24th week of 2014 patent applcation highlights part 72 |
Patent application number | Title | Published |
20140164586 | OPPORTUNISTICALLY DELAYED OFFER AND REQUEST FULFILLMENT - Systems and methods are described for subscriber-driven resource shifting in an attempt to maximize delivery of requested content to subscribers while minimizing the impact of satisfying those requests to network infrastructure resources. For example, when a media plan subscriber requests access to media content under the media plan, a determination is made that the media can be delivered at an earlier timeframe for a particular cost or at a later timeframe for a lower cost. Accordingly, an offer is presented to the requesting subscriber either to receive the media in the earlier timeframe at a higher cost, or to receive the media at a later timeframe in exchange for a discount (e.g., watch now for $4.99 or in 24 hours for free). Embodiments further handle delayed delivery of the content, notification of the delayed delivery to the subscriber, accounting for the delayed delivery, and/or other related functions. | 2014-06-12 |
20140164587 | ADMINISTRATION DEVICE, ADMINISTRATION CONTROL METHOD, AND PROGRAM - An administration device in a system in which a first device group and a second device group are connected to a network. The administration device acquires first communication history of the first device group and second communication history of the second device group, compares first specific information which specifies communication source and communication destination of the first communication history and second specific information which specifies communication source and communication destination of the second communication history while referring to relating information and detects a setting error of the second specific information set in the devices of the second device group based on a result of the comparison. | 2014-06-12 |
20140164588 | SYSTEM AND METHOD FOR EFFICIENTLY REPRESENTING AND MANAGING A COMPUTER FACILITY - A method of representing and managing hierarchical relationship configuration in a computing facility is described. The method includes providing and storing a first index of hardware identifier assigned to each object in the computing facility; providing and storing a second index of ancestry identifiers of each object in the computing facility, the ancestry identifier of an object being the hardware identifier of an ancestor object at 1 to n hierarchy levels above the object; providing and storing a type information element for each ancestor object indicative of a type of ancestor object; and identifying an ancestor object of a particular object in the computing facility by accessing the first index of hardware identifier of the particular object; and identifying an ancestor object thereof of a particular typed by accessing the ancestry identifiers and the type information element of the particular object. | 2014-06-12 |
20140164589 | POLICY APPLICATION SERVER FOR MOBILE DATA NETWORKS - A policy application server and methods for use are described. The policy application server is a logical element of a policy-based control and charging system for a mobile data service network. The policy application server is configured to manage policies including creating, revising, formatting, and provisioning of policies. The policy application server is configured to assemble policy rules from policies and context data. Context data includes subscriber and service information needed to make a particular policy rule. The policy application server gathers context data from one or more network databases. The policy application server is configured to send policy rules to select ones of a plurality of policy decision engines. The policy application server manages the storing of policies, policy rules and formatted context data in select ones of a plurality of policy repositories. | 2014-06-12 |
20140164590 | Determination and Display of LUN Encryption Paths - A management station which manages the encryption devices in a SAN to set up encrypted LUNs. In setting up the encryption, the source and target ports are identified, along with the target LUN. LUN serial numbers used to identify unique LUNs. As paths to a given LUN are defined, the management station compares the path to existing paths and provides an indication if there is a mismatch in the encryption policies or keys being applied to the LUN over the various paths. This allows the administrator to readily identify when there is a problem with the paths to an encrypted LUN and then take steps to cure the problem. By determining the paths and then comparing them, the management station greatly simplifies setting up multipath I/O to an encrypted LUN or access by multiple hosts to an encrypted LUN. | 2014-06-12 |
20140164591 | Synchronization Of A Virtual Machine Across Mobile Devices - A mobile device including a memory including computer-executable instructions for synchronizing a virtual machine and a processor executing the computer-executable instructions, the computer-executable instructions, when executed by the processor, cause the processor to perform operations including executing a virtual machine using a memory; executing a hypervisor providing a synchronization daemon, the synchronization daemon monitoring the memory, the synchronization daemon generating a checkpoint indicating a change in the memory; the hypervisor initiating transmission of the change in the memory over a wireless network for delivery to a standby mobile device to synchronize the virtual machine on the standby mobile device. | 2014-06-12 |
20140164592 | DETERMINING A SYSTEM CONFIGURATION FOR PERFORMING A COLLECTIVE OPERATION ON A PARALLEL COMPUTER - Determining a system configuration for performing a collective operation on a parallel computer that includes a plurality of compute nodes, the compute nodes coupled for data communications over a data communications network, including: selecting a system configuration on the parallel computer for executing the collective operation; executing the collective operation on the selected system configuration on the parallel computer; determining performance metrics associated with executing the collective operation on the selected system configuration on the parallel computer; selecting, using a simulated annealing algorithm, a plurality of test system configurations on the parallel computer for executing the collective operation, wherein the simulated annealing algorithm specifies a similarity threshold between a plurality of system configurations; executing, the collective operation on each of the test system configurations; and determining performance metrics associated with executing the collective operation on each of the test system configurations. | 2014-06-12 |
20140164593 | Analyzing Reading Metrics - Data reports are received from a plurality of clients including action reports and timing reports. Action reports describe actions performed by users of the clients at location within an eBook. Timing reports describe reading speeds of users of the clients. The data reports are analyzed to identify an action that is performed by the users of the clients at a location within the eBook frequently relative to other actions. Action information is generated for automatically performing the identified action at the location within the eBook. The action information is transmitted to a client. The client is configured to automatically perform the action at the location within the eBook. The reading location of a user of the client is determined based on the timing reports. | 2014-06-12 |
20140164594 | INTELLIGENT PLACEMENT OF VIRTUAL SERVERS WITHIN A VIRTUALIZED COMPUTING ENVIRONMENT - A method for recommending placement of virtual servers within a virtualized environment. The method includes collecting information relating to a plurality of virtual servers and to a plurality of host computing systems, wherein one or more of the plurality of host computing systems hosts at least one of the plurality of virtual servers. The method includes measuring efficiency of at least one of the plurality of virtual servers on a current host computing system within the virtualized environment. The method includes determining the efficiency of the at least one virtual server will be improved with the at least one virtual server on a second host computing system and, in response to determining the efficiency will be improved, recommending placement of the at least one virtual server on the second host computing system. | 2014-06-12 |
20140164595 | FIREWALL EVENT REDUCTION FOR RULE USE COUNTING - An illustrative embodiment of a method for firewall rule use counting receives log messages comprising one or more log data sets from each firewall rule in a particular network whose counts are to be tracked in a log collector, generates a network trie for each reference database in a set of databases and a device source trie and a device destination trie for each firewall device in a plurality of devices of the particular network, a source port and protocol list and a destination port and protocol list for each respective device, a unique object for each log data set received; a mapping database comprising an entry for each log data set received associated with the unique object; and feeds each entry in the mapping database through a topology model to also generate a reference to a unique firewall rule on a respective device in the plurality of devices. A count associated with the unique firewall rule is incremented using a count of logs stored associated with the respective unique object and a report is generated. | 2014-06-12 |
