BACKGROUND The present disclosure relates generally to information processing systems and, more specifically, to a mechanism that maintains the architectural state values for both active and inactive software threads that may be executed on a process…
BACKGROUND OF THE INVENTION Solid-state memory devices encompass rewritable non-volatile memory devices which may use electronic circuitry for storing data. Currently, solid-state memory devices start replacing conventional storage devices such as ha…
BACKGROUND Virtualization technology enables a single host computer running a virtual machine monitor ("VMM") to present multiple abstractions and/or views of the host, such that the underlying hardware of the host appears as one or more indepen…
BACKGROUND OF THE INVENTION A SSD apparatus is a large-capacity data storage device using a nonvolatile semiconductor memory such as a NAND flash memory. The SSDapparatus has an interface which is the same as a magnetic recording hard disk drive (HDD…
BACKGROUND Computer viruses are a common problem for computer users. One typical mode of attack is to send an electronic mail message (e-mail) containing a file attachment to an unsuspecting user's computer. The file attachment contains malicious att…
BACKGROUND Generally, the concept of virtualization in information processing systems allows multiple instances of one or more operating systems (each, an "OS") to run on a single information processing system, even though each OS is designed to…
Earlier articles in this series: Part I: Idempotence Part II: Immutability Part III: Volatility Part IV: Singletons Oh, hell, this article just had to be about state machines, didn’t it? State machines! Those damned little circles and arrows and q’s.…
小结: 1. To facilitate communication between processes, most operating systems support Inter Process Communication (IPC) resources, such as pipes and sockets. IPC is used not just for communication between processes on the same system, but processes on…
BACKGROUND The field of invention relates to the computer sciences, generally, and, more specifically, to the thermal management of components other than a processing core. Computing systems have traditionally been designed with a bus (such as a "fro…
A method for allowing a protected mode kernel to service, in virtual 8086 mode, hardware interrupts which occur during execution of ring 0 protected mode code. When an interrupt occurs during execution of ring 0 code, the microprocessor copies the st…