21st week of 2010 patent applcation highlights part 58 |
Patent application number | Title | Published |
20100131636 | APPLICATION DELIVERY CONTROL MODULE FOR VIRTUAL NETWORK SWITCH - A virtualized platform includes a virtual switch connected to the virtual network interface cards (vNICs) for a group of virtual machines running the same application program that is associated with multiple software ports. A module in the virtualized platform monitors the virtual switch's receipt of a network packet that includes control information relating to the application program and its software ports. The module applies a load balancing algorithm to select a vNIC from the vNICs connected or connectable to the virtual switch, based on the rate of processing of previous network packets by each the vNICs (e.g., as measured by the size of a network packet queue). The module might also apply the load balancing algorithm to select a software port for the application. The module then causes the virtual switch to route the network packet to the selected vNIC and software port. | 2010-05-27 |
20100131637 | Detecting Hidden Shared Dependencies Through Covert Channels - According to one method for detecting a hidden shared dependency through covert channels, a pattern of bursts is transmitted to a first application hosted by a first server. The pattern of bursts may be designed to stress a potential hidden dependency shared by the first application and a second application hosted by a second server. Each of the bursts may include one or more concurrent requests. Probe requests are transmitted to the second application. Responses corresponding to the probe requests are received from the second application. Response times are determined by computing a difference between times that the probe requests are transmitted and times that the corresponding responses are received. A determination is made whether the potential hidden dependency exists based on the response times. | 2010-05-27 |
20100131638 | Systems and Methods for GSLB Remote Service Monitoring - The present invention provides improvements to the integration between a metric exchange protocol and a monitoring mechanism supporting load balancing by a Global Server Load Balancing (GSLB) appliance in a GSLB hierarchy of appliances, using a method for triggering a monitor on a remote service. The method includes receiving, by a first appliance, metrics of a second appliance via a metric exchange connection between the first and second appliances. The first appliance includes a GSLB service and identifies a service provided via the second appliance as a remote service for GSLB. The first appliance may identify via the metrics that a state of the service is up, and determine that the metric exchange connection is down. Responsive to the determination, the first appliance may trigger a monitor to monitor the status of the service. Further, the first appliance may obtain via the monitor a second status of the service. | 2010-05-27 |
20100131639 | Systems and Methods For GSLB Site Persistence - The present invention provides systems and methods for maintaining site persistence in a hierarchical Global Server Load Balancing (GSLB) deployment. Via configuration of GSLB services locally and remotely on each of the GSLB appliances and LB appliances at a site, a site appliance identifies and associates requests from the GSLB with the site. Furthermore, the site appliance may receive a GSLB cookie with the client request and confirms the request is from the expected GSLB in the site hierarchy. When the load balancers receives a response from a server, the appliance may include the GSLB cookie with the response back to the client. The appliance may also include an LB cookie to identify the server selected by the LB. When the client sends another request, the request may include the GSLB and LB cookie. With this information, the GSLB and LB appliance may maintain site persistence for the client as well as server persistence at the site. | 2010-05-27 |
20100131640 | TECHNIQUES FOR IDENTIFYING AND LINKING RELATED CONTENT - Techniques for identifying and linking related content are provided. A principal content network node is received having principal-defined content organized around a principal-defined topic. Local content of the principal is also acquired. The principal-defined content and the local content are evaluated to derive relationships associated with principal identities, principal reputations, and the principal-defined topic. A content network is established that links the principal content network node to other content network nodes having the local content; the links are maintained in response to the relationships. | 2010-05-27 |
20100131641 | SYSTEM AND METHOD FOR IMPLEMENTING A WIRELESS QUERY AND DISPLAY INTERFACE - System and method for implementing a wireless query and display interface are disclosed. In one embodiment, the system includes a machine to be monitored and an end-point associated with the machine and comprising an interface, the end-point for connecting to the machine to be monitored via the interface. The system further includes a consolidator comprising an identity service and a Global Device Identity Listing (“GDIL”), the GDIL for maintaining a list of machines to be monitored using the system and a wireless device for viewing the list maintained by the GDIL and for issuing commands and queries related to one or more of the machines on the list. The end-point, the consolidator, and the wireless device are capable of wirelessly communicating with one another. | 2010-05-27 |
20100131642 | SYSTEM FOR MONITORING THE USE OF CONTENT IN A VEHICLE - A content monitoring system having a vehicle content module for monitoring the use of a content player in a vehicle. The vehicle module includes an interface to a data communications network of the vehicle and a data collector for monitoring data on the data communications network to access in real time player data representing use of the player. The content can include self-loaded content, such as that of a CD, DVD, an ipod, and an mp3 file and broadcast content, such as that of an FM radio broadcast. The content monitoring system also includes a transmission module for transmitting the player data from the vehicle and a server system including an analysis module for receiving and processing the player data from the data collector to generate content usage report data, e.g. representing an audience or ratings survey. | 2010-05-27 |
20100131643 | REMOTELY MANAGED DEVICE - A remote management server creates a data set-up instruction telegram to be sent to a remotely managed device. A control program extracts the data set-up instruction from the telegram, and outputs same to a communication control bundle. The communication control bundle outputs the data set-up instruction to a basic data management bundle. The basic data management bundle, based on the data set-up instruction, fetches the data to be set in the remotely managed device, and determines whether this data is basic data or extended data. If the data is basic data, the basic data management bundle executes this data set-up process. If the data is extended data, an extended data management bundle executes the data set-up process. | 2010-05-27 |
20100131644 | RESOURCE ALLOCATION METHOD IN WIRELESS NETWORK - Provided is a resource allocation method performed in a wireless network formed of a plurality of nodes, the resource allocation method including the operations of forming clusters and electing cluster heads respectively for the clusters; determining whether a node from among the plurality of nodes forming the wireless network is an edge node; if the node is not the edge node according to a result of the determining, collecting link information related to other nodes in a cluster that comprises the node, and delivering the link information to a cluster head of the cluster; and if the node is the edge node according to a result of the determining, otherwise, obtaining link information and scheduling information from an edge node of another cluster within a communication range with the cluster comprising the edge node, and delivering the link information and scheduling information to the cluster head. The resource allocation method decentralizes a load of calculations to several nodes, wherein the load may be centralized to one node in a large ad-hoc network, so that an energy efficiency of the node may be increased, and since the several nodes sequentially perform simple calculation, a total of the resource allocation time may be reduced. | 2010-05-27 |
20100131645 | SYSTEM AND METHOD FOR GENERATING AND USING FINGERPRINTS FOR INTEGRITY MANAGEMENT - A system and method is provided for capturing and using problem fingerprints in an Information Technology (IT) infrastructure for integrity management. A fingerprint of the transaction topology in an IT infrastructure is automatically captured at various time intervals prior to the occurrence of an event leading to a problem, such as a failure, hard threshold violation, defined transaction violation or user-provided occurrence. The fingerprint provides an indication of the activity and operation of the IT infrastructure immediately preceding the problem event. The captured fingerprint is then used to monitor real-time data in the IT infrastructure operation and activity to look for activity that matches a captured fingerprint to provide an indication of a pending problems before the problems occur. When it is determined that there is sufficient probability a problem event will occur based upon real-time data matching a previously generated problem fingerprint, an alert is generated to provide sufficient notification prior to the occurrence of problem event. | 2010-05-27 |
