02nd week of 2015 patent applcation highlights part 54 |
Patent application number | Title | Published |
20150012680 | EXPANSION CARD ASSEMBLY - An expansion card assembly includes a first expansion card with a first circuit board, a first expansion slot, and a second expansion card with a second circuit board. A first edge connector is arranged on a bottom edge of the first circuit board and is inserted into a second expansion slot of a motherboard. A second edge connector is arranged on a top edge of the first circuit board and is inserted into the first expansion slot. A third edge connector is arranged on a bottom edge of the second circuit board and is electrically connected to pins of the first expansion slot opposite to the first expansion card. | 2015-01-08 |
20150012681 | Common Idle State, Active State And Credit Management For An Interface - In one embodiment, the present invention includes method for entering a credit initialization state of an agent state machine of an agent coupled to a fabric to initialize credits in a transaction credit tracker of the fabric. This tracker tracks credits for transaction queues of a first channel of the agent for a given transaction type. The agent may then assert a credit initialization signal to cause credits to be stored in the transaction credit tracker corresponding to the number of the transaction queues of the first channel of the agent for the first transaction type. Other embodiments are described and claimed. | 2015-01-08 |
20150012682 | Dual Mode Display-Port Connector - A dual mode display-port connector including a host-side auxiliary interface, a display-side auxiliary interface, and a cable. Each of the host-side auxiliary interface and the display-side auxiliary interface includes a bi-directional converter and a direct-current (DC) balancing codec. The bi-directional converter converts differential auxiliary signals received via one side thereof into a single auxiliary signal and a single auxiliary signal received via another side thereof into differential auxiliary signals. The direct-current (DC) balancing codec performs DC balancing encoding on a single auxiliary signal received via one side thereof, and decodes an encoded single auxiliary signal obtained through an encoding process and received via another side thereof. | 2015-01-08 |
20150012683 | Devices, Systems, and Methods for Distributed Monitoring and Control of Networked Server Computers - Embodiments of the present invention include network cables that include a number of inter-integrated circuit communication addressable components in the connector heads. The inter-integrated circuit communication addressable components include signal translators and switches for communicating with environmental and electrical sensors, memories, and controllers in the connector heads and the computers or network interface cards to which they are coupled. Such embodiments allow for localized monitoring of environmental and operational data as well as location or server computer specific control of networked-server operations. Such information and control is useful in reducing the cost and increasing the efficiency of server farm installation cooling, maintenance, operation, and troubleshooting. Other embodiments include methods for communicating between a switch and a server computer using the network cable assembly by translating a signal from a one communication protocol to another for transmission over a dedicated connection between two connector heads. | 2015-01-08 |
20150012684 | Write Operations with Full Sequence Programming for Defect Management in Nonvolatile Memory - Data that is stored in a higher error rate format in a nonvolatile memory is backed up in a lower error rate format. Data to be stored may be transferred once to on-chip data latches where it is maintained while it is programmed in both the high error rate format and the low error rate format without being resent to the nonvolatile memory. High error rate format may be MLC format and programming in the high error rate format may program both lower page and upper page data together in a full sequence programming scheme that is suitable for handling high data volume. | 2015-01-08 |
20150012685 | Write Operations for Defect Management in Nonvolatile Memory - Data that is stored in a higher error rate format in a nonvolatile memory is backed up in a lower error rate format. Data to be stored may be transferred once to on-chip data latches where it is maintained while it is programmed in both the high error rate format and the low error rate format without being resent to the nonvolatile memory. | 2015-01-08 |
20150012686 | UNEVEN WEAR LEVELING IN ANALOG MEMORY DEVICES - A method for data storage in a memory that includes multiple analog memory cells, includes defining, based on a characteristic of the memory cells, an uneven wear leveling scheme that programs and erases at least first and second subsets of the memory cells with respective different first and second Programming and Erasure (P/E) rates. Data is stored in the memory in accordance with the uneven wear leveling scheme. | 2015-01-08 |
20150012687 | METHOD FOR MANAGING COMMANDS IN COMMAND QUEUE, MEMORY CONTROL CIRCUIT UNIT AND MEMORY STORAGE APPARATUS - A method for managing commands in a command queue, a memory controller, and a memory storage apparatus are provided. The method includes: storing at least one first command in a command queue register according to a plurality of first indication bits and updating the first indication bits according to a current storage status of the command queue register; generating a plurality of updated second indication bits according to the updated first indication bits and a plurality of second indication bits. The method also includes: obtaining at least one first command index corresponding to at least one register block storing the at least one first command in the command queue register according to the updated second indication bits and adding the at least one first command index into a command index register; executing commands corresponding to un-executed command indices in the command queue register. | 2015-01-08 |
20150012688 | COMPUTER SYSTEM AND OPERATING METHOD THEREOF - A computer system and an operating method thereof are disclosed herein. The operating method includes: dividing a file into a plurality of file segments; transmitting the file segments to an integrated circuit (IC) sequentially: receiving, through the IC, the file segments sequentially, and writing an operating file segment in a target storage page of a target block when the operating file segment is received; determining whether the operating file segment s successfully written in the target storage page; commanding the IC to erase the target block in a case that the operating file segment is not successfully written in the target storage page; searching a re-transmission start file segment corresponding to a start address of the target block; and, sequentially transmitting a plurality of remaining file segments of the file started from the re-transmission start file segment to the IC. | 2015-01-08 |
20150012689 | SYSTEMS AND METHODS FOR PERSISTENT ADDRESS SPACE MANAGEMENT - Data is stored on a non-volatile storage media in a sequential, log-based format. The formatted data defines an ordered sequence of storage operations performed on the non-volatile storage media. A storage layer maintains volatile metadata, which may include a forward index associating logical identifiers with respective physical storage units on the non-volatile storage media. The volatile metadata may be reconstructed from the ordered sequence of storage operations. Persistent notes may be used to maintain consistency between the volatile metadata and the contents of the non-volatile storage media. Persistent notes may identify data that does not need to be retained on the non-volatile storage media and/or is no longer valid. | 2015-01-08 |
20150012690 | Multi-Leveled Cache Management in a Hybrid Storage System - A hybrid storage system is described having a mixture of different types of storage devices comprising rotational drives, flash devices, SDRAM, and SRAM. The rotational drives are used as the main storage, providing lowest cost per unit of storage memory. Flash memory is used as a higher-level cache for rotational drives. Methods for managing multiple levels of cache for this storage system is provided having a very fast Level 1 cache which consists of volatile memory (SRAM or SDRAM), and a non-volatile Level 2 cache using an array of flash devices. It describes a method of distributing the data across the rotational drives to make caching more efficient. It also describes efficient techniques for flushing data from L1 cache and L2 cache to the rotational drives, taking advantage of concurrent flash devices operations, concurrent rotational drive operations, and maximizing sequential access types in the rotational drives rather than random accesses which are relatively slower. Methods provided here may be extended for systems that have more than two cache levels. | 2015-01-08 |
20150012691 | STORAGE CONTROL APPARATUS, CONTROL PROGRAM, AND CONTROL METHOD - A storage control apparatus which receives a command from a higher-level apparatus for a storage volume constructed by a plurality of storage devices one of which is a first storage device in which physically erasing data is performed on an area in which undesired data is stored in advance in preparation for next write and controls the storage devices, the storage control apparatus includes an identifying section configured to identify, as an erasing area, the area in which undesired data is stored in the first storage device, and an instructing section configured to instruct the first storage device to erase data in the erasing area identified by the identifying section. | 2015-01-08 |
