51st week of 2013 patent applcation highlights part 65 |
Patent application number | Title | Published |
20130339502 | TECHNIQUES TO MANAGE TRANSITIONS BETWEEN PRIVATE AND PUBLIC NETWORKS - Techniques to manage transitions between private and public wireless networks for wireless devices are described. In one embodiment, for example, an apparatus may comprise a logic circuit and a memory unit. The apparatus may further include connection logic operative on the logic circuit to attempt a network connection by: retrieving a first access location value from the memory unit when attempting a network connection from the apparatus; retrieving a stored internal probe link from the memory unit when the access location value is internal; retrieving a stored external probe link from the memory unit when the access location value is external; attempting to connect to a network site referenced by the retrieved probe link; and connecting to a final location via the network site when the connection attempt to the network site is successful. Other embodiments are described and claimed. | 2013-12-19 |
20130339503 | SYSTEMS AND METHODS FOR SUPPORTING A SNMP REQUEST OVER A CLUSTER - The present disclosure is directed towards systems and methods for supporting Simple Network Management Protocol (SNMP) request operations over clustered networking devices. The system includes a cluster that includes a plurality of intermediary devices and an SNMP agent executing on a first intermediary device of the plurality of intermediary devices. The SNMP agent receives an SNMP GETNEXT request for an entity. Responsive to receipt of the SNMP GETNEXT request, the SNMP agent requests a next entity from each intermediary device of the plurality of intermediary devices of the cluster. To respond to the SNMP request, the SNMP agent selects a lexicographically minimum entity. The SNMP agent may select the lexicographically minimum entity from a plurality of next entities received via responses from each intermediary device of the plurality of intermediary devices. | 2013-12-19 |
20130339504 | SYSTEM AND METHOD FOR IDENTIFYING AN ADMINISTRATOR FOR A COMMUNICATION NETWORK - The disclosure recites a system and method for identifying an access point for a network. The method comprises: upon a trigger condition for the network assessing intents of members of the network to be an administrator for the network to replace a current administrator for the network; identifying a replacement administrator from the members from the intents of the members; and transferring network management functions from the current administrator to the replacement administrator. | 2013-12-19 |
20130339505 | MULTI-TENANT MIDDLEWARE CLOUD SERVICE TECHNOLOGY - A system that includes multiple hosts, each running a plurality of virtual machines. The system may be, for example, a cloud computing environment in which there are services and a service coordination system that communicates with the hosts and with the services. The services include a middleware management service that is configured to maintain per-tenant middleware policy for each of multiple tenants. The middleware management service causes the middleware policy to be applied to network traffic by directing network traffic to a middleware enforcement mechanism. This middleware policy is per-tenant in that it depends on an identity of a tenant. | 2013-12-19 |
20130339506 | PERFORMING SYNCHRONIZED COLLECTIVE OPERATIONS OVER MULTIPLE PROCESS GROUPS - Methods and arrangements for performing synchronized collective operations. Communication calls are accepted from at least two distinct processor groups. Edge disjoint spanning paths are created over a collective comprising the processor groups, and the spanning paths are assigned to the processor groups to facilitate communication within each processor group. | 2013-12-19 |
20130339507 | THREE-PHASE-POLARITY SAFE REVERSE LINK SHUTDOWN - System, methods and apparatus are described that facilitate data link shutdown between two devices within an electronic apparatus, enabling safe entry into a hibernation mode. A host device transmits a command to a client device over a first data link. If the client device is not transmitting over the second data link, the host devices initiates shut down of the first data link and entry to a hibernation state. A delay may be initiated when it is determined that the client device is transmitting on the second data link. The command may comprise an instruction revoking permission to transmit data over a second data link to cause the client device to terminate communication on the second data link. | 2013-12-19 |
20130339508 | MANAGED OBJECT VERSION IDENTIFICATION - Systems and methods for determining a version of a standard publication that is supported by a network element are provided. Version map information is requested and received from an external node in a managed network, including publication identifiers for at least one of the network elements. Each network element identified in the version map has an associated publication version and an indication of if the publication can be applicable to its directly or indirectly inferior nodes in the hierarchical instance tree. If a particular network element does not have a corresponding publication identifier in the received version map information, it can be determined if the network element can use the publication identifiers of a superior network element in the hierarchy. | 2013-12-19 |
20130339509 | NETWORKING SYSTEMS - A system, method, and computer program product are provided for establishing secured connections between trusted users and a plurality of networkable consumer devices In different embodiments, various features may be further incorporated in association with the system, method, and computer program product, for improvement purposes. | 2013-12-19 |
20130339510 | FAST PROVISIONING SERVICE FOR CLOUD COMPUTING - A cloud-based system and method for provisioning IT infrastructure systems is disclosed. The system and method provided constructs an infrastructure generally comprised of a processing component supplying the computational capacity for a platform element, comprising one or more processing elements, memory and I/O subsystems, a storage component utilizing commodity disk drives and comprised of one or more physical storage devices, and a network component providing a high speed connection among processing elements and the processing component to storage components. In addition, the system and method provide all features required for a complete, immediately usable infrastructure system including registration of IP addresses and domain names so that the user may have the system completely up and running without the aid of an administrator. | 2013-12-19 |
20130339511 | MAPPED PARAMETER SETS USING BULK LOADING SYSTEM AND METHOD - A system and method are provided that allows users to define a set of parameters for Uniform Resource Locator (URL) mapping rules. A URL may be defined for each output parameter condition, input parameters inspected, and the output parameter value determined. Business logic is executed before and after URL mappings have been determined. Multiple exclusive groups of mapping rules are maintained and an incoming URL can be explicitly directed to a rule group. Rule handlers, new URLs within an existing link generator, as well as input and output parameters are created to act on parameters during processing. Input parameters and values are translated to output parameters and values, respectively. Output parameters and values are mapped to a destination URL. In addition, a customizable bulk loading tool is provided which sends the mapped sets directly to a client to add values to the sets and then returns the document. | 2013-12-19 |
20130339512 | System, Servers, Methods and Computer Programs for Machine-to-Machine Equipment Management - It is presented a method for machine-to-machine equipment management, executed in a subscription server arranged to provide an electronically transferable subscriber identity module. The method comprises the steps of: receiving a request for the electronically transferable subscriber identity module for a machine-to-machine equipment; obtaining a location rule; obtaining a calculated authorised area based on the location rule and a position of the machine-to-machine equipment; generating an electronically transferable subscriber identity module; sending the electronically transferable subscriber identity module to the machine-to-machine equipment; obtaining a position of the machine-to-machine equipment; determining whether the position indicates that the machine-to-machine equipment is outside of the calculated authorised area; and when the position indicates that the machine-to-machine equipment is outside of the calculated authorised area, restricting operation of the machine-to-machine equipment. It is also presented a corresponding system, subscription server, registration server, methods, computer programs and computer program products. | 2013-12-19 |
