indicating a duration of the media file, determines that an annotation is associated with the media file, and displays in an area near the timeline an indication of the associated annotation. In various embodiments, the facility displays a timeline indicative of a duration of the media file, receives an indication to add an annotation at an annotation time relative to the duration of the timeline, receives and stores an annotation, associates the annotation with the annotation time, and displays an indication of the stored annotation at an area near the timeline.
摘要:
A device comprises a data storage media storing data content and a digital signature. At least a portion of the digital signature is encrypted on the data storage media. The device also includes a removable control circuitry including a unique key. If the unique key corresponds to the encrypted portion of the digital signature, the removable control circuitry allows access to the data content. If the unique key does not correspond to the encrypted portion of the digital signature, the removable control circuitry prevents access to the data content. Embodiments of the invention may be useful to prevent a user from accessing the data content without the original control circuitry used to write the data content. For example, embodiments of the invention may prevent a user from using a different control circuitry that would readily allow unauthorized copying and distribution of the data content.
摘要:
The present invention provides an improved method and system of improving the efficiency, and ensuring the integrity, of a data transfer in a serverless backup, or third party copy, system having one or more physical storage devices. The present invention provides improvements to the processing of serverless copy, or EXTENDED COPY, commands, and transfers of data associated with such commands. These improvements increase the speed at which such commands are executed and completed, and increase the capabilities of copy managers in serverless backup systems. The improvements also make better use of the storage devices involved in the data backup process. The method broadly includes determining a desired manner of execution of segment descriptors, or instructions, as a function of components of those instructions. Other aspects of the invention allow for execution of data segments of any size, and validation of segment descriptors and target descriptors prior to data transfer.
摘要:
Various embodiments of the present invention are generally directed to adjusting a fly height of a transducer to enable a first data access with a storage medium rotating at a first speed, rotating the storage medium at a second speed substantially different from the first speed, and adjusting the fly height of the transducer to enable a second data access with the storage medium rotating at the second speed.
摘要:
Cyclic-redundancy-code (“CRC”) information that is received along with a frame from a fiber-channel is stored in an on-chip frame buffer, and later checked to ensure the integrity of the data while in the frame buffer. In various embodiments, data frames, along with their CRC information, are stored into a data-frame buffer, and/or non-data frames along with their CRC information are stored into a receive-non-data-frame buffer. The improved communications channel system includes a channel node having dual ports, each port supporting a fiber-channel arbitrated-loop serial communications channel. The serial communications channels each include CRC on data transmissions on the channel, an on-chip frame memory located on-chip in the channel node that receives a data frame and the frame's associated CRC from the communications channel, and an integrity apparatus that later uses the received associated CRC for data-integrity checking of data in the on-chip frame memory. In addition, a method for using CRC for data integrity in on-chip memory is described.
摘要:
The present invention is a system and method for determining clock rate failure in a serial communication interface. A complete clock rate failure can be detected. Alternatively, or in addition, the interface includes a rate matching buffer in which fill characters are added or deleted to accommodate minor clock variations. The number of fill characters added or deleted is monitored to determine whether clock variation is outside of a desired threshold.
摘要:
A soft-sided insulative container includes a base, a rear wall and three side walls extending upward from the base, and a cover. The base, rear wall and cover are integrally formed, with the cover connected to the rear wall with a folding hinge. The side walls are integrally formed with each other, with the side walls connected to the base and rear wall at seams. Each side wall has a side wall ear flexibly attached to it with a folding hinge to extend inward adjacent the cover. The cover has cover ears each flexibly attached to it with a folding hinge, and cover ears extend downward around all the peripheral edges of the cover. In a closed position, each unhinged edge between the cover and the side walls includes both a side wall ear and a cover ear in an overlapping configuration. The cover ears are temporarily secured to the side walls in this closed position. The base, the side walls, the cover, the side wall ears and the cover ears are formed of three layers of flexible material, including an inside layer, an outside layer, and a thermally insulative blanket. The inside layer and the outside layer are substantially waterproof. The insulation blanket includes four separate layers, which extend continuously through the flexible hinges, but do not extend into seams.
摘要:
The present invention is a disc drive storage unit incorporating novel apparatus, data structure and method for uniquely identifying data written during each write command operation of the disc drive storage unit. The disc drive storage unit attaches unique write identification data (sequence data, time data, or both) to host computer data written during each sector write operation. The unique write identification data is attached through independent action of the disc drive storage unit. The unique write identification data is attached to the host computer data in such a way that the unique write identification data is transparent to the host computer. The data structure relates the host computer data to the unique write identification data. The method documents the manner in which unique identification data is attached to, and detached from, the host computer data.
摘要:
A method and apparatus for preserving loop fairness. Some embodiments include a dynamic half-duplex feature. One aspect includes a communications channel system and method for preserving loop fairness that includes a first channel node having one or more ports, each port supporting and attached to a fibre-channel arbitrated-loop serial communications channel. One of the ports will arbitrate for control of that port's attached channel, wherein control of the channel loop, once arbitration is won, a fairness-preserving apparatus causes control of the communications channel to be released based at least in part on whether a predetermined amount of use has occurred between the first port and the communications channel. In some embodiments, the predetermined amount of use includes a transfer of a first predetermined amount of data. In some embodiments, release of control of the channel is inhibited if less than a second predetermined amount of data remains to be transferred.
摘要:
A system includes shared Small Computer System Interface (SCSI) storage devices for processing clients coupled by a fiber channel interface. The storage devices include storage blocks, and locks controlling their use by clients. Clients issue actions to the storage devices for performing operations on the locks. A client may exclude other clients from using storage blocks using a state element to acquire the lock for shared or exclusive use. If the client modified the data, a version counter in the lock is updated when the lock is released. If an activity bit is set, the version counter is updated upon both reading and writing. Other clients can forcibly release a lock owned by a failed client by monitoring its version counter. Expiration timers associated with the locks allow acquired locks to be released by timing out. A serverless global file system (GFS) manages use of the shared storage resources, and allows remapping of the locks to the storage blocks, for example, based on activity of the locks.