06th week of 2013 patent applcation highlights part 46 |
Patent application number | Title | Published |
20130036198 | METHOD FOR IMPROVING THE OPERATION OF MACHINES OR APPLIANCES - A method for improving the operation of machines or appliances having an associated machine computer and being connected to at least one further computer over a communication network, includes transmitting operating data and/or order data from the machine computer to the further computer through the communication network and storing the operating data and/or order data in the further computer. The further computer compares the performance of at least one machine with the performance of further machines, and the further computer calculates improved settings for at least one of the machines on the basis of the performance comparison and provides the settings for the purpose of setting the machine. | 2013-02-07 |
20130036199 | System and Method for Managing Information Retrievals for Integrated Digital and Analog Archives on a Global Basis - A system and method for managing information retrievals from all of an enterprises' archives across all operating locations. The archives include both digital and analog archives. A single “virtual archive” is provided which links all of the archives of the enterprise, regardless of the location or configuration of the archive. The virtual archive allows for data aggregation (regardless of location) so the a user can have data from multiple physical locations on a single screen in a single view. A single, consistent and user friendly interface is provided through which users are able to access multiple applications through a single sign-on and password. Logical tables that are used to direct information retrieval requests to the physical archives. The retrieved information is reformatted and repackaging to resolve any incompatibility between the format of the stored information and the distribution media. | 2013-02-07 |
20130036200 | Methods and Systems for Delivering a Personalized Version of an Executable Application to a Secondary Access Device Associated with a User - An exemplary method includes a media content presentation system 1) delivering a primary media content stream to a primary access device, the primary media content stream comprising data representative of a media content instance that is presented by the primary access device as the primary media content stream is delivered to the primary access device and data representative of an executable application related to the media content instance, 2) determining that a secondary access device associated with a user is located within a detection zone associated with the primary access device during a time period associated with the presentation of the media content instance by the primary access device, and 3) directing the primary access device to generate and deliver a version of the executable application that is personalized for the user to the secondary access device. Corresponding methods and systems are also disclosed. | 2013-02-07 |
20130036201 | STREAMING INTERNET VIDEO EDITING AND COMPOSITE EDIT PLAYBACK - A computer-implemented method for the creation of composite internet videos from streaming video feeds serving as an intermediary between an internet video user and a plurality of separate internet video sources. A user may invoke the service from a web page and fashion a composite video from a plurality of sources without copying or otherwise disturbing the source videos. The user's composite video is defined by an edit decision list (EDL) which specifies the location of the plurality of separate videos, the “cut in” and “cut out” locations within the separate videos where the composite video will transition between the separate videos, and an audio volume value associated with each video. | 2013-02-07 |
20130036202 | METHOD AND SYSTEM FOR PROVIDING TARGETED CONTENT TO A SURFER - Providing targeted content to a surfer by determining which content object of a group of content objects, will be best suited for presentation in association with a link on a requested web page. Content objects may include the text, topic, font, color or other attribute of an external or internal advertisement, as well as the specific design of the object, an image, the design of the page in which the object is presented, etc. Selection of a content object can be based on predictive information that is associated with the request (i.e. day and time of receipt, IP address of request, etc.) or historical information about the surfer. | 2013-02-07 |
20130036203 | SYSTEM FOR SHARING VIDEO WITH ADVERTISEMENTS OVER A NETWORK - A user can create a video segment or employ an existing video segment, upload the segment to a server, indicate an advertisement to be associated with the video, and then send it to a recipient over a computer network. The user provides an indication that one or more particular video segments and advertisements are to be shared over the network. An identifier for the video segment is automatically created and the segment and the identifier are automatically uploaded to a host computer over the network such as the Internet. The video segment, the identifier (optionally with other identifying material such as an identity of the sender, and an advertisement selected by the sender can be stored at the direction of the host computer. | 2013-02-07 |
20130036204 | RECEPTION OF A DIGITAL CONTENT IN TRICK MODE - A terminal receives a digital content which is transmitted in the form of a data stream in a network. This digital content is received by the terminal with a reception throughput, a nominal rendering time being associated with the digital content. Activation of a trick mode corresponding to a modification of the nominal rendering time according to a modification factor associated with the trick mode is detected on the terminal. Data to be requested are then determined according to the modification factor and according to a value representative of reception throughput. The data are then requested from the network and the requested data are received. | 2013-02-07 |
20130036205 | Metadata Processing Apparatus, Server, and Metadata Processing Method - According to one embodiment, a metadata processing apparatus which communicates with a server that holds metadata, the metadata processing apparatus includes a metadata update module configured to update metadata pertaining to content, a transmission module configured to transmit, to the server, content identification data for identifying the content to which the metadata updated by the metadata update module pertains, a reception module configured to receive data transmitted from the server, a determination module configured to determine, on the basis of the data received from the server by the reception module, whether it is necessary to upload the metadata updated by the metadata update module, and a notification module configured to invoke notification that presses upload of the metadata updated by the metadata update module to the server when the determination module has determined that upload is necessary. | 2013-02-07 |
20130036206 | METHOD AND APPARATUS FOR EXTENDING REMOTE NETWORK VISIBILITY OF THE PUSH FUNCTIONALITY - An approach is provided for extending remote network visibility for push functionality. An application is transmitted, via a push agent, from a first network to a device of a second network, wherein the device is configured to execute the application. The device is remotely controlled using the application. | 2013-02-07 |
20130036207 | COMMUNICATION HANDLING - An apparatus, method, system and computer-readable medium are provided for abstracting a public facing identity associated with one or more devices, such as user devices. In some embodiments, a unique identity may be associated with a device. A mapping may be used to establish a relationship between the public facing identity and the unique identity. In some embodiments, configuration data may indicate how a communication (e.g., an incoming or outgoing communication) is to be handled or routed. For example, the configuration data may indicate preferences as to which device(s) amongst a plurality of devices is to receive an incoming communication and/or which public facing identity/identities amongst a plurality of public facing identities is to be used in transmitting an outgoing communication. | 2013-02-07 |
20130036208 | SYSTEMS AND METHODS FOR AUTOMATIC HARDWARE PROVISIONING BASED ON APPLICATION CHARACTERISTICS - Systems and methods are provided for automatically provisioning resources based on application characteristics. In accordance with an embodiment, a system can include a computer, including a computer readable medium and processor, and a template engine, executing on the computer. The template engine is configured to receive applications and associated metadata. The system can also include a virtualized environment, and a plurality of templates, each defining a different resource available within the virtualized environment. When the template engine receives an application and associated metadata, the template engine determines resource requirements for the application based on the associated metadata, compares the resource requirements with the plurality of templates, identifies appropriate templates for the resource requirements, and provisions resources in the virtualized environment using the appropriate templates. Hardware resources can then be allocated dynamically according to the needs of the virtualized environment. | 2013-02-07 |
20130036209 | Method of Medium Access Control Type Detection - A method of medium access control (MAC) type detection for a communication device compatible of a plurality of media each conformed to a communication standard in a network system is disclosed. The method comprises generating a library, wherein the library includes at least a character for each medium, configuring a MAC layer of the communication device according to the library, and determining the existence of a medium according to the configuration result. | 2013-02-07 |
