40th week of 2008 patent applcation highlights part 85 |
Patent application number | Title | Published |
20080244254 | MULTI-MODE COMPUTER OPERATION - A mobile device, such as a laptop or notebook computer, capable of booting from at least two environments. If a remote environment is present, the mobile device may boot from the remote environment. The mobile device may also boot from the local environment. | 2008-10-02 |
20080244255 | Method for not resetting memory while booting computer through hardware booting button thereof - A method for not resetting a memory while booting a computer through a hardware booting button is adapted to utilize a general hardware booting mode and increases steps that judges whether preset values are respectively stored in specific address of the memory. If it is the preset value, allowing the memory to be reset is not executed before booting sequences are executed, the booting sequences are directly processed and data stored in the memory is allowed to maintain so that it will not happen that the data stored in the memory is cleared to cause embarrassment to a user because the memory is not reset. | 2008-10-02 |
20080244256 | Parallel link reset in link based system - A link based system including a plurality of processors is reset when transitioning from a slower speed to a higher speed mode during a booting process. One processor may coordinate the simultaneous establishment of link resetting of a plurality of other processors. In one embodiment, the processors may operate beginning with the farthest processor to reset their local links. Each processor sets its local links and if it determines, based on the speed of the link that the link has already been reset, it moves on to the next link. | 2008-10-02 |
20080244257 | Server active management technology (AMT) assisted secure boot - In some embodiments, the invention involves a system and method relating to secure booting of a platform. In at least one embodiment, the present invention is intended to securely boot a platform using one or more signature keys stored in a secure location on the platform, where access to the signature is by a microcontroller on the platform and the host processor has no direct access to alter the signature key. Other embodiments are described and claimed. | 2008-10-02 |
20080244258 | Instrumenting Configuration and System Settings - Described are systems and methods for instrumenting configuration and system settings based on targeting configuration settings at dynamically populated groups, groups with varied membership, and objects defined in a class. The systems and methods provide for attributing a configuration setting or policy to one or more objects and then targeting the object at one or more scope. | 2008-10-02 |
20080244259 | Component firmware integration in distributed systems - A plurality of platforms may be defined in a distributed system. Each of the platforms may include a processor and a chipset from a common source on a single motherboard. Extensible firmware interface drivers are provided for the processors and the chipsets. Each of the platforms may be defined pursuant to a system definition model where the system definition model defines the firmware for each of the platforms. As a result, any of the platforms can be updateable from a common source, such as an Internet web site. | 2008-10-02 |
20080244260 | SYSTEM AND METHOD FOR MANAGING INTEROPERABILITY OF INTERNET TELEPHONY NETWORKS AND LEGACY TELEPHONY NETWORKS - A system and method for providing interoperability between Internet telephony networks and legacy telephony networks includes conveying an address of an Internet telephony endpoint in a legacy telephony protocol. A globally unique Uniform Resource Identifier, referred to as a Universal Global Title, may be assigned as the address of the Internet telephony endpoint. The URI-based address of the Internet telephony endpoint can be conveyed to a legacy telephony network as an Internet Address Parameter, implemented as an extension to the ANSI ISDN User Part legacy telephony protocol. As such, a Universal Teletraffic EXchange may be provided where Internet telephony networks and legacy telephony networks can exchange addressing and signaling information while interoperating at a peer-to-peer level. | 2008-10-02 |
20080244261 | SEPARATION OF LOGICAL TRUSTED PLATFORM MODULES WITHIN A SINGLE PHYSICAL TRUSTED PLATFORM MODULE - A device, method, and system are disclosed. In one embodiment, the device includes storage to contain more than one trust root, and logic to associate each command ordinal sent to the device with one of the trust roots. | 2008-10-02 |
20080244262 | ENHANCED SUPPLICANT FRAMEWORK FOR WIRELESS COMMUNICATIONS - The present disclosure provides a method that may be used in wireless communications. According to one exemplary embodiment, the method may include partitioning a first device into a user operating system including a supplicant client and a secure operating system including a supplicant core. The method may also include performing a user authentication process at the supplicant core. The method may further include transmitting user authentication data from the supplicant core to at least one wireless network and accessing the supplicant core from at least one additional device. Of course, additional embodiments, variations and modifications are possible without departing from this embodiment. | 2008-10-02 |
20080244263 | Certificate management system - A system and method for generating and storing a large number of public key certificates that enables a revocation status to be determined while providing a smaller amount of storage than is typically required. | 2008-10-02 |
20080244264 | PUBLIC KEY CERTIFICATE VALIDATION SYSTEM - To validate a certificate of a service provider apparatus, a service receiving apparatus determines a certificate validation method on based on a combination of the performance of the service receiving apparatus, the performance of a CRL repository apparatus, the performance of a certificate validation apparatus, and the performance of a network, and performs validation of a certificate by the determined method. Furthermore, to validate a certificate of a service provider apparatus, a service receiving apparatus requests a method selection apparatus to validate the certificate, and the method selection apparatus determines a certificate validation method based on a combination of the performance of the method selection apparatus, the performance of the CRL repository apparatus, the performance of the certificate validation apparatus and the performance of the network, validates the certificate by the determined method, and notifies a validation result to the service receiving apparatus. | 2008-10-02 |
20080244265 | MOBILITY DEVICE MANAGEMENT SERVER - A mobility device management server (MDMS) for use as part of a mobility device platform allowing for secure mobile computing is provided. In an illustrative implementation, an exemplary mobility device platform (MDP) comprises a mobility device (MD) operable to communicate with at least one computing environment through a communications interface and wherein the MD is operable to process and store secure web services, a communications network operable to communicate data and computing applications using web services, and a MDMS operable to generate, process, store, communicate and encrypt web services to the MD. Further, the MDMS is operable to perform one or more mobility device management functions to provide encryption keys to cooperating MDs and to authenticate and verify cooperating MDs requesting web services from the MDMS. The MDMS further may operate to perform metering functions and may operate to support intermittent connections between itself and cooperating MDs. | 2008-10-02 |
20080244266 | AUTHENTICATING A COMMUNICATION DEVICE AND A USER OF THE COMMUNICATION DEVICE IN AN IMS NETWORK - IMS networks and methods are disclosed for authenticating a communication device and a user of the communication device. When a communication device attempts to register with an IMS network, the IMS network receives a register message from the device that includes device authentication information, such as a public or private identifier for the device. The IMS network processes the device authentication information to authenticate the communication device. The IMS network also receives user authentication information from the device, such as a password. The IMS network processes the user authentication information to authenticate the user of the device. The device and the user are both authenticated by the IMS network. Authentication of the user may also occur when originating a session or terminating a session over the IMS network with the device. | 2008-10-02 |