20140164596 | SYSTEMS AND METHODS FOR COMMUNICATING ULTRASOUND DATA - Systems and methods for communicating ultrasound data are provided. One method includes monitoring over time estimates of bandwidth of a channel communicatively coupling an imaging location with another location remote from the imaging location and communicating the estimates to a system at the imaging location. The method also includes identifying at least one of a region-of-interest (ROI) mask or one or more transmission parameters for the channel and adjusting at least one of the ROI mask or the one or more transmission parameters based on the monitored estimates of the bandwidth for communicating the medical images. | 2014-06-12 |
20140164597 | METHOD AND APPARATUS FOR DETECTING USER ID CHANGES - In many speech-enabled applications, adaptation of speech recognition and language understanding tools for different users are employed. With such adaptation, identifying the particular user precedes applying the speech recognition and language understanding tools. According to at least one example embodiment, a method and corresponding apparatus of identifying a user includes comparing personal information data received from a user network device against personal information accessible by the server; and identifying a speech profile specific to the user based on the results of comparing the personal information data retrieved from the first user network device against the personal information accessible by the server. The identified speech profile is used in processing a speech of the user. Through use of the method or corresponding apparatus, a user can proceed directly to the use of the speech recognition or other applications and bypassing a login sequence. | 2014-06-12 |
20140164598 | WORKLOAD DEPLOYMENT WITH INFRASTRUCTURE MANAGEMENT AGENT PROVISIONING - A computer-implemented method for managing a workload in connection with a networked computing infrastructure having a plurality of host computer systems includes obtaining first data indicative of an environment type of the networked computing infrastructure, obtaining second data indicative of an operating system type of the workload, deploying, with a processor, an image of the workload in a virtual machine on a target host computer system of the plurality of host computer systems, incorporating a management agent of the networked computing infrastructure into the virtual machine to provision the virtual machine for operation within the networked computing infrastructure, the management agent being configured in accordance with the first data, and modifying launch instructions of the virtual machine in accordance with the second data such that the management agent is invoked during the operation of the virtual machine. | 2014-06-12 |
20140164599 | WORKLOAD DISPATCH DEVICE AND WORKLOAD DISPATCH METHOD THEREOF - A workload dispatch device and a workload dispatch method thereof are provided. The workload dispatch device comprises a monitor, a processor and a dispatcher. The monitor is configured to monitor operating conditions of a plurality of servers. The processor is electrically connected to the monitor and configured to execute the following operations: creating an average performance index table for a plurality of algorithms according to the operating conditions of the servers; normalizing the average performance index table; calculating a benchmark for each of the algorithms according to the normalized performance index table and a corresponding weighting table; and choosing a candidate algorithm from the algorithms according to the benchmarks. The dispatcher is electrically connected to the processor and configured to dispatch a workload to the plurality of servers according to the candidate algorithm. | 2014-06-12 |
20140164600 | DETERMINING A SYSTEM CONFIGURATION FOR PERFORMING A COLLECTIVE OPERATION ON A PARALLEL COMPUTER - Determining a system configuration for performing a collective operation on a parallel computer that includes a plurality of compute nodes, the compute nodes coupled for data communications over a data communications network, including: selecting a system configuration on the parallel computer for executing the collective operation; executing the collective operation on the selected system configuration on the parallel computer; determining performance metrics associated with executing the collective operation on the selected system configuration on the parallel computer; selecting, using a simulated annealing algorithm, a plurality of test system configurations on the parallel computer for executing the collective operation, wherein the simulated annealing algorithm specifies a similarity threshold between a plurality of system configurations; executing, the collective operation on each of the test system configurations; and determining performance metrics associated with executing the collective operation on each of the test system configurations. | 2014-06-12 |
20140164601 | MANAGEMENT OF STREAM OPERATORS WITH DYNAMIC CONNECTIONS - One embodiment is directed to a method for processing a stream of tuples in a stream-based application. A stream operator may receive a stream of tuples. A stream manager may determine whether a dynamic connection exists at a first stream operator. The dynamic connection may connect the first stream operator to a second stream operator. The stream manager may poll the first stream operator and the second stream operator for a presence of the dynamic connection. The stream manager may modify processing of one or more upstream stream operators in response to a change in use of the dynamic connection. | 2014-06-12 |
20140164602 | OAM NAME STATE EVENT TRIGGER - The disclosed embodiments include a method, apparatus, and computer program product for improving network monitoring. For example, in one embodiment, current inaccuracies due to the imperfect counter frame injection error between ingress counters and egress counters is eliminated, by monitoring, using an ingress counter, for a time period that is slightly greater than the time it takes for a packet/frame to pass from one end to the other, for “no packets/frames”. In one embodiment, once this no packet time occurs, a signaling event is triggered. A notification is sent from the start of the path counter to the end of the path counter to start counting. A “stop counting/restart counting” signal is then sent from the start of the path counter to the end of the path counter the next time that no packets/frames are observed for the same period. | 2014-06-12 |
20140164603 | COMPUTER SYSTEM AND METHOD FOR MAINTENANCE MANAGEMENT INCLUDING COLLABORATION ACROSS CLIENTS - A computer system is provided that is connected to the Internet and enables a plurality of network connected devices to access a novel and innovative resource management platform. The computer system includes an Internet enabled computer platform that implements a multi-tenant architecture that enables multiple platform clients to populate the platform with various information regarding their resource management requirements. The computer system includes one or more tools that (i) track activities of users in connection with the management of resources, (ii) extracts insights from such activities, and/or (iii) enables users to upload information or documents related to resource management to the computer system, such tools enabling the automated suggestion of maintenance actions and/or product or service requirements of platform clients. A range of different intelligent features are provided. The computer system may include a CMMS with intelligent features. A number of related computer implemented methods for managing resources in an intelligent way, and based on collective information and knowledge is also provided. | 2014-06-12 |
20140164604 | NETWORK DEVICE AND NETWORK DEVICE RECOGNITION METHOD - A network device and network device recognition method are provided. The method includes: receiving a Continuity Check Message (CCM) by a local Maintenance Association End Point (MEP); determining whether the CCM is transmitted from an unknown remote MEP; setting the unknown remote MEP to a dynamic MEP if the CCM is transmitted from the unknown remote MEP; and recording the dynamic MEP and the receiving count of the CCM corresponding to the dynamic MEP in a storage unit. | 2014-06-12 |
20140164605 | METHOD AND SYSTEM FOR VISUALIZING AN ADAPTIVE SCREEN ACCORDING TO A TERMINAL - The present invention relates to a user terminal, cloud device and virtualization method in which a user terminal transmits a system profile to a cloud apparatus for generating a list of candidate screen visualization techniques from system profile information transmitted from the terminal, checks an apparatus loading amount and processing possibility for each technique, and determines an optimal screen visualization technique candidate on the basis of an available resource of an apparatus and a system profile of a terminal according to web service possibility and video streaming processing possibility. The system profile information includes web browser performance, video streaming replay function, RDP and VNC client driving possibility, network status, resolution and requesting service. The cloud apparatus receives the system profile information from the user terminal, generates a list of candidate screen visualization techniques, checks an apparatus loading amount and processing possibility to determine a screen visualization technique. | 2014-06-12 |
