Abstract:
Ein fehlertolerantes Datenverarbeitungssystem weist Gruppen (TMR) von gleiche binäre Datensignale liefernden und verarbeitenden Rechnereinheiten (SRU) und je eine logische Entscheidungseinheit (Voter) auf, welche über die Datensignale der Gruppe (TMR) abstimmt. Hiebei ist eine Mehrzahl von Gruppen (TMR) mit wenigstens drei, Datensignale liefernden oder verarbeitenden Rechnereinheiten (SRU) miteinander über Datenkanäle (K1, K2, K3) verbunden und die Voter einer Gruppe sind mit den Votern anderer Gruppen über Daten- bzw. Signalleitungen verbunden. Jede Datensignale liefernde oder verarbeitende Rechnereinheit (SRU) kann wenigstens einen Voter für die Entscheidung über die Fehlerfreiheit von Eingangs- und/oder Ausgangssignalen aufweisen. Zweckmäßig enthält jede Datensignale liefernde oder verarbeitende Rechnereinheit (SRU) einen Sequenzvoter für die Entscheidung über die korrekte Reihenfolge der zu verarbeitenden Signale.
Abstract:
A method and apparatus for testing very large scale integrated circuit devices (50), most particularly Level Sensitive Scan Design (LSSD) devices, by applying (50-1/96) differently configured sequences of pseudo-random patterns in parallel to each of the input terminals of the device under test, collecting the sequences of all output responses (51-1/96) from each of the output terminals in parallel, combining (400-1/16, 401) these outputs to obtain a signature which is a predetermined function of all of the sequences of parallel outputs and comparing (402) the test signature with a known good signature (403) obtained by computer simulation. The input test stimuli are further altered in a predetermined fashion as a function of the structure of the device to be tested, to individually weight the inputs in favour of more or less binary ones or zeros.
Abstract:
A system and method for verifying consistency of data in a recovery system, the method including: protecting data in the recovery system, the recovery system includes a target disk configured to store a replica of a protected storage system from before a time window and a journal including data and metadata of write operations to the protected storage system that occurred during the time window; verifying consistency of the replicated data, concurrently with the protecting by: copying data of a selected chunk of the protected storage system at a specified time point, while monitoring write operations to the protected system; generating a replica of the selected chunk in the recovery system from the target disk and the journal, from the specified time point; comparing the copied data of the selected chunk with the replica of the selected chunk and repeating the copying, generating and comparing for a plurality of chunks.
Abstract:
A first non-volatile memory stores a redundant copy of system data that relates to a configuration of at least one physical component of a system, where the first non-volatile memory is accessible by a controller in the system and inaccessible to a processor in the system. It is determined whether system data in a second non-volatile memory accessible by the processor is compromised. In response to determining that the system data in the second non-volatile memory is compromised, the compromised system data in the second non-volatile memory is repaired.
Abstract:
A system for backup replication comprises a processor and a memory. The processor is configured to determine data present in a most recent backup not present in a previous backup; transmit an extent specification; and transmit data segment fingerprints of the one or more data segments. The memory is coupled to the processor and is configured to provide the processor with instructions.
Abstract:
A technique for tracking web browsing activity of a client device that includes storing, in a memory, a client profile having a client identifier associated therewith, providing a client device with a cache file having the client identifier embedded therein, receiving from the client device an identification of a client action and the client identifier, and updating the client profile to include the identification of the client action.
Abstract:
A firmware upgrading method for an electronic device is provided. The electronic device includes a storage section which stores a firmware image and a controller which executes a boot loader of the electronic device to determine whether the firmware image is damaged, performs a restoration function for the firmware image if the firmware image is damaged, and executes an operating system (OS) to perform normal operations if the firmware image is not damaged.
Abstract:
A semiconductor device comprising: a first processor; a second processor; a first delay circuit delaying a signal input into the first processor by a predefined number of cycles and inputting the signal into the second processor; a first compression circuit compressing a signal of n-bit width from the first processor into a signal of m-bit width (m