Abstract:
Die Erfindung betrifft ein Verfahren zur Prüfung einer elektronischen Baugruppe, bei dem Prüfpunkte auf der Baugruppe adaptiert werden und durch Vergleich mit einem Fehlerkatalog auf vorhandene Fehler untersucht werden können. Um eine schnelle Fehlerortsbestimmung auch auf komplexen Baugruppen durchzuführen, werden an zentralen inneren Prüfpunkten Signaturregister aufgeschaltet, die zusätzlich zur Auswertung mit dem Fehlerkatalog herangezogen werden. Die Erfindung ist vor allem bei der Prüfung von komplexen Baugruppen in der Fertigung elektronischer Geräte anwendbar.
Abstract:
The present invention relates to a method for byzantine fault tolerant data replication with a plurality of 2f+1 data servers and one or more clients, wherein data is stored in at least f+1 different data servers out of the 2f+1 data servers and wherein metadata of the stored data is stored under a metadata-identifier in a fault-tolerant metadata-service, wherein the metadata to be stored includes a unique identifier of the stored data, a fingerprint of the stored data and a list of data servers which have stored the data. The present invention further relates to a system for byzantine fault tolerant data replication.
Abstract:
A first non-volatile memory stores a redundant copy of system data that relates to a configuration of at least one physical component of a system, where the first non-volatile memory is accessible by a controller in the system and inaccessible to a processor in the system. It is determined whether system data in a second non-volatile memory accessible by the processor is compromised. In response to determining that the system data in the second non-volatile memory is compromised, the compromised system data in the second non-volatile memory is repaired.
Abstract:
Various embodiments relate to a system and related method for scanning active instances of an application within a system. Unique identifiers in the form of fingerprints, tags, or metadata can be associated with a target application. A manager can then scan the process tables and file system directories of the servers within the system to find active processes and stored files that include the unique identifier. In some embodiments, the manager scans the active processes while they are running to search for the unique ID within the process' command line structure. In some embodiments, the manager also finds processes or files that do not have the unique identifier, but were previously associated with the unique identifier. The manager can then report the server and application information to user. Such information can include which of the one or more servers has the target application as an active process.
Abstract:
Aspects of the subject matter described herein relate to data protection of files that may include both content and embedded metadata. In aspects, an indication that a file has changed is received. If the content has changed, the entire file or just the content may be backed up. If the metadata only has changed, the metadata may or may not be backed up, depending on implementation. Instead of parsing the file to determine the exact size and positioning of the metadata within the file, the file may be divided into three portions: a head portion, a middle portion, and a tail portion. Hashes of these portions may then be used to determine whether the metadata and/or content of the file have changed.
Abstract:
Provided herein are systems and methodologies for highly efficient restoration in a network-based backup system. As described herein, differential-based analysis can be utilized such that a new complete differential is calculated based on signatures and/or other information relating to a given item to be restored prior to retrieving backup data. Based on the differential, only blocks determined to be unique between the current version of the item and the desired version are transmitted, which can then be merged with non-unique locally present blocks to obtain the fully restored version of the item. Further, a hybrid architecture can be employed, wherein signatures and/or data are stored at a global location within a network as well as one or more local peers. Accordingly, a backup client can obtain information necessary for restoration from either the global location or a nearby peer, further reducing latency and bandwidth consumption.
Abstract:
A method of scan testing an integrated circuit to provide real time identification of a block of test patterns having at least one failing test pattern comprises performing (120) a number of test operations and storing (122) a test response signature corresponding to each block of test patterns into a signature register; replacing (124) the test response signature in the signature register with a test block expected signature; identifying (126) the block as a failing test block (128) when the test response signature is different from the test block expected signature; and repeating preceding steps until the test is complete.
Abstract:
A common backup format of a backup rights object according to embodiments of the present invention has the following features: License information that is not critical for cryptographic security of the rights object is kept in "plain text" with a well defined syntax in a first data container (302), license information that is critical for cryptographic security of the rights object is stored in cryptographically protected form that is specific for the originating device to which the rights object is bound to in a second data container (304), and the rights object is cryptographically signed by the originating device such that it may not be manipulated. The signature is stored in a third data container (306).
Abstract:
The invention relates to a method for storing data, comprising a first storage system and a second storage system. The second storage system is used to store data from the first storage system and the first storage system is provided with a filing system in which the files that are to be safeguarded are filed by means of a client device that monitors the first storage system and a server that maintains the second storage system. Said method comprises the following steps: files in the first storage system are checked, in relation to modifications made by the client in accordance with one or several events; in the event of modifications being detected, a hash value is determined in relation to the files, configured such that the identity of the files can be determined; the hash value is transferred to the server; checked by the server using the hash value whether the identical file is filed on the second storage system, and if the file is already there, the file is not required, but it is stated that the file is filed on the first storage system, and if the file is not present, the entire file or parts of the file that have been modified by the first storage system is requested, and the files are stored with the remark of the first storage system on the second storage system.
Abstract:
Verfahren zum Speichern von Daten mit einem ersten Speichersystem und einem zweiten Speichersystem, wobei das zweite Speichersystem zum Sichern der Daten vom ersten Speichersystem dient, wobei das erste Speichersystem mit einem Filesystem versehen ist, auf dem Dateien abgelegt sind, die zu sichern sind, mit einem Client der das erste Speichersystem überwacht und einem Server, der das zweite Speichersystem verwaltet, umfassend die folgenden Schritte: Überprüfen der Dateien auf dem ersten Speichersystem auf Veränderungen durch den Client in Abhängigkeit von einem oder mehreren Ereignissen; falls Veränderungen festgestellt wurden, Bestimmung eines Hash-Wertes in Bezug auf die Datei, der so ausgebildet ist, dass die Identität der Datei feststellbar ist, Übermitteln des Hash-Wertes an den Server, Überprüfen anhand des Hash-Wertes durch den Server, ob die identische Datei auf dem zweiten Speichersystem abgelegt ist, und falls die Datei bereits vorhanden ist, so wird die Datei nicht angefordert, jedoch vermerkt, dass die Datei auf dem ersten Speichersystem abgelegt ist, und falls die Datei nicht vorhanden ist, anfordern der gesamten Datei oder Teile der Datei, die sich geändert haben, vom ersten Speichersystem und Ablegen der Datei mit einem Vermerk auf das erste Speichersystem auf dem zweiten Speichersystem.