20140164606 | TECHNIQUES FOR AUDITING AND CONTROLLING NETWORK SERVICES - Techniques for auditing and controlling network services are provided. A proxy is interposed between a principal and a network service. Interactions between the principal and the service pass through the proxy. The proxy selectively raises events and evaluates policy based on the interactions for purposes of auditing and controlling the network service. | 2014-06-12 |
20140164607 | DEPENDENCY MAPPING AMONG A SYSTEM OF SERVERS, ANALYTICS AND VISUALIZATION THEREOF - Analytics and visualization for logical dependency mapping of computer servers may be provided. Data collected from computer servers is received and analyzed to discover logical dependencies among the computer servers, for example, to discover communications between one or more of operating systems, middleware and applications associated with the computer servers. The computer servers may be grouped into one or more dependency groups based at least on a user-defined grouping criterion. The one or more dependency groups and their logical dependencies may be output. | 2014-06-12 |
20140164608 | CONTENT TRANSMISSION SYSTEM - In order to easily prevent traffic of a content data server, which provides an arbitrary content, from being overloaded, the content transmission system according to an exemplary embodiment includes a content data server which provides an arbitrary content to a plurality of terminals when a request signal for the arbitrary content is input from the plurality of terminals, a data control server which when the arbitrary content is provided, monitors whether the traffic of the content data server is overloaded and if the traffic is overloaded as a result of monitoring, generates a traffic distribution request signal, and a node control server which when the traffic distribution request signal is input from the data control server, controls to provide the arbitrary content to an arbitrary distribution node, which satisfies a setting standard among a plurality of distribution nodes, to be provided to an arbitrary terminal among the plurality of terminals. | 2014-06-12 |
20140164609 | Apparatus, System, and Method for Enhanced Monitoring and Searching of Devices Distributed Over a Network - A system for network monitoring and network traffic analysis includes a plurality of network devices and a management station. Each of the plurality of network devices is associated with corresponding ones of a plurality of ports. Each of the plurality of network devices is configured to determine network traffic analysis data associated with a characteristic of network data traversing each of the plurality of ports. The management station is configured to determine a ranking of the plurality of ports based on the network traffic analysis data in response to a search request implicating the characteristic, and is configured to display the plurality of ports based on the ranking. | 2014-06-12 |
20140164610 | SELF-FORMING NETWORK - A connected computer may be operated as node by inspecting communications from other nodes that pass through that node. From the communications, two or more pointers may be determined for the given node. These pointers may include a first pointer identified by a default designation that links the given node to a first node in the network, and a second pointer to another node. The second pointer may be identified by a determination that a designated criteria has been satisfied after the given node is placed on the network. | 2014-06-12 |
20140164611 | TRACKING USER PHYSICAL ACTIVITY WITH MULTIPLE DEVICES - Methods, devices, and computer programs are presented for creating a unified data stream from multiple data streams acquired from multiple devices. One method includes an operation for receiving activity data streams from the devices, each activity data stream being associated with physical activity data of a user. Further, the method includes an operation for assembling the unified activity data stream for a period of time. The unified activity data stream includes data segments from the data streams of at least two devices, and the data segments are organized time-wise over the period of time. | 2014-06-12 |
20140164612 | System and Method for Determining and Visualizing Efficiencies and Risks in Computing Environments - A system and method are provided for determining and visualizing efficiencies and risks in computing environments. The method comprises obtaining resource utilization data and resource capacity data for a plurality of entities in a computing environment; obtaining at least one operational policy defining at appropriate level of at least one resource used by the computing environment according to at least one factor; and computing at least one score quantifying efficiencies and risks associated with the computing environment based on the resource utilization data, resource capacity data, and at least one operational policy. | 2014-06-12 |
20140164613 | TRACKING WEB SERVER - A web server is disclosed that is configured to track requests for web pages on a third party web server. The tracking web server traps a web page request, such as a PURL (Personalised URL) for a personalised web page, before it attempts to serve the web page requested. The URL of the web page request is analysed to determine the location of the requested page on a third party server, and details of the contact with which the personalised web page is associated. Receipt of the web page request is then recorded in a memory associated with the server, and the web page request is forwarded to the third party server for processing. The redirection to the third party web server may be seamless, such that the contact requesting the page does not know of the redirection. In this way, a tracking web server is provided which can supply a personalised tracking and forwarding function. | 2014-06-12 |
20140164614 | Method and Apparatus for Submitting Data - Various examples provide a method and an apparatus for submitting data. The method includes: a user terminal sends a webpage visiting request to a server, scans received webpage information returned by the server in response to the webpage visiting request, adds a mark pointing to a statistic server into the webpage information; parses the webpage information, and sends user visiting data to the statistic server by using the mark. | 2014-06-12 |
20140164615 | SYSTEMS AND METHODS FOR ENTERPRISE CLOUD MULTI-SITE APPLICATION TARGETING - The systems and methods of the present disclosure provide the capacity to create via a web browser a cluster of integrated web sites, mobile sites, and applications by an organization in its own private cloud where applications, web sites, mobile sites and users can be matched through a consumer targeting engine based on dynamic filters with relevant content and applications in real time across the cluster of web sites and mobile sites. In an embodiment, the systems and methods of the present disclosure provide the capacity to define via a web browser the unique data conditions that will match applications with target users via a web site or mobile site. User data collected from online data forms is matched with user data collected from interactions within the web site to produce dynamic targets. Dynamic targets form the foundation of the targeting engine for matching relevant content and applications to specific audiences within a web site or cluster of web sites. | 2014-06-12 |
20140164616 | SELECTIVE ACCESS CONTROL TO MOBILE IP NETWORK - Systems and methods are described for managing access of a computing device to services over a mobile network where requests for managed or unmanaged services are translated to corresponding IP addresses sent to the computing device and corresponding requests sent to the translated IP addresses are permitted if the computing device has a valid data plan for using the mobile network, are denied if the computing device does not have a valid data plan and the request corresponds to the first address, and are permitted even if the computing device does not have a valid data plan if the request corresponds to the second address. | 2014-06-12 |
20140164617 | FORWARDING POLICIES ON A VIRTUAL SERVICE NETWORK - In providing packet forwarding policies in a virtual service network that includes a network node and a pool of service load balancers serving a virtual service, the network node: receives a virtual service session request from a client device, the request including a virtual service network address for the virtual service; compares the virtual service network address in the request with the virtual service network address in each of a plurality of packet forwarding policies; in response to finding a match between the virtual service network address in the request and a given virtual service network address in a given packet forwarding policy, determines the given destination in the given packet forwarding policy; and sends the request to a service load balancer in the pool of service load balancers associated with the given destination, where the service load balancer establishes a virtual service session with the client device. | 2014-06-12 |
20140164618 | Method And Apparatus For Providing A Unified Resource View Of Multiple Virtual Machines - Various embodiments provide a method and apparatus for dynamically allocating resources to processes by using unified resources. In particular, a superVM allows a process from an application to utilize resources (e.g., CPU, memory, and storage) from other VMs. Advantageously, sharing resources of of VMs that are operating below capacity increases cost efficiencies and providing resources without the overhead of spawning new VMs to VMs requiring additional resources increases application performance. Moreover, legacy applications may run utilize resources from multiple VMs without modification. | 2014-06-12 |
