44th week of 2010 patent applcation highlights part 59 |
Patent application number | Title | Published |
20100281148 | TECHNIQUE FOR PROVIDING SUPPORT FOR A PLURALITY OF MOBILITY MANAGEMENT PROTOCOLS - A technique for registering a mobile terminal with an anchor node and for handling data packets after registration is provided. A method implementation of this technique comprises the steps of providing support for a plurality of mobility management protocols, wherein the mobility management protocols are deployed in parallel within a protocol stack of an anchor node, receiving, from a mobile terminal, a registration message, and selectively handling the registration message in accordance with the mobility management protocol associated with the registration message. | 2010-11-04 |
20100281149 | Buffer system for managing service measurement requests - The present invention relates to a buffer system for managing a plurality of service measurement (SM) requests. In one embodiment, the buffer system includes a count buffer configured to store the SM requests. Each SM request includes a key set and a name-value pair. The name-value pair includes a name field and a value field. The buffer system further includes a send buffer configured to consolidate indices of the count buffer according to a destination address of each of the SM requests and a transport buffer configured to create at least one outgoing message based on data contents of the count buffer than correspond to the indices that have been consolidated. | 2010-11-04 |
20100281150 | Method of Processing Event Notifications and Event Subscriptions - A method of processing event notifications and event subscriptions in a telecommunications or data network comprising a plurality of nodes, wherein an individual node performs the steps of maintaining a first repository for storing a set of event subscriptions encoded in a first summary and maintaining a second repository for storing the set of event subscriptions. The node encodes a received event notification into a second summary and then checks if the received event notification is a member of the set by comparing the first summary and the second summary. If the event notification is not a member of the set said notification is discarded. | 2010-11-04 |
20100281151 | PROVISIONING AVAILABLE NETWORK RESOURCES - Systems and methods are provided that allow network resources to be shared across geographical distances. This can be achieved by changing the resources available for establishing and handling call or data session processing in an area. A mobility management device can alone or in combination with a DNS server change the size or the resource pool available in some embodiments. The change in resources can be dynamic according to certain predefined conditions or can be setup beforehand to account for daily demand. This sharing of resources can allow more efficient usage of resources available across a geographic region, rather than needed to over-provision each region to account for peak demands. | 2010-11-04 |
20100281152 | Integrated Media Content Server System And Method for Customization Of Metadata That Is Associated Therewith - A system and method for the customization of media content metadata that is transmitted to any one of a plurality of end user devices of differing types. The system is adapted to modify individual records or even individual fields from the entire gamut of available metadata into a metadata feed which is optimally suited for display upon the type of end user device. Additionally, the system is also able to modify the records or individual fields from a list of all metadata instances according to pre-recorded user preferences. The result is a system that optimally utilizes the current connection path in order to reduce congestion thereon, or to alleviate any user potential frustration caused by sporadic performance of the overloaded interconnection path. | 2010-11-04 |
20100281153 | SYSTEM AND METHOD FOR REMOTELY CONTROLLING MOBILE COMMUNICATION DEVICES - A system for remotely controlling mobile communication devices includes a redirection system, a remote control system and a mobile data communication device. The redirection system detects a triggering event at a host system and in response to the triggering event continuously redirects data items from the host system to a wireless network. The mobile data communication device receives data items from the wireless network and executes a plurality of device operations. The remote control system receives control information from a user interface and transmits the control information through the redirection system to the wireless network. The control information is received and executed by the mobile data communication device to remotely control one or more of the device operations. Methods of controlling the operation of mobile data communication devices are also disclosed. | 2010-11-04 |
20100281154 | Methods and Apparatus for Remote Monitoring - Provided are methods, apparatus and computer programs for remote monitoring of data. Log data output by an application program running on a storage-constrained apparatus is saved to local system memory—either as an in-memory data file or as output from one application piped to the input of another, or as a named pipe that passes data to a local publisher program—and then captured by the local publisher program. The local publisher program sends the data to a publish/subscribe broker, which can retain the most recent publications for analysis by one or more subscribers. This avoids the need to save large amounts of data to disk storage on the storage-constrained apparatus, and ensures that console output data and log data that is often discarded by headless, storage-constrained systems is available for analysis. The combination of the retain feature and publishing of output data in response to failure of a monitoring application ensures the availability of the data that was output just before the failure, which is generally the most useful data for problem diagnosis. | 2010-11-04 |
20100281155 | APPLICATION MONITORING - A method and apparatus for monitoring an application executing on a self-service terminal. The method comprises: registering with a services manager (such as an XFS or J/XFS manager) to receive event reports indicative of a change of state being sent to the application; accessing an operating system function to deduce a current status of the application; and communicating a status of the application to the remote management system, without communicating with the application, to enable the remote management system to manage the self-service terminal more effectively. | 2010-11-04 |
20100281156 | SYSTEM AND METHOD OF RECORDING AND SHARING MOBILE APPLICATION ACTIVITIES - A method of recording activity at a wireless device is provided. The method includes receiving a record command, determining a user activity at the wireless device, and determining available memory at the wireless device. The method further includes recording the user activity to create a device recording at least partially based on the user activity and the available memory. | 2010-11-04 |
20100281157 | DETECTING OVERLOADS IN NETWORK DEVICES - Systems and methods are provided to allow detection of the load conditions on network devices. The load detection can occur using a mobility management device to track establishment of sessions and attempts at session establishment to determine the loading conditions on various network devices. This information can then be used by a selection logic to determine which devices are selected to send session establishment messaging for new session establishment requests. This can provide quicker setup times as highly loaded network devices or network devices experiences other failures are selected less until conditions are back to normal. | 2010-11-04 |
20100281158 | ENVIRONMENTAL FOOTPRINT MONITOR FOR COMPUTER NETWORKS - A system and method for obtaining an environmental footprint of a website are presented. The system includes a website embedded with a unique identifying tag, a user terminal to view the website, an environmental footprint server which identifies the unique identifying tag of the website, and a processor to calculate the environmental footprint of the website based upon time data and the average emissions emitted by a user terminal, the server hosting the website and a network connecting the user terminal and the server. | 2010-11-04 |
20100281159 | MANIPULATION OF DHCP PACKETS TO ENFORCE NETWORK HEALTH POLICIES - A facility for causing a device connected to a network that is configured to act as a DHCP server to enforce network health policies against hosts connected to the network is described. The device intercepts network packets sent to a DHCP server from any host connected to the network. For each of at least a portion of these intercepted network packets that contain a statement of health, the facility ( | 2010-11-04 |
20100281160 | SYSTEM, APPARATUS AND METHODS TO IMPLEMENT HIGH-SPEED NETWORK ANALYZERS - Systems, apparatus and methods for the implementation of high-speed network analyzers are provided. A set of high-level specifications is used to define the behavior of the network analyzer emitted by a compiler. An optimized inline workflow to process regular expressions is presented without sacrificing the semantic capabilities of the processing engine. An optimized packet dispatcher implements a subset of the functions implemented by the network analyzer, providing a fast and slow path workflow used to accelerate specific processing units. Such dispatcher facility can also be used as a cache of policies, wherein if a policy is found, then packet manipulations associated with the policy can be quickly performed. An optimized method of generating DFA specifications for network signatures is also presented. The method accepts several optimization criteria, such as min-max allocations or optimal allocations based on the probability of occurrence of each signature input bit. | 2010-11-04 |