20150012692 | SYSTEMS AND METHODS FOR MANAGING DATA - Systems and methods for managing data input/output operations are described. In one aspect, a device driver identifies a data read operation generated by a virtual machine in a virtual environment. The device driver is located in the virtual machine and the data read operation identifies a physical cache address associated with the data requested in the data read operation. A determination is made regarding whether data associated with the data read operation is available in a cache associated with the virtual machine. | 2015-01-08 |
20150012693 | READ BASED TEMPORAL LOCALITY COMPRESSION - For read based temporal locality compression by a processor device in a computing environment, read operations are monitored, traced, and/or analyzed to identify repetitions of read patterns of compressed data. The compressed data is rearranged based on the repetitions of read order of the compressed data that are in a read order. | 2015-01-08 |
20150012694 | HARDWARE ASSISTED META DATA LOOKUP - A memory system including a memory device. The memory device includes a substrate. A memory array defines a plurality of pages, each page including a data area for storing data and a spare area for storing metadata. A compare circuit is configured to receive metadata retrieved from a plurality of pages sequentially and compare the retrieved metadata to a search pattern. The physical location of the page can be determined by finding the search pattern. The memory array and the compare circuit are formed in different layers of the substrate. | 2015-01-08 |
20150012695 | APPARATUS AND METHOD FOR MULTI-MODE STORAGE - According to an example, multi-mode storage may include operating a first array including a first memory and a second array including a second memory in one or more modes of operation. The first memory may be a relatively denser memory compared to the second memory and the second memory may be a relatively faster memory compared to the first memory. The modes of operation may include a first mode of operation where the first array functions as the relatively denser memory compared to the second memory and the second array functions as the relatively faster memory compared to the first memory, a second mode of operation where the second array is operated as an automatic cache of a portion of a dataset, and a third mode of operation where a cache-tag functionality used to support the second mode of operation is instead used to provide a CAM. | 2015-01-08 |
20150012696 | DATA MANAGEMENT DEVICE, DATA MANAGEMENT SYSTEM, AND DATA MANAGEMENT METHOD - A data management device includes a processor. The processor is configured to transmit data of a logical volume to a library device different from the data management device so as to record the data of the logical volume on a portable recording medium managed by the library device. The processor is configured to prepare recognition information whenever data of a logical volume is recorded on the portable recording medium. The recognition information is used to recognize entire first logical volumes. Data of the first logical volumes is recorded on the portable recording medium. The processor is configured to transmit the recognition information to the library device so as to record the recognition information on the portable recording medium. | 2015-01-08 |
20150012697 | STORAGE CONTROL APPARATUS AND STORAGE CONTROL METHOD - A storage control apparatus includes a processor. The processor is configured to store, during a normal operation mode, first data as a first logical volume in a storage section of a first virtual storage device. The first data is transmitted and received between a first host device and a physical storage device. The physical storage device stores data in a physical volume. The first virtual storage device is connected to the physical storage device during the normal operation mode. The processor is configured to serve, during a data migration mode, as a pseudo host device connected to a second virtual storage device. The pseudo host device accesses the second virtual storage device to read out second data of a second logical volume stored in the second virtual storage device. The first virtual storage device is connected to the second virtual storage device during the data migration mode. | 2015-01-08 |
20150012698 | RESTORING TEMPORAL LOCALITY IN GLOBAL AND LOCAL DEDUPLICATION STORAGE SYSTEMS - Techniques and mechanisms described herein facilitate the restoration temporal locality in global and local deduplication storage systems. According to various embodiments, when it is determined that cache memory in a storage system has reached a capacity threshold, each of a plurality of data dictionary entries stored in the cache memory may be associated with a respective merge identifier. Each data dictionary entry may correspond with a respective data chunk. Each data dictionary entry may indicate a storage location of the respective data chunk in the storage system. The respective merge identifier may indicate temporal locality information about the respective data chunk. The plurality of data dictionary entries may be stored to disk memory in the storage system. Each of the stored plurality of data dictionary entries may include the respective merge identifier. | 2015-01-08 |
20150012699 | SYSTEM AND METHOD OF VERSIONING CACHE FOR A CLUSTERING TOPOLOGY - Aspects of the disclosure pertain to a system and method for versioning cache for a clustered topology. In the clustered topology, a first controller mirrors write data from a cache of the first controller to a cache of the second controller. When communication between controllers of the topology is disrupted (e.g., when the second controller goes offline, while the first controller stays online), the first controller increments a cache version number stored in a disk data format of a logical disk, the logical disk being owned by the first controller and associated with the write data. The incremented cache version number provides an indication to the second controller that the data of the cache of the second controller is stale. | 2015-01-08 |
20150012700 | MANAGING A CACHE IN A MULTI-NODE VIRTUAL TAPE CONTROLLER - According to one embodiment, a system includes a virtual tape library having a cache, a virtual tape controller (VTC) coupled to the virtual tape library, and an interface for coupling multiple hosts to the VTC. The cache is shared by the multiple hosts, and a common view of a cache state, a virtual library state, and a number of write requests pending is provided to the hosts by the VTC. In another embodiment, a method includes receiving data from at least one host using a VTC, storing data received from all the hosts to a cache using the VTC, sending an alert to all the hosts when free space is low and entering into a warning state, sending another alert to all the hosts when free space is critically low and entering into a critical state while allowing previously mounted virtual drives to continue normally. | 2015-01-08 |
20150012701 | REDUNDANT ARRAY OF INDEPENDENT DISKS (RAID) SYSTEM BACKUP MANAGEMENT - Disclosed herein are RAID backup management systems and methods. According to an aspect, a method may include identifying portions of data in each of multiple storage units of a RAID system. The method may also include backing up data in the identified portions to a hot spare. Further, the method may include allocating storage space in the hot spare for the backup based on detection of errors among the storage units. | 2015-01-08 |
20150012702 | REDUNDANT ARRAY OF INDEPENDENT DISKS VOLUME CREATION - Methods and structure for automatic creation of Redundant Array of Independent Disks (RAID) volumes are provided. The system comprises A RAID controller that includes a memory and a processor. The memory stores information describing storage devices of a storage system. The processor is able to receive a request to generate a RAID volume, to access the memory to identify a first group of storage devices that each have a first storage capacity, and to determine an expected size of a volume implemented by the first group. The processor is further able to access the memory to identify a second group of storage devices that each have a second storage capacity, to determine an expected size of a volume implemented by the first group and the second group, and to select one or more of the groups to create the requested volume based on the expected sizes. | 2015-01-08 |
20150012703 | METHOD TO OPTIMIZE PROVISIONING TIME WITH DYNAMICALLY GENERATED VIRTUAL DISK CONTENTS - Distribution of middleware binary includes: receiving a request to deploy a workload with middleware service(s); selecting a base operating system (OS) image to host the middleware service(s); determining locations of binary file(s) for the middleware service(s) in a repository on a storage system; cloning a virtual disk containing the base OS image on the storage system; and copying the binary file(s) from the locations in the repository into the cloned virtual disk on the storage system. The binary file(s) are copied onto the virtual disk directly on the storage system, without the need to traverse a network interface. The base OS image is augmented with the binary files just prior to the deployment of the virtual machine (VM). | 2015-01-08 |