20140164619 | HYBRID FIREWALL FOR DATA CENTER SECURITY - A system and method for managing a hybrid firewall solution, employing both hardware and software firewall components, for a cloud computing data center is provided. A virtual application is hosted by a first plurality of application virtual machines and a second plurality of firewall virtual machines provides firewalling services for traffic associated with the virtual application. A cloud management entity determines that the virtual application requires an increased number of application virtual machines. A security profile for the virtual application is verified to determine if an increased number of firewall virtual machines is required by the increased number of application virtual machines. The cloud management entity can instantiate additional application virtual machines and firewall virtual machines as required. | 2014-06-12 |
20140164620 | CLOUD-SHARED RESOURCE PROVIDING SYSTEM - Readiness, cost performance, etc. related to usage of public clouds by users are achieved. In this system, a plurality of user terminals | 2014-06-12 |
20140164621 | NETWORK SYSTEM AND METHOD FOR OPERATING THE SAME - In a network system, a storage configuration information of a storage resource as a data storage destination and a VM resource information related to a VM as storage resource allocation destination are gathered so as to provide storage resources matching the VM characteristics to the VM. Then, based on the gathered storage configuration information, storage areas corresponding to storage tiers having different characteristics are formed, and the storage tier of the storage area allocated to the VM via the VM resource information is specified. | 2014-06-12 |
20140164622 | INTELLIGENT LARGE NETWORK CONFIGURATION MANAGEMENT SERVICE - A method and system of automating service updates to network elements is disclosed. The system determines the right network element for service updates without impacting network operations. Maintenance Regions (MR)that have similar maintenance behavior/constraints are defined. Each MR is associated with a Maintenance Policy (MP). A Maintenance Policy captures information on the best time to perform service impacting actions. MP is a set of time related rules with an expiry. Before an update, software compatibility for the network element is confirmed. The NE (Network Element) provides its geographical location and NE neighbor information is then captured. Once obtained, this information is used in an algorithm that at any given time can select the preferred candidate network element to receive the service impacting action (like a software upgrade). Then based on capacity of running parallel activities the algorithm performs an optimized and maximum number of actions simultaneously. | 2014-06-12 |
20140164623 | METHOD AND A SYSTEM FOR MANAGING RESOURCE ALLOCATION IN SCALABLE DEPLOYMENTS - A method and a system for managing resource allocation in scalable deployments | 2014-06-12 |
20140164624 | Systems and Methods for Managing a Virtual Infrastructure - This disclosure includes example methods and systems comprising at least one computer server including at least a cloud computing manager configured to determine a location for instantiating at least one virtual machine in at least one cloud network using a weighted rating engine, interface with at least one user via a management console, and communicate with the at least one cloud network. | 2014-06-12 |
20140164625 | System and method for sharing multiple network resources on stand-alone machine - The disclosure discloses a system and method for sharing multiple network resources on a stand-alone machine. The system includes: a task managing subsystem configured to receive a downloading task, acquire a task parameter, divide the downloading task into M downloading subtasks and allocate the M downloading subtasks respectively to respective network equipments, merge downloaded messages after the respective downloading subtasks are completed, and report the merged message; an equipment managing subsystem configured to maintain an equipment status of each network equipment and provide an equipment parameter; a protocol managing subsystem configured to encapsulate a downloading request and send the downloading request to a route managing subsystem, receive and parse a message sent by the route managing subsystem, and store the parsed message in a corresponding memory space; and the route managing subsystem configured to maintain a route table, forward the downloading request to a network side via a corresponding network equipment, and send a message returned by the network side to the protocol managing subsystem. By integrating multiple network equipments on the stand-alone machine, the disclosure achieves sharing of multiple network resources, maximizing utilization of network resources of the stand-alone machine, which meets the demand of a high-speed network application. | 2014-06-12 |
20140164626 | CONNECTION MODEL-BASED CONTROL OF CONCURRENT CONNECTION COUNT AND PROPERTIES - A connection request including a connection model key and a partner system attribute of the partner system requesting a connection is received at an application server from a partner system. Using a predefined connection model, as determination is made as to whether the received connection model key and the received partner system attribute respectively match a configured connection model key and a configured authorized partner system attribute within the predefined connection model. In response to determining that the received connection model key and the received partner system attribute match the respective configured connection model key and the configured authorized partner system attribute within the predefined connection model, a connection is created that includes a first unique connection name derived from the received partner system attribute. | 2014-06-12 |
20140164627 | PEER-TO-PEER PERFORMANCE - Embodiments disclosed herein generally relate to improving distribution of digital content in a peer-to-peer network. For example, future snapshots of a peer-to-peer network are predicted and used to determine that a computing device may be better off waiting until a future point in time to download specific digital content. For another example, computing devices are mapped into different groups based on location information, and inter-group information is used to identify other computing devices for a computing device to send download requests for digital content. For a further example, information indicative of scarcity associated with different digital content units is used to prioritize distribution of the digital content units. For still another example, computing devices are grouped into clusters and different computing devices within the same cluster download different digital content units so that the computing devices within the same cluster collectively obtain all of the different digital content units. | 2014-06-12 |
20140164628 | MANAGEMENT OF STREAM OPERATORS WITH DYNAMIC CONNECTIONS - One embodiment is directed to a method for processing a stream of tuples in a stream-based application. A stream operator may receive a stream of tuples. A stream manager may determine whether a dynamic connection exists at a first stream operator. The dynamic connection may connect the first stream operator to a second stream operator. The stream manager may poll the first stream operator and the second stream operator for a presence of the dynamic connection. The stream manager may modify processing of one or more upstream stream operators in response to a change in use of the dynamic connection. | 2014-06-12 |
20140164629 | SYSTEM AND ASSOCIATED METHODOLOGY FOR PROXIMITY DETECTION AND DEVICE ASSOCIATION USING ULTRASOUND - In one embodiment, a method includes receiving ultrasound frequency sweeps in a sound receiving device. Each of the plurality of ultrasound frequency sweeps is centered on one of at least two predetermined frequencies. The method also includes converting the ultrasound frequency sweeps into an ultrasound message based on a central frequency of each of the ultrasound frequency sweeps received, and placing the ultrasound message into a receive buffer. Then at least a network address is extracted from the ultrasound message, and the network address is used to establish a communication session over a data network with a telecommunications device. | 2014-06-12 |
20140164630 | METHOD AND APPARATUS FOR LOADING A LANDING PAGE - A Universal Serial Bus (USB) modem/Wireless Wide Area Network (WWAN) device is provided that when connected to a host device, presents itself as an Ethernet endpoint to the host device, without requiring additional software/drivers to be downloaded to the host device. Embedded in the USB modem/WWAN device are various modules that provide functionality allowing either automatic connection to the Internet or redirection to a local Web User Interface (UI) that a user may employ to configure the USB modem/WWAN device and/or manually connect to the Internet. Additionally, the USB modem/WWAN device employs predetermined rules to determine whether or not/how the redirection occurs, including in scenarios where wireless connectivity to the Internet is unavailable. | 2014-06-12 |