20080244267 | Local and remote access control of a resource - Embodiments of the invention are generally directed to systems, methods, and apparatuses for local and remote access to a resource. In some embodiments, an integrated circuit includes a configurable hardware resource. In addition, the integrated circuit may also include access control logic to authenticate agents that attempt to configure the resource. In some embodiments, the agents may be in-band or out-of-band agents. Other embodiments are described and claimed. | 2008-10-02 |
20080244268 | End-to-end network security with traffic visibility - Both end-to-end security and traffic visibility may be achieved by a system using a controller that derives a cryptographic key that is different for each client based on a derivation key and a client identifier that is conveyed in each data packet. The controller distributes the derivation key to information technology monitoring devices and a server to provide traffic visibility. The key may be derived using a cryptographic one way function and a client identifier so that end-to-end security may be achieved. | 2008-10-02 |
20080244269 | Data processing system, memory device, data processing unit, and data processing method and program - To provide an improved management structure of memory devices storing service-use applications. A card for a memory device applied to use various services is provided as one child card or more corresponding to each of the services, a parent card stores data for child-card issue management, and the child-card issue processing is executed based on the parent card, such as parent card authentication. An issue certificate having a parent-card digital signature is stored in the child card, the issue certificate contains a service code and a child-card identification, and thus it becomes possible to confirm a service set in the child card based on the issue certificate as the parent-card signature data. | 2008-10-02 |
20080244270 | SYSTEM AND METHOD FOR SIGNATURE BASED DATA CONTAINER RECOGNITION - A system and method for signature based data container recognition is provided. When a new data container, such as a lun, is created, a security appliance generates a signature of the data container, by, e.g., examining the contents of one or more data blocks of the data container. The generated signature is then associated with the appropriate encryption key for the data container and is stored either within a configuration database of the security appliance or on a key management system operating within a security appliance environment. To identify the encryption key associated with a data container, the security appliance generates a signature of the data container and compares the generated signature with the stored signatures. Should there be a matching signature, the security appliance utilizes the encryption key associated with the matching signature to process data access requests to/from the data container. | 2008-10-02 |
20080244271 | METHOD AND SYSTEM FOR AUTHENTICATION BASED ON WIRELESS IDENTIFICATION, WIRELESS IDENTIFICATION AND SERVER - The invention discloses a method and a system for authentication based on a wireless identification, and a wireless identification. The method comprises steps of: obtaining, by a mobile device, wireless tag information and connection configuration information from the wireless identification; establishing, by the mobile device, a connection with the server according to the connection configuration information, and transmitting, by the mobile device, the wireless tag information to the server; authenticating, by the server, the validity of the wireless tag information, and determining, by the server, an access right of the mobile device after the authentication is successful; generating, by the wireless identification, device signature information and forwarding it, by the mobile device, to the server; and authenticating, by the server, the validity of the device signature information, and canceling, by the server, the access right of the mobile device. The present invention provides an authentication system based on the wireless identification, wherein the server authenticates not only the wireless tag information, but also the device signature information generated by the wireless identification, thereby the system is of a higher security. | 2008-10-02 |
20080244272 | HAND CRYPTOGRAPHIC DEVICE - Disclosed is a hand cryptographic device for keeping a secret code inside confidential and being convenient to be carried about. The hand cryptographic device of the present invention includes an input module, a memory and a user interface. The input module is used for being inputted the secret code and a command of accessing the secret code. The memory stores a control program of the hand cryptographic device and the inputted secret code. The user interface provides the secret code to the user when the user inputs the command of accessing the secret code. The input module may comprise a keypad device for inputting the command of accessing the secret code. | 2008-10-02 |
20080244273 | CRYPTOGRAPHIC METHOD USING REDUNDANT BITS AND ADAPTIVE CLOCK FREQUENCY - The present invention discloses a cryptographic method using redundant bits and an adaptive clock frequency, which adds redundant bits and modifies clock frequency to change the contents and transmission rate of the bit sequence to encrypt data. The present invention can combine with the existing security mechanism or cryptographic algorithm, such as AES (Advanced Encryption Standard) or DES (Data Encryption Standard), to achieve a multi-fold security function. Thereby, the present invention can apply to various communication devices to increase the immunity against attacks, promote information security and protect personal privacy. | 2008-10-02 |
20080244274 | Methods and Systems for Processing of n-State Symbols with XOR and EQUALITY Binary Functions - Multi-valued or n-state with n=2 | 2008-10-02 |
20080244275 | Instruction Transform for the Prevention and Propagation of Unauthorized Code Injection - A method and structure of instruction transformation. Applying the principals of biodiversity to instruction transformation applicable to devices and embedded systems and networks containing many devices not only protects individual devices from attack from unauthorized code, but additionally retards propagation of such unauthorized code to other devices in the system or network in communication with a potentially infected device. | 2008-10-02 |
20080244276 | Method and Device for Creating a Group Signature and Related Method and Device for Verifying a Group Signature - A method for creating a group signature of a message to be implemented by a member of a group in a system, the system including a trust authority, the group including at least the member provided with a secure portable electronic entity including storage elements and computing elements wherein are implanted a cryptographic algorithm. The method includes the following steps: generating via the computing elements a signature of the message using a private key common to the members of the group and integrating a data identifying the group member and a temporal data representing a temporal information of the member's membership to the group and of the date of the signature of the message, the private key common to the members of the group, the identifying data and the temporal data being stored in the storage elements. | 2008-10-02 |
20080244277 | Secure data parser method and system - The present invention provides a method and system for securing sensitive data from unauthorized access or use. The method and system of the present invention is useful in a wide variety of settings, including commercial settings generally available to the public which may be extremely large or small with respect to the number of users. The method and system of the present invention is also useful in a more private setting, such as with a corporation or governmental agency, as well as between corporation, governmental agencies or any other entity. | 2008-10-02 |
20080244278 | Leakage Power Estimation - Methods and apparatus to provide leakage power estimation are described. In one embodiment, one or more sensed temperature values ( | 2008-10-02 |
20080244279 | Methods and Apparatus to Detect Voltage Class of a Circuit - A method including monitoring whether an externally originating signal reaches a predetermined threshold value in a host, producing an output value based on the monitoring, and identifying a power environment for the host based on the output value is described. Also described is a method for determining the power environment of a host. Systems and hosts for implementing the methods are also described. | 2008-10-02 |
20080244280 | System and Method for Hardware Manipulation in a Computing Device - A device having an operating system including a power control policy for a component of the device and an effector program controlling power for the component based on the power control policy and power control hardware controlled by the effector program to implement the power control policy for the component. A method for determining a power state for a component, executing an effector program to produce a control output corresponding to the power state and controlling power supplied to the component so that the component enters the power state. | 2008-10-02 |