20130339513 | INFORMATION NOTIFICATION METHODS, APPARATUSES AND ELECTRONIC DEVICES - There is disclosed an information notification method, apparatus and first electronic device. The information notification method is used in a first electronic device having first user identification, comprising the steps of transmitting a request to talk with a second electronic device via a first application module; determining whether it receives voice data collected from the second electronic device during a communication process when the communication process ends, and obtaining a determination result; and automatically switching to a second application module for transmitting a notification if the determination result indicates that no voice data has been received during the communication process. According to the embodiments of the present disclosure, it automatically switches to a second application module if the called party does not answer a call, so that the user may transmit a notification by using the second application module, to inform the called party of the thing, which is convenient to the user. | 2013-12-19 |
20130339514 | SYSTEMS AND METHODS FOR INTERACTIVE ANALYTICS OF INTERNET TRAFFIC - A computer implemented method, a cloud system, and a log system provide interactive analytics providing various intuitive mechanisms for interaction with data visualizations of Internet traffic, email, etc. The methods and systems utilize a cloud based monitoring system where all traffic from an organization may be monitored in a location and platform independent manner. The methods and systems include context-aware drilldown with progressively applied filtering and grouping while maintaining workflow history such that a user can go back to any point in the flow and proceed down a new path of investigation. | 2013-12-19 |
20130339515 | NETWORK SERVICE FUNCTIONALITY MONITOR AND CONTROLLER - A system and method is disclosed for controlling functionality of a computer network to avoid occurrence of resource or service incidents that degrade or disrupt operation of the network. The metrics monitored are formulated into control charts. Nelson like rules analyze the control charts to identify abnormal service events and abnormal resource events. The identified abnormal service events and abnormal resource events are analyzed using various analytic modes to identify potential resource incidents and potential service incidents. The analytic modes include covariate analysis, multivariate analysis, time series analysis and similar analytic techniques. Information on the abnormal service and abnormal resource events and the information on the potential service incidents/potential resource incidents are forwarded to a control or decision center to guide actions by an autonomic system or human operator to prevent the identified potential resource incidents and potential service incidents from degrading or disrupting operation of the network. | 2013-12-19 |
20130339516 | SYSTEMS AND METHODS FOR FORWARDING TRAFFIC IN A CLUSTER NETWORK - The present invention is directed towards forwarding network packets in a cluster network. A predetermined identifier may be inserted into a Media Access Control (MAC) ID field of an Ethernet header of a packet to distinguish various types of traffic. Newly received packets may be identified due to the absence of the identifier. The identifier may be added to the source MAC ID field of the Ethernet header of the packet, and the packet may be distributed to cluster nodes for processing via an inter-node communication bus. Thus, received packets with the identifier in the source MAC ID field may be identified as steered for processing by an internal node of the cluster. After processing the packet, the internal node may transmit the processed packets via the inter-node bus with a destination MAC ID including the identifier. | 2013-12-19 |
20130339517 | TECHNIQUES FOR PROVIDING DYNAMIC ACCOUNT AND DEVICE MANAGEMENT - Techniques for providing data in dynamic account and device management are disclosed. In one particular exemplary embodiment, the techniques may be realized as a system for providing data in dynamic account and device management. The system may comprise one or more processors communicatively coupled to a network. The one or more processors may be configured to identify a user device to be managed. The one or more processors may be configured to transmit a request for delegate authority to manage the user device. The one or more processors may be configured to receive delegate authority to manage the user device. The one or more processors may be configured to provide network access to the user device. The one or more processors may also be configured to manage the user device and monitor data communicated to and from the user device. | 2013-12-19 |
20130339518 | Software Product Management Through the Cloud - Status of software product(s) may be monitored through the cloud by Extract, Transform, Load (ETL) of status information, in the form of business process status indicators from customer tenants. Examples of such status indicators can include a backlog of tasks to be fulfilled, or a number of business documents present in specific processing states, which describe aspects of the business application and allow an understanding of the overall status of the monitored application. A data extractor component of a customer tenant may extract and transform the status indicators from a plurality of business documents. A data import framework of a central monitoring system may in turn employ mapping to condense that heterogeneous data into a monitoring-specific simplified status model. | 2013-12-19 |
20130339519 | Systems and Methods for Performing Localized Server-Side Monitoring in a Content Delivery Network - Some embodiments provide systems and methods for performing localized and real-time server-side network performance monitoring. These systems and methods leverage the distributed architecture of a content delivery network (CDN) so as to perform distributed monitoring with each Point-of-Presence of the CDN responsible for monitoring performance to a localized set of end users. These systems and methods also leverage existing traffic flows from a server to a particular end user in order to perform real-time server-side network performance monitoring without the injection of specialized monitoring packets and without active involvement of the end user in deriving the performance measurements. The performance measurements are then used to optimize delivery of existing and future traffic flows to the end user. | 2013-12-19 |
20130339520 | METHOD AND APPARATUS FOR PERFORMING CAPABILITY DISCOVERY OF RICH COMMUNICATION SUITE IN A PORTABLE TERMINAL - A method of performing capability discovery of Rich Communication Suite (RCS) in a portable terminal is provided. The method includes displaying a predetermined number of pieces of contact information from among registered contact information when a displaying of the registered contact information is requested, displaying the registered contact information so as to correspond with a user input when the user input is determined, and selecting currently displayed contact information and performing capability discovery with respect to the selected displayed contact information, when the user input is not determined during a predetermined time. | 2013-12-19 |
20130339521 | MEDIA DATA USAGE MEASUREMENT AND REPORTING SYSTEMS AND METHODS - An audience measurement system for gathering data reflecting usage of media data by a user on a processing device configured to process and present the media data locally on the processing device. Report objects may be generated by the processing device, wherein each of the report objects reflect usage of media data by each user of a processing device. Each of the report objects are configured to be generated regardless whether the media data was received from a network source or a source local to each processing device. In certain exemplary embodiments, report objects may correspond to different media data categories, and/or different user agents. The report objects may be assembled into a macro report. | 2013-12-19 |
20130339522 | Managed Unit Device, Self-Optimization Method and System - A managed unit executes a self-optimization according to a self-optimization trigger rule. The self-optimization trigger rule relates to a self-optimization capability supported by the managed unit. The self-optimization capability supported by the managed unit includes any one of or any combination of a self-optimization type, a self-optimization trigger condition, a self-optimization objective, and a self-optimization monitoring cycle. | 2013-12-19 |
20130339523 | METHOD AND APPARATUS FOR PASSIVELY MONITORING ONLINE VIDEO VIEWING AND VIEWER BEHAVIOR - Various user behaviors are passively monitored and recorded when a user/viewer interacts with a network video player, e.g. a web video player, while watching an online video clip. For one embodiment, a data collection agent (DCA) is loaded to the player and/or to a web page that displays the video clip. The DCA passively collects detailed viewing and behavior information without requiring any specific input or actions on the part of the user. Indications of user preferences are inferred by user actions leading up to viewing the video, while viewing the video, and just after and still related to viewing the video. The DCA periodically sends this information to a central server where it is stored in a central database and where it is used to determine preference similarities among different users. Recorded user preference information may also be used to rate a video itself. | 2013-12-19 |