20150012704 | STORAGE SYSTEM - A storage system includes a first storage apparatus including a first logical volume and a second storage apparatus including a second logical volume. The first and second logical volumes are set as a High Availability pair and associated with a virtual volume. When receiving a write request to the virtual volume, the storage system manages storage area in the first logical volume regarding to the write request as storage area during data duplication, writes data in duplicate, in order from the first logical volume to the second logical volume. When receiving a read request to the virtual volume, the first storage apparatus waits for completion of the data duplication and reads data from the first logical volume if the storage area is during the data duplication, and the first storage apparatus reads data from the first logical volume if the storage area is not during the data duplication. | 2015-01-08 |
20150012705 | REDUCING MEMORY TRAFFIC IN DRAM ECC MODE - A method for managing memory traffic includes causing first data to be written to a data cache memory, where a first write request comprises a partial write and writes the first data to a first portion of the data cache memory, and further includes tracking the number of partial writes in the data cache memory. The method further includes issuing a fill request for one or more partial writes in the data cache memory if the number of partial writes in the data cache memory is greater than a predetermined first threshold. | 2015-01-08 |
20150012706 | MANAGING METADATA FOR CACHING DEVICES DURING SHUTDOWN AND RESTART PROCEDURES - A computer program product, system, and method for managing metadata for caching devices during shutdown and restart procedures. Fragment metadata for each fragment of data from the storage server stored in the cache device is generated. The fragment metadata is written to at least one chunk of storage in the cache device in a metadata directory in the cache device. For each of the at least one chunk in the cache device to which the fragment metadata is written, chunk metadata is generated for the chunk and writing the generated chunk metadata to the metadata directory in the cache device. Header metadata having information on access of the storage server is written to the metadata directory in the cache device. The written header metadata, chunk metadata, and fragment metadata are used to validate the metadata directory and the fragment data in the cache device during a restart operation. | 2015-01-08 |
20150012707 | SYSTEM AND CONTROL PROTOCOL OF LAYERED LOCAL CACHING FOR ADAPTIVE BIT RATE SERVICES - A system for layered local caching of downstream shared media in a hierarchical tree network arrangement includes a first network node on a first distribution network having a first caching controller. The first network node configured to store a video segment transmitted on the first distribution network based on a first instruction received by the first caching controller from a central caching controller communicatively coupled to the first distribution network. The central caching controller is located upstream from the first network node. The system includes a second network node on a second distribution network having a second caching controller and communicatively coupled to the first network node. The second network node configured to store a video segment transmitted on the second distribution network based on a second instruction received by the second caching controller from the first caching controller. | 2015-01-08 |
20150012708 | Parallel, pipelined, integrated-circuit implementation of a computational engine - Embodiments of the present invention are directed to parallel, pipelined, integrated-circuit implementations of computational engines designed to solve complex computational problems. One embodiment of the present invention is a family of video encoders and decoders (“codecs”) that can be incorporated within cameras, cell phones, and other electronic devices for encoding raw video signals into compressed video signals for storage and transmission, and for decoding compressed video signals into raw video signals for output to display devices. A highly parallel, pipelined, special-purpose integrated-circuit implementation of a particular video codec provides, according to embodiments of the present invention, a cost-effective video-codec computational engine that provides an extremely large computational bandwidth with relatively low power consumption and low-latency for decompression and compression of compressed video signals and raw video signals, respectively. | 2015-01-08 |
20150012709 | PROGRESSIVE VIRTUAL LUN - A system for progressive just-in-time restoration of data from backup media. Backup data may be stored on any kind of media such as DAS disk, object storage, USB drive, network share or tape. The backup data does not need to reside on contiguous media and can span multiple media. An index map is maintained that represents contiguous blocks of backup data of a volume. The backup data may be compressed, encrypted, or de-duplicated. The backup data may be located on different media, object stores, or network shares, or differing geographic locations. To perform a recovery, a virtual LUN is provided to the operating system and applications of the restored computer. | 2015-01-08 |
20150012710 | CACHE STICKINESS INDEX FOR CONTENT DELIVERY NETWORKING SYSTEMS - Various embodiments of the present disclosure relate to a cache stickiness index for providing measurable metrics associated with caches of a content delivery networking system. In one embodiment, a method for generating a cache stickiness index, including a cluster stickiness index and a region stickiness index, is disclosed. In embodiments, the cluster stickiness index is generated by comparing cache keys shared among a plurality of front-end clusters. In embodiments, the region stickiness index is generated by comparing cache keys shared among a plurality of data centers. In one embodiment, a system comprising means for generating a stickiness index is disclosed. | 2015-01-08 |
20150012711 | SYSTEM AND METHOD FOR ATOMICALLY UPDATING SHARED MEMORY IN MULTIPROCESSOR SYSTEM - A system for operating a shared memory of a multiprocessor system includes a set of processor cores and a corresponding set of core local caches, a set of I/O devices and a corresponding set of I/O device local caches. Read and write operations performed on a core local cache, an I/O device local cache, and the shared memory are governed by a cache coherence protocol (CCP) that ensures that the shared memory is updated atomically. | 2015-01-08 |
20150012712 | SYSTEM, METHOD AND A NON-TRANSITORY COMPUTER READABLE MEDIUM FOR A PRE-FETCH OPERATION - A method for pre-fetching information units, the method may include: (I) Receiving, by a storage system, write requests for writing information units to the storage system. Each write request includes a first identifier and a second identifier. The first identifier identifies a logical address. A combination of the first and second identifiers identifies an accessing entity that initiated the write request. (II) Receiving a read request for reading at least one information unit from the storage system, the read request is initiated by a certain accessing entity. (III) Determining whether to perform a pre-fetch of at least one additional information unit in response to at least one write request that was initiated by the certain accessing entity. If is determined to perform the pre-fetch then fetching the at least one additional information unit. | 2015-01-08 |
20150012713 | DATA PROCESSING APPARATUS HAVING FIRST AND SECOND PROTOCOL DOMAINS, AND METHOD FOR THE DATA PROCESSING APPARATUS - A data processing apparatus ( | 2015-01-08 |
20150012714 | Method and System for Multiple Processors to Share Memory - A method and system for multiple processors to share memory are disclosed. The method includes that: at least one local interconnection network is set, each of which is connected with at least two function modules; a local shared memory unit connected with the local interconnection network is set, and address space of each function module is mapped to the local shared memory unit; a first function module of the at least two function modules writes processed initial data into the local shared memory unit through the local interconnection network; and a second function module of the at least two function modules acquires data from the local shared memory unit via the local interconnection network. The technical solution of the disclosure can solve the drawbacks that a conventional system for multiple processors to globally share memory suffers a large transmission delay, high management overhead and the like. | 2015-01-08 |
20150012715 | DISTRIBUTED SHARED MEMORY - Systems and methods for implementing a distributed shared memory (DSM) in a computer cluster in which an unreliable underlying message passing technology is used, such that the DSM efficiently maintains coherency and reliability. DSM agents residing on different nodes of the cluster process access permission requests of local and remote users on specified data segments via handling procedures, which provide for recovering of lost ownership of a data segment while ensuring exclusive ownership of a data segment among the DSM agents detecting and resolving a no-owner messaging deadlock, pruning of obsolete messages, and recovery of the latest contents of a data segment whose ownership has been lost. | 2015-01-08 |