20080244281 | Method and System for Associating Power Consumption with a Network Address - A system for associating power consumption with a network address. Network traffic is inspected to determine network addresses. The network addresses are assigned to one or more servers. A power output of a plurality of power outlets is measured to determine a power consumption of the one or more servers connected to the plurality of power outlets. The network addresses assigned to the one or more servers is associated with the power consumption of the one or more servers. A total power consumption is calculated for the one or more servers having an association of network addresses with power consumption. Then, the total power consumption is recorded for the one or more servers in a table and a user is provided access to the table. | 2008-10-02 |
20080244282 | Managing Power Allocation To Ethernet Ports In The Absence Of Mutually Exclusive Detection And Powering Cycles In Hardware - A method of allocating power to ports in an Ethernet switch, including: (1) assigning a configuration power to a selected port, wherein the assigned configuration power is less than a power supplied by the selected port to a powered, (2) enabling and powering the selected port in a single indivisible step, (3) determining the power limit of a device coupled to the selected port, (4) comparing the power supplied by the selected port to the device with the configuration power assigned to the selected port, and (5) if the power supplied by the selected port to the device is greater than the configuration power assigned to the selected port, then increasing the configuration power of the selected port to correspond with the power limit of the device. | 2008-10-02 |
20080244283 | System and Method for Thresholding System Power Loss Notifications in a Data Processing System - A system and method for thresholding system power loss notifications in a data processing system are provided. Power loss detection modules are provided in a data processing system having one or more data processing devices, such as blades in an IBM BladeCenter® chassis. The power loss detection modules detect the type of infrastructure of the data processing system, a position of a corresponding data processing device within the data processing system, and a capability of the data processing system to provide power during a power loss scenario. The detection module detects various inputs identifying these types of data processing system and power system characteristics and provides logic for defining a set of behaviors during a power loss scenario, e.g., behaviors for sending system notifications of imminent power loss. The detection of the various inputs and the defining of a set of behaviors may be performed statically and/or dynamically. | 2008-10-02 |
20080244284 | Methods and apparatus providing advanced classification for power over Ethernet - A system conducts a plurality of cycles on the powered device. Each cycle has a detection phase and a classification phase. A classification voltage is applied to the conductors during each cycle. The system measures a current in the conductors while the classification voltage is applied. The system determines a final class responsive to a plurality of measured currents. The final class utilized to determine an amount of inline power to deliver to the powered device. | 2008-10-02 |
20080244285 | Method to control core duty cycles using low power modes - A processor starting a duty cycle timer with a specified duty cycle period and a specified power state, and if the duty cycle timer expires, placing the processor in the specified power state in response to the expiry of the timer, if the timer has not expired and if an interrupt other than a timer tick interrupt is received, canceling the duty cycle timer in response to the interrupt other than a timer tick interrupt. | 2008-10-02 |
20080244286 | Starting device - A starting device includes a first transform device that restores a first transfer signal, which is converted from an input signal supplied from an input device, to the input signal, and outputs the input signal to a computer, and a power connecting device that starts the computer when the input signal restored by the first transform device includes a starting signal. | 2008-10-02 |
20080244287 | Platform communication protocol - A host chipset heartbeat may be utilized, in some embodiments, to handle interrupts from external devices on a power efficient basis. The availability of the host chipset heartbeat may be signaled to external devices and those external devices may time their activities to a period of time when not only are resources available, but the assertion of the activity is advantageous because the host chipset is already transitioning from a lower power consumption state. | 2008-10-02 |
20080244288 | Power supply system, management system, and computer readable medium - A power supply system includes: a first device that commands an external device to perform processing, and is configured to supply electric power to the external device; a second device that is connected to the first device through a communications line, and that performs the processing in accordance with the command received from the first device; and a request unit that requests the first device to supply to the second device an amount of electric power needed for the second device performing the processing commanded by the first device, the first device determining whether or not to supply electric power to the second device, in accordance with at least one of; (i) content of the command sent to the second device, and (ii) the amount of electric power requested by the request unit and an amount of electric power which the first device is capable of supplying. | 2008-10-02 |
20080244289 | Hybrid Operating System for Battery Powered Computing Systems - Systems, methods, and/or techniques (“tools”) for hybrid operating systems for battery powered computing systems are described herein. The hybrid operating systems (OS) may include a full-power OS component that enables the computing system to operate in a full-power mode, and a low-power OS component that enables the computing system to operate in a low-power mode. In the full-power mode, the computing system consumes a first amount of electrical power, while in the low-power mode, the computing system consumes less electrical power. The computing system may include a processor that consumes a given power amount of power, and a low-power core processor that consumes less power than the processor. | 2008-10-02 |
20080244290 | POWER SAVING DEVICE CONTROLLED BY CONTROLLER OR DISK - This is a disk array device comprising means for operating a plurality of controller modules or disks, means for determining the a future operating state, based on operation history of the controller module or the disk and setting means for setting an operating state of the controller module or disk in such a way as to reduce its power consumption, based on the future operating state of the controller module or disk. | 2008-10-02 |
20080244291 | Resource power controller - Embodiments of the invention are generally directed to systems, methods, and apparatuses for a resource power controller. In some embodiments, an integrated circuit includes a resource power controller to control whether a resource is in an up state or a down state. In some embodiments, the resource power controller heuristically estimates when to return the resource to an up state based, at least in part, on an estimate of a gap size. | 2008-10-02 |
20080244292 | Method and Apparatus to Re-create trust model after sleep state - A processing system features random access memory (RAM), a processor, and a trusted platform module (TPM). When the processing system enters a sleep mode during which the RAM is to stay powered, the processing system may measuring a VMM and one or more secure VMs in the processing system. However, the processing system may not measure or encrypt all of system memory. Upon resuming from sleep, the processing system may verify the measurements, to ensure that the VMM and secure VMs have not been tampered with. Other steps may include sealing encryption keys to the TPM, while preserving the blobs in memory. Other embodiments are described and claimed. | 2008-10-02 |
20080244293 | Methods, Systems, And Computer Program Products For Providing For Automatically Closing Application Widgets Based On Markup Language Elements - Methods and systems are described for providing for automatically closing application widgets based on markup language elements. In one embodiment, a markup element defined in a markup language to specify a condition for automatically closing the first widget is detected while processing a resource for presentation in a widget. It is determined without using executable code included in the resource whether the condition for automatically closing the widget is satisfied. The widget is automatically closed responsive to the condition for automatically closing the widget being satisfied. In another embodiment, a resource including a markup element defined in a markup language to specify a condition for automatically closing a widget that presents the resource is provided by a first network entity to a second network entity that is one of a client and a server. | 2008-10-02 |
