Atul Goel - Sunnyvale CA, US Con Phan - Sunnyvale CA, US Cheng Tan - Fremont CA, US
Assignee:
Network Appliance, Inc. - Sunnyvale CA
International Classification:
G06F 11/00
US Classification:
714 8, 714 7
Abstract:
The input/output (I/O) performance of a hard disk drive in a mass storage computer system is evaluated to maintain efficiency by addressing I/O commands to sectors of the disk drive, evaluating the execution of the I/O commands to the sectors to obtain performance information for the sectors to which the I/O commands are addressed, comparing the performance information to a predetermined I/O performance criterion, and identifying any impaired sectors in which the performance information indicates less than the predetermined I/O performance criterion. Thereafter, further I/O commands to the impaired sectors are avoided.
Protecting A Manufactured Item From Counterfeiting
A method and system are described for protecting a manufactured item from counterfeiting. The manufactured item, which is marked with an identifier, such as a serial number, is associated with a code generator that has secret functions and data for generating verification codes. The manufactured item is then supplied along with the corresponding code generator. Thereafter, the identifier from the manufactured item and the verification code generated by the code generator are used to verify authenticity of the manufactured item.
Gavin Reid - Campbell CA, US Ron Hopkinson - Campbell CA, US Cheng P. Tan - Fremont CA, US John Brock - San Francisco CA, US Chris Ligtenberg - San Carlos CA, US Bartley K. Andre - Menlo Park CA, US
Assignee:
Apple Inc. - Cupertino CA
International Classification:
G06F 1/16
US Classification:
36167947, 31233416, 710304, 248618
Abstract:
Portable computer structures are provided. The portable computer structures may include hard drive mounting structures. The hard drive mounting structures may include elastomeric support members. Each elastomeric support member may have a relatively rigid inner portion. The inner portion may include a hole that receives a hard drive mounting pin. Each elastomeric support member may also have a relatively flexible outer portion. The relatively flexible outer portion may be mounted within an opening in a plastic support member. The rigid inner portion may have a square outline and may be mounted within a square opening in the flexible outer portion.
Portable Hard Drive And Mounting Structure For Same
Cheng Ping Tan - Fremont CA, US Con Phan - Milpitas CA, US Steven Lee Owen - San Jose CA, US Michael D. Hillman - Los Altos CA, US
Assignee:
Apple Inc. - Cupertino CA
International Classification:
H05K 5/00 H05K 7/00
US Classification:
36167934, 36167933, 361 6943
Abstract:
A portable computing device having an outer housing, and internal hard disk drive and a shock damping mounting assembly is disclosed. Multiple outer dimensions of the portable computing device can be less than the width of the hard drive due to a diagonal arrangement of the hard drive within the overall device. The hard drive can comply with a standardized form factor, such as a 3. 5 inch form factor. A mounting assembly located within the outer housing and coupled to the hard drive can include one or more components adapted to damp a mechanical shock to the hard drive, which components can be mounted to corners and/or edges of the hard drive. Mounting assembly components can includes a first stage spring comprising a finger geometry that provides initial damping of the mechanical shock and a second stage spring comprising an elastic block that provides final damping of the mechanical shock.
Disposition Instructions For Extended Access Commands
Cheng P. Tan - Fremont CA, US Khalu C. Bazzani - San Francisco CA, US
Assignee:
Apple Inc. - Cupertino CA
International Classification:
G06F 12/14
US Classification:
711165, 711118, 711161, 711162, 710 4, 709217
Abstract:
A computer system that generates a disposition instruction and an associated access command directed to a block of data at a logical address is described. The disposition instruction and the access command are communicated to a memory system in the computer system via a communication link. Note that the memory system includes different types of memory having different performance characteristics, and the disposition instruction is generated based on the different performance characteristics. In response to the access command, the memory system accesses the block of data at the logical address in a first type of memory in the different types of memory. Furthermore, based on the disposition instruction, the memory system moves the block of data to a second type of memory in the different types of memory to facilitate subsequent accesses to the block of data.
Gavin Reid - Campbell CA, US Ron Hopkinson - Campbell CA, US Cheng P. Tan - Fremont CA, US John Brock - San Francisco CA, US Chris Ligtenberg - San Carlos CA, US Bartley K. Andre - Menlo Park CA, US
Assignee:
Apple Inc. - Cupertino CA
International Classification:
G06F 1/16
US Classification:
36167947, 312236, 2483091, 710303
Abstract:
Portable computer structures are provided. The portable computer structures may include hard drive mounting structures. The hard drive mounting structures may include elastomeric support members. Each elastomeric support member may have a relatively rigid inner portion. The inner portion may include a hole that receives a hard drive mounting pin. Each elastomeric support member may also have a relatively flexible outer portion. The relatively flexible outer portion may be mounted within an opening in a plastic support member. The rigid inner portion may have a square outline and may be mounted within a square opening in the flexible outer portion.
Method For Providing Product Safety To A Manufactured Item Using A Multiple Use Verification Code
In a method and system for providing product safety to a manufactured item, a verification code is associated with the manufactured item. The verification code is initialized to an unvalidated state. The manufactured item is then supplied with this verification code hidden from view. The verification code may be exposed by a user and submitted to a validation service for validation for any number of occasions. In response to the validation service receiving the verification code for validation, the user is provided with an indicator of a current state of the verification code. A first successful validation of the verification code is then used as an event that triggers a state transition of the verification code from the unvalidated state to a validated state.
Method And System For Providing Product Safety To A Manufactured Item With Verification Codes
In a method and system for providing anti-counterfeit and product safety to a manufactured item, two substantially unique verification codes, one readable and the other hidden, are associated and supplied with the manufactured item. The verification codes are initialized to a first state at a validation service. Either or both codes may be submitted to a validation service for validation for any number of occasions, with the validation service responding with a message appropriate to the current state of the code. When the hidden verification code is exposed and submitted to the validation service for validation, a first successful validation is used as an event that triggers a state transition of both the readable and the hidden verification codes from the first state to a second state.
Nanjing University - Laboratory of Biophysics, Nanjing University - Department of Physics
Relationship:
Single
About:
PhD student majoring in biophysics ···············... solving:National Record Holder (former) of 2×2×2 cube single: 2.40 sec Official ResultsRubik's Cube   14.78  17.40 2x2 Cube      2.40...
Tagline:
Biophysics; Physics; Linux; Rubik's cube; Cycling
Cheng Tan
Education:
Oregon State University - Electrical and Computer Engineering