20150012716 | DATA MANAGEMENT APPARATUS AND CONTROL METHOD OF DATA MANAGEMENT APPARATUS - A data management apparatus has a first storage unit, a first selecting unit, a second selecting unit, and a second storage unit. The first storage unit stores data associated with first identification information. When writing data out to a storage medium, the first selecting unit selects a first storage medium on which the first identification information corresponding to the data to be written out is displayed, from among a plurality of storage media. When the first storage medium is not available, the second selecting unit selects a second storage medium attached with a display unit configured to display stored information, from among the plurality of storage media, and stores the first identification information in the display unit of the second storage medium. | 2015-01-08 |
20150012717 | MEMORY CONTROLLED DATA MOVEMENT AND TIMING - The present disclosure includes apparatuses, electronic device readable media, and methods for memory controlled data movement and timing. A number of electronic device readable media can store instructions executable by an electronic device to provide programmable control of data movement operations within a memory. The memory can provide timing control, independent of any associated processor, for interaction between the memory and the associated processor. | 2015-01-08 |
20150012718 | SYSTEM FOR COMPENSATING FOR DYNAMIC SKEW IN MEMORY DEVICES - A memory device includes a memory array, a memory controller, data lines connecting the memory array and the memory controller, and a delay compensation module. The delay compensation module includes a delay line that provides delayed clock signals, a look-up table that stores a mapping between predefined data bit patterns and corresponding propagation delays for each data line, and delay compensation logic modules corresponding to the data lines. The delay compensation logic modules receive data bit patterns carried by the data lines, select propagation delays based on the data bit patterns and the look-up table data, and delay the bits carried by corresponding ones of the data lines based on delayed clock signals corresponding to the propagation delays. | 2015-01-08 |
20150012719 | DATA STORE AND METHOD OF ALLOCATING DATA TO THE DATA STORE - A data store has a data array for storing data values and a tag array for storing tag values for tracking which data values are stored in the data array. The associativity of the data array is greater than the associativity of the tag array. This means that fewer tag entries need to be accessed on each data access than in a conventional data store, reducing power consumption. | 2015-01-08 |
20150012720 | MEMORY MANAGING APPARATUS AND IMAGE PROCESSING APPARATUS - The memory area managing unit | 2015-01-08 |
20150012721 | SEAMLESS APPLICATION ACCESS TO HYBRID MAIN MEMORY - A command from an application is received to access a data structure associated with one or more virtual addresses mapped to main memory. A first subset of the virtual addresses for the data structure having constituent addresses that are mapped to the symmetric memory components and a second subset of the virtual addresses for the data structure having constituent addresses that are mapped to the asymmetric memory components are identified. Data associated with the virtual address from the first physical addresses and data associated with the virtual addresses from the second physical addresses are accessed. The data associated with the symmetric and asymmetric memory components is accessed by the application without providing the application with an indication of whether the data is accessed within the symmetric memory component or the asymmetric memory component. | 2015-01-08 |
20150012722 | IDENTIFICATION OF PAGE SHARING OPPORTUNITIES WITHIN LARGE PAGES - Memory performance in a computer system that implements large page mapping is improved even when memory is scarce by identifying page sharing opportunities within the large pages at the granularity of small pages and breaking up the large pages so that small pages within the large page can be freed up through page sharing. In addition, the number of small page sharing opportunities within the large pages can be used to estimate the total amount of memory that could be reclaimed through page sharing. | 2015-01-08 |
20150012723 | PROCESSOR USING MINI-CORES - A mini-core and a processor using such a mini-core are provided in which functional units of the mini-core are divided into a scalar domain processor and a vector domain processor. The processor includes at least one such mini-core, and all or a portion of functional units from among the functional units of the mini-core operate based on an operation mode. | 2015-01-08 |
20150012724 | DATA PROCESSING APPARATUS HAVING SIMD PROCESSING CIRCUITRY - A data processing apparatus has permutation circuitry for performing a permutation operation for changing a data element size or data element positioning of at least one source operand to generate first and second SIMD operands, and SIMD processing circuitry for performing a SIMD operation on the first and second SIMD operands. In response to a first SIMD instruction requiring a permutation operation, the instruction decoder controls the permutation circuitry to perform the permutation operation to generate the first and second SIMD operands and then controls the SIMD processing circuitry to perform the SIMD operation using these operands. In response to a second SIMD instruction not requiring a permutation operation, the instruction decoder controls the SIMD processing circuitry to perform the SIMD operation using the first and second SIMD operands identified by the instruction, without passing them via the permutation circuitry. | 2015-01-08 |
20150012725 | METHOD AND APPARATUS FOR A GENERAL-PURPOSE, MULTIPLE-CORE SYSTEM FOR IMPLEMENTING STREAM-BASED COMPUTATIONS - A method and system of efficient use and programming of a multi-processing core device. The system includes a programming construct that is based on stream-domain code. A programmable core based computing device is disclosed. The computing device includes a plurality of processing cores coupled to each other. A memory stores stream-domain code including a stream defining a stream destination module and a stream source module. The stream source module places data values in the stream and the stream conveys data values from the stream source module to the stream destination module. A runtime system detects when the data values are available to the stream destination module and schedules the stream destination module for execution on one of the plurality of processing cores. | 2015-01-08 |
20150012726 | LOOP STREAMING DETECTOR FOR STANDARD AND COMPLEX INSTRUCTION TYPES - A processor includes a microcode storage comprising a plurality of microcode flows and a decode logic coupled to the microcode storage. The decode logic is configured to receive a first instruction, decode the first instruction into an entry point vector to a first microcode flow in the microcode storage, the entry point vector comprising a first indicator specifying a number of clock cycles associated with the first microcode flow, initiate the microcode storage, wherein the microcode storage inserts microinstructions of the first microcode flow into an instruction queue, count clock cycles after initiating the microcode storage, and decode a second instruction without first receiving a return from the microcode storage, wherein the second instruction is decoded at a particular clock cycle based on the number of clock cycles associated with the first microcode flow. | 2015-01-08 |
20150012727 | PROCESSING DEVICE AND CONTROL METHOD OF PROCESSING DEVICE - A processing device has: a plurality of registers configured to correspond to a plurality of accessible register windows; and an instruction decoder configured to inhibit, when, during an execution of a first instruction of changing a number of a current register window by one, a second instruction of changing the number of the current register window by one in a direction same as a direction of the first instruction is input, a decode of the second instruction until when the execution of the first instruction is completed, and to perform, when, during the execution of the first instruction of changing the number of the current register window by one, a second instruction of changing the number of the current register window by one in a direction opposite to the direction of the first instruction is input, a decode of the second instruction during the execution of the first instruction. | 2015-01-08 |
20150012728 | SYSTEM FOR PROVIDING TRACE DATA IN A DATA PROCESSOR HAVING A PIPELINED ARCHITECTURE - The invention is a method and system for providing trace data in a pipelined data processor. Aspects of the invention include providing a trace pipeline in parallel to the execution pipeline, providing trace information on whether conditional instructions complete or not, providing trace information on the interrupt status of the processor, replacing instructions in the processor with functionally equivalent instructions that also produce trace information and modifying the scheduling of instructions in the processor based on the occupancy of a trace output buffer. | 2015-01-08 |