20080244294 | Dynamic power reduction - Some embodiments of the invention include systems, apparatuses, and methods for dynamically reducing requested supply voltage based on idle functional blocks. | 2008-10-02 |
20080244295 | Method of saving power consumed by a storage system - Provided is a method of saving power consumed by a storage system that is connected to a host computer via a network, including a disk device for storing to be written data requested by the host computer, and controllers that control access to the disk device, in which the controllers each have an interface connected to the network, a processor connected to the interface, and a memory connected to the processor, in which the processor measures a load of the storage system, and in which the processor controls power to the controllers in accordance with the measured load of the storage system. | 2008-10-02 |
20080244296 | COMPUTER SYSTEM FAULT DETECTION - A computer system is disclosed. The computer system includes a core processor, a power supply including a first output in power communication with the core processor, and a power switch in signal communication with the power supply for controlling a state of the first output. The computer system also includes a service processor in signal communication with the sub-system and power communication with a second output of the power supply and a back up power supply. In response to activation of the power switch and a fault of the second output, the service processor uses the back up power supply and a reduced power mode to detect the fault of the second output and generate a signal representative thereof to be displayed upon a light emitting diode display. | 2008-10-02 |
20080244297 | Automatic power management of a network powered device - A system delivers power to a powered device through a local area network using a power sourcing equipment to process data of an interconnected network and to receive power from a first power source coupled to the power sourcing equipment. The system may include a powered device coupled at a distance away from the power sourcing equipment through a local area network (LAN) to process the data of the interconnected network through the power sourcing equipment. The powered device may include a modular power over LAN circuit to enable power to the powered device through the LAN when the modular power over LAN circuit is coupled to the powered device. | 2008-10-02 |
20080244298 | Clock synchronization scheme for deskewing operations in a data interface - A technique includes providing transmitters that are each associated with a data bit line of a bus, and each transmitter is clocked by an associated transmit clock signal. The technique includes determining a baseline offset to apply to a base clock signal to synchronize the base clock signal to a source clock signal of a source that supplies data to the transmitters. For each transmitter, an associated phase offset is determined to compensate for an associated skew. The phase of each transmit clock signal is controlled based on the associated phase offset and the baseline offset. | 2008-10-02 |
20080244299 | Data processing apparatus and method for translating a signal between a first clock domain and a second clock domain - The present invention provides a data processing apparatus and method for translating a signal between a first clock domain and a second clock domain. The data processing apparatus may comprise a first component for generating a signal, the first component operating in the first clock domain having a first clock period, and a second component for receiving the signal, the second component operating in the second clock domain having a second clock period. In one embodiment, the second clock period is synchronous with but slower than the first clock period. Interface circuitry is provided for translating the signal between the first clock domain and the second clock domain, the interface circuitry operating in the first clock domain and comprising a storage element for temporarily buffering the signal generated by the first component before outputting that signal to the second component. Further, enable circuitry is used to control output of the signal from the storage element having regard to a specified input delay value identifying an input delay time of the second component expressed in terms of the first clock period. Hence, such a data processing apparatus controls translation of a signal from a fast clock domain to a slow clock domain where the input delay time of the component in the slower clock domain is configured in terms of the fast clock period, thereby enabling the latency to be tuned having regard to the slow clock domain input delay constraints. In an alternative embodiment, a similar arrangement is used to control translation of a signal from a slow domain to a fast clock domain, with the output delay time of the component in the slow clock domain being configured in terms of the fast clock period. | 2008-10-02 |
20080244300 | Fault Tolerant Time Synchronization Mechanism in a Scaleable Multi-Processor Computer - Redundant time-of-day (TOD) oscillators are aligned, within a master oscillator path, to local logic oscillator and used to create independent step-sync signals. A step checker validates and provides selection signals to identify which of the TOD oscillators operates according to a criterion. Independent step-sync signals are transmitted to several sibling chips. Local step and sync signals are delayed to arrive at TOD register nearly synchronous with TOD registers in sibling chips. A slave oscillator path may be used to select time signals generated in a sibling chip, whereby the master oscillator path is deselected. A primary control register set may be used to configure which among several chips is a master chip using the master oscillator path. All remaining chips are slave chips. All segments of the topology are redundant. One of multiple possible alternate topologies is defined in a secondary control register set. Commands and TOD values are passed on the fabric at predefined time increment boundaries to establish, restore, or maintain synchronization across all chips. | 2008-10-02 |
20080244301 | REAL-TIME CLOCK CORRECTION METHODS AND APPARATUS - A real-time clock (RTC) correction method is provided. Correction data for correcting an RTC of the electronic device is calculated and stored before a power off operation of an electronic device. When the power off operation is performed between two correction operations of the RTC, the period between the two correction operations of the RTC is also calculated. The RTC is corrected utilizing the correction data and the period. | 2008-10-02 |
20080244302 | SYSTEM AND METHOD TO ENABLE AN EVENT TIMER IN A MULTIPLE EVENT TIMER OPERATING ENVIRONMENT - An information handling system including a local event timer operably associated with a management application interface is disclosed. The information handling system can also include a remote event timer accessible by a system management application. The remote event timer can be used relative to use of the local event timer. The information handling system can also include an event timer detection module operable to determine an availability of the local event timer relative to an operating system type. The event timer detection module can also initiate use of the local event timer, and disable use of the remote event timer in response to detecting a local event timer enabled operating system. A method and a chipset configured to be used by an information handling system are also disclosed. | 2008-10-02 |
20080244303 | NIBBLE DE-SKEW METHOD, APPARATUS, AND SYSTEM - De-skew is performed on a nibble-by-nibble basis where a nibble is not limited to four bits. | 2008-10-02 |
20080244304 | Deriving accurate media position information - Various embodiments utilize different counters or clocks, working in concert, to smooth out position information that is derived for a rendering/capturing device. Specifically, in at least some embodiments, each counter or clock has a different speed. A faster counter or clock is used to determine intra-transition position offsets relative to a slower counter or clock. | 2008-10-02 |
20080244305 | DELAYED LOCK-STEP CPU COMPARE - The present invention relates to an electronic device comprising a first CPU, a second CPU, a first delay stage and a second delay stage for delaying data propagating on a bus, a CPU compare unit, and wherein the first delay stage is coupled to an output of the first CPU and a first input of the CPU compare unit, an input of the first CPU is coupled to a system input bus, the second delay stage is coupled to the system input bus and to an input of the second CPU, an output of the second CPU (CPU | 2008-10-02 |