20130036210 | REMOTE CONFIGURATION AND SELECTIVE DISTRIBUTION OF PRODUCT CONTENT TO MEDICAL DEVICES - A distribution server for distributing updates for medical devices is disclosed. The distribution server can provide an update to a configuration device which configures a device to be updated. The distribution server includes a portal that allows an update provider to provide an update package including an update file and update package data relating to the update file. The update package data includes dependency data indicating a condition that must be satisfied by the configuration device or a second device so that the update file can be installed on the device to be updated. The distribution server further includes a database that is configured to store package data of a plurality of update packages and locations of update files of the plurality of update packages. The server further includes a distribution module that receives an inquiry on behalf of a medical device and provides a list of available update packages. | 2013-02-07 |
20130036211 | Coordinated service to multiple mobile devices - In a first embodiment of the present invention, a method is provided comprising: receiving application data from a first application on the first device, wherein the application is designed to automatically send application data pertaining to a first service to the server; determining if the first device is a member of a collection group or a control group; when the first device is a member of a collection group, sending the application data to one or more other devices that are members of the collection group to allow the other members of the collection group to provide a version of the first service having unfiltered application data; and when the first device is a member of a control group, sending some, but not all, of the application data to particular one or more other devices that are members of the control group, based on a stored set of rules, to allow the other members of the control group to provide a version of the first service having filtered application data. | 2013-02-07 |
20130036212 | BACKUP, RESTORE, AND/OR REPLICATION OF CONFIGURATION SETTINGS IN A STORAGE AREA NETWORK ENVIRONMENT USING A MANAGEMENT INTERFACE - A method for backing up components in a mixed vendor network using a common administration computer, comprising the steps of (A) sending a plurality of first requests to a plurality of components of a first network, (B) storing responses to the first requests in the common administration computer and (C) sending a plurality of second requests to a plurality of components in a second network in response to the stored plurality of first requests. The first network comprises components from a first manufacturer. The second network comprises components from a second manufacturer. The second network replicates the first network in response to the plurality of second requests. | 2013-02-07 |
20130036213 | VIRTUAL PRIVATE CLOUDS - Techniques are described for providing a virtual private cloud in a multi-tenant environment. Embodiments receive a request specifying cloud-based computing resources hosted by one or more cloud providers to integrate into a virtual private cloud with enterprise computing resources, the resources within the virtual private cloud are communicatively coupled at a common logical network level. Embodiments provision a cloud network device to integrate the cloud-based computing resources into the virtual private cloud. Additionally, the enterprise network device is configured to associate the enterprise computing resources with the virtual private cloud. Network packets between applications running on the enterprise computing resources and applications running on the cloud-based computing resources are then forwarded over the common logical network. | 2013-02-07 |
20130036214 | SYSTEM AND METHOD FOR MANAGING ENVIRONMENT CONFIGURATION USING SNAPSHOTS - A method for managing configuration of an environment of composite configuration items (Cls) is disclosed. The method may include periodically obtaining snapshots of the configuration of an environment. The method may also include logging the snapshots of the configuration of the environment in composite Cl level. The method may further include causing display of configuration information relating to a first snapshot of the snapshots in composite Cl level, while indicating configuration changes in that snapshot with respect to a second earlier snapshot of said snapshots. | 2013-02-07 |
20130036215 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR NETWORK METADATA BASED POLICY CONTROL - The subject matter described herein includes methods, systems, and computer readable media for network metadata based policy control. According to one aspect, a system for network metadata based policy control is provided. The system includes a network metadata directed policy server for obtaining network information for a plurality of subscribers, for deriving network metadata from the network information, for applying a network metadata policy manipulation rule for changing a value of a network an operator assigned policy control parameter for the subscribers, and for generating an instruction for changing the value of the network operator assigned policy control parameter for the subscriber. The system further includes a policy control and charging rules function (PCRF) node for detecting the instruction and for instructing a policy and charging enforcement function (PCEF) node to change value of the operator assigned policy control parameter for the subscribers. | 2013-02-07 |
20130036216 | SYSTEM AND METHOD FOR OPTIMIZED EVENT MONITORING IN A MANAGEMENT ENVIRONMENT - In accordance with the present disclosure, a system and method for optimizing event monitoring in a management environment is disclosed. The system may include a management system, an agent system, an intermediate management module and an event generation engine. The intermediate management module may create a device object in the management system corresponding to the agent system. The event generation engine may convert a transmission from the agent system into a pre-determined event structure and inject the event structure into the device object. The intermediate management module may then generate an alert in response to the injection of the event structure. | 2013-02-07 |
20130036217 | NETWORK COMPUTING MANAGEMENT - Network computing management is implemented by determining a location of a requestor requesting access to an instance configured at a data center, retrieving a list of data centers configured for a network computing environment, and evaluating aspects of the data centers in the list in view of the location of the requestor. The network computing management is further implemented by selecting a data center from the list that satisfies a threshold level of criteria and which threshold level exceeds a level ascertained for remaining data centers in the list. In response to determining the data center selected is different from the data center through which the instance is configured, the network computing management relocates the instance to the selected data center. | 2013-02-07 |
20130036218 | Monitoring Tool Deployment Module and Method of Operation - A monitoring tool deployment module comprises an interface, a memory, and a processor. The interface receives a plurality of monitoring deployment requests, each monitoring deployment request identifying one or more monitoring tools to be deployed for one or more monitoring targets. The memory is coupled to the interface and stores the plurality of monitoring deployment requests in a queue based at least in part upon the order that the monitoring deployment requests are received by the interface. The processor is coupled to the memory and accesses a particular one of the plurality of monitoring deployment requests stored in memory, and determines a monitoring tool to be used based at least in part upon the particular monitoring deployment request. The processor further determines a monitoring target based at least in part upon the received monitoring deployment request, and executes commands to initiate the deployment of the determined monitoring tool for the determined monitoring target. | 2013-02-07 |
20130036219 | Monitoring Tool Auditing Module and Method of Operation - A monitoring tool auditing module comprises an interface, a memory, and a processor. The interface receives a plurality of monitoring audit requests, each monitoring audit request identifying one or more monitoring targets to be audited. The memory is coupled to the interface and stores the plurality of monitoring audit requests in a queue based at least in part upon the order that the monitoring audit requests are received by the interface. The processor is coupled to the memory and accesses a particular one of the plurality of monitoring audit requests stored in memory and determines a monitoring target to be audited based at least in part upon the particular monitoring audit request. The processor determines a plurality of monitoring tools that are deployed at the determined monitoring target, and determines status information for each determined monitoring tool deployed at the determined monitoring target. The processor further determines configuration information for each determined monitoring tool deployed at the determined monitoring target. | 2013-02-07 |