20150012729 | Method and system of compiling program code into predicated instructions for excution on a processor without a program counter - A predicated instruction compilation system includes a control flow graph generation module to generate a control flow graph of a program code to be compiled into the predicated instructions to be executed on a processor that does not include any program counter. Each of the instructions includes a predicate guard and a predicate update. The compilation system also includes a control flow transformation module to automatically generate the predicate guard and an update to the predicate state on the processor. A computer-implemented method of compiling a program code into predicated instructions is also described. | 2015-01-08 |
20150012730 | COMPACT LINKED-LIST-BASED MULTI-THREADED INSTRUCTION GRADUATION BUFFER - A processor and instruction graduation unit for a processor. In one embodiment, a processor or instruction graduation unit according to the present invention includes a linked-list-based multi-threaded graduation buffer and a graduation controller. The graduation buffer stores identification values generated by an instruction decode and dispatch unit of the processor as part of one or more linked-list data structures. Each linked-list data structure formed is associated with a particular program thread running on the processor. The number of linked-list data structures formed is variable and related to the number of program threads running on the processor. The graduation controller includes linked-list head identification registers and linked-list tail identification registers that facilitate reading and writing identifications values to linked-list data structures associated with particular program threads. The linked-list head identification registers determine which executed instruction result or results are next to be written to a register file. | 2015-01-08 |
20150012731 | DISTRIBUTION OF TASKS AMONG ASYMMETRIC PROCESSING ELEMENTS - Techniques to control power and processing among a plurality of asymmetric cores. In one embodiment, one or more asymmetric cores are power managed to migrate processes or threads among a plurality of cores according to the performance and power needs of the system. | 2015-01-08 |
20150012732 | METHOD AND DEVICE FOR RECOMBINING RUNTIME INSTRUCTION - A method for recombining runtime instruction comprising: an instruction running environment is buffered; the machine instruction segment to be scheduled is obtained; the second jump instruction which directs an entry address of an instruction recombining platform is inserted before the last instruction of the obtained machine instruction segment to generate the recombined instruction segment comprising the address A″; the value A of the address register of the buffered instruction running environment is modified to the address A″; the instruction running environment is recovered. A device for recombining the runtime instruction comprising: an instruction running environment buffering and recovering unit suitable for buffering and recovering the instruction running environment; an instruction obtaining unit suitable for obtaining the machine instruction segment to be scheduled; an instruction recombining unit suitable for generating the recombined instruction segment comprised the address A″; and an instruction replacing unit suitable for modifying the value of the address register of the buffered instruction running environment to the address of the recombined instruction segment. The monitoring and control of the runtime instruction of the computing device is completed. | 2015-01-08 |
20150012733 | SYSTEM AND METHOD FOR PERFORMING DETERMINISTIC PROCESSING - A system and method is provided for performing deterministic processing on a non-deterministic computer system. In one example, the system forces execution of one or more computer instructions to execute within a constant execution time. A deterministic engine, if necessary, waits a variable amount of time to ensure that the execution of the computer instructions is performed over the constant execution time. Because the execution time is constant, the execution is deterministic and therefore may be used in applications requiring deterministic behavior. For example, such a deterministic engine may be used in automated test equipment (ATE) applications. | 2015-01-08 |
20150012734 | BASIC INPUT OUTPUT SYSTEM UPDATE APPARATUS - A basic input output system (BIOS) update apparatus is configured to update the BIOS of a first electronic device. The BIOS update apparatus includes a transfer board and a second electronic device. The transfer board includes a firmware for converting between USB signals and system management bus (SMBUS) signals. The second electronic device includes an update software. The BIOS update apparatus automatically updates the BIOS of the first electronic device when the update software is activated. | 2015-01-08 |
20150012735 | Techniques to Initialize from a Remotely Accessible Storage Device - Examples are disclosed for remotely initializing or booting a client or host device. In some examples, a network (NW) input/output (I/O) device coupled to a host device may connect to a remote server via a NW communication link. For these examples, modules of the network I/O device may establish a control path to a non-volatile memory express (NVMe) controller maintained at the remote server using a remote direct memory access (RDMA) protocol. Properties of a storage device controlled by the NVMe controller as well has an RDMA service tag (STag) to indicate allocated portions of the storage device may be obtained. A system basic I/O system (BIOS) may be capable of using the RDMA STag to access the storage device and load an operating system (OS) kernel and one or more device drivers to remotely boot the host device. Other examples are described and claimed. | 2015-01-08 |
20150012736 | SERVER AND BOOTING METHOD - A server including a basic input output system (BIOS), a control unit and a plurality of central processing units (CPUs), and a booting method are provided. The BIOS outputs a booting signal. One of the CPUs receives the booting signal to execute a booting program, and outputs a successful signal after being booted. The control unit is coupled between the BIOS and the CPUs, and receives the successful signal to control a connection between the BIOS and the one of the CPUs. When the control unit receives the successful signal, the control unit replaces a connection between the BIOS and current one of the CPUs with a new connection between the BIOS and next one of the CPUs according to the successful signal, and the next CPU then receives the booting signal. | 2015-01-08 |
20150012737 | Secure Boot for Unsecure Processors - A method for securely booting a target processor in a target system from a secure root of trust includes computing a message authentication code from boot code to be provided to the target processor, including an obfuscated algorithm for recreating the message authentication code in the target processor, serving the boot code to the target processor, executing the boot code to recreate the message authentication code in the target processor, serving the message authentication code back to the root of trust, comparing the returned message authentication code with the message authentication code generated in the root of trust, continuing execution of the boot code data if the returned message authentication code matches the message authentication code, and applying at least one penalty to the target system if the returned message authentication code does not match the message authentication code generated in the root of trust. | 2015-01-08 |
20150012738 | FIRMWARE VERIFIED BOOT - Methods and apparatus for verifying a boot process of a computing system are disclosed. An example computer-implemented method includes reading, by a computing system during a boot process, a header section of a read-write portion of firmware of the computing system. The example method further includes generating, using a first cryptographic hash algorithm, a message digest corresponding with the header. The example method also includes decrypting, using a first public-key, an encrypted signature corresponding with the header. The example method still further includes comparing the message digest corresponding with the header and the decrypted signature corresponding with the header. In the event the message digest corresponding with the header and the decrypted signature corresponding with the header match, the example method includes continuing the boot process. In the event the message digest corresponding with the header and the decrypted signature corresponding with the header do not match, the example method includes halting the boot process. | 2015-01-08 |
20150012739 | SWITCHING OF OPERATING SYSTEMS - Switching from a first operating system to a second operating system by re-using components that are common to the first operating system and the second operating system. The common components can be for example a kernel, file systems, drivers, protocol stack and the like. | 2015-01-08 |
20150012740 | TECHNIQUES FOR SECURE NETWORK SEARCHING - Techniques for network searching are provided. A search is defined and the search is encrypted in a format known to a search service. Return instructions are defined for delivering search results of the search to a principal that defined the search and the return instructions. The return instructions are encrypted in a different format know to a return search process. The encrypted search is delivered to the search service for processing the search and the encrypted return instructions are delivered to the return search process for handling search results provided by the search service and for conforming delivery of the search results to the return instructions. | 2015-01-08 |