20100131646 | POLICY-MANAGED DNS SERVER FOR TO CONTROL NETWORK TRAFFIC - Disclosed is a method, a computer system, and a computer-readable media product that contains a set of computer executable software instructions for directing the computer to execute a process for policy-based operation of a DNS server apparatus to manage traffic due to undesirable mail or requests for electronic documents. The policies operate according to owners, regions, or countries controlling source IP addresses and deterministically select from a plurality of non-equivalent replies to be sent to the source IP address. Accumulating previous activity records may assist in determining which traffic may be usefully deferred or suppressed. The process includes withholding certain information from certain DNS servers seeking IP addresses to improve overall security and integrity of the Internet. | 2010-05-27 |
20100131647 | Enhanced Media Control - The present invention is aimed to provide an enhanced mechanism for conflict resolution between authorized services in respect of selective authorization criteria, such as service incompatibilities, subscribed bandwidth QoS assigned per subscriber and pre-emption priority value assigned per service. To this end, the present invention provides for a new method that allows the authorization of a subsequent service as a result of applying a selective authorization criterion for the subscriber at a policy control rules server to determine those previously authorized services to be put on hold, notifying about said previously authorized services to be on hold towards application devices handling such services, and inactivating at a policy enforcement device those control rules applicable to the media associated with said previously authorized services. In addition, the method as well as the policy control rules server, the application devices and the policy enforcement device may be also arranged for re-activating said previously authorized services still on hold when the reason for being on hold has ceased. | 2010-05-27 |
20100131648 | METHODS AND SYSTEMS FOR PROVIDING POWER MANAGEMENT SERVICES IN A SOFTWARE PROVISIONING ENVIRONMENT - A software provisioning server can be configured to communicate with a power management system of the target machines to alter the power state of the target machines during actions requiring a change in the power states such as power cycling the target machines during a software installation. The software provisioning server can communicate with the power management system of the target machines and instruct the power management systems to alter the power state of the target machines during the actions. | 2010-05-27 |
20100131649 | SYSTEMS AND METHODS FOR EMBEDDING A CLOUD-BASED RESOURCE REQUEST IN A SPECIFICATION LANGUAGE WRAPPER - Embodiments relate to systems and methods for embedding a cloud-based resource request in a specification language wrapper. In embodiments, a set of applications and/or a set of appliances can be registered to be instantiated in a cloud-based network. Each application or appliance can have an associated set of specified resources with which the user wishes to instantiate those objects. For example, a user may specify a maximum latency for input/output of the application or appliance, a geographic location of the supporting cloud resources, a processor throughput, or other resource specification to instantiate the desired object. According to embodiments, the set of requested resources can be embedded in a specification language wrapper, such as an XML object. The specification language wrapper can be transmitted to a marketplace to seek the response of available clouds which can support the application or appliance according to the specifications contained in the specification language wrapper. | 2010-05-27 |
20100131650 | Methods and Apparatus to Support Network Policy Managers - Methods and apparatus to support network policy managers are disclosed herein. An example method for use in a communication system includes receiving an adjustment request from a user premises to temporarily adjust a policy defining a bundled service associated with the user premises, the bundled service including a first service assigned a first percentage of a network resource and a second service assigned a second percentage of the network resource; automatically adjusting the policy such that the first service is assigned a third percentage of the network resource, wherein the third percentage is greater than the first percentage; receiving a notification of a termination of an application associated with the first service; and readjusting the policy such that the first service is assigned the first percentage in response to the notification. | 2010-05-27 |
20100131651 | METHOD AND SYSTEM FOR ADAPTIVE RESOURCE MANAGEMENT FOR FUTURE INTERNET - When a virtual network environment is established using resources on a network in order for a user to perform an arbitrary test service in the future Internet that is emerging as a replacement of the current Internet, resources having characteristics desired by the user are selected from among a number of resources on the network, and a resource capable of exhibiting an optimum performance is effectively selected from the selected resources. | 2010-05-27 |
20100131652 | UNIFIED INTERFACE FOR CONFIGURING MULTIPLE NETWORKING TECHNOLOGIES - A network and connection provisioning framework for configuring and provisioning multiple aspects of network connectivity (e.g., multiple networks, media types, and/or connections). The framework may comprise a unified configuration interface that enables an administrator to configure multiple different types of network connectivity. A single configuration file comprising settings for multiple aspects of network connectivity may be generated based on preferences entered by a system administrator, or by exporting current settings from a particular computing device. Global configuration policies or other configuration settings that span multiple types of network connectivity may be also created and stored in one or more configuration files. Stand-alone media managers and/or plug-in modules may implement one or more standardized application programming interface functions so that they may interoperate with the network and connection provisioning framework. The standardized API may be used to ensure that configuration information is handled and stored in a standardized manner by different media managers and/or plug-in modules. | 2010-05-27 |
20100131653 | BUILDING CONTROL SYSTEM USER INTERFACE WITH PINNED DISPLAY FEATURE - Building control systems that include a user interface that is configured to help manage relatively large amounts of building control data in an efficient and intuitive manner. In some cases, subsets of building control information can be associated with display elements such as windows or tabs, which can then be pinned to provide a convenient way to selectively display only certain building control information. In some cases, a pinned display element may display one or more building control parameters, which in some cases, can be user selectable and/or updated over time. | 2010-05-27 |
20100131654 | PLATFORM FOR ENABLING TERMINAL SERVICES VIRTUALIZATION - Disclosed are techniques for providing a platform and application program interface (API) that leverages a terminal services session broker infrastructure to support third party plug-in applications. In a typical scenario, when a user requests for a connection to access third party plug-in applications, the application program interface may interact with the session broker process to identify sessions or suitable servers to which the user can be connected. The user may access the third party plug-in applications through the identified sessions or suitable servers. | 2010-05-27 |
20100131655 | SYSTEM AND METHOD FOR TRANSFERRING LARGE AMOUNT OF DATA IN WEB SERVICE TRANSACTION - A system and associated method for web service data for a web service transaction are disclosed. A client program that employs the web service transaction invokes a pair of web service calls to transfer the web service data to and from a web service program that executes the web service transaction. The web service program establishes a user session between the web service program and a web interface program. During the user session, the web service transaction is performed as a user of the client program directly interacts with the web service program through the web interface program. When the user session is completed, the client program retrieves the web service data resulting from the web service transaction from the web service program. | 2010-05-27 |
20100131656 | METHOD AND SYSTEM FOR DISPATCHING RECEIVED SESSIONS BETWEEN A PLURALITY OF INSTANCES OF AN APPLICATION USING THE SAME IP PORT - A logical module, referred as Load Balancer Module (LBM), is disclosed which listens to one of certain common predefined port number. These well-known ports for receiving communication video conference signaling and control protocols is thereafter load balanced and multi-plexed to a number of instances of protocol stack applications. By balancing the multi-media data stream across a multitude of application instances multiple multi-media data streams may be serviced and processed by a single internet protocol host processor. A mutipoint control unit (MCU) may therefore process multiple input data streams containing multi-media video conferencing information. | 2010-05-27 |
20100131657 | Novel method and system of anonymizing real time Internet communications between peers - A method and system of establishing a direct communication between two peers over the Internet without revealing their real identities and personal information to each other, comprising of a first client node, a second client node, an intermediate anonymizer server node, the first anonymizer interface and the second anonymizer interface. | 2010-05-27 |
20100131658 | Multiple core Session Initiation Protocol (SIP) - A Session Initiation Protocol (SIP) proxy server including a multi-core central processing unit (CPU) is presented. The multi-core CPU includes a receiving core dedicated to pre-SIP message processing. The pre-SIP message processing may include message retrieval, header and payload parsing, and Call-ID hashing. The Call-ID hashing is used to determine a post-SIP processing core designated to process messages between particular user pair. The pre-SIP and post-SIP configuration allows for the use of multiple processing cores to utilize a single control plane, thereby providing an accurate topology of the network for each processing core. | 2010-05-27 |