20140164631 | CONNECTION MODEL-BASED CONTROL OF CONCURRENT CONNECTION COUNT AND PROPERTIES - A connection request including a connection model key and a partner system attribute of the partner system requesting a connection is received at an application server from a partner system. Using a predefined connection model, as determination is made as to whether the received connection model key and the received partner system attribute respectively match a configured connection model key and a configured authorized partner system attribute within the predefined connection model. In response to determining that the received connection model key and the received partner system attribute match the respective configured connection model key and the configured authorized partner system attribute within the predefined connection model, a connection is created that includes a first unique connection name derived from the received partner system attribute. | 2014-06-12 |
20140164632 | APPLICATION EXECUTION METHOD AND APPARATUS - A method and an apparatus for executing an application are provided. The application execution method of the present disclosure includes connecting a first external device, receiving, from the first external device, connection information for use in connecting to a second external device, connecting to the second external device using the connection information, and transmitting, when a transfer command is received, application execution state information to the second external device. The application execution method of the present disclosure is capable of allowing the user to execute the application conveniently. | 2014-06-12 |
20140164633 | Method, Device and System For Session Binding - Disclosed are a method, device and system for session binding. The method includes: a PCRF or BPCF receives a first session from a fixed network, wherein the first session carries an IP address and a port number set; the PCRF or BPCF receives a second session from an AF or a Traffic Detection Function (TDF), wherein the second session carries an IP address and port number information; and the PCRF or BPCF binds the first session to the second session according to the IP addresses and the port number information. The disclosure solves the problem of inaccurate session binding in the scenario where a mobile terminal directly accesses mobile network services via a fixed network. | 2014-06-12 |
20140164634 | APPARATUS AND METHOD FOR DETERMINING BUFFER SIZE OF NETWORK RECEPTION BUFFER, AND NETWORK SESSION SYSTEM - In this system for determining buffer size, the number of times a network reception buffer in which data is accumulated becomes full or empty (the number of occurrence of full or emptiness) in a certain period of time Tr is counted by a full/empty counter CT in response to start of communication with a different session terminal TM to adjust buffer size in accordance with the counted number of occurrence of full or emptiness (S | 2014-06-12 |
20140164635 | APPARATUS AND METHOD FOR SHARING STREAMING MEDIA - A method for sharing streaming media between a plurality of media providing devices and a media requesting device includes the media requesting device sending a request message to each of the media providing devices. Each of the media providing devices generates and displays a verification image. The media requesting device captures the verification image of one of the media providing devices and extracts a verification code from the captured verification image. The verification code is sent to each of the media providing devices for verification. When the verification code passes a verification of a corresponding media providing device, a media sharing connection between the media requesting device and the corresponding media providing device is established. | 2014-06-12 |
20140164636 | AUTOMATIC PANNING AND ZOOMING SYSTEMS AND METHODS - Methods and system for managing media clips over a data network. Media streams may be received over a data network and stored by a storage server. Metadata regarding the media streams may be generated and stored at a metadata server. A control station can retrieve media frames originating in the stored media streams from the storage server, based on metadata. Media frames from multiple media streams can be retrieved and displayed in synchronization, based on respective timecodes. | 2014-06-12 |
20140164637 | APPARATUS, SYSTEM, AND METHOD FOR RECEIVING MULTIMEDIA CONTENT OVER A MULTICAST ENABLED NETWORK - An apparatus for receiving multimedia content over a multicast enabled network includes a communications module, a stream assembly module, and a display module. The communications module receives and stores a plurality of multicast data packets pertaining to one or more video streams on a client device. The stream assembly module assembles at least a portion of the data packets pertaining to a video stream into a video stream. The display module displays an assembled video stream. | 2014-06-12 |
20140164638 | SOFTWARE STREAMING SYSTEM AND METHOD - A method for streaming software may include downloading blocks associated with a software title until an executable threshold is reached, initiating execution of the software title, and continuing to download blocks of the software title while the software title is executed. Another method for streaming software may include sending to a client data sufficient for the client to build a virtual directory structure for use in executing a software title, streaming a subset of blocks associated with the software title to the client, and streaming additional blocks associated with the software title to the client on demand. A system for streaming software may include a server computer and a client computer. The server computer may include a program database and a streaming engine. In operation the streaming engine may stream an executable streaming application from the program database to the client. | 2014-06-12 |
20140164639 | Method and System for Transparent Network Acceleration - A method includes duplicating, by an acceleration engine that is associated with a software application executing in a computing environment, a state of a kernel stack of an operating system of the computing environment to generate a duplicate network stack; receiving, by the acceleration engine, a request by the software application to send traffic over a network interface; and sending, by the acceleration engine, the request to a network driver relating to the network interface. | 2014-06-12 |
20140164640 | SMALL PACKET PRIORITY CONGESTION CONTROL FOR DATA CENTER TRAFFIC - Network congestion management techniques are applied in a communication network. Network characteristics and target thresholds can be determined. A transmission mode can be determined. Further, a sending rate can be determined based on the transmission mode and network characteristics. In one aspect, network characteristics at a recent time can be determined to alter sending rates in a network to manage network congestion. | 2014-06-12 |
20140164641 | CONGESTION CONTROL FOR DATA CENTER TRAFFIC - Network congestion management techniques are applied in a communication network. Network characteristics and target thresholds can be determined. A transmission mode can be determined. Further, a sending rate can be determined based on the transmission mode and network characteristics. In one aspect, network characteristics at a recent time can be determined to alter sending rates in a network to manage network congestion. | 2014-06-12 |
20140164642 | ALIASING OF NAMED DATA OBJECTS AND NAMED GRAPHS FOR NAMED DATA NETWORKS - Systems, methods and computer program products for aliasing of named data objects (in named data networks) and entities for named data networks (e.g., named graphs for named data networks). In various examples, aliasing of named data objects may be implemented in one or more named data networks in the form of systems, methods and/or algorithms. In other examples, named graphs may be implemented in one or more named data networks in the form of systems, methods and/or algorithms. | 2014-06-12 |
20140164643 | ALIASING OF NAMED DATA OBJECTS AND NAMED GRAPHS FOR NAMED DATA NETWORKS - Systems, methods and computer program products for aliasing of named data objects (in named data networks) and entities for named data networks (e.g., named graphs for named data networks). In various examples, aliasing of named data objects may be implemented in one or more named data networks in the form of systems, methods and/or algorithms. In other examples, named graphs may be implemented in one or more named data networks in the form of systems, methods and/or algorithms. | 2014-06-12 |
20140164644 | ENERGY MANAGEMENT SYSTEM FOR A DATA CENTER NETWORK - An energy management system for a data center network may include a central computer to establish an energy use policy for the computer data center network. The system may also include computer nodes in the computer data center network to receive a packet which is a query that obtains energy information from the nodes and/or a transmission reservation that provides instructions for the energy use policy to be implemented at the computer nodes. The computer nodes may reallocate data traffic on the computer data center network based on the energy use policy to improve energy consumption of the computer data center network. | 2014-06-12 |