20080244306 | STORAGE SYSTEM AND MANAGEMENT METHOD FOR THE SAME - In a storage system performing remote copy, when a failure occurs in a storage apparatus, optimum redundancy configuration is reestablished promptly. In the storage system performing remote copy, when a storage apparatus detects a failure in its disk drive, a storage apparatus capable of providing a logical unit that can be a replacement for the logical unit affected by the failure in the disk drive is searched for based on storage apparatus performance, and a redundancy configuration is reestablished using a new logical unit the found storage apparatus provides. | 2008-10-02 |
20080244307 | Method to avoid continuous application failovers in a cluster - A method and mechanism for failing over applications in a clustered computing system is provided. In an embodiment, the methodology is implemented by a high-availability failover mechanism. Upon detecting a failure of an application that is currently designated to be executing on a particular node of the system, the mechanism may attempt to failover the application onto a different node. The mechanism keeps track of a number of nodes on which a failover of the application is attempted. Then, based on one or more factors including the number of nodes on which a failover of the application is attempted, the mechanism may cease to attempt to failover the application onto a node of the system. | 2008-10-02 |
20080244308 | DEFECT INSPECTION APPARATUS, DEFECT INSPECTION PROGRAM, RECORDING MEDIUM STORING DEFECT INSPECTION PROGRAM, FIGURE DRAWING APPARATUS AND FIGURE DRAWING SYSTEM - Input CAD data and run-length data obtained by performing a RIP process on the input CAD data are acquired. A predetermined conversion process is performed on at least one of the input CAD data and the run-length data to make the data formats of both data comparable and then both data are compared with each other to detect an area having a difference as a defect area in the run-length data. This provides a technique to detect a defect in the run-length data to be used for drawing of a figure before the execution of drawing with a simple structure. | 2008-10-02 |
20080244309 | DISK ARRAY DEVICE, OPERATING METHOD THEREOF AND PROGRAM-STORING MEDIUM - Even if failure probabilities are different for hard disks due to the individual specificity such as a hard disk manufacturer, model number or the like, a disk with high failure probability is reliably determined and removed from the operating RAID to be kept in a standby state as a hot spare disk, thereby keeping a low failure probability of the disk array device. In order to realize this, the disk array device includes a disk controlling unit for, based on S.M.A.R.T. information of each of the hard disks read by a S.M.A.R.T. information reading unit, assigning a predetermined number of hard disks to the hot spare disk in descending order of failure probability of the hard disks. | 2008-10-02 |
20080244310 | POWER SUPPLYING METHOD AND APPARATUS AND A SYSTEM USING THE SAME - An apparatus includes at least one load, a control circuit, and a power supplying apparatus including a control-use power supply part, at least one load-use power supply part, and a power supply control part. The control-use power supply part supplies first electric power to the control circuit, and stops supplying the first electric power and outputs a first detection signal when detecting a first abnormal operation state. The at least one load-use power supply part supplies second electric power to the respective at least one load, and stops supplying the second electric power and outputs a second detection signal when detecting a second abnormal operation state. The power supply control part causes the control-use power supply part to stop supplying the first electric power according to the first detection signal, and causes the at least one load-use power supply part to stop supplying the second electric power according to the second detection signal. | 2008-10-02 |
20080244311 | System and Method for Thresholding System Power Loss Notifications in a Data Processing System Based on Vital Product Data - A system and method for thresholding system power loss notifications in a data processing system are provided. Power loss detection modules are provided in a data processing system having one or more data processing devices, such as blades in an IBM BladeCenter® chassis. The power loss detection modules detect the type of infrastructure of the data processing system, a position of a corresponding data processing device within the data processing system, and a capability of the data processing system to provide power during a power loss scenario. The detection module detects various inputs identifying these types of data processing system and power system characteristics and provides logic for defining a set of behaviors during a power loss scenario, e.g., behaviors for sending system notifications of imminent power loss. The detection of the various inputs and the defining of a set of behaviors may be performed statically and/or dynamically. | 2008-10-02 |
20080244312 | Formula server for diagnostic systems - An apparatus and method are provided and include a formula server having formulas and conversion modules that are separate from a diagnostic application of a diagnostic tool. The diagnostic tool receives the diagnostic data and transmits it to a remote computer, where the data is converted using a formula. The resulting data is then transmitted back to the diagnostic tool for display. | 2008-10-02 |
20080244313 | Overriding Daughterboard Slots Marked with Power Fault - Having detected an anomalous fault in a peripheral I/O slot, a processor entity may need to perform some remedial action, wherein the peripheral slot may have a fault line. First a voltage may be detected on the slot. Processor entity may set a fault if a voltage is found. A hotplug controller which may provide outputs that the processing entity may store as a fault syndrome word. The service processor or operating system, either during initial program load, or at another time, may detect that the fault could be a false fault depending on a set of predefined conditions and following the mechanism described here can then clear the fault earlier set. If an action from a previous device list is set, then there may be a clearing of the voltage fault based on determining that the action is set. | 2008-10-02 |
20080244314 | FAILURE INFORMATION DELIVERY SYSTEM, FAILURE MANAGEMENT SERVER, MOBILE OBJECT COMMUNICATION APPARATUS, FAILURE INFORMATION DELIVERY METHOD, AND PROGRAM - Upon detecting existence of characteristic information of a failure, of which search is requested, a mobile terminal device | 2008-10-02 |
20080244315 | TESTING METHOD FOR COMPLEX SYSTEMS - A method of testing a complex system of components is provided. The method includes providing a test log for each component, each test log comprising a list of tests and a respective test routine for each test. The method also includes activating the test logs and commencing a test procedure of the complex system. The method further includes running one or more test routines, terminating the test procedure of the complex system, and creating a test report based upon the output of the test routines. | 2008-10-02 |
20080244316 | FAILURE TREND DETECTION AND CORRECTION IN A DATA STORAGE ARRAY - A plurality of data storage devices are arranged to form a multi-device array space, and a controller controls access to the array space. The controller is configured to index sets of operational performance data from the plurality of data storage devices into a unified data log. The controller further detects a failure trend of one or more data storage devices by analyzing at least one of a vertical block of data and a horizontal block of data in the unified data log. The vertical data block of data is associated with one of the data storage devices at a plurality of indices. The horizontal block of data is associated with a plurality of the data storage devices at an index. | 2008-10-02 |
20080244317 | Program and apparatus for generating system test specifications - A computer program automatically producing a system test specification adapted for real-life use of a computer system, such that the system's most important processing functions can be tested. An update record storage unit stores update records each including: a process identifier of a data updating process, the name of a dataset updated by that process, and an update timestamp. A function test data storage unit stores data of function tests for checking whether each module realizing operation steps of an operation flow satisfies specified requirements. An operation flow extractor creates a flow descriptor enumerating the names of datasets updated by a data updating process in chronological order. From the stored function test data, a system test generator compiles a system test description for each operation flow, which specifies a series of function tests in the same order as the operation steps constituting each operation flow. | 2008-10-02 |