20130036220 | Apparatus and Method for Implementing Point to Point Protocol Data Service Link-Disconnect - An apparatus and method for implementing Point to Point Protocol (PPP) data service link disconnection are disclosed in the present invention. The apparatus is set in a terminal and comprises: a detection module, a processing module and a link disconnection module, wherein, the detection module is used for detecting the state of a Personal Computer (PC) connected with the terminal when the terminal performs the PPP data service in a dormant state, and notifying the processing module when determining that the PC is currently in an unavailable state; the processing module is used for sending a link disconnection request to the network side when knowing that the PC in the unavailable state, and triggering the link disconnection module when receiving a link disconnection request acknowledgement from the network side; the link disconnection module is used for disconnecting the PPP link carrying the PPP data service. | 2013-02-07 |
20130036221 | APPARATUS, METHOD AND SYSTEM FOR IMPROVING APPLICATION PERFORMANCE ACROSS A COMMUNICATIONS NETWORK - An apparatus, method and system to enable dynamic replication of Web servers across a wide area in response to access patterns by Web clients as well as in response to customer requests. The method for dynamically replicating one or more parent nodes on a network in response to a user request by a policy manager. The policy manager transmits the user request to an event module. The event module transmits the user request to a data consistency module, wherein the data consistency module maintains integrity of the data on the parent node. The event system communicates with a resource management module to ensure proper utilization of network resources, and transmits the routing request to a request routing module for appropriately balancing the network load. The request routing module is capable of providing optimal routing based on the network resources. | 2013-02-07 |
20130036222 | INHERITABLE DIMENSIONS IN A SERVICE MODEL - A performance management tool is provided that monitors performance in a computing infrastructure in a computing environment. The performance management tool includes a service model that represents the computing infrastructure. The service model is a hierarchical tree structure comprised of a plurality of linked nodes, where each node in the tree structure represents a component of the computing infrastructure and has one or more properties of the component assigned thereto. Each node further includes an inheritance rule which defines how properties assigned to other nodes are inherited by the component. A dimension indexer module is configured to receive a request for properties associated with a particular node and operates to retrieve properties for the particular node from the tree structure, including at least one property not assigned to the particular node but inherited from another node in the tree structure in accordance with the inheritance rule assigned the particular node. | 2013-02-07 |
20130036223 | Facilitating authentication of access terminal identity - Methods and apparatuses are provided for facilitating authentication of access terminal identities and for recording a usage relationship between a valid access terminal identity and a user identity. An access terminal and a validation server are both provisioned with corresponding validation keys. The access terminal may determine that a user identity is not recorded for use with the access terminal, and may send a report message to report a usage relationship between the access terminal identity and the user identity, where the report message is signed with a signature based on the validation key. The validation server authenticates the signature using the validation key in the validation server. The validation server may record the usage relationship between the authenticated access terminal identity and the user identity in a database, which database records may be employed to determine whether an access terminal requesting network access is authorized or unauthorized. | 2013-02-07 |
20130036224 | AUTOMATED BILLING AND DISTRIBUTION PLATFORM FOR APPLICATION PROVIDERS - Integrating a network-enabled application with a platform having a plurality of users and a plurality of communication channels with a respective plurality of wireless network carriers, including receiving a request from a third-party provider to integrate a network-enabled application with the platform, receiving a set of registration data corresponding to the network-enabled application from the third-party provider, the set of registration data including a link to an application location for accessing the network-enabled application, receiving a set of pricing structure data corresponding to the network-enabled application from the third-party provider, updating a system database in the platform to include the set of registration data and the pricing structure data corresponding to the network-enabled application, and enabling the network-enabled application to be accessible to the plurality of users via a networked interface operated by the platform. | 2013-02-07 |
20130036225 | Systems and Methods for Rule Inheritance - Systems and methods for automating and increasing the efficiency of access to data using inheritance of access rules within an organization based upon the relationship of positions within the organization and the roles associated with the positions. In one embodiment, a role structure is used in conjunction with a hierarchical organization structure to allow access rules to be inherited by some of the positions from other positions based upon the relationship of positions within the organization and the roles associated with the positions. Access rules can be applied across equivalent or similar positions, yet differentiated between distinct portions of the organization and the distinct roles associated with the positions. Consequently, particular access rules are not necessarily inherited by all of the positions subordinate to a particular position with which the rule originates, and are not necessarily inherited by all of the positions that are associated with a particular role. | 2013-02-07 |
20130036226 | OPTIMIZATION OF RESOURCE PROVISIONING IN A NETWORKED COMPUTING ENVIRONMENT - In general, embodiments of the present invention provide an approach for pre-provisioning computing resource sub-components in order to achieve improved overall provisioning times. In a typical embodiment, when a workload request is received, a set/sequence of tasks needed to complete the workload request is identified. Based on the set of tasks, a set of corresponding computing resources is determined. Rather than provision each computing resource as a whole, embodiments of the present invention break each computing resource into its individual sub-components. Once the sub-components are identified, the time required to provision (i.e., provisioning time) each sub-component is determined (e.g., based on historical data). Based on these provisioning times, an optimal order in which the sub-components should be provisioned is determined, and the sub-components are then provisioned in this order. | 2013-02-07 |
20130036227 | SELECTING AN AUXILIARY EVENT-PACKAGE SERVER - A method includes registering with a proxy for an auxiliary event-package, wherein the auxiliary event-package is provided by a plurality of auxiliary event-package servers. The method may further include subscribing to the auxiliary event-package through the proxy. The proxy forwards the subscription to the plurality of auxiliary event-package servers. The method may include receiving notification from each of the auxiliary event-package servers. The notification includes an indicator of capacity of the auxiliary event-package server. The method may include determining an auxiliary event-package server having a highest capacity based on the indicators of capacity of the auxiliary event-package servers. In addition, the method may include selecting the auxiliary event-package server having the highest capacity as a primary handle for the auxiliary event-package. | 2013-02-07 |
20130036228 | COMMUNICATION DEVICE, METHOD FOR COMMUNICATION AND RELAY SYSTEM - A communication device is configured to relay a signal between a first device to perform as a connection start terminal and a second device to perform as a connection end device, the communication device including: a processor configured to execute a procedure, the procedure including: establishing, with the second device, sessions meaning logical connections in communication; deciding whether an unused session remains in the established sessions for a command to be transferred to the second device, the command being generated by the first device; in a case of identifying that the unused session remains in the established sessions when the command is received, exchanging the command with the second device by using the unused session; and communicating messages to the second device by using the established sessions within a particular period of time of the second device, the established sessions being continuously maintained in the particular period of time. | 2013-02-07 |
20130036229 | METHOD OF MANAGING CONNECTION BETWEEN PERSONAL NETWORK AND CPNS SERVICE IN CPNS SYSTEM - A method of managing a connection between a Personal Network (PN) and a Converged Personal Network Service (CPNS) server by a first device in a CPNS system including the personal network configured between the first device and a second device including at least one of a Personal Network Entity (PNE) and a Personal Network GateWay (PNGW) and the CPNS server connected with the personal network through a first communication network is provided. The method includes identifying the second device including the PNGW by using device mode information indicating whether the second device included in a PN inventory includes the PNE and the PNGW; requesting a connection between the CPNS server and the second device through the first communication network; and terminating the connection to the CPNS server according to the connection between the CPNS server and the second device through the first communication network. | 2013-02-07 |
