Patent application number | Description | Published |
20150024743 | Cell Selection and Reselection Optimizations Responsive to Mobility State - User equipment (UE) obtains system information using a foreground or background process. The system information may include cell information that distinguishes femtocells from macrocells. Given this cell information, the UE may avoid tuning to or attempting to connect to cell types that the UE does not support. For instance, the UE may avoid connection attempts to femtocells, when the UE does not support femtocell connections. | 01-22-2015 |
20150024760 | Femtocell Fingerprinting - User equipment (UE) includes an architecture for handling femtocell fingerprints. The architecture may, as examples, maintain the validity and reliability of fingerprints and coordinate enhancement to existing fingerprints. The architecture also supports fingerprint creation, updating, and deletion. | 01-22-2015 |
20150319679 | Femtocell Fingerprinting - User equipment (UE) includes an architecture for handling femtocell fingerprints. The architecture may, as examples, maintain the validity and reliability of fingerprints and coordinate enhancement to existing fingerprints. The architecture also supports fingerprint creation, updating, and deletion. | 11-05-2015 |
Patent application number | Description | Published |
20080243992 | SYSTEM AND METHOD FOR BANDWIDTH OPTIMIZATION IN A NETWORK STORAGE ENVIRONMENT - According to one or more embodiments of the present invention, a network cache intercepts data requested by a client from a remote server interconnected with the cache through one or more wide area network (WAN) links (e.g., for Wide Area File Services, or “WAFS”). The network cache stores the data and sends the data to the client. The cache may then intercept a first write request for the data from the client to the remote server, and determine one or more portions of the data in the write request that changed from the data stored at the cache (e.g., according to one or more hashes created based on the data). The network cache then sends a second write request for only the changed portions of the data to the remote server. | 10-02-2008 |
20100125598 | ARCHITECTURE FOR SUPPORTING SPARSE VOLUMES - An architecture, including a file-level protocol, for supporting sparse volumes on a storage system is provided. The file-level protocol provides coherency checking for use in retrieving data stored on a backing store remote from a storage system. | 05-20-2010 |
20100325377 | SYSTEM AND METHOD FOR RESTORING DATA ON DEMAND FOR INSTANT VOLUME RESTORATION - A technique is disclosed for restoring data of sparse volumes, where one or more block pointers within the file system structure are marked as ABSENT, and fetching the appropriate data from an alternate location on demand. Client data access requests to the local storage system initiate a restoration of the data from a backing store as required. A demand generator can also be used to restore the data as a background process by walking through the sparse volume and restoring the data of absent blocks. A pump module is also disclosed to regulate the access of the demand generator. Once all the data has been restored, the volume contains all data locally, and is no longer a sparse volume. | 12-23-2010 |
20110035357 | SYSTEM AND METHOD FOR MANAGING DATA DEDUPLICATION OF STORAGE SYSTEMS UTILIZING PERSISTENT CONSISTENCY POINT IMAGES - A system and method for managing data deduplication of a storage system utilizing persistent consistency point images (PCPIs). Once a target PCPI of a data transfer is generated, a backup management module of the storage system alerts a data deduplication module to begin deduplication of the data contained within the target PCPI. Once the deduplication procedure has been completed, the active file system of the storage system has been deduplicated, however, the target PCPI remains un-deduplicated. In response, the backup management module generates and exports a revised target PCPI. The previous target PCPI may then be deleted, thereby transitioning the exported PCPI's image of the state of the file system to a deduplicated state. | 02-10-2011 |
20120197853 | SYSTEM AND METHOD FOR SAMPLING BASED ELIMINATION OF DUPLICATE DATA - A technique for eliminating duplicate data is provided. Upon receipt of a new data set, one or more anchor points are identified within the data set. A bit-by-bit data comparison is then performed of the region surrounding the anchor point in the received data set with the region surrounding an anchor point stored within a pattern database to identify forward/backward delta values. The duplicate data identified by the anchor point, forward and backward delta values is then replaced in the received data set with a storage indicator. | 08-02-2012 |
20130018942 | SYSTEM AND METHOD FOR BANDWIDTH OPTIMIZATION IN A NETWORK STORAGE ENVIRONMENT - According to one or more embodiments of the present invention, a network cache intercepts data requested by a client from a remote server interconnected with the cache through one or more wide area network (WAN) links (e.g., for Wide Area File Services, or “WAFS”). The network cache stores the data and sends the data to the client. The cache may then intercept a first write request for the data from the client to the remote server, and determine one or more portions of the data in the write request that changed from the data stored at the cache (e.g., according to one or more hashes created based on the data). The network cache then sends a second write request for only the changed portions of the data to the remote server. | 01-17-2013 |
20130262805 | Method and Apparatus for Identifying and Eliminating Duplicate Data Blocks and Sharing Data Blocks in a Storage System - A method for sharing data blocks in a hierarchical file system in a storage server includes allocating a plurality of data blocks in the file system, and sharing data blocks in the file system, without using a persistent point-in-time image, to avoid duplication of data blocks. A method for identifying data blocks that can be shared includes computing a fingerprint for each of multiple data blocks to be written to a storage facility and storing the fingerprint with information identifying the data block in an entry in a set of metadata. The set of metadata is used to identify data blocks which are duplicates. | 10-03-2013 |
Patent application number | Description | Published |
20100287394 | NORTH-BRIDGE TO SOUTH-BRIDGE PROTOCOL FOR PLACING PROCESSOR IN LOW POWER STATE - A processor integrated circuit has one or more processor cores and a power management controller in a North-Bridge that generates a first power state recommendation for the one or more processor cores. The North-Bridge also receives a second power state recommendation from a South-Bridge integrated circuit. The North-Bridge determines a final power state for the one or more processor cores based on the first and second power state recommendations. | 11-11-2010 |
20130227196 | CIRCUIT AND METHOD FOR INITIALIZING A COMPUTER SYSTEM - A circuit for use in a computing system including and a bus interface unit and an autoload controller. The autoload controller has an input to receive an initialization signal. In response to receiving the initialization signal, autoload controller searches for a signature using the bus interface unit and, in response to finding the signature at a signature address, loads a plurality of base addresses corresponding to a plurality of controllers from memory locations having a predetermined relationship to the address, and provides the plurality of base addresses to a control output thereof. | 08-29-2013 |
20130262726 | TASK BASED MESSAGE SIGNALED INTERRUPT - Methods and apparatuses are provided for servicing an interrupt in a computer system. The method includes a device driver receiving an interrupt request. The device driver is responsive to the interrupt request to store interrupt data in a portion of the memory. The interrupt data includes identification of at least one processor of the plurality of processors capable of servicing the interrupt request; priority of the interrupt request; a thread context; and an address for instructions to service the interrupt request. The device driver then instructs the peripheral device to issue a memory write to the plurality of processors so that each may determine if it can use the thread context and the instructions to service the interrupt. A computer system is provided with the hardware needed to perform the method. | 10-03-2013 |
20140310552 | REDUCED-POWER SLEEP STATE S3 - Current computer systems support sleep states such as sleep state S | 10-16-2014 |