20140164645 | ROUTING TABLE MAINTENANCE - Among other things, one or more techniques and/or systems are provided for maintain a routing table. The routing table may comprise a routing statement associated with a destination. The routing statement may comprise a domain identifier, such as a URL, for the destination and a gateway identifier, such as an IP address, for a gateway through which communication traffic to the destination may be routed. During routing of a request, an IP address for the destination may be dynamically resolved based upon the domain identifier within the routing statement. The IP address may be cached for a restricted period of time so that subsequent requests may utilize the cached IP address. Because the routing statement is based upon a domain identifier (e.g., as opposed to a hardcoded static IP address), the routing statement may remain valid even though an IP address of the destination may change. | 2014-06-12 |
20140164646 | Synchronization of clients to maximize multicast opportunities - A content monitor includes a processor that at least receives requests from a plurality of clients for content, instructs each client to retry their respective request at a first later time if the request is received before a first time, counts the requests to determine if a number of the requests exceeds a threshold if the request is received before a second time, instructs each client to retry their respective request at a second later time if the counted number of requests does not exceed a first threshold, instructs each client to join a multicast group to receive the content when the number of requests exceeds the first threshold, and counts a number of late clients joining the multicast group after a first portion of the content has been sent to the multicast group. | 2014-06-12 |
20140164647 | Management Data Input/Output (MDIO) Protocol Including Checksum Mode - A process to manage data between one or more MDIO manageable devices situated on the same bus utilizing the MDIO protocol. The data management efficiency can be increased through the use of an MDIO protocol that includes a checksum mode. The MDIO protocol including the checksum mode can provide write confirmations while reducing the overhead for confirmed write operations by omitting read-back and compare sequences following write transactions. | 2014-06-12 |
20140164648 | SYSTEMS AND METHODS FOR IMPROVING PERFORMANCE OF REMOTE USB STORAGE - Methods and systems described herein facilitate improving universal serial bus (USB) storage performance in remote computing environments. A virtual USB host is associated with a virtual machine running a guest operating system (OS) and is configured to communicate with a USB storage device that is connected to a remote terminal. The virtual USB host is further configured to transmit one of a data-in request to the USB storage device before the guest OS transmits the data-in request or an acknowledgement of a data-out request to the guest OS before the USB storage device transmits the acknowledgement. | 2014-06-12 |
20140164649 | ELECTRONIC EQUIPMENT, CONTROL METHOD OF ELECTRONIC EQUIPMENT, AND CONTROL PROGRAM OF ELECTRONIC EQUIPMENT - According to one embodiment, an electronic equipment, includes: a connection detecting module, a referring module, and an output module. The connection detecting module configured to detect connection of an external storage device. The referring module configured to refer to a predetermined type of media file from the external storage device when the connection is detected. The output module configured to output the predetermined type of media file preferentially to other types based on the reference. The electronic equipment can improve a convenience of a user by reducing the complexity when the user looks for a desired data (media file, application software) when the external storage device (USB memory) is connected to the electronic equipment. | 2014-06-12 |
20140164650 | System, method and computer program product for monitoring and alerting the health of sub-system connectors - An information handling system that monitors and tracks the connectivity status of physical sub-system connectors in the field while the system is in a user-operational mode and provides alerts when connectivity problems are detected. | 2014-06-12 |
20140164651 | NETWORKING CLOUD AND METHOD OF USING THE SAME - A cloud computing network device is disclosed. The device is configured to generate output data based on input data, wherein the output data is indicative of the input data, cause data indicative of the input data to be stored in a memory, and respond to instructions to access the input data by accessing the data stored in the memory. | 2014-06-12 |
20140164652 | HARMONIC DECIMATION OF REAL TIME DATA FOR UNIQUE WORD (OR SYNC CELL) ACQUISITION IN A LIMITED PROCESSING ENVIRONMENT - A non-transitory computer-readable medium, method, and system for processing a first data stream being in a first format from a link, the first data stream having a plurality of frames, each frame having a fixed frame length; selecting a plurality of sections of the first data stream based on a harmonic pattern of the first format, each selected section being separated from a neighboring selected section by a fixed separation length that is a whole number multiple of the fixed frame length; and creating a second data stream in a second format that includes a contiguous sequence of the selected sections. The second data stream can be further processed to acquire frame alignment with a reduction of required processing power. | 2014-06-12 |
20140164653 | Load Balancing with SCSI I/O Referrals - A method and/or system may be configured to receive an input/output (I/O) request from an initiator system, add priority information to a multiple path referral for each port on which data can be accessed, selectively omit ports on which data may be accessed, transmit the multiple path referral from the target to the initiator, and/or choose a path on the initiator with the highest performance. | 2014-06-12 |
20140164654 | ASYMMETRICAL PROCESSING MULTI-CORE SYSTEM AND NETWORK DEVICE - An asymmetrical processing multi-core system used in a network device is provided. A sub processing core within the asymmetrical processing multi-core system facilitates a main processing core of the asymmetrical processing multi-core system in processing tasks, thereby improving an overall performance of the entire network device and causing the network device to operate more facilely. Different from a conventional processing method, the asymmetrical processing multi-core system does not require moving or copying a large amount of processed packet data, and thus a large amount of memory bandwidth is saved and the power consumption is reduced. | 2014-06-12 |
20140164655 | FOLDED FIFO MEMORY GENERATOR - Synthesizable code representing first-in-first out (FIFO) memories may be used to produce FIFO memories in a hardware element or system. To more efficiently use a memory element that stores the data in a FIFO, a code generator may generate a wrapper that enables the FIFO to use a memory element with different dimension (i.e., depth and width) than the FIFO's dimensions. For example, the wrapper enables a 128 deep, 1 bit wide FIFO to store data in a memory element with 16 rows that store 8 bits each. To any system communicating with the FIFO, the FIFO behaves like a 128×1 FIFO even though the FIFO is implemented using a 16×8 memory element. To do so, the code generator may generate a wrapper which enables the folded memory element to behave like a memory element that was not folded. | 2014-06-12 |
20140164656 | APPARATUS AND METHOD FOR TRANSMITTING AND RECEIVING DATA IN A DATA COMMUNICATION SYSTEM - An apparatus and method are provided for transmitting and receiving data in a data communication system. The method includes receiving certain multimedia data from a portable terminal using a first data communication scheme; transmitting the certain multimedia data to an external device; receiving control data corresponding to the certain multimedia data from the external device based on the first data communication scheme; converting the control data into a data format of a second data communication scheme; generating data including the converted control data; and transmitting the data to the portable terminal. | 2014-06-12 |
20140164657 | MAPPING VIRTUAL DEVICES TO COMPUTING NODES - A method for providing virtualization of information handling resources includes accessing a information handling system and a information handling resource, accessing a first virtual function configured to cause virtualized access to the information handling resource through the interface, accessing a second virtual function configured to cause virtualized access to the information handling resource through the interface, and selectively mapping the first virtual function and the second virtual function to information handling systems of the system. The selective mapping includes preventing the first virtual function and the second virtual function from both being mapped to the same information handling system. | 2014-06-12 |
20140164658 | Wireless Protocol Communication Bridge And System Comprising Bridge - A bridge for linking a first and a second wireless communication device and translating between differing wireless protocols is described and taught. The bridge system comprises at least one wireless device and a bridge apparatus. The bridge apparatus takes the form of a universal serial bus that contains components that allows it to function without a host system. Additionally, the bridge apparatus enables the translation between different wireless protocols. This, in turn, enables older or outdated wireless technology to function seamlessly with the most current wireless protocols. | 2014-06-12 |
20140164659 | REGULATING ACCESS TO SLAVE DEVICES - A method includes receiving a request from a master device to access a slave device of a plurality of slave devices that are associated with a slave port of bus switching fabric. The slave port is shared in common among the slave devices. The method includes, in response to the request, multiplexing use of the slave port among the slave devices. | 2014-06-12 |
