摘要:
In a continuously variable transmission of an electric actuator system from which a hydraulic pressure generator such as an oil pump is excluded, it is necessary to cut off power supply to an actuator and turn a motor into an inoperative state similarly in a hydraulic actuator system in order to prevent unintended sudden acceleration or deceleration when a fail state is formed due to microcomputer failure of an electronic control device. As a result, a belt-slipping state occurs causing traveling failure. Thus, a master CPU (for control) and a slave CPU (for monitoring), which are configurations of an existing electronic control device are used. Both CPUs have monitoring functions configured to perform mutual monitoring. In addition, the existing electronic control device is also considered as a monitoring device via a network to provide a monitoring configuration among the three devices to accurately specify the failure part (CPU).
摘要:
Embodiments enable a database management system (DBMS) to manage two levels of disk failure groups. These two levels of redundancy are achieved by grouping the disks of the disk group for the DBMS into two levels of failure groups (i.e., “data sites” each containing two or more “failure groups” of disks). This system of disk grouping allows a DBMS to potentially tolerate the loss of both an entire first site and part of a second site. Such a DBMS uses a multi-level voting system, based on both failure group-level votes and site-level votes, to identify the current version of administrative data structures (ADS) that store key administrative data. In addition to data sites that store database data, the DBMS includes a quorum site with a single quorum failure group that stores a copy of the ADS. The quorum site contributes a site-level vote during a multi-level voting event.
摘要:
The present invention provides a data processing device that includes a memory and includes a first CPU and a second CPU, each having an instruction processing section to process an instruction, a cache to store part of data of the memory, an error detection section to detect an error in the data stored in the cache, and an error correction section to correct the data stored in the cache on the basis of the data stored in the cache and an error notification and output corrected data to the instruction processing section, wherein the error correction section of the first CPU receives, as input, the data stored in the cache of the first CPU, the error notification of the first CPU, the data stored in the cache of the second CPU, and the second error notification, and if the error notification of the first CPU is an error and the error notification of the second CPU is not an error, outputs the data stored in the cache of the second CPU to the instruction processing section of the first CPU, and in other cases, outputs the data stored in the cache of the first CPU to the instruction processing section of the first CPU.
摘要:
A fault-tolerant data processing computer system and method for implementing a distributed two-tier state machine aimed for distributed (replicated) data stores, in which consistency is maintained despite the failure of any number of replicas and communication paths. In the distributed two-tier state machine, one process (device) in a network of processes (devices) is chosen as the leader, and that leader is responsible for executing functions that return state machine commands, and for broadcasting the commands to the other processes. The processes execute the commands in the logical precedence order that corresponds to the order of function executions that return these commands. The system and method ensures that each of the processes issues exactly the same sequence of commands for execution, such that each command in the sequence, except the first one, has a precedent command on which the command logically depends.
摘要:
A highly efficient and effective method for deciding, in the context of a distributed computer network, how many computers will participate in an initial vote if multiple computers are started in the same general time frame.
摘要:
A system and method for controlling processor instruction execution. In one example, a method for synchronizing a number of instructions performed by processors includes instructing a first processor to iteratively execute instructions via a first set of iterations until a predetermined time period has elapsed. A number of instructions executed in each iteration of the first set of iterations is less than a number of instructions executed in a prior iteration of the first set of iterations. The method also includes instructing a second processor to iteratively execute instructions via a second set of iterations until the predetermined time period has elapsed. A number of instructions executed in each iteration of the second set of iterations is less than a number of instructions executed in a prior iteration of the second set of iterations. The method includes determining whether additional instructions are to be executed.
摘要:
System, especially for use in aircraft, for controlling at least one switching device (5, 5b, 5n) able to open or close the connection between at least one power source and at least one supplied device, and means for measuring the state of the power supply channel. The system comprises: at least two microcontrollers (1a, 1b) each able to emit a command intended for each switching device (5, 5b, 5n), said microcontrollers (1a, 1b) being connected to at least one portion of the means for measuring the state of the power supply channel; and a means (14, 14b, 14n) for determining the command to be transmitted, able to determine the command to be transmitted to each switching device (5, 5b, 5n) from the commands emitted by each microcontroller (1a, 1b) and intended for said control switch.
摘要:
The systems and methods of the present invention provide a solution that makes data provably secure and accessible—addressing data security at the bit level—thereby eliminating the need for multiple perimeter hardware and software technologies. Data security is incorporated or weaved directly into the data at the bit level. The systems and methods of the present invention enable enterprise communities of interest to leverage a common enterprise infrastructure. Because security is already woven into the data, this common infrastructure can be used without compromising data security and access control. In some applications, data is authenticated, encrypted, and parsed or split into multiple shares prior to being sent to multiple locations, e.g., a private or public cloud. The data is hidden while in transit to the storage location, and is inaccessible to users who do not have the correct credentials for access.
摘要:
The systems and methods of the present invention provide a solution that makes data provably secure and accessible—addressing data security at the bit level—thereby eliminating the need for multiple perimeter hardware and software technologies. Data security is incorporated or weaved directly into the data at the bit level. The systems and methods of the present invention enable enterprise communities of interest to leverage a common enterprise infrastructure. Because security is already woven into the data, this common infrastructure can be used without compromising data security and access control. In some applications, data is authenticated, encrypted, and parsed or split into multiple shares prior to being sent to multiple locations, e.g., a private or public cloud. The data is hidden while in transit to the storage location, and is inaccessible to users who do not have the correct credentials for access.
摘要:
A computing device may be joined to a cluster by discovering the device, determining whether the device is eligible to join the cluster, configuring the device, and assigning the device a cluster role. A device may be assigned to act as a cluster master, backup master, active device, standby device, or another role. The cluster master may be configured to assign tasks, such as network flow processing to the cluster devices. The cluster master and backup master may maintain global, run-time synchronization data pertaining to each of the network flows, shared resources, cluster configuration, and the like. The devices within the cluster may monitor one another. Monitoring may include transmitting status messages comprising indicators of device health to the other devices in the cluster. In the event a device satisfies failover conditions, a failover operation to replace the device with another standby device, may be performed.