20130339524 | METHOD AND ARRANGEMENT FOR PROVIDING SECURITY THROUGH NETWORK ADDRESS TRANSLATIONS USING TUNNELING AND COMPENSATIONS - This invention provides a method for providing network security services, such as those provided by the IPSEC protocol, through network address translation (NAT). The method is based on determining the transformations that occur on a packet and compensating for the transformations. Because only TCP and UDP protocols work through NATs, the IPSEC AH/ESP packets are encapsulated into UDP packets for transport. Special operations are performed to allow reliable communications in such environments. | 2013-12-19 |
20130339525 | AUGMENTED REALITY SYSTEM, APPARATUS AND METHOD - Information technology tools can be provided to manage access by a plurality of attendees through a network to a presentation. Each of the attendees is registered with an associated content access status, and presentation data for the presentation is provided to a registered attendee based on the particular content access status of the registered attendee. | 2013-12-19 |
20130339526 | METHOD AND SYSTEM FOR GENERATING AND USING AN AUGMENTED BLOOM FILTER - The present invention relates to an augmented data structure representing the availability of resources in a communication device, such as an augmented Bloom filter. A method of generating and using the augmented data structure comprises: providing first and additional groups of resources available in the same communication device; providing one or more hash functions for each of the first and additional groups, and calculating one or more hash values for each resource using the one or more corresponding hash functions; mapping each obtained hash value onto one entry of a data structure, wherein the hash values obtained from a resource of the first group are mapped onto a first subpart of the data structure only, such as a conventional Bloom array, and the hash values obtained from a resource of an additional group are mapped onto a portion of the data structure including the first subpart and an additional subpart. | 2013-12-19 |
20130339527 | VIRTUAL MACHINE MIGRATION IN A CLOUD FABRIC - Technologies are generally described for systems and methods configured to migrate a virtual machine. Some systems may include a memory configured to store terms of a service level agreement for a first virtual machine. The first computing device may determine the terms of the service level agreement for the first virtual machine. The first computing device may be configured to determine that the first virtual machine is operating on the first computing device using operating resources in violation of the terms of the service level agreement. The first computing device may be configured to identify a second virtual machine operating on the first computing device. The first computing device may be configured to migrate one of the first virtual machine or the second virtual machine to a second computing device in response to the determination of the violation. | 2013-12-19 |
20130339528 | APPLICATION ALLOCATION IN DATACENTERS - An allocation entity of a datacenter is provided, wherein said allocation entity being configured: to receive an application allocation request for allocating an application to one of a plurality of processing units of the datacenter, the application allocation request comprising application network load information; to acquire path network load information indicating network load of network paths to at least a part of the plurality of processing units; and to select a processing unit from the plurality of processing units for allocating the application based on the application network load information and the path network load information. | 2013-12-19 |
20130339529 | SERVICE SESSION RESOURCE MANAGEMENT - A service session resource manager ( | 2013-12-19 |
20130339530 | SHARED BANDWIDTH CONTROL METHOD AND DEVICE IN BANDWIDTH SHARING NETWORK AMONG USER GROUPS, AND SHARED BANDWIDTH CONTROL SYSTEM - A shared bandwidth control method, device, and system are provided that can accommodate burst traffic between multiple locations and enhance usage efficiency of a communication link without performing complicated control. In a bandwidth sharing network | 2013-12-19 |
20130339531 | METHOD AND APPARATUS FOR TRANSMITTING AN IDENTITY - The invention relates to a session control entity, method and computer program for receiving a first identity of a calling user from a subscription entity, wherein the first identity is an identity for displaying to a called user, receiving a request from the calling user, including the first identity in the request as an identity for displaying to the called user, and, transmitting the request towards the called user. | 2013-12-19 |
20130339532 | SYSTEM AND METHOD FOR COOKIE-BASED BROWSER IDENTIFICATION AND TRACKING - The present invention provides a system and method to identify unique browsers (Agents) communicating to the client. Every new browser communicating through the client is assigned a unique Agent ID that is stored in the browser's cookie cache. When the browser sends a request, the cookie may have the Agent ID to identify the browser to the client. If the cookie with the Agent ID is not present, then the client will return a re-direction response to a common URL with the domain having the cookie with the Agent ID to identify the unique browser. Another re-direction takes place back to the browser to make the request with the original URL, but this time has the cookie with the Agent ID to identify the unique browser. | 2013-12-19 |
20130339533 | VIRTUAL SESSION MANAGEMENT AND REESTABLISHMENT - Systems and methods are described that establish and maintain a virtual session between a client and one or more database servers. A database server establishes a first session with a client wherein establishing the virtual session with the client comprises associating a virtual session identifier (ID) with the first session, generates state information in association with the first session, and stores the state information in a repository in association with the virtual session ID. After the first session fails, a same or different database server establishes a second session with the client wherein establishing the second session with the client comprises receiving the virtual session ID from the client, accesses the state information that was stored in the repository in association with the virtual session ID, and associates the state information with the second session. | 2013-12-19 |
20130339534 | DEVICE INTERCONNECTION TECHNIQUE - Communication between first device and second media device commences by first rendering accessible at least one area in the first device for access by the second device. Thereafter, the electronic first device receives identification information from the second device via a first communications modality. In response to the identification information, the first device configures itself to initiate communications with the second device via a second communications modality. | 2013-12-19 |
20130339535 | PROXIMITY INITIATED CO-BROWSING SESSIONS - Methods and systems of conducting co-browsing sessions may provide for detecting a proximity event between a first device and a second device, and initiating a co-browsing session between the first device and the second device based on the proximity event. In one example, the proximity event is a physical bump between the first and second devices. | 2013-12-19 |
20130339536 | PROXIMITY INITIATED CO-BROWSING SESSIONS - Methods and systems of conducting co-browsing sessions may provide for detecting a proximity event between a first device and a second device, and initiating a co-browsing session between the first device and the second device based on the proximity event. In one example, the proximity event is a physical bump between the first and second devices. | 2013-12-19 |
20130339537 | SYSTEM FOR DYNAMIC STREAM MANAGEMENT IN AUDIO VIDEO BRIDGED NETWORKS - A network communication system includes one or more talkers that may communicate data streams to one or more listeners over a network, such as an Ethernet Audio/Video Bridging network. Before transmitting a new data stream, a talker may request a reservation for bandwidth through a controller that is configured to manage and/or control the flow of data streams over the network. If there is not enough bandwidth, then the controller may determine whether any existing data streams may be transmitted at lower bandwidths to make available enough bandwidth for the new data stream. Alternatively, the controller may determine whether any existing data streams having lower priorities than the new data stream may be terminated to make available enough bandwidth for the new data stream. | 2013-12-19 |
