Abstract:
A storage apparatus includes a storage drive providing a physical storage area for creating a logical storage area to be used by an external apparatus; a drive interface unit inputting and outputting data to and from the storage drive, a power supply unit supplying operation power to the storage drive and the drive interface unit; and a storage controller including processing units executing data write processing from the external apparatus to the storage drive and data read processing from the storage drive through the drive interface unit, and a drive control interface unit issuing a command to the drive interface unit in response to a request from each of the processing units. The power supply unit inputs power supply information indicating an operation state of the power supply unit to the drive interface unit. Any one of the processing units acquires the power supply information of the power supply unit through a data network path to the drive interface unit for the data write processing and the data read processing, and determines whether or not a failure occurs in the power supply unit supplying the operation power to the storage drive and the drive interface unit, on the basis of the acquired power supply information.
Abstract:
A storage apparatus includes: a storage drive providing a physical storage area for creating a logical storage area used by an external apparatus; a storage controller including a plurality of central processing units executing data write processing from the external apparatus to the storage drive, and data read processing from the storage drive; a plurality of cooling fans cooling the storage drive; a temperature sensor detecting a temperature of air introduced or discharged by the cooling fans; and a revolving speed sensor detecting a revolving speed of each cooling fan. Any of the plurality of central processing units executes operation control processing in which, through a data network path to the storage drive for the data write and read processing, measurement values of the temperature and revolving speed sensors are acquired and a revolving speed setup value of the fans calculated from the measurement values of the temperature and revolving speed sensors is transmitted to the cooling fans.
Abstract:
Based on information security rules, it is not possible to take out a failure HDD to the exterior of a facility for replacement without erasing data therefrom. According to the present storage sub-system, a slot in which failure has occurred and a slot not registered to a configuration information of a storage sub-system are used to simultaneously perform correction copy to a spare HDD and data erase of the failure HDD in parallel, so as to enable the failure HDD to be brought out to the exterior of the storage facility. Further, time required from when failure has occurred to the HDD to data recovery is shortened, so as to prevent deteriorated redundancy that may be caused by another failure occurring during data recovery and to reduce the risk of data loss.
Abstract:
Even if an arbitrary hard disk drive is added, the hard disk drive is operated in a specific operation mode suited for that hard disk drive. As triggered by attachment of a hard disk drive to a disk adapter, a processor operates the hard disk drive in a predetermined operation mode based on predetermined parameter information that has been prepared in advance. The hard disk drive stores, in advance, particular parameter information including information about the specific operation mode suited for operation. The processor reads the particular parameter information from the hard disk drive in the predetermined operation mode and operates the hard disk drive in the specific operation mode based on the particular parameter information.
Abstract:
A key issuing center (11) distributes a system secret parameter group that is information necessary for generating a content key used for encrypting a content to a server (12), and an encrypted intermediate key group set that is information necessary for generating a content key used for decrypting the content to output apparatuses (13a to 13n). The server (12) generates the content key based on the system secret parameter group and a time varying parameter group, encrypts the content based on the content key, and distributes the encrypted content and the time varying parameter group to the output apparatuses (13a to 13n). The output apparatuses (13a to 13n) generates a content key based on the encrypted intermediate key group set and the received time varying parameter group, decrypts the encrypted content based on the content key, and outputs to outside.
Abstract:
The present invention provides a technique which makes it possible to eliminate unauthorized playback of contents where unauthorized apparatuses are used and enable only authorized playback apparatuses to play back contents properly. The playback apparatus of the present invention obtains encrypted key information that has been encrypted by a first secret-key encrypting method, and decrypt the encrypted key information into key information using a secret key stored in a storing unit. When the key information is key-updating information, the playback apparatus updates the secret key according to the key-updating information. When the key information is a decryption key, the playback apparatus (i) obtains an encrypted content key that has been encrypted by a second secret-key encrypting method, (ii) decrypts the encrypted content key into a content key using the decryption key, (iii) obtains a scrambled content that has been scrambled by a scramble encrypting method, (iv) descramble the scrambled content using the decrypted content key, and (v) plays back the descrambled content.
Abstract:
Aureobasidins useful as a wide-spectrum antimycotic. They are cyclodepsipeptides composed of one hydroxy acid residue having group A , three amino acid residues having groups C , F and H , four N-methylamino acid residues having groups B , D , G and I , and one cyclic amino acid residue having E . A representative example thereof is one wherein A is CH3CH2CH(CH3)-, B is (CH3)2CH-, C is benzyl, cyclohexylmethyl, p-fluorobenzyl, benzyloxymethyl, benzyloxybenzyl, methoxybenzyl, cyclohexylmethyloxybenzyl, etc., D is methyl, benzyl, hydroxymethyl, etc., E is propylene, F is CH3CH2CH(CH3)-, G is (CH3)2CH-, H is (CH3)2CHCH2-, and I is (CH3)2C(OH)-. They have excellent activities against not only candida but also cryptococcus and aspergillus.
Abstract:
Electric energy is supplied to melting/evaporating material (for instance, metal fine wire (6)) to melt and evaporate the melting/evaporating material. An object (for instance, a concrete block (2)) to be broken is broken to the evaporation expansion force. Particles (8) which are discharged from a vessel when the evaporation expansion force is produced are prepared. Alternatively the breaking material (46) in which the melting/evaporating material is immersed is a flammable material and the object is broken by a strong breaking force.
Abstract:
A management system in which centralized control of a plurality of numerical controllers is performed by one information processor, such as a personal computer, having software for communication with a plurality of numerical controllers. The function of communication allows the transfer of numerical information such as NC programs, PMC data and coordinate data from numerical controllers to the information processor as well as the transfer of modified programs and various data from the information processor to the numerical controllers, so that the machining programs of a plurality of numerical controllers and various data are concentrically managed by one information processor.
Abstract:
A destroying method in which a hole (2) is made in an object (1) to be destroyed, a rubber-made bag-like container (22) containing a destroying substance (4) and a metal fine wire (5) to both ends of which a pair of electrodes (6) are attached is placed in the hole (2), electric energy is fed to the electrodes (6), the metal fine wire (5) is fused and evaporated, and the destroying substance (4) is expanded, thus destroying the object (1). Even if the hole (2) is deformed, the expansion force is transmitted to the object (1).