20130036230 | SOCIAL NETWORK CONNECTIONS - The present invention relates to methods and apparatus for maintaining network connections. One or more new communication events for a first user are identified and a social graph builder receives data relating to the one or more new communication events wherein the data includes data relating to a second user. The social graph builder modifies a social network graph for the first user based on the received data if the identified one or more new communication events fulfills one or more predefined criteria. | 2013-02-07 |
20130036231 | METHOD, APPARATUS, AND COMPUTER PROGRAM PRODUCT FOR CONNECTION SETUP IN DEVICE-TO-DEVICE COMMUNICATION - Example method, apparatus, and computer program product embodiments are disclosed to enable out-of-band short-range communication carrier transport switching for connection setup in device-to-device communication. example embodiments of the invention include a method comprising the steps of participating, by a first device, in a wireless network managed by at least one of an access point device or a group owner device; and exchanging, by the first device, information with a second device over a wireless out-of-band short-range carrier, the exchanged information comprising in-band communication connection parameters for enabling the second device to join the wireless network and authentication information recognizable by the at least one of an access point device or a group owner device managing the wireless network. | 2013-02-07 |
20130036232 | System and Method for Enhanced Physical Layer Device Autonegotiation - A system and method for enhanced physical layer device autonegotiation. The autonegotiation process typically identifies the highest common denominator amongst various standardized modes of operation. Enhanced autonegotiation can be used to select a mode of operation that is not the highest common denominator. Enhanced autonegotiation can also identify a non-standardized mode of operation using next page messaging, additional physical signaling, or Layer | 2013-02-07 |
20130036233 | PROVIDING PARTIAL FILE STREAM FOR GENERATING THUMBNAIL - A partial file stream is utilized to conserve resources and provide services when a file stream such as video file stream is requested for processing to generate a thumbnail. A file stream host provides a partial file stream generated from the beginning and end parts of the video file stream adjoined by a middle part. The partial file stream minimizes resource utilization. The partial file stream also enables access by external processes to generate the thumbnail and minimize exposure to security risks by stopping direct access to the file stream host. | 2013-02-07 |
20130036234 | METHOD AND APPARATUS FOR TRANSPORT OF DYNAMIC ADAPTIVE STREAMING OVER HTTP (DASH) INITIALIZATION SEGMENT DESCRIPTION FRAGMENTS AS USER SERVICE DESCRIPTION FRAGMENTS - A method, an apparatus, and a computer program product for wireless communication are provided. The apparatus establishes a file delivery session with a server in a broadcast network for system information. The apparatus also receives a plurality of metadata fragments in the file delivery session. The plurality of metadata fragments including at least one initialization segment description fragment, wherein the at least one initialization segment description fragment is associated with at least one media segment transmitted in another file delivery session. | 2013-02-07 |
20130036235 | METHOD OF TRANSMISSION OF VISUAL CONTENT - A method of transmission of visual content over a communication network which locates static content and dynamic content, and transmits each type of content in a different way to optimize the transmission rate and the quality of the content received at the other end of the communication network. | 2013-02-07 |
20130036236 | METHOD AND SYSTEM FOR CREATING PEER-TO-PEER GEOGRAPHICAL ROUTING AND MULTI-ATTRIBUTE SIMILARITY ROUTING - A system and method for creating a peer-to-peer geographical routing overlay network and a multi-attribute similarity routing overlay network. The geographical overlay network can be generated utilizing a geographical routing protocol to organize connections between one or more distributed micro-markets depending on a geographical location of each market and to detect a geographically close neighbor in a decentralized manner. The multi-attribute similarity overlay network can be computed by applying a filtering function based on a multi-attribute routing protocol defined over at least one attribute in order to enable decentralized clustering of the distributed micro-markets. The multi-attribute similarity protocol can be combined with the geographic overlay protocol to route messages to a target set of similarity-based attributes and a target geographic location thereby dynamically evolve a structure of distributed micro-markets over time and optimize a market interaction in the overlay network. | 2013-02-07 |
20130036237 | CONTINUOUS DEPLOYMENT OF APPLICATIONS - Concepts and technologies are described herein for continuously deploying applications. In accordance with the concepts and technologies disclosed herein, a first host environment executes an application. An upgrade for the application is released by creating a backup of the application and content used by the application and restoring the backup at a second host environment. The application hosted by the second host environment is upgraded, traffic is routed to the second host environment, and performance of the upgraded application is monitored. If errors are detected in the upgraded application, the upgrade can be rolled back, and traffic can be rerouted back to the first host environment. If the errors are not detected, traffic can be increasingly routed to the second host environment and the first host environment can be deactivated. | 2013-02-07 |
20130036238 | METHOD AND SYSTEM FOR COMPRESSING LOCATION DATA OF A RADIO FOR OVER-THE-AIR TRANSMISSION - Disclosed are methods and systems for compressing location data of a radio for over-the-air transmission. A method includes obtaining raw latitude and raw longitude coordinates reflecting a current location of the client device, the raw latitude coordinate represented by x number of bits and the raw longitude coordinate represented by y number of bits. The raw latitude coordinate is truncated by removing n number of most significant bits from the raw latitude coordinate to create a compressed latitude coordinate. The raw longitude coordinate is truncated by removing m number of most significant bits from the raw longitude coordinate to create a compressed longitude coordinate, where m varies as a function of the value of the raw latitude coordinate. The compressed longitude and compressed latitude coordinates are then transmitted to another network device for decompression and use as an indication of the client device's absolute location. | 2013-02-07 |
20130036239 | SYNCHRONIZATION OF CLOCKS BETWEEN TWO COMMUNICATION TERMINALS USING TCP/IP - Clocks of communication terminals can be synchronized using packets over TCP/IP. In one example, an Internet Protocol packet is received at the first terminal from the second terminal, the packet having a time stamp indicating the time at which it was sent from the second terminal. The time is determined at which the packet arrived at the first terminal and compared to the time stamp to determine a minimal feasible bias. The determined minimal feasible bias is compared to a stored bias and the stored bias is set to the determined minimal feasible bias if the stored bias is less than the minimal feasible bias. A clock time difference is then determined at the second terminal using the stored bias. | 2013-02-07 |
20130036240 | SCSI Reservation Status Information on a SAN Disk - A system and computer program product are disclosed for retrieving the reservation status information of a storage area network (SAN) device, a host transmits a persistent reservation in command with service action setting of ‘read reservation’ to a first LUN, wherein the host is connected to a port of the data storage server to which the LUN belongs. The host receives a message from the LUN. The host determines that the message is a success. The host sends to the LUN a persistent reservation in command with service action setting of ‘read keys’, responsive to a success message. The host determines that the LUN responds with a zero data length. The host determines the LUN is reserved with type 2 reservation, responsive to a determination that the LUN responds with a non-zero data length. | 2013-02-07 |
20130036241 | SCSI Reservation Status Information on a SAN Disk - A method is disclosed for retrieving the reservation status information of a storage area network (SAN) device, a host transmits a persistent reservation in command with service action setting of ‘read reservation’ to a first LUN, wherein the host is connected to a port of the data storage server to which the LUN belongs. The host receives a message from the LUN. The host determines that the message is a success. The host sends to the LUN a persistent reservation in command with service action setting of ‘read keys’, responsive to a success message. The host determines that the LUN responds with a zero data length. The host determines the LUN is reserved with type 2 reservation, responsive to a determination that the LUN responds with a non-zero data length. | 2013-02-07 |
