Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

82 results about "Legacy mode" patented technology

In computing, legacy mode is a state in which a computer system, component, or software application behaves in a way different from its standard operation in order to support older software, data, or expected behavior. It differs from backward compatibility in that an item in legacy mode will often sacrifice newer features or performance, or be unable to access data or run programs it normally could, in order to provide continued access to older data or functionality. Sometimes it can allow newer technologies that replaced the old to emulate them when running older operating systems.

Switching between multiple software entities using different operating modes of a processor in a computer system

A processor has multiple operating modes, such as the long / compatibility mode, the long / 64-bit mode and the legacy modes of the x86-64 microprocessor. Different software entities execute in different ones of these operating modes. A switching routine is implemented to switch from one operating mode to another and to transfer control from one software entity to another. The software entities may be, for example, a host operating system and a virtual machine monitor. Thus, for example, a virtual computer system may comprise a 64-bit host operating system and a 32-bit virtual machine monitor, executing on an x86-64 microprocessor in long mode and legacy mode, respectively, with the virtual machine monitor supporting an x86 virtual machine. The switching routine may be implemented partially or completely in an identity-mapped memory page. Execution of the switching routine may be initiated by a driver that is installed in the host operating system of a virtual computer system.
Owner:VMWARE INC

Method and apparatus for supporting legacy mode fail-over driver with ISCSI network entity including multiple redundant controllers

The invention is directed to a method and apparatus for supporting legacy mode fail-over drivers with an iSCSI network entity including multiple redundant controllers. In an exemplary aspect of the present invention, to support legacy mode fail-over drivers with an iSCSI network entity including multiple redundant controllers, the following configuration constraints may be placed on the iSCSI network entity and its iSCSI configuration: (1) the network device need have two or more redundant controllers; (2) the portals on each controller may or may not be formed into portal groups; (3) the portal groups may not span controllers (i.e., the target portal groups are limited in scope to a single controller); (4) the same iSCSI target name need be exported by all redundant controllers (i.e., the targets span all controllers of the iSCSI network entity, making the LUNs available to all controllers); (5) the target portal group numbers on the redundant controllers need have unique target portal group tags (i.e., all target portal group tags are unique across all portal groups in the iSCSI network entity. However, the target portal group tags do not need to be unique for different iSCSI targets); and (6) all targets are available from at least one target portal group on each controller. In addition, the initiator may use a single ISID for all sessions, use a different ISID for a different session, or the like. The present configuration constraints may enable the normal behavior of the legacy mode SCSI driver to locate and use redundant SCSI paths to the SCSI devices on the iSCSI target.
Owner:NETWORK APPLIANCE INC

Method and apparatus for supporting legacy mode fail-over driver with iSCSI network entity including multiple redundant controllers

The invention is directed to a method and apparatus for supporting legacy mode fail-over drivers with an iSCSI network entity including multiple redundant controllers. In an exemplary aspect of the present invention, to support legacy mode fail-over drivers with an iSCSI network entity including multiple redundant controllers, the following configuration constraints may be placed on the iSCSI network entity and its iSCSI configuration: (1) the network device need have two or more redundant controllers; (2) the portals on each controller may or may not be formed into portal groups; (3) the portal groups may not span controllers (i.e., the target portal groups are limited in scope to a single controller); (4) the same iSCSI target name need be exported by all redundant controllers (i.e., the targets span all controllers of the iSCSI network entity, making the LUNs available to all controllers); (5) the target portal group numbers on the redundant controllers need have unique target portal group tags (i.e., all target portal group tags are unique across all portal groups in the iSCSI network entity. However, the target portal group tags do not need to be unique for different iSCSI targets); and (6) all targets are available from at least one target portal group on each controller. In addition, the initiator may use a single ISID for all sessions, use a different ISID for a different session, or the like. The present configuration constraints may enable the normal behavior of the legacy mode SCSI driver to locate and use redundant SCSI paths to the SCSI devices on the iSCSI target.
Owner:NETWORK APPLIANCE INC

Method for automatically constructing target file based on container technology

PendingCN111399865AAvoid wastingSave yourself the hassle of typing commandsVersion controlProgram code adaptionProject environmentConfigfs
The invention discloses a method for automatically constructing a target file based on a container technology. The method comprises the following steps: 1, acquiring a project code and copying the project code to a server; 2, judging whether a configuration file stored with project environment information exists on the server or not; if so, executing the step 3; if not, executing the step 6; 3, reading configuration file information to obtain an environment required by the current project; 4, judging whether an environment mirror image exists on the server or not, and generating the environment mirror image if the environment mirror image does not exist: if yes, the docker container is started through the docker mirror image; 5, executing a predefined target file construction command in the docker container; 6, ending the construction operation. The compiling construction problem based on the standard architecture project is effectively solved, and different development environments, test environments and deployment environments are rapidly provided by using the container mirror image. In addition, in the environment migration process, the method is faster than a traditional mode,and it is guaranteed that the environment is completely consistent after migration.
Owner:贵州新致普惠信息技术有限公司

