摘要 |
A spoofing module that mimics remote computer resources to optimize system responsiveness and avoid expiration of intentional and unintentional timeouts in extended computer systems. The invention is capable of appearing to the host system and selectively responding to the host system as if it were the actual hardware. The invention includes a throttling mechanism to prevent data over-run.
|