20100131659 | Systems and Methods For Load Balancing Real Time Streaming - The present application relates to systems and methods for managing of Real Time Stream Protocol (RTSP) sessions by an intermediary located between a client and a server. An intermediary located between a client and a server receives a response from the server to a request of the client to setup a media stream. The response may include a first session identifier established by the server. The intermediary may encode a port of the server and an internet protocol address of the server into the first session identifier to form a second session identifier. The intermediary may modify the response to identify the second session identifier as the session identifier provided by the server. The intermediary may transmit the modified response to the client responsive to the request of the client to setup the media stream. | 2010-05-27 |
20100131660 | DETERMINISTIC SESSION LOAD-BALANCING AND REDUNDANCY OF ACCESS SERVERS IN A COMPUTER NETWORK - In one embodiment, for each port of an access node in an access-based computer network, one access server of a plurality of access servers is configured as a preferred access server for that port. Upon receiving a session initiation message at a particular port, the access node forwards the session initiation message to one or more of the access servers based on the configured preferred access server for the particular port. | 2010-05-27 |
20100131661 | FIBER CHANNEL STORAGE SERVER - A fiber channel (FC) storage server includes an optical network access interface and a storage device subsystem. The optical network access interface includes a first FC access module and a first small computer system interface (SCSI) module. The storage device subsystem includes a second FC access module and a second SCSI module. When the optical network access interface receives a connection request packet from an initiator, the first FC access module generates a packet in an SCSI identification format of the storage device subsystem. Further, the storage device subsystem generates a packet in an optical network access interface identification format having a response instruction through the second FC access module and the second SCSI module, and transmits the packet to the optical network access interface to complete the response process. | 2010-05-27 |
20100131662 | NETWORKED PROJECTION DISPLAY ADAPTER - A networked projector system includes a projection display device, a projector computer, and a network adapter. The projector computer negotiates an IP address of a local network, and periodically broadcasts the IP address on the local network. The network adapter connects with a client on the local network with the IP address. | 2010-05-27 |
20100131663 | METHOD FOR PRE-CONFIGURATION OF IP ADDRESS IN MOBILE COMMUNICATION SYSTEM - A handover method between heterogeneous networks is disclosed. A method for pre-configuration of an IP address allows a mobile terminal to perform a handover between heterogeneous networks. Methods for relaying messages for pre-configuration of IP address and a method for relaying messages for performing MIH based on pre-configuration of IP address are also disclosed. | 2010-05-27 |
20100131664 | Buffer transfer in a communications network - A method and apparatus for transferring buffer data from a first network node to a second network node during a mobile handover between cells. In order to improve the speed at which buffer data is transferred during a handover, a connection using a congestion control protocol is established between the two nodes prior to the handover. Dummy data is sent over this connection, in order to approach or reach the available data transfer rate, and at the handover, the dummy data is replaced with buffer data. | 2010-05-27 |
20100131665 | Method, apparatus and system for determining version information - The present disclosure discloses a method for determining version information, including: sending a first session request to a device, and receiving error code information returned by the device in response to the first session request; sending one or more session requests to the device in response to the error code information, and determining the version information of the device according to one or more pieces of information returned by the device in response to the one or more session requests. The present disclosure further discloses a system and an apparatus for determining version information. The version information of a device which does not support the version negotiation is determined, thereby solving problems of interaction and compatibility between devices which do not support the version negotiation. | 2010-05-27 |
20100131666 | System and Method for Managing Data Transfers Between Information Protocols - A computer data handling method, system and apparatus are disclosed. A data item or information object are received in one protocol. Based on data contents, a protocol transfer module (engine) optimizes information presentation by transferring/converting the data item from the one protocol to a form of the data item in a different protocol. The resulting form (i.e. the data item/information object in the different protocol) optimally presents the data contents to an end-user. The end user reads the converted data item in the different protocol. The invention system enables the user to reply or otherwise further handle the data item in the initial protocol as desired. The initial protocol may be email and the resulting form of the data item may be one or more feed entries in machine-readable feeds specified by the user. The invention optimization effectively reduces email In-box clutter and streamlines reading in feed readers. | 2010-05-27 |
20100131667 | Executable Communication Protocol Description Method and Apparatus - According to one embodiment, data is transmitted from a first communication device to a second communication device in accordance with one or more communication layer functions of a communication standard including at least a data link layer function. An executable description of at least a new data link layer function is generated at the first communication device. At least the data link layer function of the communication standard is replaced with the new data link layer function at the first communication device. | 2010-05-27 |
20100131668 | Systems and Methods For Object Rate Limiting - The present application is generally directed to systems and method for throttling a rate of requests between a client and a server using user specified inputs. A rate of requests for an object may be throttled by an intermediary which receives requests transmitted between a client and a server and via the intermediary. The intermediary may receive a request from a client for an object of a server. The intermediary may identify a policy specifying a mode of throttling for the request, the policy specifying a mode of throttling, a rate threshold and a period of time for the rate threshold. The rate throttler of the intermediary may determine whether the request exceeds the rate threshold for the period of time based on the mode of throttling of the policy and allow or block the request responsive to the determination. | 2010-05-27 |
20100131669 | HARDWARE ACCELERATION FOR REMOTE DESKTOP PROTOCOL - A method for offloading remote terminal services processing tasks to a peripheral device that would otherwise be performed in a computer system's processor and memory. In one embodiment, the disclosed method is utilized in a layered network model, wherein computing tasks that are typically performed in network applications are instead offloaded to a peripheral such as a network interface card (NIC). | 2010-05-27 |
20100131670 | COMMUNICATION DEVICE, COMMUNICATION METHOD, AND PROGRAM - A transmission device includes: a relay device information obtaining unit ( | 2010-05-27 |
20100131671 | ADAPTIVE NETWORK CONTENT DELIVERY SYSTEM - A method and apparatus stores media content in a variety of storage devices, with at least a portion of the storage devices having different performance characteristics. The system can deliver media to a large number of clients while maintaining a high level of viewing experience for each client by automatically adapting the bit rate of a media being delivered to a client using the client's last mile bit rate variation. The system provides clients with smooth viewing of video without buffering stops. The client does not need a custom video content player to communicate with the system. | 2010-05-27 |
20100131672 | MULTIPLE PATHWAY SESSION SETUP TO SUPPORT QoS SERVICES - A request from a user device is received for a service by a network management server via a communication network. The network management server determines multiple routes for delivering content associated with the requested service based on a provisioning profile for the user device. Content associated with the requested service is then delivered via the determined multiple routes. The provisioning profile is updated and includes preferred service types, desired QoS for one or more services, client account information, and/or client credit verification information. The network management server manages the delivery of the content associated with the requested service via the determined multiple routes. The content includes packets that are the same, which are communicated or delivered simultaneously via the determined multiple routes. The network management server allocates one or more of the determined multiple routes for delivering the content based on priorities associated with the routes. | 2010-05-27 |