20150012741 | Protecting Information Using Policies and Encryption - A technique and system protects documents at rest and in motion using declarative policies and encryption. Encryption in the system is provided transparently and can work in conjunction with policy enforcers installed at a system. A system can protect information or documents from: (i) insider theft; (ii) ensure confidentiality; and (iii) prevent data loss, while enabling collaboration both inside and outside of a company. | 2015-01-08 |
20150012742 | Active biometric authentication with zero privacy leakage - The invention provides a method for frequent verifications of the identity of a user performed during a long session of client-server communication by secure exchange of keys between the client and the server. A user is represented at the server by a set of random numbers that have nothing to do with his biometric data. The server initiates authentication requests by sending encoded randomly generated permutation to the client. On each request, the client creates a dynamic response key built by using the decoded permutation and biometric data of the user so that this biometric data cannot be retrieved from the key. The key also includes the correlation coefficient between the sound of the user's breathing and the distance between the most outer sides of the wings of his nose and the correlation coefficient between the area of the user's pupil and the brightness of his computer screen. | 2015-01-08 |
20150012743 | DEVICE TO DEVICE SECURITY USING NAF KEY - A method, apparatus and computer program product are disclosed for establishing secure off-network communications between first and second Secure Cellular Devices that each have a cellular identity. The second Secure Cellular Device may assume the role of Remote Device for interaction with the NAF keyserver and may obtain a local key. The first Secure Cellular Device may derive the local key and the two devices may conduct secure communications using the shared local key. The two Secure Cellular Devices may alternate the roles of Secure Host and Remote Device, each twice obtaining or deriving a shared local key such that there are two such keys. The devices may employ one key for secure communication in one direction and the other for communication in the other direction. Alternatively, the devices may derive a unique shared key as a function of the two shared keys. | 2015-01-08 |
20150012744 | GROUP BASED BOOTSTRAPPING IN MACHINE TYPE COMMUNICATION - A group key is computed based on unique identifications of each member device of a group of machine type communication devices, wherein communication with a network application function is performed by using a session identification of the group, and/or by using a session identification of a member device of the group, generated based on the session identification of the group and the unique identification of the member device. | 2015-01-08 |
20150012745 | PRECALCULATING HASHES TO SUPPORT DATA DISTRIBUTION - A content server precomputes a hash value corresponding to content stored by the server. The server receives a request for the hash value from a first client device and provides the hash value to the first client device. The server receives a request for the content corresponding to the hash value from the first client device and provides the content to the first client device. The server receives a request for the hash value from a second client device and provides the hash value to the second client device, wherein the second client device obtains the content from the first client device or a local cache over a higher bandwidth connection. | 2015-01-08 |
20150012746 | DETECTING USER PRESENCE ON SECURE IN-BAND CHANNELS - A method for detecting a human user includes establishing a protected audio video path (PAVP) session between a client device and a server device. The method also includes encrypting the user presence object with keys associated with the PAVP session. The method further includes sending an encrypted user presence object to the client device via the PAVP session. Additionally, the method includes determining whether the human user is in proximity with the client device based on a response associated with the user presence object. | 2015-01-08 |
20150012747 | METHOD AND APPARATUS FOR APPLYING ENCRYPTION IN COMMUNICATION BETWEEN TERMINALS - A method for applying encryption in communication between terminals includes determining a security key to be used when the terminal transmits and receives data to/from another terminal, determining information for updating the security key; transmitting a signal including information related to the security key and the information for updating the security key, to the another terminal, and encrypting data to be transmitted to the another terminal or decrypting data received from the another terminal, by using the security key. A security key is configured during communication between terminals, and is updated without separate communication between the terminals. Encryption and decryption are performed during transmission and reception of data. Therefore, security can be secured at relatively low complexity during the transmission and reception of data between the terminals. Other embodiments including a terminal are also disclosed. | 2015-01-08 |
20150012748 | Method And System For Protecting Data - Disclosed are a method and a system for protecting data. The method for protecting data provided by an embodiment of the present invention comprises: in an initialization process of a device where data are located, acquiring an environmental factor according to environment information of the device in a secure environment; and encrypting sensitive data in the device by utilizing the environmental factor in the secure environment, and after determining that the encryption succeeds, destroying the environmental factor. Each time the device is started, an environmental factor is acquired according to the environment information of the device in the current environment, and then the encrypted sensitive data in the device is decrypted by utilizing the environmental factor in the current environment; when the decryption succeeds, access to the data in the device is allowed, and when the decryption fails, access to the data in the device is denied. The hardware cost required by the solution is low, and the risk of data leakage can be greatly reduced. | 2015-01-08 |
20150012749 | SECURITY IDENTITY DISCOVERY AND COMMUNICATION METHOD - The present invention provides a security identity discovery method, through hiding or omitting MAC addresses of the first station and a second station in a frame for identity discovery between the two stations, adopting identity codes to identify the identities of the two stations and authenticating the identities by using a ciphertext, improves the degree of privacy protection during identity discovery of the stations. | 2015-01-08 |
20150012750 | INFORMATION DISTRIBUTION SYSTEM, AND SERVER, ON-BOARD TERMINAL AND COMMUNICATION TERMINAL USED THEREFOR - Inherent terminal identification information and a terminal unique key are stored in an on-board terminal, and server-side terminal identification information and a server-side terminal unique key, which are same information as the above terminal identification information and terminal unique key are stored in a server. And, the on-board terminal transmits the terminal identification information to the server via a communication terminal, and the server performs terminal authentication according to the server-side terminal identification information, and if the authentication is success, transmits encrypted software for the on-board terminal of which authentication was success to the communication terminal. The communication terminal transmits the encrypted software to the on-board terminal, and the on-board terminal obtains a software unique key, which is encrypted by the server-side terminal unique key by the server, via the communication terminal, decrypts the encrypted software using the software unique key, and installs it. | 2015-01-08 |
20150012751 | SYSTEM AND METHOD FOR SECURING AUTHENTICATION INFORMATION IN A NETWORKED ENVIRONMENT - This disclosure is directed to systems and methods for securely communicating authentication information in a networked environment such as one involving a client device, a cloud based computing platform, and an enterprise computing environment. Some embodiments may include encrypting, by a client device using a public key, authentication information provided by a user. The encrypted authentication information is sent to a cloud based service which then sends it to an on-premises component residing behind a firewall of an enterprise. The on-premises component decrypts the authentication information using a private key, validates the authentication information, and returns the result to the cloud based service over a network. If validated, the cloud based service establishes a secure connection between the client device and the on-premises component such that the user can access the enterprise's content without the enterprise having to share the authentication information with the cloud based service. | 2015-01-08 |
20150012752 | MULTI-FACTOR DEVICE AUTHENTICATION - A method and system for the secure delivery of data to a remote device that has been registered and which requires authentication through the use of a multifactor signature profile is disclosed, and in particular according to certain disclosed aspects, a method and system for ensuring that an authenticated remote device remains authenticated. | 2015-01-08 |