20100281161 | METHOD, SYSTEM AND APPARATUS FOR AUTOMATED INVENTORY REPORTING OF SECURITY, MONITORING AND AUTOMATION HARDWARE AND SOFTWARE AT CUSTOMER PREMISES - A single platform for controller functionality for each of security, monitoring and automation, as well as providing a capacity to function as a bidirectional Internet gateway, is provided. Embodiments of the present invention provide such functionality by virtue of a configurable architecture that enables a user to adapt the system for the user's specific needs. Embodiments of the present invention further provide for remote access to the configurable controller, thereby providing for remote monitoring of the state of a dwelling and for remote control of home automation. Embodiments of the present invention further provide for reporting to a provider those sensors and other hardware used by the configurable architecture, enabling the provider to track inventory of such items. | 2010-11-04 |
20100281162 | SYSTEMS AND METHODS OF PROVIDING SERVER INITIATED CONNECTIONS ON A VIRTUAL PRIVATE NETWORK - The present invention is related to a method for establishing via an appliance a transport layer protocol connection initiated by a server on a first network to a client connected from a second network to the first network via a secure socket layer virtual private network (SSL VPN) connection. The method includes the step of receiving, by an appliance, a transport layer connection request from a server on a first network to connect to a client connected to the first network via a SSL VPN connection from a second network. The transport layer connection request identifies a client destination internet protocol address and a client destination port on the first network. The method includes establishing, by the appliance, a first transport layer connection to the server on the first network, determining, by the appliance, the client on the second network associated with the client destination internet protocol address on the first network, and transmitting, by the appliance, connection information identifying the client destination port to an agent on the client. The agent establishes a second transport layer connection to the client destination port using a local internet protocol address of the client on the second network and establishes a third transport layer connection to the appliance, which it associates with the second transport layer connection. | 2010-11-04 |
20100281163 | METHOD AND APPARATUS FOR MAINTAINING ROUTING INFORMATION - A method and apparatus for maintaining routing information in a Peer-to-Peer (P2P) network are provided. The method includes that: a super maintenance node receives routing update information of an ordinary node in its home area; the super maintenance node sends routing update information to super maintenance nodes in other network areas; the super maintenance nodes in other network areas notify ordinary nodes in their home network areas to update routing information. With the present invention, a node of strong processing capabilities at the network area border is chosen to act as a super maintenance node and other nodes as ordinary nodes; when a node joins or fails, an ordinary node sends detected routing update information only to the super maintenance node in the local network area; the super maintenance node then forwards the update information to super maintenance nodes in other network areas. Each super maintenance node notifies ordinary nodes in its home network area of the received routing update information. | 2010-11-04 |
20100281164 | Selective acceptance of electronic messages in communication systems - A file authentication requesting device that stores a computer program for requesting authentication of files in digital systems, the device comprises a confirmation request system that generates a request for a confirmation receipt from a third party authenticator authenticating the attributes of a file; a transferring system that transfers attributes of at least one file to be authenticated to the third party authenticator from the device that requested the confirmation; and a receiving system that receives the confirmation receipt comprising authenticated file attributes, after authentication by the third party authenticator; wherein, at least one file authentication is received from the third party authenticator. Corresponding processing devices, media, systems and methods are also provided. | 2010-11-04 |
20100281165 | METHOD FOR THE LOAD DISTRIBUTION IN A PEER-TO-PEER-OVERLAY NETWORK - A method provides for the even load distribution in a peer-to-peer-overlay network having a plurality of peers, each having an associated keyword region. A data resource to be stored, the keyword thereof being within the keyword region of a peer, is only stored with said peer if the number of data resources stored there has not reached a resource threshold limit. | 2010-11-04 |
20100281166 | Software Platform and System for Grid Computing - A software platform for providing grid computing on a network of computing nodes, comprising a configurable service container executable at the nodes, including message dispatching, communication, network membership and persistence modules, and adapted to host pluggable service modules. When executed at the nodes at least one instance of the container includes a membership service module for maintaining network connectivity between the nodes, at least one instance of the container includes a scheduler service module configured to receive one or more tasks from a client and schedule the tasks on at least one of the nodes, and at least one instance of the container includes an executor service module for receiving one or more tasks from the scheduler service module, executing the tasks so received and returning at least one result to the scheduler service module. | 2010-11-04 |
20100281167 | System and method for analyzing and coordinating Service-Level-Agreements (SLA) for Application-Service-Providers (ASP) - The present invention describes a system for automatically monitoring and managing Service Level Agreements on behalf of Service providers (such as Application Service providers). The system is based on a specialized SLA language that can translate complex or simple Service Level Agreements into measurable and controllable criterion. The system enables Application Service providers to set up customized Service Level Agreements with customers, and monitor, modify and control all aspects of these agreements, including billing, sales, Customer Relation Management, customer support and Quality of Service. The technology on which the present invention is based is a formula driven language that translates Service Level Agreement details into commands. As such these details can be tracked and processed to produce detailed reports and summaries. | 2010-11-04 |
20100281168 | Assymmetric Traffic Flow Detection - Methods, apparatuses and systems directed to detecting, and in some implementations, responding to, asymmetric routing in network deployments. In a particular embodiment, a first process detects asymmetric routing at connection initiation, while the second process can detect asymmetric routing that may after connection initiation. | 2010-11-04 |
20100281169 | PRESENCE-AWARENESS FOR WIRELESS DEVICES - The invention relates to computer software product ( | 2010-11-04 |
20100281170 | METHOD FOR SELECTING A POLICY AND CHARGING RULES FUNCTION ENTITY IN THE NON-ROAMING SCENARIO - A method for selecting a policy and charging rules function entity in the non-roaming scenario includes the following steps: when a diameter routing agent DRA receives an indication message of the IP connectivity access network IP-CAN session establishment, the indication message is forwarded to a PCRF according to the related relationship which is set up and saved for allocating the policy and charging rules function PCRF entity to the IP-CAN session; and the corresponding policy and charging control PCC policy, which is made for the IP-CAN session by the PCRF, is forwarded to the provider's IP application function AF and the network element, which has policy and charging enforcement function, corresponding to the IP-CAN session. | 2010-11-04 |
20100281171 | PACKET-SWITCHED NETWORK-TO-NETWORK INTERCONNECTION INTERFACE - An exemplary method includes network elements associated with distinct network domains exchanging signaling and media border processing information by way of a secure packet-switched connection between the network elements, exchanging service policy information by way of the secure packet-switched connection, peering a session associated with a first service type between the distinct network domains by way of a packet-switched network-to-network interconnection interface (“NNII”) in accordance with the exchanged signaling and media border processing information, peering another session associated with a second service type between the distinct network domains by way of the packet-switched NNII in accordance with the exchanged signaling and media border processing information, enforcing a first performance threshold specified by the service policy information for peering the session associated with the first service type, and enforcing a second performance threshold specified by the service policy information for peering the other session associated with the second service type. | 2010-11-04 |