20100131673 | SYSTEM AND METHOD FOR DISTRIBUTING FOVEATED DATA IN A NETWORK - A system and method for executing a computer program in a network. The system includes a surrogate proxy processor which, when executing the computer program, is programmed to receive at least one foveated image from at least one of the foveating proxy server and a further device that is connected to the foveating proxy server, wherein the foveating proxy server generates the at least one foveated image, and transmit the foveated image to at least one of the client computer and a another device. In addition, a system is provided which includes a foveating proxy server, and at least two surrogate proxy servers communicating with one another. At least one of the at least two surrogate proxy servers communicates with the foveating proxy server, and another one of the at least two proxy servers communicates with at least one of the client computer and a further device, wherein the at least two surrogate proxy servers are cascaded along a multi-hop portion of the network. | 2010-05-27 |
20100131674 | NETWORK TRANSCODING SYSTEM - The system is a distributed video transcoding system that allows content to be transformed from one digital format to another close to the ingest and delivery points to minimize the time and cost of the transfer between end points. Additionally by making transcoding an integral part of the distribution of content itself, significant efficiencies can be gained. The distribution can be improved by transcoding at different phases of the transfer. Within the system decisions can be made to utilize different transcoding resources based on various business rules and priorities. | 2010-05-27 |
20100131675 | SYSTEM AND METHOD FOR SECURED DISTRIBUTION OF MEDIA ASSETS FROM A MEDIA SERVER TO CLIENT DEVICES - At least one media server and one media client device form an ad hoc wireless communication link or network. The invention is characterized by a method that a media asset in a compressed format is broadcasted over the network while the media asset in an uncompressed format is being played by the server. In accordance with one embodiment, a media file for a song is being played by a HiFi audio system while the file is compressed to MP3 format and is transmitted to a handheld media player through a wireless link. The compressed file may be transmitted repeatedly during the playback cycle of the server. In accordance with another embodiment, a video file is shown on a television terminal while the file is compressed to the MP4 format by a set top box. The MP4 formatted file is transmitted to an ad hoc wireless network including one or a plurality of handheld media players. In accordance with yet another embodiment, a media file for a movie is divided into multiple data packets and is compressed to MP4 format while the file in an uncompressed format is shown in a movie theater. The compressed data packets are transmitted to handheld media players carried by audiences. In all above mentioned embodiments, the media files may be encrypted based on a public key from a public/private key system before the transmission. The received media asset may be decrypted by using a private key after a purchasing operation is completed. The purchasing may be accomplished via an on-line facility. | 2010-05-27 |
20100131676 | SPI ADDRESSING BEYOND 24-BITS - A system and/or methodology that facilitates serial peripheral interface (SPI) addressing beyond 24 bits, by portioning a conventional SPI command byte into a plurality of nibbles. A new set of commands are mapped to the first nibble, and selected from the set of unused binary values under the conventional SPI command protocol. A number of address bytes required to access the storage location for the command are mapped on a second nibble, and a user and/or system definable number of dummy bytes to be sent after the command are mapped on a third nibble. | 2010-05-27 |
20100131677 | DATA TRANSFER DEVICE AND DATA TRANSFER METHOD - A disclosed data transfer device includes one or more data transfer control unit configured to control a command issuance and a data transfer separately, a command issuing unit configured to determine priorities of commands and issue the commands in an order from a higher priority, a memory communication control unit configured to perform the data transfer corresponding to the command from and to a memory, and a signal output unit configured to output a completion signal of the data transfer in a case where the data transfer is normally completed. | 2010-05-27 |
20100131678 | DIRECT MEMORY APPARATUS AND DIRECT MEMORY ACCESS METHOD - There is provided a direct memory access apparatus and a direct memory access method. | 2010-05-27 |
20100131679 | APPARATUS FOR PERFORMING A DOWNLINK OR UPLINK PROCESSING IN A WIRELESS COMMUNICATION SYSTEM TO MAINTAIN THE EFFICIENCY OF SYSTEM BANDWIDTH, AND ASSOCIATED METHODS - An apparatus for performing downlink or uplink processing in a wireless communication system to maintain efficiency of system bandwidth includes at least one sharing-ring buffer, a MAC-PHY interface, a security engine, and a DMA processor. The sharing-ring buffer is for storing multi-format data. In a situation where the apparatus performs downlink processing, the MAC-PHY interface is for receiving input data, the security engine is for retrieving stored data from the sharing-ring buffer and decrypting the retrieved data, and the DMA processor is for accessing the sharing-ring buffer to obtain the decrypted data. In a situation where the apparatus performs uplink processing, the DMA processor is for receiving input data and storing the input data into the sharing-ring buffer, the security engine is for retrieving the stored data from the sharing-ring buffer and encrypting the retrieved data, and the MAC-PHY interface is for receiving the encrypted data from the sharing-ring buffer. | 2010-05-27 |
20100131680 | Unified DMA - In one embodiment, an apparatus comprises a first interface circuit, a direct memory access (DMA) controller coupled to the first interface circuit, and a host coupled to the DMA controller. The first interface circuit is configured to communicate on an interface according to a protocol. The host comprises at least one address space mapped, at least in part, to a plurality of memory locations in a memory system of the host. The DMA controller is configured to perform DMA transfers between the first interface circuit and the address space, and the DMA controller is further configured to perform DMA transfers between a first plurality of the plurality of memory locations and a second plurality of the plurality of memory locations. | 2010-05-27 |
20100131681 | Bus Based Communications Between A Processor And A Peripheral Controller In A Digital Processing System - According to an aspect of the present invention, the communication between processors and peripheral controllers is provided using packets. In an embodiment, the access requests are specified according to a common format such that all the information required for performing each access request is included in a single packet and sent to the peripheral controller. The peripheral controller performs the access request on the external device and generates a response. According to another aspect, the packet format enables the peripheral controller to send responses, requests originating from the external devices and interrupt requests. According to yet another aspect, the packets from processors are first stored in a random access memory (RAM) and a DMA controller retrieves the packets and delivered to the respective peripheral controllers. | 2010-05-27 |
20100131682 | ELECTRONIC DEVICE AND METHOD FOR AUTOMATICALLY CONTROLLING OPERATION OF THE ELECTRONIC DEVICE - An electronic device is adapted to be connected to a plurality of peripheral devices, and includes a storage unit and a control circuit. The storage unit records a preset time and a control list. The control list lists at least a selected one of the electronic device and the peripheral devices, and an operation mode therefor. The control circuit detects whether the preset time matches a reference time, and if so, controls operation of the selected one of the electronic device and the peripheral devices according to settings in the control list. | 2010-05-27 |
20100131683 | SYSTEM FOR STORING, ACCESSING AND AUTOMATICALLY UPDATING DOCUMENTS - Systems and processes are provided that relate to storing, accessing, searching, and automatically updating of secure documents stored on a USB device. The systems and processes include a USB device that stores a document set, a web service that provides updated documents for the document set, and a content management application that uploads the updated documents to the web service. | 2010-05-27 |
20100131684 | SHARING RESOURCES IN MULTI-DICE STACKS - Apparatus, systems, and methods for configuring a plurality of stacked semiconductor dice with unique identifiers and identifying a die in the stack using the unique identifier are provided. Additional apparatus and methods are disclosed. | 2010-05-27 |
20100131685 | HARDWARE CONFIGURATION INFORMATION SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT - A method for determining configuration information to be reported comprises accessing a table corresponding to a configuration resource associated with the configuration information, wherein the table comprises an entry for each hardware configuration definition to be built for the configuration resource, identifying a seed value in the table corresponding to the configuration resource, and modifying the seed value based on a result of processing each entry indicated by the table. | 2010-05-27 |
20100131686 | Method and System for Secure Transmission of Process Data to be Transmitted Cyclically - The invention relates to a method and system for secure transmission of process data to be transmitted cyclically in a cyclical data transmission to be performed protocol-specifically via a transmission channel between a user functioning as a master and at least one user functioning as a slave that are connected to the transmission channel. Within a transmission protocol frame, a time slot that can always accommodate the same number of bits independently of the data to be transmitted is assigned to each slave during a data transmission cycle. For safety-relevant process data that is to be transmitted during a data transmission cycle from a slave to at least one additional user, or that is to be transmitted during a data transmission cycle from a user to at least one slave, additional first protection data for recognizing error-free transmission of this safety-relevant process data is generated and transmitted in each case. | 2010-05-27 |