20140164660 | DEVICE PRESENCE DETECTION USING A SINGLE CHANNEL OF A BUS - The presence of devices attached to a bus are detected by a controller of a bus transmitting a signal on a channel of the bus, to cause each device to hold the channel to a first logical state for a duration of time that is unique to each device. The device that holds the channel to the first logical state for the longest duration of time is detected. Detected devices remain idle while undetected devices repeat holding the channel to the first logical state for the duration of time, until detected. All devices are detected when the channel returns to a second logical state. | 2014-06-12 |
20140164661 | Methods and Systems for Time Keeping in a Data Processing System - Data processing systems with interrupts and methods for operating such data processing systems and machine readable media for causing such methods and containing executable program instructions. In one embodiment, an exemplary data processing system includes a processing system, an interrupt controller coupled to the processing system and a timer circuit which is coupled to the interrupt controller. The interrupt controller is configured to provide a first interrupt signal and a second interrupt signal to the processing system. The processing system is configured to maintain a data structure (such as, e.g., a list) of time-related events for a plurality of processes, and the processing system is configured to calise the entry of a value, representing a period of time, into the timer circuit. The timer circuit is configured to cause an assertion of the first interrupt signal in response to an expiration of the time period. | 2014-06-12 |
20140164662 | METHODS AND APPARATUS FOR INTERLEAVING PRIORITIES OF A PLURALITY OF VIRTUAL PROCESSORS - Methods and apparatus for interleaving priorities of a plurality of virtual processors are disclosed. A hypervisor assigns a base priority to each virtual processor and schedules one or more virtual processors to execute on one or more physical processors based on the current priority associated with each virtual processor. When the hypervisor receives an indication from one of the virtual processors that its current priority may be temporarily reduced, the hypervisor lowers the current priority of that virtual processor. The hypervisor then schedules another virtual processor to execute on a physical processor instead of the virtual processor with the temporarily reduced priority. When the hypervisor receives an interrupt for the virtual processor with the lowered priority, the hypervisor raises the priority of that virtual processor and schedules the virtual processor with the restored priority to execute on a physical processor so that processor can handle the interrupt. | 2014-06-12 |
20140164663 | PERIPHERAL COMPONENT INTERCONNECT ADAPTER AND COMPUTER USING SAME - A peripheral component interconnect (PCI) adapter includes a PCI connector for connecting to a PCI slot of a motherboard, a first PCI expansion slots for connecting a first PCI card, a second PCI expansion slot for connecting a second PCI card, a detection control circuit connected to the first PCI expansion slot and the second PCI expansion slot, and an alarm circuit connected to the detection control circuit. The detection control circuit detects operation power of the first PCI card and the second PCI card, and controls the alarm circuit to report a fault alarm when the operation power of the first PCI card exceeds a threshold power of the first PCI expansion slot or the operation power of the second PCI card exceeds a threshold power of the second PCI expansion slot. | 2014-06-12 |
20140164664 | ORTHOGONAL LAYOUT GENERATION - An orthogonal layout generation method can include receiving, in a computer system, data related to a plurality of devices for a schematic layout, generating, in the computer system, a node for each of the plurality of devices, hereby generating a plurality of nodes, generating, in the computer system, a link for each of the plurality of nodes, thereby generating a plurality of links, orthogonalizing, in the computer system, the plurality of nodes, initializing, in the computer system, a route for each of the plurality of links, thereby generating a plurality of routes, orthogonalizing, in the computer system, the routes and selecting, in the computer system, a direction for each of the plurality of routes. | 2014-06-12 |
20140164665 | DEVICE FOR EXCHANGING DATA BETWEEN AT LEAST TWO APPLICATIONS - A device for exchanging data between at least two data consuming and/or emitting applications, has two modules with input/outputs connected to a corresponding application each including two internal communication submodules respectively for emission and for reception; a control module; a synchronization clock; and a closed-loop transmission line, each submodule for emission including an emission FSM circuit with an emission request output connected to the module, an emission authorization request input connected to an output of the module, and an output interface for data attached to the application A | 2014-06-12 |
20140164666 | SERVER AND METHOD FOR SHARING PERIPHERAL COMPONENT INTERCONNECT EXPRESS INTERFACE - A server provides a sharing method for a peripheral component interconnect express (PCIe) interface to one or more servers. The server receives an accessing request from a virtual machine to access a sharing unit, and transmits a model number of the sharing unit with the PCIe interface and a memory address of a PCIe base address register (BAR). The server establishes a first window in a storage device of the virtual machine, and maps the first window to a memory of the PCIe BAR of the sharing unit. The server further establishes a second window in a storage device of the server, and maps the second window to the storage device of the virtual machine. | 2014-06-12 |
20140164667 | FLEXIBLE AND EXPANDABLE MEMORY ARCHITECTURES - Memory system architectures, memory modules, processing systems and methods are disclosed. In various embodiments, a memory system architecture includes a source configured to communicate signals to a memory device. At least one memory cube may coupled to the source by a communications link having more than one communications path. The memory cube may include a memory device operably coupled to a routing switch that selectively communicates the signals between the source and the memory device. | 2014-06-12 |
20140164668 | Power Stack Control Systems - The disclosed inventions relate to the field of power control electronics. More specifically the disclosed inventions pertain to Power Stack Control Systems which are used to control the generation of AC power from a DC or AC input voltage. The disclosed Power Stack Control Systems include a serial interface connection, the serial interface connection being in serial electrical communication with a plurality of power stacks, the plurality of power stacks comprising at least one interface board and at least one IGBT driver board, the at least one interface board being in parallel communication with at least one IGBT driver board. | 2014-06-12 |
20140164669 | DISAGGREGATION OF SERVER COMPONENTS IN A DATA CENTER - In a data center, components of a server are located on a different circuit board than the processor. For example, components such as a network interface controller, storage devices, power supply, and memory are located on one or more circuit boards different than the circuit board on which the processor is located. Having server components on different circuit boards allows the components to be updated on different schedules, reducing resource consumption caused from tying component updates to processor updates. Locating server components on separate server boards also allows virtualization of server components included in a server rack. | 2014-06-12 |
20140164670 | STRUCTURE FOR NON-BLOCKING SERIAL ATTACHED SCSI INFRASTRUCTURE UTILIZING VIRTUAL PATHWAYS - Structure is disclosed for a non-blocking SAS architecture utilizing virtual connections between SAS devices. One embodiment comprises a SAS expander. The SAS expander comprises a plurality of physical links (PHYs) and a Virtual Connection Manager (VCM) coupled with the plurality of PHYs. The VCM exchanges information over a plurality of concurrently established virtual pathways between a first PHY of the plurality of PHYs and a second PHY of the plurality of PHYs. | 2014-06-12 |
20140164671 | CARD CONTROL DEVICE AND CONTROL CARD OF COMPUTER SYSTEM HAVING CARD CONTROL DEVICE - A computer system includes at least one mother board and a number of control cards monitored by the motherboard via an I | 2014-06-12 |
20140164672 | METHODS AND SYSTEMS FOR PROVIDING USER SELECTION OF ASSOCIATIONS BETWEEN INFORMATION HANDLING RESOURCES AND INFORMATION HANDLING SYSTEMS IN AN INTEGRATED CHASSIS - In accordance embodiments of the present disclosure a method may include receiving a user indication of a desired association between at least one of a plurality of modular information handling systems and at least one or one or more information handling resources. The method may also include communicating one or more control signals to one or more switching elements housed in a chassis configured to house the plurality of modular information handling systems and the one or more information handling resources, such that a selected modular information handling system is communicatively coupled to a selected information handling resource in accordance with the user indication of the desired association. | 2014-06-12 |