20100281172 | SAS topology pathway analysis - Methods and systems for configuring network storage are presented. | 2010-11-04 |
20100281173 | DELEGATED ADMINISTRATION FOR REMOTE MANAGEMENT - A remote administration system is described herein that provides varying permissions to invoke administrative commands to multiple users. An application host provisions users of different organizations and defines one or more commands that the users can invoke remotely. The system associates the commands with users and/or groups to specify the users and/or groups that are authorized to execute the commands. When the remote administration system receives a remote request to perform a command, the system determines a user associated with the command and whether the user is authorized to execute the command. The system also creates an execution context for each connected user that defines the roles and access privileges associated with the user and that isolates the user from other users. Thus, the remote administration system provides remote administration of hosted applications in a way that is easy for administrators of the hosted service to manage. | 2010-11-04 |
20100281174 | Personalized Media Server in a Service Provider Network - Apparatuses and methods support a media server that is hosted in a service provider's network so that media content can be stored from or rendered to a Digital Living Network Alliance (DLNA) network. Media content may be stored directly by accessing the media server or by downloading the media content to the media server. A tunnel is established between an endpoint in the DLNA network through the service provider infrastructure to the media server. Subsequently, a session may be established between a DLNA device to the media server through the tunnel using a virtual address, where the media server is addressable as a virtual device within the DLNA network so that the virtual address is part of an address space of the DLNA network. The media server may support a plurality of DLNA networks, in which a tunnel is established to the media service for each DLNA network. | 2010-11-04 |
20100281175 | NETWORK SYSTEM | 2010-11-04 |
20100281176 | SYMBIOTIC CLIENT AND SERVER FOR EMBEDDED NETWORK SYSTEM - A protocol with matching protocol creation and parsing engines on both the client and server facilitates the automatic transfer of data and commands in an autonomous fashion. This protocol and its corresponding engines make up a new services layer software stack that is above the existing application layer in the network stack. The protocol is based on standard HTTP over TCP/IP as the applications, transport and internet layers, but adds a means to frame commands and data to allow for any operation to be performed over a single service layer. Protocol creation and parsing engines reside on all clients and the server. The server-side protocol engine runs as a common gateway interface binary within a standard web server. The client-side protocol engine has the communication layer of a standard web browser, but replaces the user interface layers with an API to automate the passing of commands and data to the server protocol engine. The server is then able to execute upon client requests or pass requests back to a specific client. | 2010-11-04 |
20100281177 | METHOD OF GENERATING A FILE DESCRIBING A BITSTREAM, CORRESPONDING DEVICE AND COMPUTER PROGRAM PRODUCT - Method of generating a file describing a bit stream, corresponding device and computer program product. The invention relates to a method of generating a description file ( | 2010-11-04 |
20100281178 | Network Audio Distribution System and Method - System and methods for distributing audio content from plural audio sources to plural client terminals located on a network. The system includes an audio source interface that is coupled to receive raw audio from a first audio source, and converts the raw audio into a digital audio clip that is incorporated into a digital audio packet, which further contains a timestamp and a channel identity corresponding to the first audio source. A network audio server is coupled to receive the digital audio packet from the audio source interface, and operates to format the digital audio packet into a digital audio file that is compliant with the network, and store the digital audio file at a network address. The network audio server generates a directory packet that includes the network address of the digital audio file, the channel identity, and the timestamp, and couples the directory packet to a directory server located on the network. The directory server receives the directory packet and generates a directory stream, including at least a portion of the directory packet, and couples the directory stream through the network to a first client terminal. The first client terminal receives the directory stream and selectively identifies the directory packet according to a client profile, and subsequently communicates an audio file request through the network, requesting the digital audio file from the network audio server. Then, upon receipt of the audio file request, the audio server responds by coupling the digital audio file to the client terminal through the network. | 2010-11-04 |
20100281179 | Integrated Media Content Server System And Method For the Customization Of Metadata That Is Associated Therewith - A system and method for the customization of media content metadata that is transmitted to any one of a plurality of end user devices of differing types. The system is adapted to modify individual records or even individual fields from the entire gamut of available metadata into a metadata feed which is optimally suited for display upon the type of end user device. Additionally, the system is also able to modify the records or individual fields from a list of all metadata instances according to pre-recorded user preferences. The result is a system that optimally utilizes the current connection path in order to reduce congestion thereon, or to alleviate any user potential frustration caused by sporadic performance of the overloaded interconnection path. | 2010-11-04 |
20100281180 | Initiating Peer-to-Peer Tunnels - Initiating peer-to-peer tunnels between clients in a mobility domain. Client traffic in a mobility domain normally passes from the initiating client to an access node, and from the access node through a tunnel to a controller, and then through another tunnel from the controller to the destination access node, and the destination client. When initiated by the controller, the access nodes establish a peer-to-peer tunnel for suitable client traffic, bypassing the “slow” tunnels through the controller with a “fast” peer-to-peer tunnel. Traffic through this “fast” tunnel may be initiated once the tunnel is established, or traffic for the “fast” tunnel may be queued up until traffic has completed passing through the “slow” tunnel. This queue and release process may be bidirectional or unidirectional depending on the traffic. Completion of slow tunnel traffic may be sensed in a number of ways. Slow tunnel traffic may be timed out, and queued traffic released after a preset time since the last packet was sent through the slow tunnel. The identity of the last packet sent through the slow tunnel may be retained, and queued traffic released when an acknowledgement for that packet is received. A special packet may be sent through the slow tunnel and queued traffic released when an acknowledgement for that packet is received. | 2010-11-04 |
20100281181 | NETWORK ABSTRACTION AND ISOLATION LAYER FOR MASQUERADING MACHINE IDENTITY OF A COMPUTER - A network abstraction and isolation layer (NAIL) for masquerading the machine identity of a computer in a network to enable the computer to communicate in the network with a different machine identity including an isolated network interface for communicating with the computer, an abstraction network interface for communicating with a network device coupled to the network, and control instructions or device. The control instructions or device performs machine identity translation to masquerade machine identity of the computer relative to the network. Machine identity masquerading includes selectively translating any one or more of an IP address, a MAC address, a machine name, a system identifier, and a DNS Name in the header or payload of communication packets. | 2010-11-04 |
20100281182 | Extensible binary mark-up language for efficient XML-based data communications and related systems and methods - An extensible binary mark-up language is disclosed that is compatible with existing XML standards yet provides significantly improved efficiencies for XML-based data storage and communications, particularly for narrow and low bandwidth communication media. A corresponding extensible non-binary mark-up language is also disclosed that is compatible with the XML standard. This dual-representation common message format (CMF) allows standard XML tools to be utilized in viewing and editing XML-based data and allows a CMF parser to be utilized to convert the XML formatted information into an extensible binary representation for actual communication through a medium or storage on a wide range of media. Advantages include a very compact, yet flexible and extensible binary data representation (CMF-B) for a corresponding extensible mark-up language (CMF-X), a data packaging scheme that allows for the effective transport of XML-based data over existing data channels, including narrow-bandwidth channels that utilize existing network protocols, and a CMF parser that allows for seamless conversion between CMF-B and CMF-X. | 2010-11-04 |