20080244318 | METHOD AND SYSTEM FOR PROACTIVE DRIVE REPLACEMENT FOR HIGH AVAILABILITY STORAGE SYSTEMS - Methods for preventing the failure of disk drives in storage systems are disclosed. A system and a computer program product for preventing the failure are also disclosed. Factors relating to the aging or early onset of errors in a disk drive are monitored. These factors are then compared to thresholds. In case the thresholds are exceeded, an indication for the replacement of the disk drive is given. Sudden rises in the factors are also used to indicate the impeding failure of disk drives. | 2008-10-02 |
20080244319 | Method and Apparatus For Detecting Performance, Availability and Content Deviations in Enterprise Software Applications | 2008-10-02 |
20080244320 | Program Test System - An improved automated software testing system provides the ability to generate and reuse test cases over multiple platforms. Keywords and natural language are used in test case creation, simplifying the process for non-technical business users. Business users can write test cases without scripts. Test cases can be generated even before the application to be tested is available. Data substitution provides ability for test cases to adapt to changing data. Abstraction allows use of all third-party and custom software test tools to be incorporated. Persistent data handling allows capture of data generated during test execution for later use. Testing can be performed entirely automatically or can incorporate some manual interaction. Test results, screen captures of the system tested, along with environment and machine variables are saved in results logs for later review. | 2008-10-02 |
20080244321 | Program Test System - An improved automated software testing system provides the ability to generate and reuse test cases over multiple platforms. Keywords and natural language are used in test case creation, simplifying the process for non-technical business users. Business users can write test cases without scripts. Test cases can be generated even before the application to be tested is available. Data substitution provides ability for test cases to adapt to changing data. Abstraction allows use of all third-party and custom software test tools to be incorporated. Persistent data handling allows capture of data generated during test execution for later use. Testing can be performed entirely automatically or can incorporate some manual interaction. Test results, screen captures of the system tested, along with environment and machine variables are saved in results logs for later review. | 2008-10-02 |
20080244322 | Program Test System - An improved automated software testing system provides the ability to generate and reuse test cases over multiple platforms. Keywords and natural language are used in test case creation, simplifying the process for non-technical business users. Business users can write test cases without scripts. Test cases can be generated even before the application to be tested is available. Data substitution provides ability for test cases to adapt to changing data. Abstraction allows use of all third-party and custom software test tools to be incorporated. Persistent data handling allows capture of data generated during test execution for later use. Testing can be performed entirely automatically or can incorporate some manual interaction. Test results, screen captures of the system tested, along with environment and machine variables are saved in results logs for later review. | 2008-10-02 |
20080244323 | Program Test System - An improved automated software testing system provides the ability to generate and reuse test cases over multiple platforms. Keywords and natural language are used in test case creation, simplifying the process for non-technical business users. Business users can write test cases without scripts. Test cases can be generated even before the application to be tested is available. Data substitution provides ability for test cases to adapt to changing data. Abstraction allows use of all third-party and custom software test tools to be incorporated. Persistent data handling allows capture of data generated during test execution for later use. Testing can be performed entirely automatically or can incorporate some manual interaction. Test results, screen captures of the system tested, along with environment and machine variables are saved in results logs for later review. | 2008-10-02 |
20080244324 | Method and system for providing enhanced exception messages for exceptions thrown by virtual machines - A system and method are provided to provide enhanced exception messages for exceptions thrown by virtual machines. In one embodiment, an exception is detected when it is thrown at a virtual machine when a programming error is detected. A first message is associated to the exception, the first message including a default message. A request is received for a second message to be associated with the exception. The second message is associated to the exception in response to the request, the second message including an extended message explaining the exception. | 2008-10-02 |
20080244325 | AUTOMATED SOFTWARE SUPPORT SYSTEM WITH BACKWARDS PROGRAM EXECUTION AND DEBUGGING - The invention describes an automated software support system comprising automated bug filing and test case creation component to checkpoint a client process initial state and record the client process initial state changes while the client process undergoes sequence of states which need to be analyzed, such as software bug, deliver the recordings to a development node, where the problem can be debugged without reproducing the client process environment by using the recorded state to recreate initial state of the client program and by using the recorded log to simulate the client program execution forwards and backwards. | 2008-10-02 |
20080244326 | Prognosis of faults in electronic circuits - A process for a prognosis of faults in electronic circuits identifies parameters of a circuit under test. An upper and a lower limit is determined for one or more components of the circuit under test. A population of faulty and non-faulty circuits are generated for the circuit under test, and feature vectors are generated for each faulty and non-faulty circuit. The feature vectors are stored in a fault dictionary, and a feature vector for an implementation of the circuit under test in a field operation is generated. The feature vector for the implementation of the circuit under test in the field operation is compared to the feature vectors in the fault dictionary. | 2008-10-02 |
20080244327 | TRACE DEVICE FOR MONITORING ELECTRONIC DEVICE - A trace device for monitoring and storing trace data of a device under test (DUT) is provided. The trace device is coupled in situ with the DUT when the DUT is in its operating environment (e.g., when the DUT is located within a rack, housing, or enclosure including the DUT). The trace device comprises a trace data buffer for storing trace data received from the DUT during operation. | 2008-10-02 |
20080244328 | GENERALIZED TRACE AND LOG FACILITY FOR FIRST ERROR DATA COLLECTION - A generalized trace and log facility is employed to collect data, including data associated with the first occurrence of an error. The facility provides standardized application programming interfaces to be used to collect data, print the data, and forward the data to a support team, if desired. | 2008-10-02 |
20080244329 | APPARATUS DIAGNOSING METHOD, APPARATUS DIAGNOSIS MODULE, AND APPARATUS MOUNTED WITH APPARATUS DIAGNOSIS MODULE - An apparatus diagnosing method is a method in which, in an apparatus including a control apparatus and a control board for controlling the control apparatus, on the controlling board, an error occurrence at the control apparatus and the control board is detected, an error signal is outputted, sensor data outputted from a sensor acquiring data about operation environments of the control apparatus and the control board is collected, and an environmental factor causing a failure or an error of the control apparatus and the control board is specified based upon the error signal and the sensor data, and the sensor data is collected in association with the error signal when the sensor data is collected. | 2008-10-02 |
20080244330 | APPARATUS, SYSTEM AND COMPUTER PROGRAM PRODUCT FOR SEAMLESSLY INTEGRATING THERMAL EVENT INFORMATION DATA WITH PERFORMANCE MONITOR DATA - An apparatus, system and method of integrating performance monitor data with thermal event information are provided. A thermal event, in this case, is when the temperature of a chip within which is embedded a processor exceeds a user-configurable value while the processor is processing instructions and/or using storage devices that are being monitored. In any event, when the thermal event occurs, the temperature of the chip along with the performance monitor data is stored for future uses, which include performance and diagnostic analyses. | 2008-10-02 |