20130339538 | GENERATING PACKETS WITH LOW OVERHEAD OR SELECTABLE SEQUENCE NUMBER GENERATION - Methods, systems, and computer readable media for generation of sequence numbers for insertion into a data stream are disclosed. According to one aspect, low-overhead sequence number generation includes reading a stored set of coefficients and using them to calculate a value for a sequence number according to an equation for calculating a sequence number value, but not changing the values of the stored set of coefficients during generation of the sequence numbers. According to another aspect, a sequence number generation method is selected from multiple available methods based on a desired pattern of sequence numbers and used to generate sequence numbers that are included in a data stream. According to yet another aspect, sequence numbers are calculated using multiple inputs, each input being a counter output or a value referenced by a counter output. | 2013-12-19 |
20130339539 | System and Method for Capturing, Editing, Searching, and Delivering Multi-Media Content - Various acquisition streams are delivered, synchronously or asynchronously, to a server. Those streams having local time indicia are synchronized with the global timeline and the various acquisition streams are then stored. Low bit rate streams corresponding to the stored acquisition streams are generated for use in subsequent editing of the acquisition streams. The editing of the acquisition streams entails reviewing the various acquisition streams and selecting portions for replay. The portions selected for replay are identified through metadata which is then stored. The replay or distribution mode begins by editing the global timeline using the metadata generated in the editing mode so as to produce an edited timeline. The various acquisition streams are then rendered or played back according to the edited timeline to produce a distribution stream. | 2013-12-19 |
20130339540 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR LOAD BALANCING STREAM CONTROL TRANSMISSION PROTOCOL (SCTP) MESSAGES - According to one aspect, the subject matter described herein includes a method for load balancing SCTP messages. The method includes receiving an SCTP message containing an address, a port identifier, and a verification tag. The method includes determining, using the verification tag, an associated application server from a plurality of application servers. The method includes sending the SCTP message to the application server for processing. | 2013-12-19 |
20130339541 | MULTI-OUT MEDIA DISTRIBUTION SYSTEM AND METHOD - A multi-out media delivery system and method are provided herein. | 2013-12-19 |
20130339542 | KEY FRAME DETECTION AND SYNCHRONIZATION - Mechanisms are provided for allowing a streaming server to efficiently provide frames associated with a media stream to a client device. A streaming server receives multiple media streams and determines which frames in the multiple media streams are key frames. When a connection request is received from a client device, a key frame is selected and provided to the client device. A client device receiving a key frame does not have to drop any predictive frames prior to playing a media stream. | 2013-12-19 |
20130339543 | AVOIDING UNWANTED TCP RETRANSMISSIONS USING OPTIMISTIC WINDOW ADJUSTMENTS - A method, an apparatus, and a computer program product for communicating data via the Transmission Control Protocol (TCP) are provided. The apparatus receives from a sender a plurality of data segments according to a sequential order, infers at least one missing data segment in the sequential order, and acknowledges to the sender receipt of a highest byte sequence number of a received data segment plus one based on the inference of the at least one missing data segment. The apparatus also adjusts a receive window based on at least one of: the inference of the at least one missing data segment, or a round-trip-time of a TCP connection, wherein the receive window indicates a buffer capacity for receiving data segments. The apparatus further advertises the adjusted receive window to the sender. | 2013-12-19 |
20130339544 | SYSTEMS AND METHODS FOR USING ECMP ROUTES FOR TRAFFIC DISTRIBUTION - The present application is directed towards systems and methods for using equal cost multi-path routing for traffic distribution in a cluster environment. Each intermediary device of a cluster may advertise, via a routing protocol to a router, a corresponding internet protocol (IP) address of a virtual server and one or more connection metrics having predetermined values. Upon determining that another intermediary device of the cluster is unavailable, each active device may re-advertise the IP address of the virtual server executing on the intermediary device and the one or more connection metrics with the previously advertised value reduced by a predetermined amount. In some embodiments, each active device may wait a predetermined time period, such as a time period for expiration of routing protocol tables, and then re-advertise the IP address of the virtual server executing on the intermediary device and the one or more connection metrics with the predetermined values. | 2013-12-19 |
20130339545 | NETWORK-BASED HYPERSPEED COMMUNICATION AND DEFENSE - This invention relates to the use of optimal (hyperspeed) paths for command and control (and other high priority) traffic and suboptimal (slower) paths for all other traffic in order to implement sophisticated network service differentiation and defensive techniques. A reaction time window is created to ensure that packets sent along hyperspeed paths can arrive sufficiently in advance of malicious traffic in order to alert network devices and initiate defensive actions. Assortments of defensive options are available to networks employing the invention and the inventive algorithms. | 2013-12-19 |
20130339546 | DEVICE IDENTIFICATION - A mobile device is configured to create a network address for the mobile device, the network address allowing the mobile device to communicate across a mobile network; associate the network address with a name for the mobile device; store the network address and the name for the mobile device in a first component, the first component being a part of the mobile device; update the network address, for the mobile device, to a new network address; associate the new network address with the name for the mobile device; store the new network address in the first component; and send, using the first component, the new network address to a first server. | 2013-12-19 |
20130339547 | SYSTEMS AND METHODS FOR ARP RESOLUTION OVER A CLUSTER CHANNEL - In the present solution, when a cluster node sends an ARP request for an external IP, the node sends a message to all the other nodes, which are part of the CLAG to expect an ARP reply for the IP. When a node in the cluster receives the ARP reply, the node informs the other nodes which are part of the same CLAG to update the MAC address. Also when an ARP entry is learned/updated over a CLAG link as part of an ARP request/Gratuitous ARP, the node learning/updating the ARP entry will inform other nodes which are part of the same CLAG about the learned/updated ARP entry. Nodes in a cluster may communicate between with each other over a dedicated backplane, which may be a separate physical medium. | 2013-12-19 |
20130339548 | SYSTEMS AND METHODS FOR ARP RESOLUTION OVER AN ASYNCHRONOUS CLUSTEER NETWORK - In the present solution, when a cluster node sends an ARP request for an external IP, the node sends a message to all the other nodes, which are part of the CLAG to expect an ARP reply for the IP. When a node in the cluster receives the ARP reply, the node informs the other nodes which are part of the same CLAG to update the MAC address. Also when an ARP entry is learned/updated over a CLAG link as part of an ARP request/Gratuitous ARP, the node learning/updating the ARP entry will inform other nodes which are part of the same CLAG about the learned/updated ARP entry. Nodes in a cluster may communicate between with each other over a dedicated backplane, which may be a separate physical medium. | 2013-12-19 |
20130339549 | SYSTEMS AND METHODS FOR SUPPORTING IP OWNERSHIP IN A CLUSTER - While each node in a cluster of nodes sources connections with the same IP if each node allocates a port on this IP independently, there may be port clashes. Also, the return traffic is not guaranteed to hit the originating node. These issues are addressed by allocating a port in such a way that the response traffic hashes back to the originating node. A good hash is chosen such that the ports are equally divided among the nodes. When a node leaves, the other nodes take over the port range used by this node. When a node joins, the node takes back its share of ports. | 2013-12-19 |
20130339550 | SYSTEMS AND METHODS FOR GENERATING IPID ACROSS A CLUSTER NETWORK - In a cluster environment, nodes participating in the cluster may generate packets with the same source IP to the same destination IP. If those packets get fragmented down stream, then reassembling this packets depends on the source IP, destination IP, protocol and the IP identifier field (IPID) of the IP packet. As the source IP, destination IP and protocol may be fixed, the IPID generation is coordinated across the nodes to support reassembly down stream and avoid tuple collision. The IPID space may be equally split among the nodes in the cluster. Each node generates IPID within its range to avoid a collision with an IPID generated from another node. | 2013-12-19 |