20140164673 | MEMORY CONTROLLER AND MEMORY SYSTEM INCLUDING THE SAME - A memory controller connected with a storage medium via a plurality of channels is provided which includes a signal processing block including a plurality of signal processing engines; and a decoding scheduler configured to control a data path such that at least one activated signal processing engine of the plurality of signal processing engines is connected with the plurality of channels, respectively. | 2014-06-12 |
20140164674 | Storage Device with Health Status Check Feature - A storage device with a health status check feature is disclosed. In one embodiment, the storage device keeps track of the number of erase cycles performed on the memory of the storage device. The storage device also stores a value of the predicted limit on the number of times that erase cycles can be performed on the memory. In response to a request from a host device for the health status of the memory, the storage device can provide the host device with information about how many erase cycles have been performed on the memory as compared to the predicted limit. | 2014-06-12 |
20140164675 | LOW-OVERHEAD STORAGE OF A HIBERNATION FILE IN A HYBRID DISK DRIVE - A hybrid drive and associated methods provide low-overhead storage of a hibernation file in the hybrid hard disk drive. During operation, the hybrid drive allocates a portion of solid-state memory in the drive that is large enough to accommodate a hibernation file associated with a host device of the hybrid drive. In addition to the erased memory blocks that are normally present during operation of the hybrid drive, the portion of solid-state memory allocated for accommodating the hibernation file may include over-provisioned memory blocks, blocks used to store a previous hibernation file that has been trimmed, and/or non-dirty blocks. | 2014-06-12 |
20140164676 | USING A VIRTUAL TO PHYSICAL MAP FOR DIRECT USER SPACE COMMUNICATION WITH A DATA STORAGE DEVICE - A data storage device includes multiple flash memory devices, where each of the flash memory devices are arranged into multiple blocks having multiple pages for storing data. The data storage device includes a memory controller that is operationally coupled with the flash memory devices. The memory controller is configured to receive a virtual to physical memory address translation map from a host device, where a physical memory address includes a physical address for memory on the host device. The memory controller is configured to store the virtual to physical memory address translation map in a memory module on the memory controller, receive commands directly from an application running on the host device, where the commands include virtual memory addresses that refer to the memory on the host device and translate the virtual memory addresses to physical memory addresses using the virtual to physical memory address translation map. | 2014-06-12 |
20140164677 | USING A LOGICAL TO PHYSICAL MAP FOR DIRECT USER SPACE COMMUNICATION WITH A DATA STORAGE DEVICE - A data storage device includes multiple flash memory devices, where each of the flash memory devices is arranged into multiple blocks having multiple pages for storing data. The data storage device includes a memory controller operationally coupled with the flash memory devices. The memory controller is configured to receive a logical to physical address translation map from a host device, where a physical address includes a physical address for one of the flash memory devices. The memory controller is configured to store the logical to physical address translation map in a memory module on the memory controller, receive read commands directly from an application running on the host device, where the read commands include logical memory addresses that refer to the logical locations on the flash memory devices, and translate the logical addresses to physical memory addresses using the logical to physical address translation map. | 2014-06-12 |
20140164678 | INTELLIGENT DETECTION DEVICE OF SOLID STATE HARD DISK COMBINING A PLURALITY OF NAND FLASH MEMORY CARDS AND DETECTING METHOD FOR THE SAME - An intelligent detection device of solid state hard disks combining a plurality of NAND flash memory card, and detecting method for the same. Wherein, a central processing unit (CPU) controls a control unit, and is connected electrically to a plurality of flash card insertion slots, for a plurality of NAND flash memory card to be inserted in. Said control unit reads parameters of said flashcards, and transmits said parameters back to said CPU, for it to determine status of each said NAND flash memory card, and display status of each said NAND flash memory card on at least a status display unit. Said intelligent detection device is capable of integrating storage space of a plurality of NAND flash memory card into a larger storage space, and detecting status of each said NAND flash memory card, to inform users to backup data in time. | 2014-06-12 |
20140164679 | Dynamic Block Linking with Individually Configured Plane Parameters - A multi-plane non-volatile memory die includes circuits that receive and apply different parameters to different planes while accessing planes in parallel so that different erase blocks are accessed using individualized parameters. Programming parameters, and read parameters can be modified on a block-by-block basis with modification based on the number of write-erase cycles or other factors. | 2014-06-12 |
20140164680 | METHOD FOR SWITCHING OPERATION MODE, MEMORY CONTROLLER AND MEMORY STORAGE APPARATUS - An operation mode switching method for a memory storage apparatus, a memory controller and a memory storage apparatus using the method are provided. The operation mode switching method includes receiving at least one access command from a host system and determining whether the access command conforms to a predetermined pattern. If the access command conforms to the predetermined pattern, an operation mode of the memory storage apparatus is switched from a first mode to a second mode. The access command includes a first write command including a write string, and the memory storage apparatus executes an operation corresponding to the write string. Accordingly, the method switches the operation mode of the storage memory apparatus by determining the pattern of the access command, so as to simplify the procedure of switching the operation mode and effectively decrease the probability of switching the operation mode incorrectly. | 2014-06-12 |
20140164681 | Systems and Methods for Intelligent Flash Management - Systems and method for performing intelligent flash management are disclosed. A controller may determine if a write pattern exists between a set of writes associated with a first data chunk and a set of writes associated with a second data chunk based on whether a number of writes for first data chunk is equal to a number of writes for second data chunk; a degree to which a sequence of logical block address for the first data chunk matches the sequence of logical block addresses for the second data chunk; and a degree to which a size of each write for the first data chunk matches a size of each write for the second data chunk. The controller may then perform storage management operations based on whether or not a write pattern exists. | 2014-06-12 |
20140164682 | NONVOLATILE MEMORY APPARATUS, OPERATING METHOD THEREOF, AND DATA PROCESSING SYSTEM HAVING THE SAME - Provided is a nonvolatile memory apparatus which writes data into a memory cell according to a program and verify (PNV) operation, wherein the nonvolatile memory apparatus performs the PNV operation for first data during a first time, and performs a plurality of PNV operations for second data during the first time. | 2014-06-12 |
20140164683 | NONVOLATILE MEMORY APPARATUS, OPERATING METHOD THEREOF, AND DATA PROCESSING SYSTEM HAVING THE SAME - A nonvolatile memory apparatus includes: a memory cell array; a write driver/sense amplifier (WD/SA) configured to program data into the memory cell array or read data from the memory cell array; and an I/O controller configured to receive the read data from the memory cell array from the WD/SA, decide a coding mode based on comparison data between write data and the read data, encode the write data according to the coding mode, and provide the encoded data to the WD/SA. | 2014-06-12 |
20140164684 | Storage array controller - A storage array controller provides a method and system for autonomously issuing trim commands to one or more solid-state storage devices in a storage array. The storage array controller is separate from any operating system running on a host system and separate from any controller in the solid-state storage device(s). The trim commands allow the solid-state storage device to operate more efficiently. | 2014-06-12 |
20140164685 | NON-VOLATILE MEMORY DEVICE AND OPERATING METHOD THEREOEF - An operating method is for operating a memory controller which controls a non-volatile memory device. The non-volatile memory device includes a plurality of memory cells arranged in a direction perpendicular to a substrate. The operating method includes erasing the plurality of memory cells, reading memory cells connected with a first word line using a first word line voltage to search string address information corresponding to memory cells being at an off state, and programming memory cells corresponding to the string address information to a particular program state based on the string address information to store mapping information. | 2014-06-12 |