18th week of 2015 patent applcation highlights part 73 |
Patent application number | Title | Published |
20150120900 | SYSTEM AND METHOD FOR INTEGRATING A CLOUD PLATFORM ENVIRONMENT WITH AN APPLICATION SERVER OR OTHER ENVIRONMENT - In accordance with an embodiment, described herein is a system and method for integrating a cloud platform with an application server or other environment, for example, a WebLogic environment. A cloud platform runtime including a cloud server can be embedded within an application server container, so that the cloud server domain can execute within the application server domain. An integration bridge and integration components support integration between the cloud server and the application server. Cloud server components can be used as part of the application server domain, including for example, administration, logging and diagnostics, security, and configuration management. | 2015-04-30 |
20150120901 | DETECTING POOR PERFORMING DEVICES - A device is configured to determine a set of performance indicators associated with a base station and a set of user devices, and determine that a quantity of the set of user devices does not exceed a threshold. The device is configured to receive performance information based on the set of performance indicators, and store the performance information based on determining that the quantity of the set of user devices does not exceed the threshold. The device is configured to determine a performance problem, associated with the base station, based on the performance information, and determine that a user device, of the set of user devices, is associated with the performance problem. The device is configured to provide information that identifies the user device. | 2015-04-30 |
20150120902 | METHOD AND APPARATUS FOR MANAGING COMMUNICATION ACTIVITIES OF A COMMUNICATION DEVICE - Aspects of the subject disclosure include, for example, selecting a first communication device of the plurality of communication devices to analyze activities of the first communication device, presenting at a device activity information associated with the activities of the first communication device, facilitating an exchange of messages between the device and the first communication device, receiving a request from the device to transfer control of the first communication device to the device responsive to the device receiving an unsatisfactory response from the first communication device, and receiving control information from the device to adjust an operational aspect of the first communication device. Other embodiments are disclosed. | 2015-04-30 |
20150120903 | System for monitoring XMPP-based communication services - Monitoring a communication-based system, comprising: communication service supporting XMPP communication with remote devices; device management applications; external, independent monitoring service monitors the communication-based system; XMPP clients; sending and receiving XMPP messages; and analytical component analyzes XMPP messages to determine status of the system, to possibly restart the communication service if the current response time is below a threshold. Methods include monitoring API and XMPP format comprising monitoring request with name of command to receive performance metrics, and monitoring response that comprises performance metrics; and tags; XMPP messages comprising real command, not merely watching or monitoring processes; availability matrix and statistical data in a database; availability metrics is percentage of time when the communication service is available, in comparison to the time while it is unavailable or shut down; and performance metrics is number of messages processed in a unit of time and response time of the communication service. | 2015-04-30 |
20150120904 | VARIABLE CAPTURE BETWEEN APPLICATIONS - A first communication session is created with a first application written in first language. A change is detected in first variables in the first application. The first variables are retrieved from the first application in response to detecting a change in the first variables. The first communication session is transferred to a second application written in a second language. A change is detected in a second variable in the second application. The second variable is retrieved from the second application in response to detecting the change in the second variable. A common pair of variables are matched between the first variables and the second variable. The first communication session and the transferred first communication session are associated as a common communication session in response to matching the common pair of variables. One or more of the first plurality of variables is then used by the second application. | 2015-04-30 |