20100131687 | WIRELESS REMOTE USB HUB APPARATUS AND SYSTEM THEREOF - A wireless remote USB hub apparatus includes a server end operation processor module as the data processing center, for converting and processing data; a server end wireless Wi-Fi communication module is coupled to the server end operation processor module, for transceiving data of Wi-Fi communication protocol format; and at least one USB port, for connecting electronic devices that supports USB, such as a USB drive or printer. When the electronic device connects to the USB port, the server end operation processor module receives a connection signal data from the USB port, converts the connection signal data format into Wi-Fi communication protocol format, and then transmits the connection signal data via the server end wireless Wi-Fi communication module to a personal computer or other client device. Thereby a user of the client device may remotely utilize the electronic device connected to the wireless remote USB hub apparatus. | 2010-05-27 |
20100131688 | INTERFACE METHOD FOR DATA TX/RX SYSTEM USING DATA STREAM - An interface method for a data transmitting and receiving system including a transmitter and a receiver includes; resetting the receiver in response to a data stream communicated from the transmitter or upon detecting power-up of the transmitter or receiver, and operating the receiver in response to a current data stream received from the transmitter, wherein the operating of the receiver comprises at least one of; (a) updating data stored in the receiver according to control data contained in the current data stream, and (b) receiving payload data contained in the current data stream. | 2010-05-27 |
20100131689 | COMMUNICATION SYSTEM, COMMUNICATION APPARATUS, CONTROL METHOD THEREFOR, AND COMPUTER PROGRAM - In a communication system, one of a plurality of communication apparatuses that acts as a host controls data transmission and the other communication apparatuses that act as devices perform data transmission under control of the host over a predetermined communication interface. The communication apparatuses have both host and device roles, and are configured to exchange the host and device roles by using a predetermined communication protocol are connected to the predetermined communication interface. A first apparatus acts as a host and a second apparatus as a device. The second apparatus transmits information concerning the second apparatus to the first apparatus. The first apparatus compares the transmitted information with information concerning the first apparatus to determine whether or not to switch the host and device roles according to a predetermined criterion. In response to an affirmative determination, the host and device roles are switched by using the predetermined communication protocol. | 2010-05-27 |
20100131690 | Content reception apparatus and content reception method - Disclosed is a content reception apparatus capable of receiving a content distributed from a server apparatus via a first network and a second network, the content reception apparatus including a plurality of content reception apparatuses capable of being connected to the second network that is local and connected to the first network, the server apparatus being capable of distributing a content and capable of being connected to the first network. The content reception apparatus includes an arbitration condition storage unit to store an arbitration condition for an arbitration, an arbitration table storage unit to store an arbitration table, an input unit with which a content reception request is input, an arbitration start request transmission unit to generate and transmit an arbitration start request, and an arbitration unit to execute arbitration processings. | 2010-05-27 |
20100131691 | EXTENDING DEVICE FUNCTIONALITY AMONGST INDUCTIVELY LINKED DEVICES - A docking station is provided for a computing device. The docking station may be used by, for example, a mobile computing device, such as a cellular or wireless telephony/messaging device. The docking station includes a housing comprising a receiving surface top receive and retain the mobile computing device. An inductive signal transfer interface is included with the housing to inductively signal at least one of power or data to the mobile computing device. The docking station further provides an output component and processing resources. The processing resources are configured to detect placement of the mobile computing device on the receiving surface. The data is received from the mobile computing device, and an output is signaled to the output component based on the received data. | 2010-05-27 |
20100131692 | BUS BRIDGE APPARATUS AND BUS BRIDGE SYSTEM - A bus bridge is connected between a general-purpose first bus and a second bus on which an interruption signal is transmitted using a packet. The bus bridge includes a plurality of reception buffers and a control section. The control section controllably switches the order of read of the read responses and the requests based on the order of reception of the read responses and the requests after recognizing reception of an interruption assert signal packet transferred by the second bus and before recognizing reception of an interruption de-assert signal packet transferred by the second bus. | 2010-05-27 |
20100131693 | HARD DISK SYSTEM STATE MONITORING METHOD - A hard disk system state monitoring method is provided. The hard disk system state monitoring method is to monitor the state of a hard disk system. The hard disk system comprises a backplane, an expander and a plurality of hard disks adapted in the device slots of the backplane. The hard disk system state monitoring method comprises the steps of: retrieving a logic and physical address mapping table from the expander; retrieving a physical address and device slot number mapping table, generating a logical address and device slot number mapping table according to the logic and physical address mapping table and physical address and device slot number mapping table; receiving a plurality of hard disk instant state signals; and establishing a hard disk system state database according to the logical address and device slot number mapping table and the hard disk instant state signals. | 2010-05-27 |
20100131694 | Secure Boot ROM Emulation - Secure boot ROM emulation with locking storage device. A locking storage device is provided by combining a nonvolatile memory device such as flash or EEPROM with one-shot locking logic which write enables at least a portion of the nonvolatile memory device upon power cycling of the overall digital device. This write enable is cleared during the stage 1 bootloader process, thus providing a protected update interval for updating a stage 2 bootloader once per power cycle. | 2010-05-27 |
20100131695 | Method for Utilizing a Memory Interface to Control Partitioning of a Memory Module - Apparatuses and methods for implementing partitioning in memory cards and modules where conventional memory cards or modules have only a single partition. A representative memory card/module in accordance with the invention includes a memory devices), and a memory interface which includes a data bus, a command line and a clock line. The memory card/module further includes a memory controller coupled to the memory device(s) and to the memory interface. The memory card/module includes means for controlling the partitioning of the memory device(s), and the memory controller is configured to operate the memory device(s) in accordance with the partition information. | 2010-05-27 |
20100131696 | System and Method for Information Handling System Data Redundancy - Flash memory integrated in a hard disk drive chassis maintains a back-up copy of data stored on the hard disk drive between back-ups of the hard disk drive data to separate storage devices. If the hard disk drive fails, the data on the flash memory provides a back-up of changes made since the previous hard disk drive back-up. When a back-up is made of data stored on the hard disk drive to an external storage device, the back-up on the flash memory device is erased to make room for subsequent back-up data. If back-up data stored on the flash memory approaches the capacity of the flash memory, a notice is provided to an end user that a back-up is needed. | 2010-05-27 |
20100131697 | METHODS FOR TAG-GROUPING OF BLOCKS IN STORAGE DEVICES - Embodiments described herein disclose methods, devices, and media for storing data. Methods including the steps of: receiving data to be stored in a memory that includes at least three blocks, wherein each block, for storing the data, has at least one metadata value, associated with each block, that is dependent upon a writing time of each block; grouping at least three blocks into at least two block groups, wherein at least one block group contains at least two blocks; associating a respective metadata value with each block group; and associating the respective metadata value of a respective block group with each block storing the data contained in the respective block group, without storing a dedicated copy of at least one metadata value for each block. In some embodiments, at least one metadata value is stored in a block-group table. | 2010-05-27 |
20100131698 | MEMORY SHARING METHOD FOR FLASH DRIVER - A memory sharing method for flash driver includes determining a target memory size corresponding to a target flash driver, and loading a target flash program included in the target flash driver into a stack memory allocated in a specific memory device when an unused size of the stack memory available for data storage is greater than the target memory size. Additionally, the step of determining the target memory size includes determining a specific flash program having a maximum size among a plurality of flash programs included in the target flash driver, and setting the target memory size equal to the maximum size of the specific flash program. | 2010-05-27 |