20130036242 | ADAPTIVE DATA THROTTLING FOR STORAGE CONTROLLERS - There are provided a method, a system and a computer program product for minimizing data transfer latency between redundant storage controllers in a network-based storage controller system that utilizes adaptive data throttling. Each corresponding redundant storage controller calculates average time latency for round trip communications between the corresponding redundant storage controller and the other redundant storage controllers during a fixed monitoring period. The corresponding redundant storage controller, at the end of each fixed monitoring period, compares the average time latency to a fixed latency. The corresponding redundant storage controller selectively throttles data transfer between the corresponding redundant storage controller and a server and data transfer between the corresponding redundant storage controller and a back-end storage, based on the comparison. | 2013-02-07 |
20130036243 | HOST-DAUGHTERCARD CONFIGURATION WITH DOUBLE DATA RATE BUS - A double data rate bus system includes a host-network interface card configuration wherein the host is configured to recognize the network interface card to establish a double data rate bus between the host and the network interface card. The host is configured to generate a plurality of generic data frame queues. Each of the generic data frame queues is configured to receive and to transmit generic data frames via the double data rate bus. The network interface card is configured to transmit a plurality of dynamic memory access read requests to the host via the double data rate bus. The host is configured to allow each of the plurality of dynamic memory access read requests to remain pending prior to responding to anyone of the plurality of dynamic memory access read requests. | 2013-02-07 |
20130036244 | COMMUNICATION CONTROL DEVICE, INFORMATION PROCESSING APPARATUS, AND PATH SELECTING METHOD | 2013-02-07 |
20130036245 | Device and Method for Enhancing Flexibility of Interface Between 3G Communication Module and Application Processor - This invention provides a device and method for enhancing flexibility of interface between 3G communication module and application processor. The device comprises the 3G communication module, the AP and an interface transfer module connected between them, wherein the interface transfer module is configured to perform bus transfer. A bus interface of the 3G communication module adapted to voice service data and a bus interface of the AP adapted to voice service data are directly connected. The bus transfer in the present invention is: the interface transfer module converts the bus data format of the non-voice service data adapted to the 3G communication module or the AP into the bus data format of the non-voice service data adapted to the AP or the 3G communication module. With this invention, the 3G communication module can be connected with various APs conveniently, and the generality of the 3G communication module is improved. | 2013-02-07 |
20130036246 | MICROCONTROLLER SYSTEM BUS SCHEDULING FOR MULTIPORT SLAVE MODULES - A system includes master modules, at least one multiport slave module, and a scheduler connected by a system bus. The scheduler is configured to provide scheduling information to the multiport slave module. The scheduling information includes master categorization information and anticipated burst information. The anticipated burst information is based on a scheduler determination for an anticipated bus access by an anticipated master module. The master categorization information categorizes the anticipated master. | 2013-02-07 |
20130036247 | I2C ISOLATED, BIDIRECTIONAL COMMUNICATION SYSTEM WITH ISOLATED DOMAIN CURRENT SOURCE PULL-UPS - This disclosure describes a circuit implementation providing the functions necessary to implement an isolated I | 2013-02-07 |
20130036248 | MONITOR WITH PERSONAL SYSTEM/2 KEYBOARD INTERFACE - A monitor for a computer includes a display screen, a frame fixing the display screen, a display circuit, a personal system (PS)/2 keyboard interface, a power circuit, and a monitor video interface. The PS/2 keyboard interface is disposed on the frame, and includes a data signal pin, a clock signal pin, a power pin, and a ground pin. The power circuit powers the display circuit and the PS/2 keyboard interface. The monitor video interface includes video pins, first and second idle pins. The video pins are connected to the display circuit. The first idle pin is connected to the data signal pin. The second idle pin is connected to the clock signal pin. | 2013-02-07 |
20130036249 | PREEMPTIVE GUEST MERGING FOR VIRTUALIZATION HYPERVISORS - Aspects of the present invention provide a solution for managing memory in a shared virtual computing environment. A page that is to be stored in the memory of the host in the virtual computing environment is obtained from a guest. The page is analyzed to compute an identifier for the page. This identifier is compared with other identifiers of other pages that are currently stored in the memory to determine whether the identical page is already stored in the memory. If the identical page is currently stored in the memory, a link to that page is stored in the portion of the memory that is allocated to the guest. | 2013-02-07 |
20130036250 | METHOD AND APPARATUS TO MOVE PAGE BETWEEN TIERS - The thin provisioning storage system maintains migration history between the first and the second group which the unallocated pages of virtual volume would be allocated from, and updates on writes against storage areas of virtual volume having migration history. Before the storage controller determines to migrate data allocated in the first group to the second group, the storage controller checks the migration history and if the data stored in the first group has been previously migrated from the second group and is still maintained in the second group, the storage controller would change the allocation between the virtual volume and the first group to the second group for the data subject to migration and not perform the data migration. | 2013-02-07 |
20130036251 | METHOD AND SYSTEM OF A TIMER BASED BUFFER USED FOR METROLOGY - Described herein are embodiments of methods and systems of using a timer based memory buffer for metrology. One embodiment of the method comprises receiving metrology data from one or more metrology sensors; writing at least part of the metrology data to a volatile memory; incrementing a write pointer to indicate the metrology data contained within the volatile memory; and repeating the above until a timer expires, then reading at least a portion of the metrology data from the volatile memory. | 2013-02-07 |
20130036252 | PRACTICAL CODE LIST CACHE FOR VALUE HELP - Methods and apparatus, including computer program products, are provided for providing value help. In one aspect, there is provided a computer-implemented method. The method may include receiving, at a code list provider, a request from a user interface for code list value help; determining, based on the request, whether to access at least one of a cache and a secondary storage; accessing, by the code list provider, a cache including at least a first code list, the cache implemented in memory, when the determination results in access to the cache; accessing a secondary storage including at least a second code list, when the determination results in access to the secondary storage; and sending, by the code list provider, at least one of the first code list and the second code list to a user interface to enable the user interface to provide code list value help. Related apparatus, systems, methods, and articles are also described. | 2013-02-07 |
20130036253 | WEAR LEVELING FOR A MEMORY DEVICE - Memory devices and methods to facilitate wear leveling operations in a memory device. In one such method, particular blocks of memory cells are excluded from experiencing wear leveling operations performed on the memory device. In at least one method, a user selects blocks of memory to be excluded from wear leveling operations performed on the remainder of blocks of the memory device. Selected blocks of memory are excluded from wear leveling operations responsive to a command initiated by a user identifying, either directly or indirectly, the selected blocks to be excluded. | 2013-02-07 |
20130036254 | DEBUGGING A MEMORY SUBSYSTEM - In one implementation, a memory subsystem includes non-volatile memory, a memory controller that is communicatively connected to the non-volatile memory over a first bus, a host interface through which the memory controller communicates with a host controller over a second bus, and a joint test action group (JTAG) interface that provides the host controller with access to state information associated with the memory controller. The memory subsystem can be configured to be coupled to a board-level memory device that includes the host controller. | 2013-02-07 |
20130036255 | TESTING MEMORY SUBSYSTEM CONNECTIVITY - In one implementation, a memory subsystem includes a plurality of non-volatile memory dies, a memory controller that is communicatively connected to each of the non-volatile memory dies over one or more first busses, a host interface through which the memory controller communicates with a host over a second bus, and a joint test action group (JTAG) interface through which the host performs a boundary scan of the memory subsystem including, at least, the non-volatile memory dies and the memory controller. The memory subsystem can be configured to be a subunit of a board-level memory device that includes the host. | 2013-02-07 |
20130036256 | METHOD AND APPARATUS OF SANITIZING STORAGE DEVICE - Systems and methods directed to erasing data and/or the sanitization of storage systems. In storage systems that utilize storage devices such as Flash Memory Devices or Hard Disk Drives (HDDs), systems and methods utilize the initializing function of the storage device to erase the data. Storage devices within the storage systems may have an initializing function that erases all blocks of the storage device. Systems and methods further check for the initializing function and the media type to determine if the initializing function is available to determine the optimal sanitizing process for the device. | 2013-02-07 |