20150120905 | METHOD AND SYSTEM FOR MONITORING CONDITIONS IN A DYNAMIC NETWORK ENVIRONMENT - A method for monitoring network conditions by receiving a first condition definition describing a first network condition to be monitored in a network and an activation definition, determining a network topology of the network, and compiling the first condition definition to generate a first data plane component, a first control plane component, and an activation component. The method also includes deploying the first data plane component into a data plane of the network, where the data plane component captures and synthesizes a first stream of network events to generate a first modified stream of network events. The method also includes deploying the control plane component into a network operating system for the network. The control plane component receives and correlates the first modified stream of network events. The method also includes deploying an activation component that, upon receiving the correlated stream of events, initiates the activation definition. | 2015-04-30 |
20150120906 | AGENTLESS BASELINE PROFILE COMPILATION FOR APPLICATION MONITORING SOLUTION - Aspects of the present invention provide a solution for monitoring execution of an application on a computer system. In an embodiment, a plurality of base operating values is obtained via an agentless process for each of a set of resource utilization variables that measure performance of the computer system. Based on these base operating values, an application profile for the computer system is compiled. This application profile can include an upper process control limit and a lower process control limit for each of the set of resource utilization variables. Execution of an application can be monitored by gathering operating values from the computer system during execution of the application and comparing the gathered values to the corresponding upper process control limits and the lower process control limits in the application profile. | 2015-04-30 |
20150120907 | STORAGE AREA NETWORK QUEUE DEPTH PROFILER - A system for improving performance of a network includes a monitor that obtains data sets corresponding to network performance, infers characteristics from the data set and generates visualizations and recommendations. In one aspect, the network is a storage area network and the system generates a box plot showing response time based on inferred queue depth, and recommending a queue depth setting if possible. | 2015-04-30 |
20150120908 | REAL-TIME, DISTRIBUTED ADMINISTRATION OF INFORMATION DESCRIBING DEPENDENCY RELATIONSHIPS AMONG CONFIGURATION ITEMS IN A DATA CENTER - In a data center, real-time, distributed administration of information describing dependency relationships among configuration items may be carried out. In such a data center, each configuration item is associated with an independent agent that is coupled to other agents and maintains a record of dependencies amongst the configuration item associated with the agent and other configuration items. Administration of dependency information includes: detecting, by an independent agent associated with a particular configuration item, a change in the item's dependency; providing information describing the change in the particular configuration item's dependency to all other independent agents associated with configuration items that are in a dependency relationship with the particular configuration item; and, for each of the other independent agents associated with configuration items that are in a dependency relationship with the particular configuration item: updating the record of dependences for the configuration item associated with the independent agent. | 2015-04-30 |
20150120909 | DNS-ASSISTED APPLICATION IDENTIFICATION - Techniques are disclosed for classifying a network flow based on a domain name system (DNS) request. Embodiments receive a first DNS request associated with establishing a network flow with a remote service. Here, the first DNS request specifies a domain name associated with the remote service. The domain name is analyzed in order to determine a first classification for the remote service. The first classification is selected from a plurality of classifications. Embodiments then determine a network management policy to apply to the network flow, based on the determined first classification. | 2015-04-30 |
20150120910 | METHOD FOR DYNAMIC LOAD BALANCING IN CAMPUS DEPLOYMENTS - A method is described for dynamically assigning tasks to entities of different types within a network system based on preferences to perform the tasks on particular entities and/or network/device conditions. This ability to dynamically assign processing of tasks between disparate devices in a network system provides a more efficient network configuration and utilization of resources while not compromising throughput, overall network security, and/or network flexibility. | 2015-04-30 |
20150120911 | METHOD AND SYSTEM FOR NETWORK SERVICE HEALTH CHECK AND LOAD BALANCING - A non-transitory computer readable medium includes instructions which, when executed by one or more network devices, causes performance of operations. The operations include sending, to shared devices, one or more status queries regarding one or more device conditions for each of the shared devices, obtaining responses to the one or more status queries from each of the plurality of shared devices, the responses including the one or more device conditions for each of the shared devices, filtering the shared devices based on the one or more device conditions to obtain a subset of the shared devices, identifying the subset of the shared devices as a set of available shared devices, and transmitting information identifying the set of available shared devices to a client device. | 2015-04-30 |