20100281183 | METHOD AND DEVICE FOR ACTIVATING FUNCTIONS OF A POWERED-OFF DEVICE VIA A SERIAL DATA BUS INTERFACE - A method and device are provided for activating certain functions of a powered-off device having a serial data bus interface when it is attached to a powered device via the serial bus interface. On detection of a voltage on the power line of the serial bus, the processor of the device is booted in a special operation mode, wherein certain functions of the serial data bus interface can be used without powering the complete device. The device may then be enumerated by the attached host device and for example allow access to its memory unit or use the power signal on the serial bus interface for battery charging. | 2010-11-04 |
20100281184 | Mouse with expandable memory capacity and an operating method thereof - A mouse with expandable memory capacity includes a button set with a plurality of buttons, a build-in memory, a card connector, and a controller. Therein, the card connector is for connecting with a memory card. The controller is connected to the button set, the build-in memory, and the card connector, wherein the controller is for controlling the operation of the build-in memory and for controlling the operation of the memory card so as to store a button instruction set. The controller further controls and uses the memory card to form an expansion memory for the build-in memory. The button instruction set records an operation instruction that is represented by combinations formed from one or more of the buttons. Therefore, the goal of expanding memory capacity of the mouse is achieved. | 2010-11-04 |
20100281185 | COMMUNICATION DEVICE, CONTROL METHOD FOR COMMUNICATION DEVICE, AND COMPUTER PROGRAM PRODUCT - A communication device includes a connecting unit that connects another device; a communicating unit that performs communication with the other device via the connecting unit by using a signal in accordance with a communication request; and a controlling unit that controls a state of the connecting unit to be in either one of a first state in which the communication can be performed by the communicating unit and a second state in which the communication is not performed by the communicating unit and electrical power consumption of the connecting unit is reduced, wherein the controlling unit shifts the state of the connecting unit from the first state to the second state, when the connecting unit to which the other device is connected is in the first state, and if the communication request to the communicating unit is not received for a predetermined period of time. | 2010-11-04 |
20100281186 | Electric protective relay provided with a USB type connector - An electric protective relay provided with a USB type connector that is provided with at least a “USB” type or miniUSB interface connector ( | 2010-11-04 |
20100281187 | Methods of Operating Electronic Devices Having USB Interfaces Capable of Supporting Multiple USB Interface Standards - An electronic device includes a universal serial bus (USB) interface therein. This USB interface is configured to support at least first and second different USB interface standards. These different interface standards are selected by the electronic device in response to comparing a voltage level of a signal provided to said USB interface relative to a reference voltage generated within the electronic device. The signal provided to the USB may be a power supply signal, the first USB standard may be a USB 2.0 interface standard and the second USB standard may be an inter-chip USB interface standard. | 2010-11-04 |
20100281188 | Methods and Systems for Outlying Peripheral Device Management - Aspects of the present invention comprise systems and methods for detecting and managing peripheral devices that perform outside a given performance envelope. In some aspects, one or more threshold values may be determined prior to or during implementation by heuristic or other methods. These threshold values may then be used to determine device performance. In some aspects, threshold values may relate to performance parameters comprising device failures, consumption levels, output quality and other parameters. In some aspects, multiple threshold values may be used to determine device performance. In an exemplary aspect, a sheet usage threshold, a tone usage threshold and a power usage threshold may be used to determine if a device is an outlying device. In some aspects, performance below an excellence threshold value may indicate that a device has excellent performance. | 2010-11-04 |
20100281189 | METHOD FOR ENHANCING DATA TRANSMISSION EFFICIENCY - A method for enhancing data transmission efficiency in a data transmission system having a host, a subsystem and a transmission interface, utilized for the host to transmit and receive a data from a memory of the subsystem via the transmission interface includes steps of the host outputting a query command to the subsystem via the transmission interface for querying available memory utilization of the subsystem; the subsystem outputting a return message to the host via the transmission interface for indicating the available memory utilization according to the query command; and controlling data transmission from the host to the subsystem according to the return message. | 2010-11-04 |
20100281190 | Packet processing apparatus - By referring to a receiving connection information table stored in a memory, a receiving assignment CPU assigns packets to parallel processing CPUs in such a manner that the packets received from the same connection are subjected to a receiving process by a corresponding parallel processing CPU. Each parallel processing CPU identifies the input QoS of a packet and notifies a QoS processing CPU, corresponding to that identified input QoS, of the packet. Each QoS processing CPU is arranged so that it corresponds to a QoS processing queue group in the memory and performs a QoS process on this QoS processing queue group. | 2010-11-04 |
20100281191 | Striping with SCSI I/O referrals - The present disclosure is directed to a method for communication between an initiator system and a block storage cluster. The method may comprise initiating an input/output (I/O) request from the initiator system to a first storage system included in a plurality of storage systems of the block storage cluster, each of the plurality of storage systems comprising a plurality of data segments; receiving a referral response from the first storage system, the referral response providing information describing a layout of data requested in the I/O request; obtaining a virtual disk count, a segment size, and at least one indexed port identifier based on the referral response; and directing the I/O request from the initiator system to the block storage cluster based on the virtual disk count, the segment size, and the at least one indexed port identifier. | 2010-11-04 |
20100281192 | APPARATUS AND METHOD FOR TRANSFERRING DATA WITHIN A DATA PROCESSING SYSTEM - An apparatus for transferring data between buffers within a data processing architecture includes first and second memory devices. The apparatus further includes a first connection manager associated with a first buffer in the first memory device, and a second connection manager associated with a second buffer in the second memory device. The first and second connection managers manage data transfers between the first and second buffers. The first connection manager is configured to receive a token from the second connection manager in order to trigger data transfer between the first buffer and the second buffer. The first connection manager is further configured to initiate a data transfer between the first and second buffers in response to receiving the token. This token-based method for initiating data transfers between the connection managers requires little or no CPU intervention. | 2010-11-04 |
20100281193 | DATA BUFFER DEVICE - A data buffer device includes: a tag value generation circuit that generates a tag value; a first buffer that stores first priority data; a second buffer that stores second priority data; and a data output circuit that outputs the first priority data or the second priority data, wherein the tag value generation circuit sets a tag value for the following second input data to a second tag value which differs from a first tag value for second preceding input data, and sets a tag value of the following first input data to a fourth tag value that is the same as a third tag value for the first preceding input data, and wherein the data output circuit outputs the first priority data or the second priority data in a first mode based on the tag values and outputs the first priority data earlier in a second mode. | 2010-11-04 |
20100281194 | Modular application computing apparatus, system and method - An apparatus, system and method of open platform computing. The present invention may include at least one microprocessor, a computer case that encases the at least one microprocessor, at least one operating system resident on the at least one microprocessor, wherein the at least one operating system includes an open platform for accepting a plurality of applications and hardware not presented as forming a portion of, and absent the plurality of applications not being operable by, the at least one operating system, at least three ports in the computer case, wherein the ports are communicatively electrically connected to the at least one microprocessor, and wherein at least one of the plurality of applications is applied at least one of the ports for presentation by the at least one microprocessor via the at least one operating system. | 2010-11-04 |