20130036257 | MEMORY SYSTEM WHICH CAN AVOID UNAVAILABILITY DUE TO OPERATION ERROR BY USER - According to one embodiment, a memory system includes a nonvolatile semiconductor storage device and controller. The nonvolatile semiconductor storage device has a file system area including a file allocation table (FAT), a data write-once area including a plurality of clusters, and a management information area which stores a pointer indicating a rewrite inhibition area of the clusters. The controller reads the FAT from the file system area of the nonvolatile semiconductor storage device, and sets the pointer based on a cluster use status recorded in the FAT. | 2013-02-07 |
20130036258 | MEMORY STORAGE DEVICE, MEMORY CONTROLLER THEREOF, AND METHOD FOR PROGRAMMING DATA THEREOF - A memory storage device, a memory controller thereof, and a method for programming data thereof are provided. The memory storage device includes a buffer memory and a rewritable non-volatile memory chip, wherein the rewritable non-volatile memory chip includes a buffer unit and a plurality of physical blocks. The method includes storing first data received from a host system into the buffer memory, and generating a writing complete message for replying to the host system after the first data stored in the buffer memory is transmitted to the buffer unit by using a first data transmitting command. The method further includes programming the first data to a first physical block of the physical blocks. Meanwhile, if a data program failure is detected, the method also includes programming the first data maintained in the buffer unit to a second physical block by using a second data transmitting command. | 2013-02-07 |
20130036259 | SOLID STATE DRIVE AND DATA STORING METHOD THEREOF - A solid state drive includes a plurality of dies. The dies are divided into first-portion dies and second-portion dies. The first-portion dies are located at a user area. The second-portion dies are located at a reserved area. The solid state drive is in communication with a host. The data storing method of the solid state drive includes the following steps. Firstly, if the host generates a plurality of write data to the solid state drive, the plurality of write data are stored into the reserved area. If there is not accessing action between the host and the solid state drive and if the write data are in the reserved area, the write data are stored into the user area. Afterwards, error correction codes corresponding to the write data in the user area are calculated and stored into the reserved area. | 2013-02-07 |
20130036260 | INFORMATION PROCESSING APPARATUS AND CACHE METHOD - According to one embodiment, an information processing apparatus includes a controller and a cache module. The controller is configured to issue commands for a first storage device and a second storage device, and thereby perform data transmission. The cache module is configured to use the first storage device as a read cache of the second storage device, the cache module withholding issuance of a write command to write cache data in the first storage device to the controller, when commands issued by the controller to the first storage device exceed a preset number, until the issued commands becomes equal to or less than the preset number. | 2013-02-07 |
20130036261 | METHOD FOR OPERATING MEMORY CONTROLLER, AND MEMORY SYSTEM INCLUDING THE SAME - A method for operating a memory controller capable of controlling a maximum count of a read retry operation is disclosed. The method includes programming a first real time clock (RTC) value indicating a time-of-day when a program operation is performed when the program operation for programming a data to a storage region of a non-volatile memory, obtaining information for the storage region by using the first RTC value read from the non-volatile memory and a second RTC value indicating a time-of-day when a read operation is performed, when the read operation for the data programmed to the storage region is performed, and decreasing a maximum count of a read retry operation by using the information, when the read retry operation is performed for the storage region. | 2013-02-07 |
20130036262 | APPARATUS, SYSTEM, AND METHOD FOR TESTING PHYSICAL REGIONS IN A SOLID-STATE STORAGE DEVICE - An apparatus, system, and method are disclosed for testing physical regions in a solid-state storage device. The method includes defining a physical storage region on solid-state storage media of a solid-state storage device. The physical storage region includes a subset of storage capacity of the solid-state storage media. The method includes implementing the physical storage region definition on a storage controller such that memory operations are bounded to the physical storage region. The method includes testing wear of solid-state storage media associated with the physical storage region using memory operations bounded to the physical storage region. | 2013-02-07 |
20130036263 | SOLID STATE STORAGE DEVICE USING VOLATILE MEMORY - A solid state storage device using volatile memory comprises a first transmission interface, a memory controller, a memory module and a backup memory module. The memory module is comprised of a plurality of volatile memories. The backup memory module is comprised of a plurality of non-volatile memories. A plurality of volatile memories and a plurality of non-volatile memories are electrically coupled with the memory controller via memory connecting sockets. Before power failure, the memory controller controls the memory module to save internal data backup to the backup memory module. In addition, the memory controller controls memory module to save internal backup data back to the backup memory module when required. | 2013-02-07 |
20130036264 | MULTI-RANK MEMORY MODULE THAT EMULATES A MEMORY MODULE HAVING A DIFFERENT NUMBER OF RANKS - A transparent four rank memory module has a front side and a back side. The front side has a third memory rank stacked on a first memory rank. The back side has a fourth memory rank stacked on a second memory rank. An emulator coupled to the memory module activates and controls one individual memory rank from either the first memory rank, the second memory rank, the third memory rank, or the fourth memory rank based on the signals received from a memory controller. | 2013-02-07 |
20130036265 | METHOD TO ALLOW STORAGE CACHE ACCELERATION WHEN THE SLOW TIER IS ON INDEPENDENT CONTROLLER - The present invention is directed to a method for providing storage acceleration in a data storage system. In the data storage system described herein, multiple independent controllers may be utilized, such that a first storage controller may be connected to a first storage tier (ex.—a fast tier) which includes a solid-state drive, while a second storage controller may be connected to a second storage tier (ex.—a slower tier) which includes a hard disk drive. The accelerator functionality may be split between the host of the system and the first storage controller of the system (ex.—some of the accelerator functionality may be offloaded to the first storage controller) for promoting improved storage acceleration performance within the system. | 2013-02-07 |
20130036266 | FIRST STORAGE CONTROL APPARATUS AND STORAGE SYSTEM MANAGEMENT METHOD - An object of the present invention is to allocate a volume to an appropriate tier in a pool in accordance with the performance of the volume. Multiple tiers | 2013-02-07 |
20130036267 | PLACEMENT OF DATA IN SHARDS ON A STORAGE DEVICE - A method, system and computer program product for placing data in shards on a storage device may include determining placement of a data set in one of a plurality of shards on the storage device. Each one of the shards may include a different at least one performance feature. Each different at least one performance feature may correspond to a different at least one predetermined characteristic associated with a particular set of data. The data set is cached in the one of the plurality of shards on the storage device that includes the at least one performance feature corresponding to the at least one predetermined characteristic associated with the data set being cached. | 2013-02-07 |
20130036268 | Implementing Vector Memory Operations - In one embodiment, the present invention includes an apparatus having a register file to store vector data, an address generator coupled to the register file to generate addresses for a vector memory operation, and a controller to generate an output slice from one or more slices each including multiple addresses, where the output slice includes addresses each corresponding to a separately addressable portion of a memory. Other embodiments are described and claimed. | 2013-02-07 |
20130036269 | PLACEMENT OF DATA IN SHARDS ON A STORAGE DEVICE - A method, system and computer program product for placing data in shards on a storage device may include determining placement of a data set in one of a plurality of shards on the storage device. Each one of the shards may include a different at least one performance feature. Each different at least one performance feature may correspond to a different at least one predetermined characteristic associated with a particular set of data. The data set is cached in the one of the plurality of shards on the storage device that includes the at least one performance feature corresponding to the at least one predetermined characteristic associated with the data set being cached. | 2013-02-07 |