20150120912 | AUTOMATED GENERATION AND DYNAMIC UPDATE OF RULES - The present subject matter relates to monitoring of an environment using data trend analysis. The method comprises obtaining at least one data trend pertaining to at least one data stream for a pre-defined period of time. The at least one data trend is indicative of a pattern followed by the at least one data stream. Further, at least one delta value pertaining to the at least one data stream may be computed, the at least one delta value being indicative of a deviation in the at least one data stream with respect to the at least one data trend at a specific time instance. Furthermore, at least one relationship between a plurality of data streams is identified based on the at least one data trend and identity metadata associated with each data stream. Based on the at least one delta value and the at least one relationship, at least one rule is generated. | 2015-04-30 |
20150120913 | DYNAMIC CLONING OF APPLICATION INFRASTRUCTURES - Techniques for dynamically cloning application infrastructures are provided. In one embodiment, a computer system can monitor one or more metrics pertaining to an infrastructure for an application at a first site. If the one or more metrics exceed or fall below one or more corresponding thresholds, the computer system can clone the infrastructure at a second site distinct from the first site, thereby enabling the application to be hosted at the second site. | 2015-04-30 |
20150120914 | SERVICE MONITORING SYSTEM AND SERVICE MONITORING METHOD - A method detects a request higher than the baseline in baseline monitoring and stores the request in an outlier request DB. The method selects a common pattern from requests stored in the outlier request DB, differentiates between a request including the pattern and a request not including the pattern, and monitors them with different baselines as different services. | 2015-04-30 |
20150120915 | Policy Service Logging Using Graph Structures - A policy service logging system includes one or more servers connected by a network. The one or more servers are configured to provide a graph structure having a plurality of nodes. Each node is in communication with at least one other node. The graph structure is configured to process log entries of network resource requests subject to policy implemented by a policy service. As log entries flow through the graph structure, the nodes perform operations on the log entries. | 2015-04-30 |
20150120916 | SYSTEM, METHOD AND APPARATUS FOR TRAFFIC MIRROR SETUP, SERVICE AND SECURITY IN COMMUNICATION NETWORKS - The present invention provides method and systems for dynamically mirroring network traffic. The mirroring of network traffic may comprise data that may be considered of particular interest. The network traffic may be mirrored by a mirror service portal from a mirror sender, referred to as a mirror source, to a mirror receiver, referred to as a mirror destination, locally or remotely over various network segments, such as private and public networks and the Internet. The network traffic may be mirrored to locations not involved in the network communications being mirrored. The present invention provides various techniques for dynamically mirroring data contained in the network traffic from a mirror source to a mirror destination. | 2015-04-30 |
20150120917 | METHODS AND APPARATUS FOR SCALABLE PRIVATE SERVICES - Methods and apparatus for providing scalable private services in service provider networking environments. A service provider that provides a large, public, multi-tenant implementation of a web service to multiple customers via a public API endpoint may allow a customer to request the establishment of a private implementation of the service. In response, a service private instance may be automatically and/or manually established for the customer that provides a private API endpoint to the service and that is at least in part implemented on single-tenant hardware that is not shared with other customers. The service private instance may initially be implemented as a relatively small scale and possibly limited implementation of the service when compared to the service public instance. As the needs of the customer grow, the service private instance may be automatically and/or manually scaled up from the initial implementation. | 2015-04-30 |
20150120918 | TRAVERSAL OF SYMMETRIC NETWORK ADDRESS TRANSLATOR FOR MULTIPLE SIMULTANEOUS CONNECTIONS - Handling of multiple connections during NAT traversal for a node behind a symmetric NAT is disclosed. The likelihood of connection failure during symmetric NAT traversal may be reduced by serializing critical time windows after port prediction. Once a connection request has been sent for a first connection, port prediction for a subsequent connection may be delayed until a connectivity check has begun for the first connection. This process may be repeated to handle NAT traversal for multiple simultaneous connections to different nodes. | 2015-04-30 |