20130339551 | COMMUNICATION PATH SELECTION - A computer system includes a processor configured for detecting initial command response times of a plurality of paths for transmitting signals from the processor to one or more external devices via a plurality of channels, assigning weighted values to the plurality of paths based on the detected initial command response times, and modifying a frequency at which respective paths among the plurality of paths are selected for transmitting the signals based on the weighted values assigned to the respective paths. | 2013-12-19 |
20130339552 | ACTIVE CABLE MANAGEMENT - Disclosed is a method and state machine that configures a serial attached SCSI (SAS) controller. The insertion of a mini-SAS HD cable is detected. Power is supplied a management interface of the cable. The nonvolatile memory in the mini-SAS HD cable is read to determine the type of cable and the type of transmitter supported by the cable. The cable is an active type cable, power is supplied to a non-management interface of the cable. | 2013-12-19 |
20130339553 | ASSOCIATION OF AN INPUT AND OUTPUT OF A PERIPHERAL DEVICE IN A COMPUTING SYSTEM - A method on a computing system for associating an output of a coupled peripheral device to an input of the peripheral device is provided. A computing system configured to be coupled to a peripheral device comprising an input and an associated output is provided. The computing system comprises an input logical layer configured to receive descriptor configuration information from the peripheral device and build interface sets including attributes of the input of the peripheral device and the associated output. The input logical layer uses the interface sets to select and set attributes of the output of the peripheral device. | 2013-12-19 |
20130339554 | USB PERIPHERAL DEVICE COMPRISING LIMITED FUNCTION USB HOST CONTROLLER - A USB peripheral device comprising a limited function Universal Serial Bus (USB) host controller configured to control HID compliant USB peripheral devices on a downstream facing USB port is disclosed. The port is also capable of dynamically interfacing to any USB compliant peripheral device. | 2013-12-19 |
20130339555 | PARALLEL STATUS POLLING OF MULTIPLE MEMORY DEVICES - An apparatus includes an interface and a processor. The interface is configured to communicate with multiple memory devices over a bus that includes a plurality of parallel data lines. The processor is configured to request the memory devices to provide respective status reports, and to receive the status reports from the memory devices such that, in a given clock cycle of the bus, the multiple status reports from the respective memory devices are received in parallel over respective different subsets of the data lines of the bus. | 2013-12-19 |
20130339556 | System and method for integrating devices for servicing a device-under-service - A system comprising multiple devices that are operable when servicing a device-under service is described. A data acquisition (DAQ) device and a scanner device of the system are operable to acquire data from the device-under-service and to transmit the acquired data to a display device of the system. The DAQ device can operate in a local-control mode in which selection of DAQ mode for the DAQ device is carried out at the DAQ device. The DAQ device can operate in a remote-control mode in which selection of a DAQ mode for the DAQ device is carried out at the display device. The multiple devices may communicate with each other via one or more wireless network via one or more air interface protocols. Each device of the system may operate as a stand-alone device or in combination with multiple devices of the system. | 2013-12-19 |
20130339557 | HOST ELECTRONIC DEVICE AND HOST DETERMINATION METHOD - The present disclosure provides a host electronic device including a main operating circuit, a first peripheral bus, an interface circuit, a second peripheral bus, and a conversion device. The interface circuit is coupled between the second peripheral bus and a host computer for receiving an external command form the host computer through a transmission protocol compatible with a first interface. The conversion device is coupled between the first and the second peripheral bus including an external virtual adapter, an internal virtual adapter, and a network channel. Furthermore, the conversion device encodes and decodes the external command, and produces a decoded external command. A processor of the main operating circuit executes the decoded external command, such that the main operating circuit implements a corresponding operation. | 2013-12-19 |
20130339558 | Delegating Network Processor Operations to Star Topology Serial Bus Interfaces - An advanced processor comprises a plurality of multithreaded processor cores each having a data cache and instruction cache. A data switch interconnect is coupled to each of the processor cores and configured to pass information among the processor cores. A messaging network is coupled to each of the processor cores and a plurality of communication ports. The data switch interconnect is coupled to each of the processor cores by its respective data cache, and the messaging network is coupled to each of the processor cores by its respective message station. In one aspect of an embodiment of the invention, the messaging network connects to a high-bandwidth star-topology serial bus such as a PCI express (PCIe) interface capable of supporting multiple high-bandwidth PCIe lanes. Advantages of the invention include the ability to provide high bandwidth communications between computer systems and memory in an efficient and cost-effective manner. | 2013-12-19 |
20130339559 | METHOD TO CONTROL OPTICAL TRANSCEIVER IMPLEMENTED WITH A PLURALITY OF INNER SERIAL BUSES - An optical transceiver implemented with a plurality of inner serial busses is disclosed. One of inner serial busses is the mother serial bus drawn out from the controller to the bus selector, while, the rest are daughter serial busses connecting the bus selector to respective circuit units. When some circuit units causes failures to hang the daughter serial bus connected thereto, the controller makes this daughter serial bus inactive by controlling the bus selector, and collects information and sets parameters to rest circuit units as activating other daughter serial busses. | 2013-12-19 |
20130339560 | LOCK CONTROL APPARATUS AND LOCK CONTROL METHOD - A lock control apparatus includes a control unit that controls acquisition of a lock for using a shared resource shared among a plurality of tasks by a task according to first lock information that indicates whether to permit the tasks to acquire the lock, and a determining unit that determines whether there is a conflict of requests for acquisition of the lock by the tasks, wherein when the determining unit determines that there is a conflict of requests for acquisition of the lock, the control unit controls acquisition of the lock by the tasks according to second lock information that indicates whether to permit acquisition of the lock when there is a conflict. | 2013-12-19 |
20130339561 | PROGRAM EVENT RECORDING WITHIN A TRANSACTIONAL ENVIRONMENT - A transaction is initiated within a computing environment, and based on detecting a program event recording event, an interrupt is presented for the transaction. Subsequent to the interrupt, one or more controls are set to inhibit presentation of another interrupt based on detecting another PER event. Thereafter, the transaction is re-executed and PER events detected during execution of the transaction are ignored. | 2013-12-19 |
20130339562 | PROGRAM EVENT RECORDING WITHIN A TRANSACTIONAL ENVIRONMENT - A transaction is initiated within a computing environment, and based on detecting a program event recording event, an interrupt is presented for the transaction. Subsequent to the interrupt, one or more controls are set to inhibit presentation of another interrupt based on detecting another PER event. Thereafter, the transaction is re-executed and PER events detected during execution of the transaction are ignored. | 2013-12-19 |
20130339563 | SYSTEMS AND METHODS FOR ADVANCED INTERRUPT SCHEDULING AND PRIORITY PROCESSING IN A STORAGE SYSTEM ENVIRONMENT - Methods and systems for advanced interrupt processing and scheduling are provided. The system comprises a memory operable to store interrupt priorities, an interface, and a processor operable to acquire incoming interrupts and to handle the incoming interrupts according to the interrupt priorities. The processor is also operable to receive interrupt processing criteria from the interface (sent, for example, from a device not directly coupled with the system), and to modify the interrupt priorities of the memory based upon the interrupt processing criteria without losing incoming processing requests for the system. Additionally, the processor is operable to process the incoming interrupts according to the modified interrupt priorities responsive to modifying the interrupt priorities. | 2013-12-19 |
20130339564 | Function Approximation Circuitry - Function approximation circuitry approximates an arbitrary function F over discrete inputs. Discrete values of the function F are stored in a lookup table (LUT) component for various inputs. An addressing module generates an address from an input. An interpolation factor module generates an interpolation factor from the input. An interpolation module generates an output, which is an approximate value of the function F for the input, from the interpolation factor, and from outputs of the LUT component when the LUT component is addressed by the address. | 2013-12-19 |