20100131699 | METHODS, APPARATUSES, AND COMPUTER PROGRAM PRODUCTS FOR ENHANCING MEMORY ERASE FUNCTIONALITY - A method, apparatus, and computer program product are provided for enhancing memory erase functionality. An apparatus may include a block-based mass memory and a controller configured to receive an erase command from a host device comprising an indication of a location of a block in the mass memory storing memory allocation data. The controller may be further configured to access the memory allocation data based at least in part upon the indicated location. The controller may additionally be configured to determine, based at least in part upon the memory allocation data, blocks within the mass memory that have been freed by the host device. The controller may also be configured to erase the freed blocks. Corresponding methods and computer program products are also provided. | 2010-05-27 |
20100131700 | MEMORY INDEXING SYSTEM AND PROCESS - The invention relates to a memory index management system. The said system comprises an indexed storage memory, a memory zone containing the index and a microprocessor. The index is built in the form of a hierarchical tree structure and comprises at least two nodes. A node contains an identifier associated with a pointer that references either a node of the index or a memory zone in the storage memory. The content of a node is distributed over a first and a second memory zone that are separate in the memory zone. The first space has a first specific pointer that points to the second space and the second space has a second specific pointer whose value has a blank state. | 2010-05-27 |
20100131701 | NONVOLATILE MEMORY DEVICE WITH PREPARATION/STRESS SEQUENCE CONTROL - Provided is a nonvolatile memory device which includes a command buffer configured to receive and store a sequence of first and second commands, a memory including an array of nonvolatile memory cells, and an operation controller configured to control the execution of first and second operations in the memory as respectively defined by the first and second commands, wherein each one of the first and second operations comprises a preparation sequence followed by a stress sequence, and execution of the preparation sequence for the second operation is parallel with the stress sequence of the first operation. | 2010-05-27 |
20100131702 | SINGLE SEGMENT DATA OBJECT MANAGEMENT - A single segment data structure and method for storing data objects employing a single segment data object having a header and a data record. The header includes a segment length field describing the length of memory reserved for the data record and the data record contains at least one data instance object. Each of the data instance objects has a data instance header and data field. The header includes a data instance state field and a data instance length field. The data instance length field contains data representing the length of the data instance data field allowing for variable length “in place” updating. The data instance state field contains data representing an object state of the instance data. Only one of the data instance objects of the data record of the single segment data object has a valid object state. The state field facilitates a power loss recovery process. | 2010-05-27 |
20100131703 | REDUCING CONTENT ADDRESSABLE MEMORY (CAM) POWER CONSUMPTION COUNTERS - A method may include counting the number of times each of a plurality of entries in a content addressable memory (CAM) matches one or more searches; grouping entries in the CAM into a first subset and a second subset based on the number of times each of the plurality of entries in the CAM matches one or more searches; and searching the first subset for a matching entry and, if no matching entry is found, searching the second subset for the matching entry. | 2010-05-27 |
20100131704 | Storage control apparatus - In a storage control apparatus provided therein with a battery-backed-up memory device being a combination of a cache memory of a storage device and a system memory on the side of a CPU, an ASIC (Application-Specific Integrated Circuit) having a virtual window function is provided to a system, and I/O from a front end and/or a back end is performed via a virtual window, thereby making an addition of data integrity code, and performing automatic dual write of data. With such a storage control apparatus provided therein with a battery-backed-up memory being a combination of a CS/DS (Code Storage/Data Storage) and a cache, implemented are protection of block data, and dual write into a Cache (user data, control data) so that the reliability can be kept at the time of data input/output control. | 2010-05-27 |
20100131705 | STORAGE SYSTEM, LOAD DISTRIBUTION MANAGEMENT METHOD, AND STORAGE MEDIUM - A host computer includes a virtual disk control part for controlling an input/output request into a virtual disk. A plurality of storage subsystems includes a load monitoring part for measuring a load on a physical disk by the input/output request and storing load information in a disk management table. The virtual disk control part identifies, upon receiving the input/output request into a not-ever-outputted space in a virtual disk, an appropriate logical disk on the virtual disk based on the load information in the disk management table, sends the input/output request to the storage subsystem having the identified logical disk, and updates, upon receiving a completion acknowledgement of the input/output request, the load information in the disk management table based on the load information in the logical disk map information table. | 2010-05-27 |
20100131706 | DATA RELIABILITY BIT STORAGE QUALIFIER AND LOGICAL UNIT METADATA - Apparatus and associated method that stores first metadata only at the same addressable storage location of a computer readable medium as that where associated first user data is stored, and afterward satisfies a read request for the first user data by retrieving the first user data from the addressable location of the computer readable medium where the first metadata is stored if the first metadata has a first value, and by reconstructing the first user data from other metadata stored at another addressable location of the computer readable medium than where the first metadata is stored if the first metadata has a second value. | 2010-05-27 |
20100131707 | SYSTEMS FOR ACCESSING MEMORY CARD AND METHODS FOR ACCESSING MEMORY CARD BY A CONTROL UNIT - A system for accessing a memory card is provided. The system includes a control unit having a control pin and a processor. The processor senses a card-insertion signal from a socket via the control pin for indicating whether the memory card has been inserted into the socket. The processor provides a power control signal via the control pin to supply an operating voltage to the memory card when the sensed card-insertion signal indicates that the memory card has been inserted into the socket. The processor detects whether a write protection function of the memory card is present via the control pin. | 2010-05-27 |
20100131708 | Semiconductor device having resistance based memory array, method of reading and writing, and systems associated therewith - In one embodiment, the semiconductor device includes a non-volatile memory cell array, a write buffer configured to store data being written into the non-volatile memory cell array, and a write address buffer configured to store a write address associated with each data stored in the write buffer. An output circuit is configured to selectively output one of data read from the non-volatile memory array and data from the write buffer. A by-pass control circuit is configured to control the output circuit based on whether an input read address matches a valid write address stored in the write address buffer. An invalidation unit is configured to invalidate an address stored in the write address buffer if the stored write address matches an input write address. | 2010-05-27 |
20100131709 | ELECTRONIC APPARATUS, SERVER, AND METHOD FOR CONTROLLING ELECTRONIC APPARATUS - An electronic apparatus stores therein information that includes a first list, a second list, and a third list. The first list contains a list of memory devices usable with the electronic apparatus, the second list contains a list of memory devices for which it is not certain whether the memory devices are usable with the electronic apparatus, and the third list contains a list of memory devices unusable with the electronic apparatus. A determining unit determines, by using the information, whether a connected memory device is usable or unusable with the electronic apparatus or determines that it is not certain whether the connected memory device is usable with the electronic apparatus. | 2010-05-27 |
20100131710 | METHOD AND APPARATUS FOR SHARING CONTENT BETWEEN PORTALS - A method and apparatus for enabling a first portal to receive and present or otherwise use content from a second portal. The first portal comprises an indication to a location within the second portal. During execution of the first portal, the indication, such as a shortcut is parsed, a connection between the first portal and the second portal is created, and requests and responses related to the content are exchanged between the first and the second portal. The shortcuts enable the loose coupling between the portals and avoid the need for managing multiple versions of the component providing the data or tight coupling In addition, the method and apparatus enable the execution of a non-executable unit of the second portal from an environment of the first portal. The method and apparatus can be used in a transitive manner, such that a first portal will use content from a second portal, which in turn uses content from a third portal. | 2010-05-27 |