20100281195 | Virtualization of a host computer's native I/O system architecture via internet and LANS - A hardware/software system and method that collectively enables virtualization of the host computer's native I/O system architecture via the Internet and LANs. The invention includes a solution to the problems of the relatively narrow focus of iSCSI, the direct connect limitation of PCI Express, and the inaccessibility of PCI Express for expansion in blade architectures. | 2010-11-04 |
20100281196 | MANAGEMENT DEVICE OF HARDWARE RESOURCES - A management device for managing states of components. The management device includes a reading unit to read management information from each of plural components; a determining unit to refer to license information associated with management information of each component stored in a license storage unit, and to determine, based on the referred license information, whether each component is usable or not; and an operation control unit to make a component determined to be usable operate but to inhibit an operation of a component determined to be unusable. | 2010-11-04 |
20100281197 | USB BRIDGE - A bridge circuit | 2010-11-04 |
20100281198 | Bus relay device and bus control system - A combination includes a first bus master coupled to a first bus to output a first signal group including at least one of signals onto the first bus, a second bus master coupled to the first bus to output a second signal group including at least one of signals onto the first bus, an interconnect section coupled between the first bus and a second bus to receive the first and second signal groups and to output a third signal group including at least one of signals onto the second bus, and a bridge section coupled between the second bus and a third bus to receive the third signal group and to output a fourth signal group including at least one of signals onto the third bus free from performing a selecting operation for the third signal group. | 2010-11-04 |
20100281199 | DATA STORAGE DEVICE CARRIER SYSTEM - A data storage device carrier system includes a carrier configured to support one or more data storage devices, a backplane, including one or more coupling connector devices configured to electrically couple with a motherboard, and an interposer board operable to couple a plurality of the data storage devices supported by the carrier with the backplane. In an embodiment, the one or more coupling connector devices are operable to transfer communication signals and electrical power. The interposer board is operable to provide the electrical power from a single port on the backplane to each of the plurality of the data storage devices. The interposer board is also operable to pass communication signals between a primary port on the backplane to a first one of the plurality of the data storage devices, and to pass communication signals between a secondary port on the backplane to a second one of the plurality of the data storage devices. | 2010-11-04 |
20100281200 | ELECTRONIC DEVICE WITH CARD INTERFACE - When initializing a card-shaped device inserted in a card interface, operation mode acquiring means incorporated in an electronic device acquires operation mode information, stored in a register file incorporated in the card-shaped device, by a predetermined procedure using a predetermined pin. Operation mode setting means incorporated in the electronic device executes signal assignment on a plurality of data pins peculiar to an operation mode indicated by the acquired operation mode information, thereby switching a data transfer width, and allowing the card-shaped device to operate in the operation mode. | 2010-11-04 |
20100281201 | PROTOCOL TRANSLATION IN A DATA STORAGE SYSTEM - A data storage system includes an input/output server and a storage unit. The input/output server includes a processor, memory, and a host channel adapter. The storage unit includes a processor, memory, and a storage module. The storage module includes a storage controller, and an interface block for connecting the storage module to a corresponding memory-mapped interface. The storage unit further includes a host channel adaptor. The storage unit host channel adapter is connected to a corresponding memory-mapped interface. The storage unit host channel adapter is capable of remote direct memory access to the input/output server. Protocol translation logic is configured to intercept a memory access request from the storage controller, and initiate a corresponding remote direct memory access to the input/output server through the storage unit host channel adapter and the input/output server host channel adapter. | 2010-11-04 |
20100281202 | WEAR-LEVELING AND BAD BLOCK MANAGEMENT OF LIMITED LIFETIME MEMORY DEVICES - Performing wear-leveling and bad block management of limited lifetime memory devices. A method for performing wear-leveling in a memory includes receiving logical memory addresses and applying a randomizing function to the logical memory addresses to generate intermediate addresses within a range of intermediate addresses. The intermediate addresses are mapped into physical addresses of a memory using an algebraic mapping. The physical addresses are within a range of physical addresses that include at least one more location than the range of intermediate addresses. The physical addresses are output for use in accessing the memory. The mapping between the intermediate addresses and the physical addresses is periodically shifted. In addition, contents of bad blocks are replaced with redundantly encoded redirection addresses. | 2010-11-04 |
20100281203 | Nonvolatile Memory Device and Method for Operating the Same - A nonvolatile memory device includes a selecting unit configured to select one of a read data or a program signal indicating a program period, an output unit configured to output an output signal of the selecting unit to the outside of a chip, and an output pin connected to the output unit. | 2010-11-04 |
20100281204 | MEMORY SYSTEM - A memory system includes a WC | 2010-11-04 |
20100281205 | Micro Control Module For Universal Connection And Universal Connection Method Thereof - A micro control module for universal connection and a universal connection method thereof are provided. The micro control module includes a supporting interface module, a micro control unit, and a memory unit. The micro control unit is configured to read interface-setting data saved in the supporting interface module and save the interface-setting data into the memory unit. When a wireless transmission module is electrically connected to the micro control module, the micro control unit generates an identification result, selects the appropriate interface-setting data from the memory unit, and reads the corresponding initialization data from the supporting interface module, so as to initialize the wireless transmission module. | 2010-11-04 |
20100281206 | METHOD OF CUSTOMIZING A MEMORY LIFESPAN MANAGEMENT POLICY IN AN ELECTRONIC TOKEN - The invention is a method of customizing a memory lifespan management policy of an electronic token. The electronic token is intended to be connected to a device able to establish a wireless channel. The electronic token has a microprocessor, a communication interface, a first memory intended to comprise said memory lifespan management policy, first means for exchanging data with a distant machine by means of a wireless channel established by said connected device, second means for applying said memory lifespan management policy in said electronic token, and third means for updating said memory lifespan management policy. Said method comprises the steps of—sending data from the distant machine to the electronic token by means of a wireless channel,—updating said memory lifespan management policy as a function of data received from said distant machine. | 2010-11-04 |
20100281207 | FLASH-BASED DATA ARCHIVE STORAGE SYSTEM - A flash-based data archive storage system having a large capacity storage array constructed from a plurality of dense flash devices is provided. The flash devices are illustratively multi-level cell (MLC) flash devices that are tightly packaged to provide a low-power, high-performance data archive system having substantially more capacity per cubic inch than more dense tape or disk drives. The flash-based data archive system may be adapted to employ conventional data de-duplication and compression methods to compactly store data. Furthermore, the flash-based archive system has a smaller footprint and consumes less power than the tape and/or disk archive system. | 2010-11-04 |
20100281208 | System and Method for Data Storage - A data storage architecture is composed of an array of a flash memory solid state disk and a hard disk drive or any nonvolatile random access storage that are intelligently coupled by an intelligent processing unit such as a multi-core graphic processing unit. The solid state disk stores seldom-changed and mostly read reference data blocks while the hard disk drive stores compressed deltas between currently accessed I/O blocks and their corresponding reference blocks in the solid state disk so that random writes are not performed on the solid state disk during online I/O operations. The solid state disk and hard disk drive are controlled by the intelligent processing unit, which carries out high speed computations including similarity detection and delta compression/decompression. The architecture exploits the fast read performance of solid state disks and the high speed computation of graphic processing units to replace mechanical operations on hard disk drives while avoiding slow and wearing solid state drive writes. | 2010-11-04 |