20130036270 | Data processing apparatus and method for powering down a cache - A data processing apparatus is provided comprising a processing device, and an N-way set associative cache for access by the processing device, each way comprising a plurality of cache lines for temporarily storing data for a subset of memory addresses of a memory device, and a plurality of dirty fields, each dirty field being associated with a way portion and being set when the data stored in that way portion is dirty data. Dirty way indication circuitry is configured to generate an indication of the degree of dirty data stored in each way. Further, staged way power down circuitry is responsive to at least one predetermined condition, to power down at least a subset of the ways of the N-way set associative cache in a plurality of stages, the staged way power down circuitry being configured to reference the dirty way indication circuitry in order to seek to power down ways with less dirty data before ways with more dirty data. This approach provides a particularly quick and power efficient technique for powering down the cache in a plurality of stages. | 2013-02-07 |
20130036271 | DYNAMIC INDEX SELECTION IN A HARDWARE CACHE - Systems and methods are disclosed for improving the performance of cache memory in a computer system by dynamically selecting an index for caching main memory while an application is running. A disclosed example of a memory system includes a cache including a data array, a primary tag array, and at least one secondary tag array. A currently selected index is used to index data bits to the data array and tag bits to the primary tag array. The performance of at least one candidate index is evaluated by indexing tag bits to the secondary tag array, without caching any data using the candidate index while the candidate index is under evaluation. If the candidate index has a better hit rate than the currently selected index, the memory system switches to using the candidate index to cache data. | 2013-02-07 |
20130036272 | STORAGE ENGINE NODE FOR CLOUD-BASED STORAGE - A system includes a storage engine node that includes a processor and a memory coupled to the processor. The memory stores a protocol mapper executable by the processor to convert storage access requests from a local storage protocol to a cloud storage protocol. | 2013-02-07 |
20130036273 | Memory Signal Buffers and Modules Supporting Variable Access Granularity - Described are memory modules that include a configurable signal buffer that manages communication between memory devices and a memory controller. The buffer can be configured to support threading to reduce access granularity, the frequency of row-activation, or both. The buffer can translate controller commands to access information of a specified granularity into subcommands seeking to access information of reduced granularity. The reduced-granularity information can then be combined, as by concatenation, and conveyed to the memory controller as information of the specified granularity. | 2013-02-07 |
20130036274 | ON-CHIP MEMORY (OCM) PHYSICAL BANK PARALLELISM - According to an example embodiment, a processor is provided including an integrated on-chip memory device component. The on-chip memory device component includes a plurality of memory banks, and multiple logical ports, each logical port coupled to one or more of the plurality of memory banks, enabling access to multiple memory banks, among the plurality of memory banks, per clock cycle, each memory bank accessible by a single logical port per clock cycle and each logical port accessing a single memory bank per clock cycle. | 2013-02-07 |
20130036275 | CIRCUIT AND METHOD FOR RAPIDLY TRANSMITTING DATA - A circuit for the rapid transmission of data is presented. The circuit includes a control unit, a data storage unit, and a data processing unit. The data processing unit includes an interrupt module, a processor chipset, an access controller, a first register and a second register. The interrupt module is connected to the control unit and receives an interrupt signal from the control unit. The access controller reads data from the data storage unit according to a beginning address and an ending address included in the interrupt signal and stores the retrieved data alternately in the first register and in the second register. The processor chipset retrieves and displays data from the second register when data is in the first register and retrieves and displays data from the first register when data is in the second register. | 2013-02-07 |
20130036276 | INSTRUCTIONS TO SET AND READ MEMORY VERSION INFORMATION - Systems and methods for providing additional instructions for supporting efficient memory corruption detection in a processor. A physical memory may be a DRAM with a spare bank of memory reserved for a hardware failover mechanism. Version numbers associated with data structures allocated in the memory may be generated so that version numbers of adjacent data structures are different. A processor determines that a fetched instruction is a memory access instruction corresponding to a first data structure within the memory. For instructions that are not a version update instruction, the processor compares the first version number and second version number stored in a location in the memory indicated by the generated address and flags an error if there is a mismatch. For version update instructions, the processor performs a memory access operation on the second version number with no comparison check. | 2013-02-07 |
20130036277 | STORAGE SYSTEM - The storage system includes a first auxiliary storage device, a second auxiliary storage device, and a main storage device, and also includes a data management unit which stores and keeps, in the main storage device, index data based on feature data by referring to the feature data of storage target data stored in the first auxiliary storage device, and if the index data stored and kept in the main storage device reaches a preset amount, stores and keeps, in the second auxiliary storage device, the index data stored and kept in the main storage device, and deletes the index data stored and kept in the second auxiliary storage device from the main storage device. | 2013-02-07 |
20130036278 | STORAGE SYSTEM - In a content address storage system, storage target data or address data is stored in a storage device with respect to each time zone divided in a time-series manner, and a storage region in the storage device storing a piece of data, which is not pointed to by other address data, of the storage target data or the address data stored in the storage device in a past time zone before a current time zone, is released. | 2013-02-07 |
20130036279 | STORAGE SYSTEM USING REAL DATA STORAGE AREA DYNAMIC ALLOCATION METHOD - The present invention aims at preventing the access performance of a distributed memory system by accessing via cross-over ownership a track mapping information formed as a hierarchical memory. In the process of assigning a real data storage area to a virtual volume, at first, a page from a pool is assigned, and thereafter, a track is assigned from said page. The page is composed of multiple tracks into which track data assigned at host write operation timings are stored sequentially from the top. A mapping information of the virtual volume and the page is stored in a control information page that differs from the track data, and the mapping information is stored in the control information page which could only be accessed by a microprocessor having the ownership of the virtual volume. | 2013-02-07 |
20130036280 | COMPUTER SYSTEM AND DATA MANAGEMENT METHOD - A first storage system copies data of a virtual area of a first virtual volume to a virtual area of a second virtual volume of a second storage system, monitors accesses with respect to multiple virtual areas of the first virtual volume, updates access information related to the accesses of the multiple virtual areas, and, based on the access information, reallocates data inside an actual area of a first pool allocated to the virtual area of the first virtual volume. The first storage system sends the access information to the second storage system. The second storage system receives the access information, and, based on the access information, reallocates data inside the actual area allocated to a virtual area of the second virtual volume. | 2013-02-07 |
20130036281 | MANAGING SNAPSHOT STORAGE POOLS - Various embodiments of the invention relate to an apparatus and a method of managing a snapshot storage pool (SSP) associated with a storage unit of a distributed data storage system. One apparatus includes a logic module and a processor. The logic module is adapted to provide a threshold corresponding to a ratio between a current amount of storage resources used for storing snapshots in the SSP and a total storage capacity defined for the SSP. The processor is adapted to trigger an action that may be effective for managing the SSP in response to the amount of storage resources used for storing snapshots in the SSP crossing the threshold. | 2013-02-07 |
20130036282 | MANAGING MEMORY OF A COMPUTER - A method for managing data in a memory of a computer. The method includes the steps of: prohibiting a specified memory area in a memory from being accessed temporarily or intermittently; and attaching, to first data, a first mark indicating that the first data has been read when a page fault has occurred as a result of an access by any process to read on the first data; where the first data is present in a specified memory area prohibited from being accessed; and where at least one of the steps is carried out using a computer device. | 2013-02-07 |
20130036283 | Extended Utilization Area For a Memory Device - Methods, systems and devices for configuring access to a memory device are disclosed. The configuration of the memory device may be carried out by creating a plurality of access profiles that are adapted to optimize access to the memory device in accordance with the type of access. Accordingly, when an application with specific memory access needs is initiated, the memory access profile that is most optimized for that particular access need is utilized to configure access to the memory device. The configuration may be effected for a portion of the memory device, a partition of the memory device, or even one single access location on the memory device. | 2013-02-07 |