20100131711 | SERIAL INTERFACE CACHE CONTROLLER, CONTROL METHOD AND MICRO-CONTROLLER SYSTEM USING THE SAME - A serial interface cache controller, control method and micro-controller system using the same. The controller includes L rows of address tags, wherein each row of address tags includes an M-bits block tag and an N-bits valid area tag. The M-bits block tag records an address block of T-byte data stored in an internal cache memory, and the N-bits valid area tag records valid bit sectors in the address block. Each valid bit sector has the size of T/N bytes. The controller needs to read T/N bytes of data from an external memory to the internal cache memory at each time without the need of reading the T-byte data of the whole address block. Because the T-byte data of the whole address block is not necessary to be read by the micro-controller, the waiting time of the micro-controller may be shortened, and the performance can be increased. | 2010-05-27 |
20100131712 | PSEUDO CACHE MEMORY IN A MULTI-CORE PROCESSOR (MCP) - Specifically, under the present invention, a cache memory unit can be designated as a pseudo cache memory unit for another cache memory unit within a common hierarchal level. For example, in case of cache miss at cache memory unit “X” on cache level L2 of a hierarchy, a request is sent to a cache memory unit on cache level L3 (external), as well as one or more other cache memory units on cache level L2. The L2 level cache memory units return search results as a hit or a miss. They typically do not search L3 nor write back with the L3 result even (e.g., if it the result is a miss). To this extent, only the immediate origin of the request is written back with L3 results, if all L2s miss. As such, the other L2 level cache memory units serve the original L2 cache memory unit as pseudo caches | 2010-05-27 |
20100131713 | MOUNTED CACHE MEMORY IN A MULTI-CORE PROCESSOR (MCP) - Specifically, under the present invention an available on-chip memory is coupled to another logic core or memory (e.g., cache) unit using a set of cache managers. Specifically, each cache manager is coupled to the input and output of a cache memory unit. This allows the assigned memory to become an extension of the same level cache, next level cache memory, or memory buffer. This also allows the recovery of a memory block whose logic core is not operational, and is used to improve cache memory performance of the system. It should be understood in advance the teachings herein are typically applied to a Multi-Core Processor (MCP), although this need not be the case | 2010-05-27 |
20100131714 | TECHNIQUES FOR CACHING IMAGES - Techniques for caching images are presented. A matrix of pixel values represents an image. A diagonal of the matrix is used as an array of numbers representing an index value. The index value is compared to existing index values housed in a cache. When no match is present, the index value is inserted into the cache and the corresponding image associated with the inserted index value acquired. When a match is present no action is taken on the index values of the cache. | 2010-05-27 |
20100131715 | Updating Data within a Business Planning Tool - A apparatus is provided for updating data within a business planning tool. The apparatus comprises a computer memory ( | 2010-05-27 |
20100131716 | CACHE MEMORY SHARING IN A MULTI-CORE PROCESSOR (MCP) - This invention describes an apparatus, computer architecture, memory structure, memory control, and cache memory operation method for multi-core processor. A logic core shares requests when faced with immediate cache memory units having low yield or deadly performance. The core mounts (multiple) cache unit(s) that might already be in use by other logic cores. Selected cache memory units serve multiple logic cores with the same contents. The shared cache memory unit(s) serves all the mounting cores with cache search, hit, miss, and write back functions. The method recovers a logic core whose cache memory block is not operational by sharing cache memory blocks which might already engage other logic cores. The method is used to improve reliability and performance of the remaining system. | 2010-05-27 |
20100131717 | CACHE MEMORY BYPASS IN A MULTI-CORE PROCESSOR (MCP) - This invention describes an apparatus, computer architecture, memory structure, memory control, and cache memory operation method for multi-core processor. A logic core bypasses immediate cache memory units with low yield or deadly performance. The core mounts (multiple) cache unit(s) that might already be in use by other logic cores. Selected cache memory units serve multiple logic cores with the same contents. The shared cache memory unit(s) serves all the mounting cores with cache search, hit, miss, and write back functions. The method recovers a logic core whose cache memory block is not operational by sharing cache memory blocks which might already engage other logic cores. The method is used to improve reliability and performance of the remaining system. | 2010-05-27 |
20100131718 | MULTIPROCESSOR SYSTEM - A multiprocessor system includes cache systems arranged in correspondence with processor cores, and each including a cache memory which stores a cache line, a shared memory shared by the processor cores, and an arbiter configured to arbitrate access requests sent from the cache systems to the shared memory, and configured to send the arbitrated access request to the shared memory and the cache systems. The cache system includes a determination circuit configured to determine an access state using line information and the access request sent from the arbiter, a flag circuit configured to set a flag for each cache line based on a determination result of the determination circuit, and a control circuit configured to confirm the flag when a read access or a write access is made to a cache line held in the cache memory, and configured to detect a violation access based on the flag. | 2010-05-27 |
20100131719 | Early Response Indication for data retrieval in a multi-processor computing system - A data processing system is described that reduces read latency of requested memory data, thereby resulting in improved system performance. An exemplary system includes a bus, a processor, and a controller associated with the processor. The controller is configured to send a request for data to a memory storage unit, receive, from the memory storage unit, an early response indicating that the controller will later receive the requested data, and upon receipt of the early response indicator, start a timer to wait a period of time. The controller is further configured to, after expiration of the timer but prior to receipt of the requested data, send an arbitration request to initiate a transaction on the bus to communicate the requested data from the controller to the processor when the requested data is later received by the controller. | 2010-05-27 |
20100131720 | MANAGEMENT OF OWNERSHIP CONTROL AND DATA MOVEMENT IN SHARED-MEMORY SYSTEMS - A method to exchange data in a shared memory system includes the use of a buffer in communication with a producer processor and a consumer processor. The cache data is temporarily stored in the buffer. The method includes for the consumer and the producer to indicate intent to acquire ownership of the buffer. In response to the indication of intent, the producer, consumer, buffer are prepared for the access. If the consumer intends to acquire the buffer, the producer places the cache data into the buffer. If the producer intends to acquire the buffer, the consumer removes the cache data from the buffer. The access to the buffer, however, is delayed until the producer, consumer, and the buffer are prepared. | 2010-05-27 |
20100131721 | MANAGING MEMORY TO SUPPORT LARGE-SCALE INTERPROCEDURAL STATIC ANALYSIS FOR SECURITY PROBLEMS - Embodiments of the invention describe systems and methods for application level management of virtual address space. A static analysis application can model and analyze a large and complex source code listing to determine whether it has vulnerabilities without exhausting the virtual memory resources provided to it by the operating system. In one embodiment of the invention, the method includes analyzing the source code listing to create a call graph model to represent the expected sequences of routine calls as a result of the inherent control flow of the source code listing. The method also includes monitoring the amount of virtual memory resources consumed by the dynamic state, and swapping out to a storage medium a portion of the dynamic state. The method includes reusing the virtual memory resources corresponding to the swapped out portion of the dynamic state to continue analyzing the source code listing. | 2010-05-27 |
20100131722 | APPARATUS AND METHOD FOR BUFFER MANAGEMENT FOR A MEMORY OPERATING - The invention provides a buffer management apparatus coupled between a memory and a plurality of circuit blocks accessing the memory. In one embodiment, the buffer management apparatus comprises an arbiter, a plurality of buffers, and a multiplexer. The arbiter selects a plurality of owners for the buffers from the circuit blocks, passes a plurality of access request signals generated by the owners to the corresponding buffers, and delivers a plurality of access response signals retrieved from the corresponding buffers to the owners in reply to the access request signals. The multiplexer alternately retrieves the access request signals from the buffers to generate a memory access signal delivered to a memory controller of the memory, receives a memory response signal generated by the memory controller in reply to the memory access signal, and distributes the memory response signal to the buffers as the access response signals. | 2010-05-27 |
20100131723 | ACCESS CONTROL APPARATUS, ACCESS CONTROL METHOD, AND STORAGE APPARATUS - According to one embodiment, an access control apparatus is configured to convert a logical address into position information of a physical sector to control access to a storage medium. The access control apparatus includes an access mode specifying command processing module and an access processing module. The access mode specifying command processing module receives an access mode specifying command specifying an access mode that defines a relationship between the logical address and the physical sector, and stores the access mode in an access mode storage module. The access processing module refers to the access mode storage module to determine an access mode for accessing the storage medium. | 2010-05-27 |