20100281209 | Press-Push Flash Drive Apparatus With Metal Tubular Casing And Snap-Coupled Plastic Sleeve - A press-push type computer peripheral “flash drive” device includes an elongated (e.g., metal) tubular casing containing a PCBA having a plug connector. A plastic housing assembly includes front and rear cap portions mounted over the open ends of the tubular casing, and a fixed plastic sleeve portion disposed in the tubular casing. The PCBA is secured to a plastic sliding rack structure that is disposed in the tubular casing and includes an actuating button protruding through a slot formed in a wall of the tubular casing. When the actuating button is manually pushed and slid along the slot, a portion of the sliding rack structure slides against the plastic sleeve portion in deploying and retracting the USB connector out of the device. | 2010-11-04 |
20100281210 | RESTORING SPANNED VOLUMES OF DATA - According to one embodiment, a backup is searched for data to be restored from a volume. The backup comprises multiple disks. The volume is stored in one or more spans on the disks. The spans containing the data to be restored from the volume are identified as desired spans, and a current disk is searched for the desired spans. A first subset of data is read from the desired spans on the current disk. A second subset of data is recorded on an unread list. The second subset of data comprises the data to be restored from the desired spans that are not on the current disk. The remaining data is read from the remaining disks according to the unread list. | 2010-11-04 |
20100281211 | Storage apparatus, management apparatus, and method of controlling storage apparatus - In a storage apparatus comprising a communication interface that receives an I/O request sent from a host apparatus, a storage device controller that performs writing and reading of data with respect to a storage device, and a cache memory that stores data to be written in the storage device or data read from the storage device, a journal volume operated as a volume for which update writing is prohibited and write once is permitted is provided, on the basis of a storage area provided by the storage device, and a virtual volume is provided as a volume accessible from the host apparatus, the journal volume being the entity of the virtual volume, the virtual volume being a volume for which an attribute (Read/Add) that permits only reading and write once is settable. | 2010-11-04 |
20100281212 | CONTENT-BASED WRITE REDUCTION - Apparatus, systems, and methods may operate to detect a write request to write new data to a storage medium, to generate a coded version of the new data, to compare the coded version of the new data to a coded version of old data stored in the storage medium, and to refrain from writing the new data to the storage medium when the coded version of the new data is equal to the coded version of the old data. Additional apparatus, systems, and methods are disclosed. | 2010-11-04 |
20100281213 | CHANGING THE REDUNDANCY PROTECTION FOR DATA ASSOCIATED WITH A FILE - A storage subsystem provides redundancy protection for data associated with files stored in a storage subsystem. A request is received to change the redundancy protection for data associated with at least one of the files, where the request identifies the data for which the redundancy protection is to be changed. The redundancy protection for the data identified by the request is changed, while the redundancy protection for a remainder of the data associated with the files stored in the storage subsystem is maintained unchanged. | 2010-11-04 |
20100281214 | DATA DISTRIBUTION THROUGH CAPACITY LEVELING IN A STRIPED FILE SYSTEM - A data distribution technique is configured to provide capacity leveling in a striped file system. When a new node is added to a striped volume set, the striping table is evolved to accommodate the newly added node. Each node of a cluster is illustratively associated with a capacity value that takes into account, e.g., processor speed, number of processors, hardware configuration and/or software available for the node. During the evolution process of the striping table, the technique apportions stripes of the SVS among the nodes in a manner so that they are optimally assigned to the nodes in accordance with each node's capacity value. By utilizing the evolutionary striping table that incorporates capacity values, heterogeneous nodes may be utilized to their maximum capacity within a striped volume set, thereby reducing underutilized processing resources. | 2010-11-04 |
20100281215 | RESTORING STRIPED VOLUMES OF DATA - According to one embodiment, a backup is searched for data to be restored from a striped volume. The backup comprises multiple disks divided into stripes. The stripes that contain data to be restored from the striped volume are identified as desired stripes, and a current disk is searched for the desired stripes. The content of a first subset of desired stripes is read from the current disk. A second subset of desired stripes that are not on the current disk are recorded on an unread list. The remaining content is read from the remaining disks according to the unread list. | 2010-11-04 |
20100281216 | METHOD AND APPARATUS FOR DYNAMICALLY SWITCHING CACHE POLICIES - A method implements a cache-policy switching module in a storage system. The storage system includes a cache memory to cache storage data. The cache memory uses a first cache configuration. The cache-policy switching module emulates the caching of the storage data with a plurality of cache configurations. Upon a determination that one of the plurality of cache configurations performs better than the first cache configuration, the cache-policy switching module automatically applies the better performing cache configuration to the cache memory for caching the storage data. | 2010-11-04 |
20100281217 | SYSTEM AND METHOD FOR PERFORMING ENTITY TAG AND CACHE CONTROL OF A DYNAMICALLY GENERATED OBJECT NOT IDENTIFIED AS CACHEABLE IN A NETWORK - The present invention is directed towards a method and system for modifying by a cache responses from a server that do not identify a dynamically generated object as cacheable to identify the dynamically generated object to a client as cacheable in the response. In some embodiments, such as an embodiment handling HTTP requests and responses for objects, the techniques of the present invention insert an entity tag, or “etag” into the response to provide cache control for objects provided without entity tags and/or cache control information from an originating server. This technique of the present invention provides an increase in cache hit rates by inserting information, such as entity tag and cache control information for an object, in a response to a client to enable the cache to check for a hit in a subsequent request. | 2010-11-04 |
20100281218 | INTELLIGENT CACHE REPLACEMENT MECHANISM WITH VARYING AND ADAPTIVE TEMPORAL RESIDENCY REQUIREMENTS - A method for replacing cached data is disclosed. The method in one aspect associates an importance value to each block of data in the cache. When a new entry needs to be stored in the cache, a cache block for replacing is selected based on the importance values associated with cache blocks. In another aspect, the importance values are set according to the hardware and/or software's knowledge of the memory access patterns. The method in one aspect may also include varying the importance value over time over different processing requirements. | 2010-11-04 |
20100281219 | MANAGING CACHE LINE ALLOCATIONS FOR MULTIPLE ISSUE PROCESSORS - An apparatus having a cache configured as N-way associative and a controller circuit is disclosed. The controller circuit may be configured to (i) detect one of a cache hit and a cache miss in response to each of a plurality of access requests to the cache, (ii) detect a collision among the access requests, (iii) queue at least two first requests of the access requests that establish a speculative collision, the speculative collision occurring where the first requests access a given congruence class in the cache and (iv) delay a line allocation to the cache caused by a cache miss of a given one of the first requests while the given congruence class has at least N outstanding line fills in progress. | 2010-11-04 |
20100281220 | Predictive ownership control of shared memory computing system data - A method, circuit arrangement, and design structure utilize a lock prediction data structure to control ownership of a cache line in a shared memory computing system. In a first node among the plurality of nodes, lock prediction data in a hardware-based lock prediction data structure for a cache line associated with a first memory request is updated in response to that first memory request, wherein at least a portion of the lock prediction data is predictive of whether the cache line is associated with a release operation. The lock prediction data is then accessed in response to a second memory request associated with the cache line and issued by a second node and a determination is made as to whether to transfer ownership of the cache line from the first node to the second node based at least in part on the accessed lock prediction data. | 2010-11-04 |
20100281221 | Shared Data Prefetching with Memory Region Cache Line Monitoring - A method, circuit arrangement, and design structure for prefetching data for responding to a memory request, in a shared memory computing system of the type that includes a plurality of nodes, is provided. Prefetching data comprises, receiving, in response to a first memory request by a first node, presence data for a memory region associated with the first memory request from a second node that sources data requested by the first memory request, and selectively prefetching at least one cache line from the memory region based on the received presence data. Responding to a memory request comprises tracking presence data associated with memory regions associated with cached cache lines in the first node, and, in response to a memory request by a second node, forwarding the tracked presence data for a memory region associated with the memory request to the second node. | 2010-11-04 |