20150012753 | TERMINAL DEVICE, VERIFICATION DEVICE, KEY DISTRIBUTION DEVICE, CONTENT PLAYBACK METHOD, KEY DISTRIBUTION METHOD, AND COMPUTER PROGRAM - The terminal device | 2015-01-08 |
20150012754 | SYSTEM FOR GENERATING A SECURITY DOCUMENT - A system for generating a security document includes a plurality of computing nodes forming a computing cluster, each computing node having a node identifier for uniquely identifying the node within the cluster, each node being capable of running multiple concurrent processes, and each process having a process identifier for uniquely identifying the process within the node,
| 2015-01-08 |
20150012755 | Cryptographic Passcode Reset - This invention provides a novel method, system, and apparatus allowing an authorized user access to controlled assets when a passcode method malfunctions, such as when a user forgets a password, a token malfunction, or a biometric mismatch. The invention allows temporary access to an access control system without knowing the password and without sending the user the password or a new random password. The user is able to set a new password without knowing the previous password. Furthermore, stored encrypted data is preserved and made accessible once again via the new passcode. This invention works for many authentication methods such as restoring access when a password, token, access card, or biometric sample is used. | 2015-01-08 |
20150012756 | DEVICE WITH PRIVILEGED MEMORY AND APPLICATIONS THEREOF - A device includes a key store memory, a rule set memory, a plurality of cryptographic clients, and a key store arbitration module. The key store memory stores a plurality of cryptographic keys and the rule set memory stores a set of rules for accessing the cryptographic keys. A cryptographic client is operable to issue a request to access a cryptographic key(s) and, when access to the cryptographic key is granted, execute a cryptographic function regarding at least a portion of the cryptographic key to produce a cryptographic result. The key store arbitration module is operable to determine whether the request to access the cryptographic key is valid; when the request is valid, interpret the request to produce an interpreted request; access the rule set memory based on the interpreted request to retrieve a rule of the set of rules; and grant access to the cryptographic key in accordance with the rule. | 2015-01-08 |
20150012757 | SYSTEM AND METHOD FOR ROUTING-BASED INTERNET SECURITY - Method and system for improving the security of storing digital data in a memory or its delivery as a message over the Internet from a sender to a receiver using one or more hops is disclosed. The message is split at the sender into multiple overlapping or non-overlapping slices according to a slicing scheme, and the slices are encapsulated in packets each destined to a different relay server as an intermediate node according to a delivery scheme. The relay servers relay the received slices to another other relay server or to the receiver. Upon receiving all the packets containing all the slices, the receiver combines the slices reversing the slicing scheme, whereby reconstructing the message sent. | 2015-01-08 |
20150012758 | System, Method, and Device for Delivering Communications and Storing and Delivering Data - A system, method, and device includes a platform data storage that stores a wrap that secures an executable controller and executable sensors. The wrap is verified, optionally through a downloaded authentication driver. After verifying the wrap, the wrap is opened and a sister of the executable controller is installed into the platform memory to cooperate with the executable controller. Additionally or alternatively, the authentication driver may cooperate with the executable controller. The executable controller allows the platform processor to access data secured in a vault and/or verify the platform to create a connection to a connection server. | 2015-01-08 |
20150012759 | VOLTAGE REGULATOR WITH FEED-FORWARD AND FEEDBACK CONTROL - Described is a voltage regulator with feed-forward and feedback control. Described is an apparatus which comprises: a circuit for providing power or ground supply for a target circuit in response to a control signal; and a feed-forward filter to receive data and to generate the control signal according to the received data. | 2015-01-08 |
20150012760 | INFORMATION PROCESSING APPARATUS AND POWER SUPPLY CONTROL METHOD - An information processing apparatus including a removable board, the board including a first control circuit which controls the board, a second control circuit which controls a power supply of the first control circuit, a first locking unit which is capable of locking the board and releasing a locking of the board, a second locking unit which locks the first locking unit, and a lock switch which turns on when the first locking unit is locked by the second locking unit; and the second control circuit turns on the power supply of the first control circuit when the lock switch is on. | 2015-01-08 |
20150012761 | METHOD FOR PERFORMING WAKE-UP CONTROL WITH AID OF WAKE-UP PACKET, AND ASSOCIATED APPARATUS - A method and apparatus for performing wake-up control are provided, where the method is applied to an electronic device, and the method may include the steps of: detecting whether a predetermined wake-up action is input into the electronic device, wherein the predetermined wake-up action is a user action for wake-up control; and when it is detected that the predetermined wake-up action is input into the electronic device, sending a wake-up packet carrying predetermined wake-up information to allow an internal circuit of another electronic device to be woken up in response to detection of the predetermined wake-up information. | 2015-01-08 |
20150012762 | POWER CONTROL SYSTEM AND METHOD THEREOF - A power control system and a power control method thereof applied to a computer device are provided. The computer device includes a computer system and a power system. The power system includes a plurality of voltage regulators for providing supply voltages to the components of the computer device. The power control system is coupled to the computer system and the power system and includes an overclocking frequency mode. When the computer system receives an OFF signal and enters a non-operating mode, and when the power control system is in the overclocking frequency mode, the power control system sends a SYSTEM-SHUTDOWN signal to the computer system to control the power system to enter the non-operating mode and to control the power system to keep outputting supply voltages. | 2015-01-08 |
20150012763 | SYSTEMS AND METHODS OF REMOTE COMMUNICATION - A system comprising at least one power device is provided. The at least one power device includes an input to receive power from a power source, an output operatively coupled to the input and configured to provide power, a data storage, a network interface, and a controller coupled to the input, the output, the data storage and the network interface. The controller is configured to provide, according to a reporting schedule, identification information directly to a cloud service via the network interface and provide, according to the reporting schedule, secured information directly to the cloud service, the secured information being descriptive of performance of the at least one power device. | 2015-01-08 |
20150012764 | Method And Apparatus For Power Control - Embodiments of the present invention relate to limiting maximum power dissipation occurred in a processor. Therefore, when an application that requires excessive amounts of power is being executed, the execution of the application may be prevented to reduce dissipated or consumed power. | 2015-01-08 |
20150012765 | DISTRIBUTION OF TASKS AMONG ASYMMETRIC PROCESSING ELEMENTS - Techniques to control power and processing among a plurality of asymmetric cores. In one embodiment, one or more asymmetric cores are power managed to migrate processes or threads among a plurality of cores according to the performance and power needs of the system. | 2015-01-08 |
20150012766 | DISTRIBUTION OF TASKS AMONG ASYMMETRIC PROCESSING ELEMENTS - Techniques to control power and processing among a plurality of asymmetric cores. In one embodiment, one or more asymmetric cores are power managed to migrate processes or threads among a plurality of cores according to the performance and power needs of the system. | 2015-01-08 |
20150012767 | Sensor Interface Systems and Methods - A sensor interface system includes a system bus, a bus master and a sensor. The bus master is coupled to the system bus. The bus master is configured to provide voltage regulation at a first band and perform data transmission within or at a second band. The sensor is also coupled to the system bus. The sensor is configured to receive or utilize the voltage regulation and to perform data transmission within or at the second band. | 2015-01-08 |
20150012768 | DYNAMIC CONTROL OF REDUCED VOLTAGE STATE OF GRAPHICS CONTROLLER COMPONENT OF MEMORY CONTROLLER - A method includes detecting a trigger condition, and in response to detecting the trigger condition, reducing a voltage applied to a graphics controller component of a memory controller. The reduction in voltage may cause the voltage to be reduced below a voltage level required to maintain context information in the graphics controller component. | 2015-01-08 |