20080244331 | System and Method for In-Band Problem Log Data Collection Between a Host System and a Storage System - A system and method for in-band problem log data collection are provided. Facilities are provided for a host system, host application, or server system to instigate a state save operation in a storage system utilizing direct commands in response to an error or failure. The host system may include an application program interface (API) to force the storage device to collect a set of state save data for debug purposes at a specific time interlocked with a host system log. The API of the illustrative embodiments may be provided in a failover driver and/or host bus adapter (HBA) driver in the prime code path such that first time data capture following an error is maximized. Since the host system is instigating the state save operation with direct commands, a larger amount of transient data may be collected to provide more comprehensive state information for debugging purposes. | 2008-10-02 |
20080244332 | MACHINE INSTRUCTION LEVEL RACE CONDITION DETECTION - An apparatus, method and computer-readable medium provide for detecting and filtering potential race conditions. In one example, potential race conditions may be detected by determining overlap of memory accesses (e.g., read, write). Potential race conditions may be filtered as potentially benign or harmful race conditions using, for example, heuristics, comparison of output states from execution of instructions or operations in differing sequences or identifying of associated output bugs corresponding to the execution of operations in different sequences. | 2008-10-02 |
20080244333 | ENHANCED FAILURE DATA COLLECTION SYSTEM APPARATUS AND METHOD - An apparatus for collecting failure data includes a failure data collector that initializes one or more test devices by establishing a secondary interface therewith in response to receiving a test device initialization command from a device tester, communicates one or more failure data collection requests to each test device corresponding to a failure data collection command received from the test device, and receives failure data from the test devices via the secondary interface in response to communicating the failure data collection request. In certain embodiments, the present invention includes a failure data storage repository for storing the collected failure data. | 2008-10-02 |
20080244334 | SYSTEM FOR SYNCHRONIZING REPLICAS OF A DATABASE - A system for synchronizing replicas of a database. The system detects a failure of update data from a first replica to be applied to a second replica and determines a cause of the failure. The system also resolves the cause of the failure. According to the system disclosed herein, the present invention synchronizes the replicas of the database without requiring manual intervention. | 2008-10-02 |
20080244335 | Protecting memory operations involving zero byte allocations - Applications are protected from being exposed to exploits and instabilities due to memory operations involving zero byte allocations. Memory operations involving a zero byte allocation are handled by a zero byte memory manager. When an application requests a zero byte allocation, a pointer to a protected part of memory is returned such that when the application attempts to read and/or write to the location the program flow is interrupted. | 2008-10-02 |
20080244336 | SET-CYCLIC COMPARISON METHOD FOR LOW-DENSITY PARITY-CHECK DECODER - The present invention discloses a set-cyclic comparison method for an LDPC (Low-Density Parity-Check) decoder, which applies to a CNU (Check Node Unit) or a VNU (Variable Node Unit). In the systematized method of the present invention, all the input elements are initialized to obtain a matrix. Based on the symmetry of the matrix and the similarity between the rows of the matrix are sequentially formed different sets respectively corresponding to the horizontally-continuous elements having the maximum iteration number in the horizontal and vertical directions, the symmetric non-continuous non-boundary elements, and the boundary elements plus the end-around neighboring elements in the same row. The present invention applies to any input number. Via the large intersection between the compared sets, the present invention can effectively reduce the number of comparison calculations and greatly promote the performance of an LDPC decoder. | 2008-10-02 |
20080244337 | Method and System for Automated Handling of Errors in Execution of System Management Flows Consisting of System Management Tasks - A method and system for automated error handling in system management flows by enhancing workflow engines by an error handling component and by adding a supportive error handling layer to invoked system management tasks which serves m the counterpart to the workflow engine's error handling component. The additional functionality of the task-provided, error handling layer is accessible for the workflow engine via extended Web services interfaces. The workflow engine's error handling component and the task-provided error handling layer allow for the definition of a standard protocol between the workflow engine and invoked tasks for automated error handling. Furthermore, an interface and method of communication between the enhanced workflow engine and an external error resolving device (such as an expert system) is defined with the purpose of using the external error resolving device for automatic error recovery. The internal or external error resolving device is capable of performing corrective actions on the managed IT infrastructure using mechanisms outside the scope of this invention. The benefit of the presented architecture is that the complexity concerning error handling is completely removed from system management flow definitions, and the designer of a system management flow can concentrate on the logical structure of the flow (e.g. the correct sequence of tasks). | 2008-10-02 |
20080244338 | Soft bit data transmission for error correction control in non-volatile memory - Data stored in non-volatile storage is decoded using iterative probabilistic decoding. An error correcting code such as a low density parity check code may be used. In one approach, initial reliability metrics, such as logarithmic likelihood ratios, are used in decoding sensed states of a set of non-volatile storage element. The decoding attempts to converge by adjusting the reliability metrics for bits in code words which represent the sensed state. Soft data bits are read from the memory if the decoding fails to converge. Initial reliability metric values are provided after receiving the hard read results and at each phase of the soft bit operation(s). In one embodiment, a second soft bit is read from the memory using multiple subsets of soft bit compare levels. While reading at the second subset of compare levels, decoding can be performed based on the first subset data. | 2008-10-02 |
20080244339 | Read level control apparatuses and methods - Various read level control apparatuses and methods are provided. In various embodiments, the read level control apparatuses may include an error control code (ECC) decoding unit for ECC decoding data read from a storage unit, and a monitoring unit for monitoring a bit error rate (BER) based on the ECC decoded data and the read data. The apparatus may additionally include an error determination unit for determining an error rate of the read data based on the monitored BER, and a level control unit for controlling a read level of the storage unit based on the error rate. | 2008-10-02 |
20080244340 | TEST APPARATUS AND SELECTION APPARATUS - There is provided a test apparatus for testing a memory under test that includes therein a plurality of blocks and one or more repairing columns. The test apparatus includes a testing section, a flag memory that stores thereon a flag indicating whether each column is defective, a counter memory that stores thereon the number of defective blocks in association with each column, a failure writing section that writes a flag indicating that a column is defective into the flag memory under a condition that one of the following conditions is satisfied: when a test result indicates that the column is defective; and when a flag stored on the flag memory in association with the column indicates that the column is defective, a counting section that increments the number of defective blocks stored on the counter memory in association with the column under a condition that the test result indicates that the column is defective and the flag indicating that the column is defective is not stored on the flag memory in association with the column, and a selecting section that selects columns to be replaced with the repairing columns based on the number of defective blocks stored in association with each column. | 2008-10-02 |