20100281222 | CACHE SYSTEM AND CONTROLLING METHOD THEREOF - A cache system and a method for controlling the cache system are provided. The cache system includes a plurality of caches, a buffer module, and a migration selector. Each of the caches is accessed by a corresponding processor. Each of the caches includes a plurality of cache sets and each of the cache sets includes a plurality of cache lines. The buffer module is coupled to the caches for receiving and storing data evicted due to conflict miss from a source cache line of a source cache set of a source cache among the caches. The migration selector is coupled to the caches and the buffer module. The migration selector selects, from all the cache sets, a destination cache set of a destination cache among the caches according to a predetermined condition and causing the evicted data to be sent from the buffer module to the destination cache set. | 2010-11-04 |
20100281223 | SELECTIVELY SECURING DATA AND/OR ERASING SECURE DATA CACHES RESPONSIVE TO SECURITY COMPROMISING CONDITIONS - Techniques are generally described for methods, systems, data processing devices and computer readable media configured to decrypt data to be stored in a data cache when a particular condition indicative of user authentication or data security has occurred. The described techniques may also be arranged to terminate the storage of decrypted data in the cache when a particular condition that may compromise the security of the data is detected. The describe techniques may further be arranged to erase the decrypted data stored in the cache when a particular condition that may compromise the security of the data is detected. | 2010-11-04 |
20100281224 | PREFETCHING CONTENT FROM INCOMING MESSAGES - A method, system, and computer program product for prefetching content from incoming messages. A computer receives an incoming message containing one or more resource links. The computer may then determine if the resource links contained in the incoming message are likely to be accessed. In response to determining that one or more of the resource links are likely to be accessed, the logic determines if the target content of the resource link has previously been cached, and if any previously cached data is current. In response to determining that the requested content has not previously been cached, or is not current, the logic begins downloading the requested content for local consumption. When the cached content is requested, the cached data is provided to the user. Upon receiving requests for the cached content from other connected client terminals, the cached content may also be served to the other requesting client terminals. | 2010-11-04 |
20100281225 | DATA PROCESSING APPARATUS OF BASIC INPUT/OUTPUT SYSTEM - A data processing apparatus of a basic input/output system (BIOS) is provided. The data processing apparatus includes a BIOS unit, a share memory and a control unit. The BIOS unit writes command data into the share memory, wherein the command data includes identification data stored in an identification field. The control unit reads and performs the command data according to the identification data in the identification field. After the command data is performed, the control unit writes returned data into the share memory for the BIOS unit to read the returned data, wherein the returned data includes the execution result of the command data performed by the control unit and also includes the identification data. | 2010-11-04 |
20100281226 | Address Management Device - Conventionally, when a switch virtualizing a storage (storage virtualization switch) is installed in a computer system including an SAN, a host computer, and a storage device, since a port ID of a virtual storage and a port ID of a storage device assigned to the virtual storage are different, the computer system has to be suspended at the time of installation of the storage virtualization switch. The storage virtualization switch installed in the computer system assigns a port ID to a port of a virtual storage generated by the storage virtualization switch so as to be equivalent to a port ID of an existing storage device and, in the case in which the port ID is designated as an access destination by an access request from one computer to the storage device, sends the access request to the virtual storage. | 2010-11-04 |
20100281227 | MULTI-PORT MEMORY DEVICES AND METHODS - Embodiments of a multi-port memory device may include a plurality of ports and a plurality of memory banks some of which are native to each port and some of which are non-native to each port. The memory device may include a configuration register that stores configuration data indicative of the mapping of the memory banks to the ports. In response to the configuration data, for example, a steering logic may couple each of the ports either to one or all of the native memory banks or to one or all of the non-native memory banks. | 2010-11-04 |
20100281228 | DATA ALLOCATION SYSTEM - A method of operating a data control system to copy a volume of data from a primary storage system to a secondary storage system comprises receiving an instruction to copy the volume of data, wherein the volume of data comprises a plurality of data blocks, in response to the instruction, determining if at least a data block of the plurality of data blocks requires copying to the secondary storage system, if the data block requires copying to the secondary storage system, then reading the data block from memory in the primary storage system and transferring the data block for writing to memory in the secondary storage system, and if the data block does not require copying, then transferring a synthetic block for writing to the memory in the secondary storage system. | 2010-11-04 |
20100281229 | Computer System Storing Data On Multiple Storage Systems - During the normal operation state of a computer system | 2010-11-04 |
20100281230 | MECHANISMS FOR MOVING DATA IN A HYBRID AGGREGATE - At least certain embodiments disclose a method, system and apparatus for relocating data between tiers of storage media in a hybrid storage aggregate encompassing multiple tiers of heterogeneous physical storage media including a file system to automatically relocate the data between tiers. The hybrid storage aggregate includes one or more volumes, each volume including a volume block number space spanning at least a first-tier of storage media and a second tier of storage media of the multiple tiers of heterogeneous physical storage media and the hybrid storage aggregate further includes a control module to cooperatively manage the tiers of the multiple tiers of heterogeneous physical storage media and a file system coupled with the control module, the file system including a policy module configured to make policy decisions based on a set of one or more policies and configured to automatically relocate data between different tiers of the multiple tiers of heterogeneous physical storage media based on the set of policies. | 2010-11-04 |
20100281231 | HIERARCHICAL MEMORY ARBITRATION TECHNIQUE FOR DISPARATE SOURCES - A hierarchical memory request stream arbitration technique merges coherent memory request streams from multiple memory request sources and arbitrates the merged coherent memory request stream with requests from a non-coherent memory request stream. In at least one embodiment of the invention, a method of generating a merged memory request stream from a plurality of memory request streams includes merging coherent memory requests into a first serial memory request stream. The method includes selecting, by a memory controller circuit, a memory request for placement in the merged memory request stream from at least the first serial memory request stream and a merged non-coherent request stream. The merged non-coherent memory request stream is at least partially based on an indicator of a previous memory request selected for placement in the merged memory request stream. | 2010-11-04 |
20100281232 | MEMORY CONTROLLING DEVICE AND MEMORY CONTROLLING METHOD - Disclosed herein is a memory controlling device including: an address converting section configured to convert a logical address included in a request issued from a plurality of clients into a physical address of a memory; a request dividing section configured to divide a converted request converted by the address converting section by a command unit for the memory on a basis of the physical address of the converted request; and an arbitrating section configured to perform arbitration on a basis of the physical address indicated in a divided request output from the request dividing section. | 2010-11-04 |
20100281233 | STORAGE OPTIMIZATION ACROSS MEDIA WITH DIFFERING CAPABILITIES - A storage device can comprise storage media that can have differing characteristics. A storage manager can obtain the characteristics of a storage device, and of individual portions, such as individual media, of the storage device, by querying the device, querying a database, or through empirical observation or testing. The storage manager can then divide the media of the storage device into storage media parts, that can comprise some or all of the individual storage media. Data can then be stored on one or more storage media parts in accordance with the information provided by metadata associated with the data, such that the data is stored on storage media parts that are optimal for such data, from among the available storage media parts, based on the information from the associated metadata. | 2010-11-04 |