20130339565 | METHOD, DEVICE AND SYSTEM FOR AGGREGATION OF SHARED ADDRESS DEVICES - Techniques and mechanisms for managing resources of an aggregate device which spans multiple physical devices of a computer platform. In an embodiment, an aggregation device coupled to a host bus of the computer platform receives resource information generated by a pre-boot software process of the computer platform. In another embodiment, the aggregation device, based on the received resource information, represents a resource in a first input/output (I/O) device to a host operating system (OS) as residing in the aggregation device, the first I/O device coupled to the aggregation device via a host bus for exchanging communications referencing a shared address space. | 2013-12-19 |
20130339566 | INFORMATION PROCESSING DEVICE - An information processing device includes: a computing device having a first path for connecting between a computing unit configured to execute a computation process and a peripheral device, a second path for connecting between a computing unit that is included in another computing device and configured to execute a computation process and the peripheral device, and a switching unit configured to switch between the first path and the second path according to a switching signal; and a signal generation unit configured to generate a switching signal, and to output the generated signal to the switching unit. | 2013-12-19 |
20130339567 | TWO LEVEL ADDRESSING IN STORAGE CLUSTERS - Digital objects are stored and accessed within a fixed content storage cluster by using a page mapping table and a pages index. A stream is read from the cluster by using a portion of its unique identifier as a key into the page mapping table. The page mapping table indicates a node holding a pages index indicating where the stream is stored. A stream is written to the cluster by storing the stream on any suitable node and then updating a pages index stored within the cluster. The cluster recovers from a node failure by first replicating streams from the failed node and reallocating a page mapping table to create a new pages index. The remaining nodes send records of the unique identifiers corresponding to objects they hold to the new pages index. A node is added to the cluster by reallocating a page mapping table. | 2013-12-19 |
20130339568 | PROACTIVE MEMORY RECLAMATION FOR JAVA VIRTUAL MACHINES - A mechanism is provided for managing memory of a virtual machine having a runtime environment executing therein. The runtime environment includes a balloon agent that allocates memory objects within heap memory of the runtime environment and hints to a hypervisor that machine memory pages backing the memory objects may be candidates for page sharing. At launch of the runtime environment, the balloon agent allocates memory objects in response to detecting a state of high machine memory consumption by the virtual machine. Further, while the runtime environment is running, the balloon agent allocates memory objects within heap memory when the runtime environment becomes idle. | 2013-12-19 |
20130339569 | Storage System and Method for Operating Thereof - Storage system(s) for providing storing data in physical storage in a recurring manner, method(s) of operating thereof, and corresponding computer program product(s). For example, a possible method can include for each recurrence: generating a snapshot of at least one logical volume; destaging all data corresponding to the snapshot which was accommodated in the cache memory prior to a time of generating the snapshot and which was dirty at the time of generating said snapshot, thus giving rise to destaged data group; and after the destaged data group has been successfully destaged, registering an indication that the snapshot is associated with an order preservation consistency condition for the at least one logical volume, thus giving rise to a consistency snapshot. | 2013-12-19 |
20130339570 | VARIABILITY AWARE WEAR LEVELING - Techniques are presented that include determining, for data to be written to a nonvolatile memory, a location in the nonvolatile memory to which the data should be written based at least on one or more wear metrics corresponding to the location. The one or more wear metrics are based on measurements of the location. The measurements estimate physical wear of the location. The techniques further include writing the data to the determined location in the nonvolatile memory. The techniques may be performed by methods, apparatus (e.g., a memory controller), and computer program products. | 2013-12-19 |
20130339571 | 3D MEMORY WITH VERTICAL BIT LINES AND STAIRCASE WORD LINES AND VERTICAL SWITCHES AND METHODS THEREOF - A 3D memory with vertical local bit lines global bit lines has an in-line vertical switch in the form of a thin film transistor (TFT) formed as a vertical structure, to switch a local bit line to a global bit line. The TFT is implemented to switch a maximum of current carried by the local bit line by a strongly coupled select gate which must be fitted within the space around the local bit line. Maximum thickness of the select gate is implemented with the select gate exclusively occupying the space along the x-direction from both sides of the local bit line. The switches for odd and even bit lines of the row are staggered and offset in the z-direction so that the select gates of even and odd local bit lines are not coincident along the x-direction. The switching is further enhanced with a wrap-around select gate. | 2013-12-19 |
20130339572 | MULTI-LEVEL MEMORY WITH DIRECT ACCESS - Embodiments of a method, device, and system for implementing multi-level memory with direct access are disclosed. In one embodiment, the method includes designating an amount of a non-volatile random access memory (NVRAM) in a computer system to be utilized as a memory alternative for a dynamic random access memory (DRAM). The method continues by designating a second amount of the NVRAM to be utilized as a storage alternative for a mass storage device. Then the method re-designates at least a first portion of the first amount of NVRAM from the memory alternative designation to the storage alternative designation during operation of the computer system. Finally, the method re-designates at least a first portion of the second amount of NVRAM from the storage alternative designation to the memory alternative designation during operation of the computer system. | 2013-12-19 |
20130339573 | OPTIMIZING WRITE PERFORMANCE TO FLASH MEMORY - Embodiments relate to optimizing write performance of a flash device. Aspects include receiving a request to evict a plurality of pages from a main memory and determining a block size for the flash device. Aspects also include grouping the plurality of pages from the main memory into a move specification block, wherein a size of the move specification block is the block size and writing the move specification block to the flash device. The block size being determined based on one or more operational characteristics of the flash device. | 2013-12-19 |
20130339574 | VARIABILITY AWARE WEAR LEVELING - Techniques are presented that include determining, for data to be written to a nonvolatile memory, a location in the nonvolatile memory to which the data should be written based at least on one or more wear metrics corresponding to the location. The one or more wear metrics are based on measurements of the location. The measurements estimate physical wear of the location. The techniques further include writing the data to the determined location in the nonvolatile memory. The techniques may be performed by methods, apparatus (e.g., a memory controller), and computer program products. | 2013-12-19 |
20130339575 | DATA STORAGE DEVICE AND DATA TRIMMING METHOD - A data storage device is disclosed. In one embodiment, the data storage device comprises a flash memory and a controller. The flash memory comprises a plurality of blocks, wherein each block comprises a plurality of pages, and each page comprises a plurality of data trimming units which is a smallest unit for data modification. After a data trimming process has been performed on an address range of the flash memory, the controller determines a last page corresponding to an ending address of the address range, determines whether data values stored in the last page with addresses subsequent to the ending address are all equal to a specific data pattern, and sets the value of a trimming flag corresponding to the last page to be 1 when the data values stored in the last page with addresses subsequent to the ending address are all equal to the specific data pattern. | 2013-12-19 |
20130339576 | METHOD FOR CONSTRUCTING ADDRESS MAPPING TABLE OF SOLID STATE DRIVE - A method for constructing an address mapping table of a solid state drive is provided. The address mapping table is stored in a non-volatile memory of the solid state drive. The method includes the following steps. After the solid state drive is powered on, a command from a host is received. Then, a logical allocation address is calculated according to a logical block address corresponding to the command. Then, the calculated logical allocation address is defined as an initial address, and a specified number of logical allocation addresses starting from the initial address and corresponding physical allocation addresses are loaded into a cache memory, so that a first portion of the address mapping table is constructed into the cache memory. Afterwards, the solid state drive responds the command according to the first portion of the address mapping table. | 2013-12-19 |