20100131724 | SEMICONDUCTOR DEVICE - The present invention has an object of providing a high-speed, low-cost, and user-friendly information processing system that can ensure scalability of memory capacity. The information processing system is configured to include an information processing device, a volatile memory, and a nonvolatile memory. By serially connecting the information processing device, the volatile memory, and the nonvolatile memory and reducing the number of connection signals, processing speed is increased while maintaining the scalability of memory capacity. When transferring data of the nonvolatile memory to the volatile memory, error correction is performed, thereby improving reliability. The information processing system including the plurality of chips is configured as an information-processing system module in which the chips are alternately stacked and arranged, and wired by a ball grid array (BGA) or by bonding between the chips. | 2010-05-27 |
20100131725 | Memory System And Device With Serialized Data Transfer - A memory system with serialized data transfer. The memory system includes within a memory controller and a plurality of memory devices. The memory controller receives a plurality of write data values from a host and outputs the write data values as respective serial streams of bits. Each of the memory devices receives at least one of the serial streams of bits from the memory controller and converts the serial stream of bits to a set of parallel bits for storage. | 2010-05-27 |
20100131726 | METHODS, APPARATUSES, AND COMPUTER PROGRAM PRODUCTS FOR ENHANCING MEMORY ERASE FUNCTIONALITY - A method, apparatus, and computer program product are provided for enhancing memory erase functionality. An apparatus may include a processor configured to initiate, at a slave device comprising a block-based mass memory, a memory management session with a host device in communication with the slave device such that the host device has ability to read from and write to the mass memory. The processor may be further configured to track changes made by the host device to memory allocation data stored on a memory block within the mass memory. The processor may additionally be configured to determine based at least in part upon the tracked changes whether the host device marked any memory blocks as free. The processor may be further configured to erase one or more memory blocks determined to be marked as free. Corresponding methods and computer program products are also provided. | 2010-05-27 |
20100131727 | STORAGE SYSTEM AND METHOD IMPLEMENTING ONLINE VOLUME AND SNAPSHOT WITH PERFORMANCE/FAILURE INDEPENDENCE AND HIGH CAPACITY EFFICIENCY - A storage system for storage of data written from a computer, and when a write request of data to a first logical volume is received, the data on request is stored into the first logical volume. When a first-generation snapshot creation request is received, the data stored in the first logical volume at the time of receiving the first-generation snapshot creation request is written into a pool region as data corresponding to a first-generation snapshot, and when a second-generation snapshot creation request is received, any portion of the data updated after the first-generation snapshot creation request is received but before the second-generation snapshot creation request is issued is read from the first logical volume for writing into the pool region. Such a storage system favorably implements snapshot backup with no dependency with a positive volume in terms of performance and failure, and with high capacity efficiency. | 2010-05-27 |
20100131728 | COMPUTER-READABLE RECORDING MEDIUM STORING DATA MIGRATION PROGRAM, DATA MIGRATION METHOD, AND DATA MIGRATION APPARATUS - A data migration apparatus migrating data from a first storage to a second storage includes a switching unit for switching a destination of an I/O request issued by a business application from a device node of the first storage to a device node of the second storage; a copying unit for copying data stored in the first storage to the second storage; a transferring unit for transferring the I/O request to the device node of the first storage; an executing unit for executing the read or write process on the first storage; a re-copying unit for re-copying target data of the write process from the first storage to the second storage; and a stopping unit for stopping the transfer of the I/O request to the device node of the first storage. | 2010-05-27 |
20100131729 | INTEGRATED CIRCUIT WITH IMPROVED DEVICE SECURITY - A semiconductor device having circuitry comprising an embedded memory, an embedded processor for executing application codes, and a functional hardware element coupled with the embedded memory via a protected bus, and with the embedded processor via an unprotected bus, the hardware element being arranged to protect the protected bus, and including a locking means comprising at least one lock bit for globally locking at least part of the locking means before executing the application code. | 2010-05-27 |
20100131730 | Software protection method - A software protection method to protect the software in a host against an unauthorized usage of a memory unit used in software is provided. The software protection method comprises the steps of: starting the operation of the software; declaring the memory unit such that the software takes the control right of the memory unit; generating a status tag of the memory unit; setting the status tag as an initializing status to initialize the memory unit; setting the status tag as an access status to access the memory unit; and setting the status tag as a delete status to forgo the control right of the memory unit. | 2010-05-27 |
20100131731 | CONTROL METHOD OF DEVICE IN STORAGE SYSTEM FOR VIRTUALIZATION - In a system where a first storage system and a second storage system are connected to a third storage system, when the first storage system virtualizes and provides a device in the third storage system as a device in its own storage system, update data stored in a cache in the first storage system is written into the device of the third storage system to be reflected, attributes of the device are transferred to the second storage system, and the second storage system virtualizes the device of the third storage system as a device of its own storage system. | 2010-05-27 |
20100131732 | METHOD AND APPARATUS FOR CHECKING THE INTEGRITY OF DATA STORED IN A PREDETERMINED MEMORY AREA OF A MEMORY - A method checks the integrity of data stored in a predetermined memory area of a memory of a first device. The first device is coupled to at least one second device by a network The method involves providing at least one parameter which is suitable for influencing a hash value of at least one predetermined hash function. At least one hash value is calculated on the basis of the data stored in the predetermined memory, the at least one predetermined hash function and the at least one parameter. The second device checks the integrity of the data stored in the predetermined memory area of the first device on the basis of the calculated hash value or values. | 2010-05-27 |
20100131733 | Identification and containment of performance hot-spots in virtual volumes - A method includes provisioning a virtual volume from at least one storage pool of a storage array, designating at least one virtual volume segment of the virtual volume for mapping a virtual volume range to a virtual drive range, organizing the virtual volume range into a plurality of clusters, measuring a data load on each of the plurality of clusters and comparing the data load on each of the plurality of clusters to activity of the virtual volume, and reconfiguring the at least one virtual volume segment to contain a hot-spot. | 2010-05-27 |
20100131734 | System and method for optimal dynamic resource allocation in a storage system - An apparatus and method to allocate memory in a storage system. Firmware running the method uses an iterative approach to find the best optimal memory configuration for a particular storage system given a variety of configuration data parameters stored as persistent data in non-volatile flash memory. The configuration data relates to resources in the environment that the storage system is found in, such as the number of virtual ports, targets and initiators supported by a storage system IOC. The configuration data is alterable, to allow flexibility in updating and changing parameters, and is employed at runtime when the storage system powers on, to enable the most flexible resource allocation. In a preferred method of determining the most optimal memory configuration for a given set of parameters corresponding to a given set of resources, an iterative method is employed to decrement parameter values from their maximum values, taking into account the minimums, and then testing the configuration by performing a memory allocation. If the allocation fails, because for example the wrong type memory or size of memory for any of the resources found, then the firmware resets the memory areas back to predetermined Start of Day (SOD) parameter values, decrements the values until a successful configuration of memory is found for the given set of parameters, and tries again, or until the firmware is caused to fault, whichever comes first. | 2010-05-27 |
20100131735 | SYSTEM AND METHOD FOR MANAGING A MEMORY SYSTEM OF A MOBILE DEVICE - A memory management system and method for a memory system of a mobile device includes initializing memory blocks of the memory system, obtaining a peak utilization rate and an average fragmentation rate of each memory block, adjusting configuration of each memory block P | 2010-05-27 |