20100281234 | INTERLEAVED MULTI-THREADED VECTOR PROCESSOR - A method includes providing a processor configured to execute instructions. The method may further include providing a first set of registers in the processor to store first data and first instructions associated with a first thread, and providing a second set of registers in the processor to store second data and second instructions associated with a second thread. The method may further include transmitting the first data and first instructions associated with the first thread to the first set of registers, and executing the first instructions in order to process the first data. The method may further include transmitting the second data and second instructions to the second set of registers while executing the first instructions and processing the first data. A corresponding apparatus is also disclosed and claimed herein. | 2010-11-04 |
20100281235 | RECONFIGURABLE FLOATING-POINT AND BIT-LEVEL DATA PROCESSING UNIT - Blocks of fixed-point units in a reconfigurable data processing unit assist the efficient calculation of floating decimal point numbers by virtue of joint hardware functions permanently implemented within the block. | 2010-11-04 |
20100281236 | APPARATUS AND METHOD FOR TRANSFERRING DATA WITHIN A VECTOR PROCESSOR - An apparatus for processing data may include an array of processing elements (such as an n×m or n×n array of processing elements) configured to simultaneously perform operations on a plurality of data elements using a single instruction. Each processing element in the array may be configured to transfer data directly to at least one neighboring processing element within the array. In selected embodiments, the apparatus may include exchange registers to temporarily store data transferred between neighboring processing elements. | 2010-11-04 |
20100281237 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND COMPUTER-READABLE STORAGE MEDIUM - In an information processing apparatus in which data processing is performed in a predetermined sequence by processing modules connected to a ring bus, if an amount of data generated by input data in the ring bus is not considered, the data amount exceeds an amount of data that can be held by the processing modules on the ring bus, and a data collision often occurs, so that processing efficiency of the ring bus deteriorates. An amount of data input into the ring bus is controlled so that the total sum of data amounts output to the ring bus from processing units used for processing does not exceed a maximum amount of data that can be held by the processing modules on the ring bus. | 2010-11-04 |
20100281238 | Execution of instructions directly from input source - A computer array ( | 2010-11-04 |
20100281239 | RELIABLE EXECUTION USING COMPARE AND TRANSFER INSTRUCTION ON AN SMT MACHINE - A system and method for efficient reliable execution on a simultaneous multithreading machine. A processor is placed in a reliable execution mode (REM) to detect possible errors during execution of a mission critical software application. Only two threads may be configured to operate in this mode. Floating-point store and integer-transfer unary instructions may be converted to new binary instructions. Each new instruction has two source operands, each one corresponding to a different thread is specified by a same logical register number as a single source operand of the original unary instruction. All other instructions are replicated, wherein the original instruction and its twin are assigned to different threads. Simultaneous multi-threaded (SMT) floating-point logic may only be able to provide lockstep execution when it communicates using the new instruction with instantiated integer independent clusters. The new instruction cannot begin until both source operands are ready, which are subsequently compared to determine any mismatches or errors. | 2010-11-04 |
20100281240 | Program Code Simulator - A system and method for facilitating simulation of a computer program. A program representation is generated from a computer program. A simulation of the program is performed. Simulation may include applying heuristics to determine program flow for selected instructions, such as a branch instruction or a loop instruction. Simulation may also include creating imaginary objects as surrogates for real objects, when program code to create real objects is restricted, or fields of the objects are unavailable or uncertain, or for other reasons. Data descriptive of the simulation is inserted into the program representation. A visualizer may retrieve the program representation and generate a visualization that shows sequence flows resulting from the simulation. | 2010-11-04 |
20100281241 | METHOD AND SYSTEM FOR SYNCHRONIZING INCLUSIVE DECISION BRANCHES - A method and system for reconstructing an original process model that includes an inclusive decision into a reconstructed process model that includes synchronized branches. The inclusive decision is replaced with a fork. Each original path of the inclusive decision is reconstructed into a corresponding reconstructed path. Each reconstructed path includes a decision, an activity included in the corresponding original path, and a merge. The decision includes a first output connected to the activity, whose output is connected to a first input of the merge. The decision further includes a second output connected to a second input of the merge. A join is created to recombine output branches from the merge node and other merge nodes included in reconstructed paths. The output branches are synchronized so that all activated reconstructed paths must finish processing before a modeling element connected to an output of the join is executed. | 2010-11-04 |
20100281242 | Consolidated boot parameter management systems and methods - Methods and systems for provision of boot parameters may comprise: receiving one or more boot parameter event notification registration requests; registering one or more boot parameter event receiver clients; and providing one or more boot parameters to one or more registered boot parameter event receiver clients. | 2010-11-04 |
20100281243 | Configuring Computer Systems with Business Configuration Information - A configuration server includes a configuration repository that stores a wide range of configuration information for possible use by application programs. The configuration repository may include configuration parameters, settings for the parameters, and meta-data of definitions and descriptions of the parameters. Configuration information is selected from the configuration repository and stored in a configuration directory for later use by application programs at runtime. The configuration information is accessed from the configuration directory when needed by an application program or a component thereof. | 2010-11-04 |
20100281244 | Configuring Computer Systems with Business Configuration Information - A configuration server includes a configuration repository that stores a wide range of configuration information for possible use by application programs. The configuration repository may include configuration parameters, settings for the parameters, and meta-data of definitions and descriptions of the parameters. Configuration information is selected from the configuration repository and stored in a configuration directory for later use by application programs at runtime. The configuration information is accessed from the configuration directory when needed by an application program or a component thereof. | 2010-11-04 |
20100281245 | METHOD AND APPARATUS FOR TUNING A DIGITAL SYSTEM - A digital system | 2010-11-04 |
20100281246 | SYNCHRONIZATION OF SWAPPABLE MODULE IN MODULAR SYSTEM - Exemplary methods, systems, and computer program product embodiments for synchronizing a swappable module between modular computer systems are provided. Each of the embodiments has dual controllers and distributed copies of states. Upon an insertion of the swappable module in a storage system, a plurality of storage components are queried, including a partner swappable module, to determine if a quorum of identification information is present. If the quorum is present, at least one of the plurality of storage components having non-matching identification information is overwritten with the identification information of the quorum. If the quorum is not present, a reset to default procedure is performed. The reset to default procedure designates at least as many storage components of the plurality of storage components with the identification information sufficient to constitute the quorum. | 2010-11-04 |
20100281247 | SECURING BACKING STORAGE DATA PASSED THROUGH A NETWORK - Techniques described herein generally relate to methods, data processing devices and computer readable media to ensure that data stored in a remote backing storage device are in encrypted form before that data is transferred to another device or over a network. In some examples, the methods, data processing devices and computer readable media may be arranged to encrypt the data passed to the network when the data stored in the backing storage device is in unencrypted form. Also disclosed are methods, data processing devices and computer readable media that identify when the data stored in the backing storage device is in unencrypted form, including methods that may detect that the data may appear to be in encrypted form as a result of the data being compressed. | 2010-11-04 |