20150120919 | PREFERRED RESOURCE SELECTOR - A computer implemented method, and computer program product for requesting resources. The computer receives an assignment of an Internet protocol address. The computer compares a computer context of a client computer with an intranet access criterion to form a comparison result. The computer selects at least one preferred uniform resource identifier based on the comparison result, indicating the intranet is accessible. The computer transmits a request to a server using at least one preferred uniform resource identifier using a packet network. | 2015-04-30 |
20150120920 | CROSS-CLOUD COMPUTING RESOURCE USAGE TRACKING - Systems and methods for cross-cloud computing resource usage tracking. An example method comprises: receiving a request comprising an operational specification of a computing resource; selecting a first provisioning cloud in view of the operational specification; receiving an updated operational specification of the computing resource; receiving a first provisioning offer from the first provisioning cloud and a second provisioning offer from a second provisioning cloud responsive to the updated operational specification; selecting the second provisioning cloud in view of the first and second provisioning offers; providing an interface between the first computing resource and a second computing resource residing in a second provisioning cloud; and tracking resource usage data of the first computing resource across the provisioning clouds. | 2015-04-30 |
20150120921 | TECHNIQUES FOR WORKLOAD TOXIC MAPPING - Techniques for toxic workload mapping are provided. A state of a target workload is recorded along with a configuration and state of an environment that is processing the workload. Micro valuations are taken, via statistical sampling, for metrics associated with the workload and for different combinations of resources within the environment. The sampling taken at micro second intervals. The valuations are aggregated to form an index representing a toxic mapping for the workload within the environment. The toxic mapping is mined, in view of policy, to provide conditions and scenarios that may be deemed problematic within the workload and/or environment. | 2015-04-30 |
20150120922 | SYSTEM, METHOD AND PROGRAM FOR DETECTING ANOMALOUS EVENTS IN A UTILITY NETWORK - A communication device detects whether anomalous events occur with respect to at least one node in a utility network. The communication device has recorded therein threshold operating information and situational operating information. The threshold operating information includes data indicative of configured acceptable operating parameters of nodes in the network based on respective locational information of the nodes. The situational information includes data indicative of configured operation data expected to be received from nodes in the network during a predetermined time period, based on a condition and/or event occurring during the time period. The communication device receives operation data from nodes in the network, and determines whether the operation data from a node constitutes an anomalous event based on a comparison of the received operation data with (i) the threshold operating information defined for the node and (ii) the situational information. The communication device outputs notification of any determined anomalous event. | 2015-04-30 |
20150120923 | Optimization Of Resource Utilization In A Collection of Devices - Technologies are described herein for optimizing resource utilization in a collection of devices having hierarchical network layers. Some example technologies may identify packets exchanged between processes executed on collections of server computers. The hierarchical network layers may couple the collections of server computers. The technologies may determine virtual machine groups based on the identified packets. Each of the virtual machine groups may identify one or more virtual machines configured on the collections of server computers to execute one or more processes. The virtual machine groups may be configured to increase data traffic in a lower layer in the hierarchical network layers and to decrease the data traffic in a higher layer in the hierarchical network layers. The technologies may relocate the virtual machines between the collections of server computers according to the virtual machine groups. | 2015-04-30 |
20150120924 | SOFTWARE-DEFINED NAMED-DATA NETWORKING - A device in an information-centric network or a named-data network can process commands from a packet on one or more local resources. During operation, the device can receive a packet that includes a name or name prefix, and additionally can include a header comprising one or more resource fields that each can include instructions that perform an operation on a corresponding resource. The device can select, from the packet, a resource field that includes instructions to be executed on a corresponding resource. The device can analyze the resource field to determine an instruction that corresponds to the resource, and executes the instruction to perform the operation on the resource. The device can also analyze access control information from the packet's header, and determines whether the access control information grants the packet permission to access the resource prior to performing the operation on the resource. | 2015-04-30 |