20130339577 | METHOD FOR READING A MULTILEVEL CELL IN A NON-VOLATILE MEMORY DEVICE - A non-volatile memory device has a memory array comprising a plurality of memory cells. The array can operate in either a multilevel cell or single level cell mode and each cell has a lower page and an upper page of data. The memory device has a data latch for storing flag data and a cache latch coupled to the data latch. A read method comprises initiating a lower page read of a memory cell and reading, from the data latch, flag data that indicates whether a lower page read operation is necessary. | 2013-12-19 |
20130339578 | SERVER AND DRIVE CONTROL DEVICE - According to one embodiment, a drive control device includes a monitor, data memory and a controller. The monitor monitors an operating state of a solid-state drive and detects whether the solid-state drive is busy. The data memory is capable of holding temporarily a write target data which should be written to the solid-state drive or a read target data which was read from the solid-state drive and should be transmitted to a requestor. The controller which writes the write target data to the data memory when the controller receives a write request and the monitor detects that the solid-state drive is busy, and which writes the write target data held in the data memory to the solid-state drive after the solid-state drive becomes not busy. | 2013-12-19 |
20130339579 | NUMERIC REPRESENTATION TO IMPROVE LIFE OF SOLID STATE STORAGE DEVICES - Technologies and implementations for improving life of a solid state storage device are generally disclosed. | 2013-12-19 |
20130339580 | STRIPE-BASED NON-VOLATILE MULTILEVEL MEMORY OPERATION - Stripe-based non-volatile multilevel memory operation can include writing a number of lower stripes including programming a number of lower pages of information in each of the number of lower stripes. An upper stripe can be written including programming a number of upper pages of the information in the upper stripe. Each of the number of upper pages can correspond to a respective one of the number of lower pages. Each of the respective ones of the number of lower pages corresponding to the number of upper pages can be programmed in a different lower stripe of the number of lower stripes. | 2013-12-19 |
20130339581 | Flash Storage Controller Execute Loop - A storage controller is provided that contains multiple processors. In some embodiments, the storage controller is coupled to a flash memory module having multiple flash memory groups, each flash memory group corresponding to a distinct flash port in the storage controller, each flash port comprising an associated processor. Each processor handles a portion of one or more host commands, including reads and writes, allowing multiple parallel pipelines to handle one or more host commands simultaneously. | 2013-12-19 |
20130339582 | Flash Storage Controller Execute Loop - A storage controller is provided that contains multiple processors. In some embodiments, the storage controller is coupled to a flash memory module having multiple flash memory groups, each flash memory group corresponding to a distinct flash port in the storage controller, each flash port comprising an associated processor. Each processor handles a portion of one or more host commands, including reads and writes, allowing multiple parallel pipelines to handle one or more host commands simultaneously. | 2013-12-19 |
20130339583 | SYSTEMS AND METHODS FOR TRANSFERRING DATA OUT OF ORDER IN NEXT GENERATION SOLID STATE DRIVE CONTROLLERS - Systems and methods are provided for transferring data back and forth from a NAND based storage device by issuing instructions for reading an allocation unit. The instructions may be issued out of order with respect to a sequential order of the data. The allocation unit related information is stored in a linked list data structure. The stored linked list data structure may be accessed for processing the allocation unit related information out of order with respect to the sequential order of the data. | 2013-12-19 |
20130339584 | METHOD FOR ACCESSING FLASH MEMORY HAVING PAGES USED FOR DATA BACKUP AND ASSOCIATED MEMORY DEVICE - The present invention provides a method for accessing a flash memory, where a block of the flash memory includes pages whose quantity is (2 | 2013-12-19 |
20130339585 | Management of Non-Volatile Memory Systems Having Large Erase Blocks - A non-volatile memory system of a type having blocks of memory cells erased together and which are programmable from an erased state in units of a large number of pages per block. If the data of only a few pages of a block are to be updated, the updated pages are written into another block provided for this purpose. Updated pages from multiple blocks are programmed into this other block in an order that does not necessarily correspond with their original address offsets. The valid original and updated data are then combined at a later time, when doing so does not impact on the performance of the memory. If the data of a large number of pages of a block are to be updated, however, the updated pages are written into an unused erased block and the unchanged pages are also written to the same unused block. By handling the updating of a few pages differently, memory performance is improved when small updates are being made. The memory controller can dynamically create and operate these other blocks in response to usage by the host of the memory system. | 2013-12-19 |
20130339586 | METHODS FOR ADAPTIVELY PROGRAMMING FLASH MEMORY DEVICES AND FLASH MEMORY SYSTEMS INCORPORATING SAME - A method for programming data into a first plurality of rows within a second plurality of erase sectors of a flash memory device using a programming process having at least one selectable parameter, the method includes characterizing each of at least one row subsets, each row subset comprising at least one row from among said first plurality of rows, thereby to generate at least one row subset characteristic value; and programming data into at least a portion of at least one individual row belonging to at least one row subset, using a programming process having at least one selectable parameter, said at least one selectable parameter being set at least partly in accordance with the row subset characteristic value characterizing a row subset to which said individual row belongs; wherein at least two row subsets of an array of flash memory cells differ from each other by their row subset characteristic values. | 2013-12-19 |
20130339587 | STORAGE SYSTEM EMPLOYING MRAM AND ARRAY OF SOLID STATE DISKS WITH INTEGRATED SWITCH - A high-availability storage system includes a first storage system and a second storage system. The first storage system includes a first Central Processing Unit (CPU), a first physically-addressed solid state disk (SSD) and a first non-volatile memory module that is coupled to the first CPU. Similarly, the second storage system includes a second CPU and a second SSD. Upon failure of one of the first or second CPUs, or the storage system with the non-failing CPU continues to be operational and the storage system with the failed CPU is deemed inoperational and the first and second SSDs remain accessible. | 2013-12-19 |
20130339588 | System on Chip with Reconfigurable SRAM - A system on chip includes a random access memory, a read-only memory, and a processor. The processor is configured to, during a development phase of the system on chip, read program code from the random access memory and execute the program code. The program code is developed during the development phase until a completed version of the program code is reached. The processor is configured to, during an operational phase of the system on chip, (i) read the completed version from the read-only memory, (ii) execute the completed version, and (iii) cache data in the random access memory. The processor is configured to, during the operational phase and in response to an improvement to the completed version of the program code being developed, (i) read program code corresponding to the improvement from the random access memory, and (ii) read remaining portions of the completed version from the read-only memory. | 2013-12-19 |
20130339589 | ADAPTIVE CONFIGURATION OF NON-VOLATILE MEMORY - Examples are disclosed for adaptive configuration of non-volatile memory. The examples include a mode register configured to include default and updated values to indicate one or more configurations of the non-volatile memory. The examples may also include discoverable capabilities maintained in a configuration table that may indicate memory address lengths and/or operating power states. | 2013-12-19 |