20130036284 | METHOD AND APPARATUS FOR MANAGING TRANSFER OF TRANSPORT OPERATIONS FROM A CLUSTER IN A PROCESSOR - A method and corresponding apparatus of managing transport operations between a first memory cluster and one or more other memory clusters, include selecting, at a clock cycle in the first memory cluster, at least one transport operation destined to at least one destination memory cluster, from one or more transport operations, based at least in part on priority information associated with the one or more transport operations or current states of available processing resources allocated to the first memory cluster in each of a subset of the one or more other memory clusters, and initiating the transport of the selected at least one transport operation. | 2013-02-07 |
20130036285 | METHOD AND APPARATUS FOR MANAGING PROCESSING THREAD MIGRATION BETWEEN CLUSTERS WITHIN A PROCESSOR - A method, and corresponding apparatus, of managing processing thread migrations within a plurality of memory clusters, includes embedding, in memory components of the plurality of memory clusters, instructions indicative of processing thread migrations; storing, in one or more memory components of a particular memory cluster among the plurality of memory clusters, data configured to designate the particular memory cluster as a sink memory cluster, the sink memory cluster preventing an incoming migrated processing thread from migrating out of the sink memory cluster; and processing one or more processing threads, in one or more of the plurality of memory clusters, in accordance with at least one of the embedded migration instructions and the data stored in the one or more memory components of the sink memory cluster. | 2013-02-07 |
20130036286 | FIRST STORAGE CONTROL APPARATUS AND FIRST STORAGE CONTROL APPARATUS CONTROL METHOD - The present invention creates a pool comprising tiers corresponding to the performance of logical volumes. | 2013-02-07 |
20130036287 | METHOD FOR ALLOCATING ADDRESSES TO DATA BUFFERS IN DISTRIBUTED BUFFER CHIPSET - The present invention relates to a method for allocating addresses to data buffers in a distributed buffer chipset, in which a memory controller informs a central buffer of the beginning of address allocation through a Command/Address channel (CA), and then the central buffer informs through a data control channel all the data buffers of preparing for receiving address parameters through respective data channels, and in this way, each data buffer receives and latches the respective address parameter from the memory controller through the respective data, thus avoiding the defect in the prior art that the size of the data buffer and the size of the entire distributed buffer chipset is bigger as several address pins need to be additionally configured in each data buffer to allocate the respective address parameter. | 2013-02-07 |
20130036288 | METHOD AND APPARATUS FOR ASSIGNING RESOURCES USED TO MANAGE TRANSPORT OPERATIONS BETWEEN CLUSTERS WITHIN A PROCESSOR - A method, and corresponding apparatus, of assigning processing resources used to manage transport operations between a first memory cluster and one or more other memory clusters, include receiving information indicative of allocation of a subset of processing resources in each of the one or more other memory clusters to the first memory cluster, storing, in the first memory cluster, the information indicative of resources allocated to the first memory cluster, and facilitating management of transport operations between the first memory cluster and the one or more other memory clusters based at least in part on the information indicative of resources allocated to the first memory cluster. | 2013-02-07 |
20130036289 | STORAGE SYSTEM - The storage system includes a data storage controlling unit that stores a plurality of units of block data, generated by dividing storage target data, in a distributed manner in a plurality of storage devices, and performs duplicate storage elimination. The data storage controlling unit stores a plurality of continuous units of block data of the storage target data, generated by dividing the storage target data, in a particular storage device among the plurality of storage devices, stores, in the particular storage device, feature data based on the data content of the block data and storing position information representing the storing position in the particular storage device of the block data in association with each other as a storing position specifying table, and stores storage device identifying information for identifying the particular storage device and the feature data of the block data stored in the particular storage device in association with each other as a storage device specifying table. | 2013-02-07 |
20130036290 | METHODS OF AND APPARATUS FOR STORING DATA IN MEMORY IN DATA PROCESSING SYSTEMS - A data array | 2013-02-07 |
20130036291 | GENERATING MULTIPLE ADDRESS SPACE IDENTIFIERS PER VIRTUAL MACHINE TO SWITCH BETWEEN PROTECTED MICRO-CONTEXTS - Embodiments of an invention for generating multiple address space identifiers per virtual machine to switch between protected micro-contexts are disclosed. In one embodiment, a method includes receiving an instruction requiring an address translation; initiating, in response to receiving the instruction, a page walk from a page table pointed to by the contents of a page table pointer storage location; finding, during the page walk, a transition entry; storing the address translation and one of a plurality of address source identifiers in a translation lookaside buffer, the one of the plurality of address source identifiers based on one of a plurality of a virtual partition identifiers, at least two of the plurality of virtual partition identifiers associated with one of a plurality of virtual machines; and re-initiating the page walk. | 2013-02-07 |
20130036292 | MEMORY CONFIGURATION APPARATUS FOR SUPPORTING ARBITRARY MEMORY SET AND METHOD THEREOF - An apparatus and a method for supporting a memory set of an arbitrary number are provided. The apparatus includes a storage, a memory manager, and a controller. The storage is configured with the memory set of the arbitrary number. The memory manager indexes the memory set of the arbitrary number based on a Hash function and an index. The controller controls the memory manager. | 2013-02-07 |
20130036293 | PROCESSING VECTORS USING WRAPPING MINIMA AND MAXIMA INSTRUCTIONS IN THE MACROSCALAR ARCHITECTURE - Embodiments of a system and a method in which a processor may execute instructions that cause the processor to receive an input vector and a control vector are disclosed. The executed instructions may also cause the processor to perform a minima or maxima operation on another input vector dependent upon the input vector and the control vector. | 2013-02-07 |
20130036294 | SYSTEM AND METHOD FOR INSTRUCTION SETS WITH RUN-TIME CONSISTENCY CHECK - A system and method includes modules for determining whether an instruction is a target of a non-sequential fetch operation with an expected numerical property value, and avoiding execution of the instruction if it is the target of the non-sequential fetch operation and does not have the expected numerical property. Other embodiments include encoding an instruction with a functionality that is a target of a non-sequential fetch operation with an expected numerical property value. Instructions with the same functionality that are not targets of non-sequential fetch operations can be encoded with a different numerical property value. More specific embodiments can include a numerical property of parity, determining whether the instruction is valid, and throwing an exception, setting status bits, sending an interrupt to a control processor, and a combination thereof to avoid execution. | 2013-02-07 |
20130036295 | GPU ASSISTED GARBAGE COLLECTION - A system and method for efficient garbage collection. A general-purpose central processing unit (CPU) sends a garbage collection request and a first log to a special processing unit (SPU). The first log includes an address and a data size of each allocated data object stored in a heap in memory corresponding to the CPU. The SPU has a single instruction multiple data (SIMD) parallel architecture and may be a graphics processing unit (GPU). The SPU efficiently performs operations of a garbage collection algorithm due to its architecture on a local representation of the data objects stored in the memory. | 2013-02-07 |
20130036296 | FLOATING POINT EXECUTION UNIT WITH FIXED POINT FUNCTIONALITY - A floating point execution unit is capable of selectively repurposing one or more adders in an exponent path of the floating point execution unit to perform fixed point addition operations, thereby providing fixed point functionality in the floating point execution unit. | 2013-02-07 |
20130036297 | META PREDICTOR RESTORATION UPON DETECTING MISPREDICTION - Methods and apparatus for restoring a meta predictor system upon detecting a branch or binary misprediction, are disclosed. An example apparatus may include a base misprediction history register to store a set of misprediction history values each indicating whether a previous branch prediction taken by a previous branch instruction was predicted correctly or incorrectly. The apparatus may comprise a meta predictor to detect a branch misprediction of a current branch prediction based at least in part on an output of the base misprediction history register. The meta predictor may restore the base misprediction history register based on the detecting of the branch misprediction. Additional apparatus, systems, and methods are disclosed. | 2013-02-07 |