20150012769 | INFORMATION PROCESSING APPARATUS CAPABLE OF REDUCING POWER CONSUMPTION, AND CONTROL METHOD AND STORAGE MEDIUM THEREFOR - An information processing apparatus capable of changing a state of power supply to respective parts of the apparatus with less user operation. When a sleep recovery button is depressed in a power saving mode, a button depression time is measured, and whether a length of the measure depression time exceeds a threshold value is determined. If the depression time exceeds the threshold value, a normal power mode is selected as power mode after transition. If the depression time does not exceed the threshold value, another power saving mode is selected as power mode after transition. According to the selected power mode, a state of power supply to respective parts of the apparatus is changed. | 2015-01-08 |
20150012770 | METHOD AND APPARATUS FOR TRANSITIONING A DEVICE BETWEEN OPERATING STATES TO CONTROL POWER CONSUMED BY THE DEVICE - A method including: accounting for a transition time for a device to transition between two of first, second, and powered off states; generating a control signal based on the transition time; receiving, at the device and from a processor, an output signal and the control signal; and consuming power, via the device, while operating in the first state and the second state. The method further includes: in response to the control signal, transitioning the device to the second state based on a frequency of the output signal or the control signal; subsequent to transitioning to the second state, performing a function based on the first output signal; and subsequent to performing the function, generating an output via the device; generating a feedback signal based on the output; and based on the feedback signal, transitioning the device to either the first state or the powered off state. | 2015-01-08 |
20150012771 | POWER MANAGEMENT FOR INPUT/OUTPUT DEVICES - Methods and systems are provided for managing power consumption in network devices. In a network device that may comprise a plurality of ports, each of which being identified by a unique identifier and being adapted to handle separate network traffic, it may be determined whether a first port of the network device may need to be reactivated, where the first port may have been previously shut down by directing of traffic corresponding to the first port, through a virtual port generated on a second port. When the first port is to be reactivated, the virtual port may be turned off, and the first port may then be reactivated. Traffic being routed through the virtual port may be routed before shutting it down; and the paused traffic to and from the network device may be resumed through the first port after it is reactivated. | 2015-01-08 |
20150012772 | METHOD AND APPARATUS FOR ADJUSTING CONNECTION SPEED OF USB DEVICE - A method for adjusting connection speed of a USB device includes determining connection speed of the USB device connected to the electronic device, recognizing whether an enhancement event for the connection speed of the USB device is generated, and enhance the connection speed of the USB device when the enhancement event occurs. An electronic device includes the at least one processor configured to determine a connection speed of the USB device connected to the electronic device, recognize whether an enhancement event for the connection speed of the USB device occurs, and enhance the connection speed of the USB device when the restoration event occurs. | 2015-01-08 |
20150012773 | INFORMATION PROCESSING APPARATUS AND DISTRIBUTION METHOD - An apparatus transmits data to terminal devices. The apparatus includes a storage unit, a transmitting unit, an obtaining unit, a calculating unit, and a controlling unit. The storage unit stores time differences between times clocked by the terminal devices and a time clocked by the apparatus. The transmitting unit transmits the data to the terminal devices. The obtaining unit obtains information indicating a time the terminal device has received the data. The calculating unit calculates a delay amount of a path to the terminal device, by using a subtraction result between a time the transmitting unit transmitted the data and the time indicated by the obtained information, and the stored time difference. The controlling unit identifies a delay amount difference of the calculated delay amounts. The controlling unit further controls a data amount transmitted/received to/from the terminal devices in accordance with the identified delay amount difference. | 2015-01-08 |
20150012774 | INFORMATION PROCESSING APPARATUS AND METHOD FOR CONTROLLING INFORMATION PROCESSING APPARATUS - An information processing apparatus includes a reception unit configured to receive data using a plurality of lanes, a degeneration control unit configured, when a failure occurs in one of the lanes, to degenerate a predetermined number of lanes including a lane in which the failure has occurred and to cause the reception unit to receive the data using remaining lanes except for the predetermined number of the degenerated lanes among the lanes, a retraining unit configured to perform retraining to establish links in the predetermined number of the degenerated lanes, and a return control unit configured, when the links are established in the predetermined number of lanes degenerated by the retraining with the retraining unit, to cause the reception unit to receive the data using the predetermined number of the degenerated lanes and the remaining lanes. | 2015-01-08 |
20150012775 | REDUNDANT ARRAY OF INDEPENDENT DISKS (RAID) SYSTEM BACKUP MANAGEMENT - Disclosed herein are RAID backup management systems and methods. According to an aspect, a method may include identifying portions of data in each of multiple storage units of a RAID system. The method may also include backing up data in the identified portions to a hot spare. Further, the method may include allocating storage space in the hot spare for the backup based on detection of errors among the storage units. | 2015-01-08 |
20150012776 | USING RDMA FOR FAST SYSTEM RECOVERY IN VIRTUALIZED ENVIRONMENTS - A method, system and computer program product are disclosed for recovery in a virtualized environment using remote direct memory access (RDMA). In one embodiment, the method comprises operating a virtual computer system on a physical computer system, and the virtual system maintains in a memory area a record of a state of the virtual system. In this method, when defined error conditions occur on the virtual system, RDMA is used to pull the record of the state of the virtual system from that memory area onto a standby computer. This record on the standby computer is used to re-initialize the virtual computer. Embodiments of the invention provide methods that provide a very fast recovery from a virtual machine fault or error, while requiring much fewer resources than standard approaches. In embodiments of the invention, one spare real computer system can be used for backing up several virtual systems. | 2015-01-08 |
20150012777 | DATA PROCESSING APPARATUS AND DATA PROCESSING METHOD - A data processing apparatus includes a storage unit configured to store plural data processing programs and a corresponding error processing program for when an error occurs with a first data processing program; and a processor configured to record to memory before executing the first data processing program, information of the error processing program that corresponds to the first data processing program; update and record in the memory after the first data processing program ends, information of a second data processing program scheduled to be executed next; and switch to any one among the first data processing program that corresponds to information recorded in the memory and the error processing program, when program processing is started next. | 2015-01-08 |
20150012778 | MULTI-CLASS HETEROGENEOUS CLIENTS IN A CLUSTERED FILESYSTEM - A cluster of computer system nodes connected by a storage area network include two classes of nodes. The first class of nodes can act as clients or servers, while the other nodes can only be clients. The client-only nodes require much less functionality and can be more easily supported by different operating systems. To minimize the amount of data transmitted during normal operation, the server responsible for maintaining a cluster configuration database repeatedly multicasts the IP address, its incarnation number and the most recent database generation number. Each node stores this information and when a change is detected, each node can request an update of the data needed by that node. A client-only node uses the IP address of the server to connect to the server, to download the information from the cluster database required by the client-only node and to upload local disk connectivity information. | 2015-01-08 |
20150012779 | Method for Fault Recognition in a System of Systems - A method for fault recognition in a distributed real-time computer system comprising fault containment units (FCUs), which has a global timebase, wherein the fault containment units communicate by means of messages via at least one message distribution unit, wherein a commitment time is associated with a message formed by a fault containment unit, and wherein a message distribution unit that receives a message relays the message to one or more fault containment units operating in parallel, and wherein a processing fault containment unit (VFCU) does not transmit or use any of its results that are influenced by one or more of the received messages to the environment of the processing fault containment unit before the commitment times associated with the received messages. | 2015-01-08 |