Method for processing user credibility social network data

InactiveCN105701704AGood effectClear technical solutionFinanceSocial circleDefault rate
A method for processing user credibility social network data provided by the invention is provided with a social network platform including WeChat, and includes: a step of user registration and generation of a corresponding social relation judging request; a step of obtaining different levels and types of social contact data network information while a user initiates a loan request; a step of data entry, cleaning and combing and output of user social contact data; a step of performing user credit assessment in a user social circle to obtain user credit data; and a step of performing secondary credit granting rating and a step of performing credibility assessment and judging the loan default rate and credit granting risk of the user. The method has the advantages that through estimation of the overdue rate of users, an assessed value of a model used for distinguishing user quality can reach above 40, an assessed value of a traditional model is only about 35, and the identification rate of user assessment can reach above 70%, i.e., repayment results of 70% of users can be accurately identified through the model. Remarkable effects are achieved in practical application compared with credit granting in a traditional mode.
Owner:先花信息技术(北京)有限公司 +1

Transportation information publishing and retrieving method based on named data networking (NDN)

The invention discloses a transportation information publishing and retrieving method based on named data networking (NDN). The method comprises the following specific steps: recommending a data naming mechanism: names are partitioned into five basic layers; publishing transportation information: a source vehicle node forwards a generated data packet to the periphery, and vehicle nodes receiving the data packet cache the data packet and continually forward the data packet outwards in a broadcasting way; and retrieving the transportation information: a requester vehicle node transmits an interest packet outwards, and returns the data packet according to a naming prefix matching rule of the NDN. According to the transportation information publishing and retrieving method based on an NDN mechanism without any central server in a VANET (Vehicular Ad-hoc Network), vehicles in a whole network are self-organized, and each vehicle node plays the roles of a producer, a consumer and a forwarder, so that the vehicles can forward and cache information through the NDN mechanism, and vehicle drivers can rapidly and efficiently inquire relevant transportation information of a certain geographical position through other vehicles without the assistance of the central server used in a conventional mode.
Owner:BEIJING UNIV OF TECH

Communication mode switching method and mobile communication terminal

InactiveCN105827812AEasy to answerSatisfy the habit of callingSubstation equipmentComputer engineeringLegacy mode
The present invention provides a communication mode switching method and a mobile communication terminal. According to the communication mode switching method, firstly, whether the mobile communication terminal is in the Bluetooth communication mode or not is judged during the conversation process of the mobile communication terminal. On the condition that the mobile communication terminal is in the Bluetooth communication mode, whether the distance between the mobile communication terminal and the ear part of a user is less than a preset distance or not is further judged. If the distance between the mobile communication terminal and the ear part of the user is less than the preset distance, the user wants to answer a call in the conventional mode. At this time, the current communication mode is switched to the microphone-earphone communication mode, so that the requirements of the user in realizing the conversation in the microphone-earphone mode can be met. Through detecting the actions of the user, the current communication mode of the mobile communication terminal is timely switched to the microphone-earphone communication mode. Therefore, the above purpose can be realized without the multiple operations of the user. As a result, the user can answer calls more conveniently.
Owner:VIVO MOBILE COMM CO LTD

Automatic construction method and system for table-driven cloud model software

The invention discloses an automatic construction method and system for table-driven cloud model software. The method comprises the following steps that a user fills related requirement information ina software system requirement table and submits the table, various requirement related information in the received software system requirement table is automatically read through an automatic web software construction framework, the various read system requirement related information is analyzed and checked, and a web software system matched with the requirement is automatically constructed according to the verified software system requirement table information and is injected into a cloud environment where the corresponding web software framework is located. The automatic construction methodand system for the software have the advantages that the complicated software development process in a traditional mode is simplified, multi-tenant software, namely a service cloud model is supported, the programming and deploying links in the conventional information management system software development process are omitted for the user, and therefore the user can quickly and efficiently construct the web software system meeting the requirement by just focusing on the requirement of a defined system, and the software development efficiency is greatly improved.
Owner:SOUTH CHINA UNIV OF TECH

Interference coordination method among downlink cells in relay wireless communication network

The invention relates to an interference coordination method among downlink cells in a relay wireless communication network, belonging to the technical field of wireless communication. The base station of the downlink of the relay wireless communication network divides the user area of the cell into non-interference user and interference user according to amount and position of users on the adjacent cell service edge, traditional transmission mode is adopted for the non-interference user, and interference evaded transmission mode is adopted for the interference user. In the interference evaded transmission mode, a relay carries out wave beam forming on the position information of the adjacent cell-edge user and the channel information of the cell interference user so that the interferenceof the adjacent cell-edge user is effectively evaded. In the method, when all cells adopt the interference evading policy, the performance of all cell-edge users can be effectively protected so that the throughput of the cell-edge user can be improved.
Owner:BEIHANG UNIV

System and method for delivery of audio content correlated to the calendar date and/or time of day

An apparatus and method are provided for automatically playing a recorded message, from a uniquely formatted encrypted CD, correlated to a specific date and a time of day as an option on a CD clock radio or the like. Disclosed are means for distinguishing the unique CD format and thereafter following a prescribed process for decrypting and playing. Otherwise all device functions and options operate in their conventional modes.
Owner:STEINBACH SCOTT BOWMAN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products