20130339590 | SEMICONDUCTOR DEVICE WITH NONVOLATILE MEMORY PREVENTED FROM MALFUNCTIONING CAUSED BY MOMENTARY POWER INTERRUPTION - In an internal register, a value for controlling operation of a flash memory is stored. A power shutoff detection register holds a value which changes when power shutoff occurs, and data stored in a specific memory cell is written in the power shutoff detection register. An EX-OR circuit compares the data stored in the specific memory cell with the value of the power shutoff detection register to thereby detect power shutoff. When power shutoff is detected, the value of the internal register is re-set. Thus, when power shutoff occurs, the flash memory can be prevented from malfunctioning. | 2013-12-19 |
20130339591 | RELAYING APPARATUS, RELAY HISTORY RECORDING METHOD, AND DATA PROCESSING APPARATUS - When a relaying apparatus receives communication unit data transmitted from a processing apparatus that performs data processing, the relaying apparatus extracts preset data from the received communication unit data as trace information and calculates the number of pieces of the received communication unit data. History information of the received communication unit data is selected from the extracted trace information and statistical information obtained from the result of the calculation. The selected information is recorded in a storage apparatus available to the processing apparatus. | 2013-12-19 |
20130339592 | APPROACH TO VIRTUAL BANK MANAGEMENT IN DRAM CONTROLLERS - Banks within a dynamic random access memory (DRAM) are managed with virtual bank managers. A DRAM controller receives a new memory access request to DRAM including a plurality of banks. If the request accesses a location in DRAM where no virtual bank manager includes parameters for the corresponding DRAM page, then a virtual bank manager is allocated to the physical bank associated with the DRAM page. The bank manager is initialized to include parameters needed by the DRAM controller to access the DRAM page. The memory access request is then processed using the parameters associated with the virtual bank manager. One advantage of the disclosed technique is that the banks of a DRAM module are controlled with fewer bank managers than in previous DRAM controller designs. As a result, less surface area on the DRAM controller circuit is dedicated to bank managers. | 2013-12-19 |
20130339593 | REDUCING PENALTIES FOR CACHE ACCESSING OPERATIONS - A computer program product for reducing penalties for cache accessing operations is provided. The computer program product includes a tangible storage medium readable by a processing circuit and storing instructions for execution by the processing circuit for performing a method. The method includes respectively associating platform registers with cache arrays, loading control information and data of a store operation to be executed with respect to one or more of the cache arrays into the one or more of the platform registers respectively associated with the one or more of the cache arrays, and, based on the one or more of the cache arrays becoming available, committing the data from the one or more of the platform registers using the control information from the same platform registers to the one or more of the cache arrays. | 2013-12-19 |
20130339594 | HOST BUS ADAPTERS WITH SHARED MEMORY AND BATTERY BACKUP - The present disclosure includes methods and systems that share memory located on one PCIe based HBA across other PCIe based HBAs in the system. In addition, the backup battery is effectively shared across multiple PCIe based HBAs in the system. This approach saves significant costs by avoiding the need to have a separate DRAM with its own dedicated battery backup on each HBA board in the system. This also allows the redundant memory and backup batteries to be removed while still retaining the same functionality through the common DDR3 memory chip and battery backup shared across multiple HBAs in the system. The component cost for batteries and memory, management module, board space, and the board manufacturing cost are all reduced as a result. | 2013-12-19 |
20130339595 | IDENTIFYING AND PRIORITIZING CRITICAL INSTRUCTIONS WITHIN PROCESSOR CIRCUITRY - In one embodiment, the present invention includes a method for identifying a memory request corresponding to a load instruction as a critical transaction if an instruction pointer of the load instruction is present in a critical instruction table associated with a processor core, sending the memory request to a system agent of the processor with a critical indicator to identify the memory request as a critical transaction, and prioritizing the memory request ahead of other pending transactions responsive to the critical indicator. Other embodiments are described and claimed. | 2013-12-19 |
20130339596 | CACHE SET SELECTIVE POWER UP - Embodiments of the disclosure include selectively powering up a cache set of a multi-set associative cache by receiving an instruction fetch address and determining that the instruction fetch address corresponds to one of a plurality of entries of a content addressable memory. Based on determining that the instruction fetch address corresponds to one of a plurality of entries of a content addressable memory a cache set of the multi-set associative cache that contains a cache line referenced by the instruction fetch address is identified and only powering up a subset of cache. Based on the identified cache set not being powered up, selectively powering up the identified cache set of the multi-set associative cache and transmitting one or more instructions stored in the cache line referenced by the instruction fetch address to a processor. | 2013-12-19 |
20130339597 | METHODS AND APPARATUS PROVIDING HIGH-SPEED CONTENT ADDRESSABLE MEMORY (CAM) SEARCH-INVALIDATES - Embodiments of a Content Addressable Memory (CAM) enabling high-speed search and invalidate operations and methods of operation thereof are disclosed. In one embodiment, the CAM includes a CAM cell array including a number of CAM cells and a valid bit cell configured to generate a match indicator, and blocking circuitry configured to block an output of the valid bit cell from altering the match indicator during an invalidate process of a search and invalidate operation. Preferably, the output of the valid bit cell is blocked from affecting the match indicator for the CAM cell array beginning at a start of the invalidate process and continuing until an end of the search and invalidate operation. | 2013-12-19 |
20130339598 | Intelligent Active Vault Operation - Example apparatus, methods, and other embodiments concern a tape library controller (TLC) configured to examine import and export commands to provide more intelligent active vault support. One example method may include receiving a command in a TLC associated with a tape library that is configured with an active archive and an active vault. The example method may include determining that the command can be satisfied by one of, an operation involving the active vault, and an operation involving an external vault. The example method may then control the TLC to provide a request that seeks the vault destination to be used to satisfy the command. The example method may also include receiving an identifier of the vault destination in the TLC and controlling the tape library to move a tape to or from the active vault or the external vault based on the vault destination identifier. | 2013-12-19 |
20130339599 | METHODS AND SYSTEMS FOR ADAPTIVE QUEUE DEPTH MANAGEMENT - The invention may be embodied in a multiple-disk data storage system including a controller module that initiates an optimization algorithm to set maximum queue depth of each disk of the data storage system to desired queue depth of each disk. Desired queue depth of each disk may be associated with performance factors including, but not limited to, input/output operations per second (IOPs), average response time, and/or maximum response time of each disk. Desired queue depth of each disk may be further associated with priority rankings of performance factors. | 2013-12-19 |
20130339600 | INTELLIGENT ADAPTER - A network device that includes a storage protocol controller having a port for interfacing with a storage area network (SAN) based storage device and another network device operating within a cluster is provided. The network device also includes a processor executing instructions for managing a local storage device that is configured to operate as a caching device for a computing device. The network device is configured to operate as a host bus adapter and a storage controller for managing storage space at the local storage device and the SAN-based storage device. | 2013-12-19 |
20130339601 | SYSTEM AND METHOD FOR DYNAMICALLY RESIZING A PARITY DECLUSTERED GROUP - A storage server resizes an array of mass storage devices and distributes data blocks stored in the array of mass storage devices evenly in a declustered organization across the resized array of mass storage devices. Resizing the array of mass storage devices may include adding a new mass storage device to the array or removing a mass storage device from the array. During resizing a data block is moved from one mass storage device to another mass storage device to minimize the imbalance of parity groups shared by the new mass storage devices in the array, as well as minimize the number of data blocks to be moved to uniformly balance the load across the new mass storage device. | 2013-12-19 |