20080244341 | METHODS AND APPARATUS FOR COMMUNICATING WITH A TARGET CIRCUIT - A system and method are disclosed which may include establishing a stored test vector, including a plurality of data bits, within a vector data engine; transmitting the stored test vector to a memory array; performing at least one arithmetic or logical operation upon the stored test vector by a vector data generator within the vector data engine to update the stored test vector; and repeating the steps of transmitting and performing so as to continuously transmit continuously changing stored test vectors to the memory array. | 2008-10-02 |
20080244342 | SCAN STRING SEGMENTATION FOR DIGITAL TEST COMPRESSION - One may use a new technique to determine the placement of exclusive-ors in each scan string of a chip to achieve improved test vector compression, and one may combine this technique with methods to minimize the overhead of the exclusive-or logic, to eliminate clock enable logic for multiple scan strings, to minimize the changes to existing test logic insertion and scan string reordering, and to minimize the test vector compression computation time. | 2008-10-02 |
20080244343 | STRUCTURAL TESTING USING BOUNDARY SCAN TECHNIQUES - A boundary scan technique to generate toggling waveform such as a square wave signal to perform structural testing is disclosed. An instr_extesttoggle command is provided that enables IEEE 1149.1 boundary scan cell to selectively generate the toggling signal on the pre-specified output pads of the integrated circuit. The frequency of the toggling signal may be controlled by the JTAG clock signal and the frequency of the toggling signal may be independent of the length of the boundary scan chain. Such an approach circumvents provisioning test points on the interconnects of a printed circuit board. | 2008-10-02 |
20080244344 | Testing A Pipeline In An Ic - An architecture for testing a pipeline ( | 2008-10-02 |
20080244345 | FAILURE DIAGNOSTIC APPARATUS, FAILURE DIAGNOSTIC SYSTEM, AND FAILURE DIAGNOSTIC METHOD - There is provided a failure diagnostic apparatus that diagnoses a semiconductor integrated circuit device for failure based on a compressed signal obtained by compressing a plurality of signals outputted from a plurality of scan chains in which a plurality of scan flip-flops, to which signals from the semiconductor integrated circuit device are inputted, are connected in series. For each stage of the scan chains, the failure diagnostic apparatus sets a virtual space compression circuit that compresses output signals of the scan flip-flops in the stage and a virtual pin connected to the output terminal of the virtual space compression circuit, and the output signal of the virtual pin is compared with the compression signal to diagnose the semiconductor integrated circuit device for failure. | 2008-10-02 |
20080244346 | Circuit for Compression and Storage of Circuit Diagnosis Data - A compactor includes test data inputs that are connectable to circuit outputs of an electrical circuit, test comparison inputs, and test data outputs. The compactor further includes a number of H matrix XOR gates arranged as a switching mechanism between the test data inputs and the test data outputs such that data applied to the test data inputs is produced at the test data outputs compressed in accordance with coefficients of an H matrix of an error-correcting code, and compensation XOR gates arranged between the test data inputs and the test data outputs, each compensation XOR gate including an input for receiving a compensation value. | 2008-10-02 |
20080244347 | Automated Circuit Model Generator - A method, system and program reduce ATPG processing times by eliminating non-value added cells in a circuit model that that is provided to an ATPG system. The elimination of non-value added cells results in a logically equivalent circuit model that is reduced in size from an original circuit model. As a result, an ATPG system that receives the modified circuit model generates a set of test vectors in a shorter amount of time. The method, system and program identify select cells in accordance with information provided in an original circuit model that defines each of the separate circuit cells. Leaf cells, a specific type of cell, are processed using a first set of conditions to generate a modified cell definition. Thereafter, a second set of conditions are applied to generate a modified circuit model. | 2008-10-02 |
20080244348 | DETERMINING DIE PERFORMANCE BY INCORPORATING NEIGHBORING DIE PERFORMANCE METRICS - A method includes receiving a first set of parameters associated with a plurality of die. A first die performance metric associated with a selected die is determined based on the first set of parameters. At least one neighborhood die performance metric associated with a set comprised of a plurality of die that neighbor the selected die is determined based on the first set of parameters. A second die performance metric is determined for the selected die based on the first die performance metric and the neighborhood die performance metric. | 2008-10-02 |
20080244349 | MEMORY DEVICE INCLUDING MEMORY CONTROLLER - A memory device includes a semiconductor memory including a plurality of memory cells, and a controller including a buffer which temporarily stores data, a data pattern check circuit which checks a predetermined data pattern of data that are stored in the buffer and are to be stored in a plurality of neighboring ones of the memory cells, and sends an address in accordance with a result of the check, and a data correction circuit which corrects a value of data at the address that is sent, and sends the corrected value to the semiconductor memory. | 2008-10-02 |
20080244350 | APPARATUS AND METHOD FOR AUTOMATIC REPEAT REQUEST IN MULTIPLE INPUT MULTIPLE OUTPUT SYSTEM - A method for an Automatic Repeat reQuest (ARQ) at a receiver in a Multiple Input Multiple Output (MIMO) system wherein when a received packet is erroneous and the erroneous packet is received from the weakest antenna in a Space Multiplexing (SM) mode, a first smallest number of retransmissions is computed to acquire a Signal to Noise Ratio (SNR) within or above an Adaptive Modulation and Coding (AMC) level. When the first number of the retransmissions is greater than a threshold, the sender is requested to retransmit the packets from the strongest antenna in the SM mode and when the first number of the retransmissions is smaller than the threshold, the sender is requested to retransmit the packets from the weakest antenna in the SM mode. | 2008-10-02 |
20080244351 | Communication Apparatus - A communication apparatus is provided. The communication apparatus includes an image read unit which reads image data from a transmission document; a tag read unit which wirelessly reads tag data stored in a wireless tag corresponding to the transmission document; an image data generation unit, if the tag data includes mark data indicating that a mark is to be added to the image data, generates composite image data by combining the image data and mark image data based on the mark data; and a transmission unit which transmits the composite image data as transmission document data to an external apparatus. | 2008-10-02 |
20080244352 | APPARATUS AND METHOD FOR TRANSMITTING DATA AND APPARATUS AND METHOD FOR RECEIVING DATA - Provided are an apparatus and method for transmitting data and an apparatus and method for receiving data, in which the transmission of uncompressed data over a wireless network can be performed by retransmitting an erroneous bit or a group of erroneous bits, if any, of each sub-packet including a number of bits or a number of groups of bits having different significance levels. The apparatus for transmitting data includes an error detection module which determines whether each of a plurality of portions of a transmitted packet having different significance levels is erroneous based on a received response packet; a data-packet generation module which generates a retransmission packet including one or more erroneous portions of the transmitted packet according to the results of the determination performed by the error detection module; and a communication module which transmits the retransmission packet through a communication channel. | 2008-10-02 |
20080244353 | METHOD FOR CREATING AN ERROR CORRECTION CODING SCHEME - The present invention relates to a method for reducing data loss comprising a first computing step for computing an intermediate result for each redundancy information entity of a redundancy set by processing respectively associated data information entities of a given data set on at least two main diagonals of a parity check matrix representing an error correction coding scheme. The method further comprises a second computing step for computing the information content of the respective redundancy information entity dependent on the respective intermediate result. | 2008-10-02 |