20150120925 | LOCK ELEVATION IN A DISTRIBUTED FILE STORAGE SYSTEM - A client requests access to a resource (e.g., a file) via a node of a storage system. The resource is stored in a directory structure. A directory in the directory structure that includes the resource and that does not have any locks that conflict with the requested access to the resource is identified and selected. A revocable access privilege (e.g., a lock) on the selected directory is awarded to the node accessed by the client, and a directory-to-node association is established. Another association between the requested resource and the node is also established. If there is a subsequent request for the resource or for another resource within that directory, then a revoke notice for the directory access privilege is sent to the node. | 2015-04-30 |
20150120926 | METHOD AND APPARATUS FOR DYNAMICALLY DEPLOYING SOFTWARE AGENTS - Methods and apparatus for dynamically deploying software agents are disclosed. For example, a user of an electronic record management system may deploy a plurality of different background processes (e.g., OCR, dedup, etc.) that may each take several hours to complete. Subsequently, the user may decide to change the number of servers dedicated to one or more background process. In addition, the user may decide to deploy additional background processes. Neither of these user actions interrupts any of the background processes. | 2015-04-30 |
20150120927 | NETWORK BASED ONSITE SUPPORT - Systems and methods for providing onsite support to technicians of a network include a hardware means for automatically detecting the presence of an onsite technician at the network node, and providing support to the onsite technician through a communications channel provided by the network node. The communications channel can be an optical service channel or a general communication channel (GCC) configured according to G.709 standard, for example. The hardware means can be further configured to determine an identity of the onsite technician and/or authenticate the onsite technician. The hardware means may comprise a dongle communicatively coupled to a network element or shelf at the network node via a universal serial bus (USB) port or Bluetooth connection. | 2015-04-30 |
20150120928 | CONTAINER VIRTUAL MACHINES FOR HADOOP - A distributed computing application is described that provides a highly elastic and multi-tenant platform for Hadoop applications and other workloads running in a virtualized environment. Data and compute nodes are separated into different virtual machines (VM). Compute VMs are used to launch containers from different tenants. Compute VMs are organized in pools of hot spare VMs that are immediately available for launching a container and executing a task, and pools of cold spare VMs. Each compute VM may include a mounted network filesystem provided by a node manager to share intermediate outputs across VMs executing on the same host. | 2015-04-30 |
20150120929 | METHOD FOR PRACTICING RECIPROCITY OF RESOURCES - The present invention relates to a method for practicing reciprocity of resources, which is a method for acquiring resources privilege of future information communication through sharing information communication resources, wherein at least one information device, including a first information device and a second information device, is installed with communication platform software. The first information device and the second information device are set in information connection with each other. When the first information device uses information communication resources through the second information device, resources privilege stored in a first account of the first information device is consumed. Oppositely, when the first information device provides information communication resources to be used by the second information device, the resources privilege of the first account of the first information device is increased so that reciprocity of network resources is achieved with such a process. | 2015-04-30 |
20150120930 | PROVISIONING ACCESS POINT BANDWIDTH BASED ON PREDETERMINED EVENTS - The present disclosure discloses a method and network device for provisioning access point bandwidth based on predetermined events. The disclosed system identifies a pattern for one or more devices over a period of time, the pattern indicating that the one or more devices (a) connect to a particular access point at a particular time of day, or (b) are located near the particular access point at the particular time of day. Prior or approximately the particular time, the disclosed system facilitates at least one client device associated with the particular access point to associate with a second and different access point. The disclosed system then provides, by the particular access point to the one or more devices, access to network resources. | 2015-04-30 |
20150120931 | AUTOMATIC REMEDIATION IN A DISTRIBUTED COMPUTER SYSTEM WITH MULTIPLE CLUSTERS OF HOST COMPUTERS - A system and method for performing automatic remediation in a distributed computer system with multiple clusters of host computers uses the same placement selection algorithm for initial placements and for remediation placements of clients. The placement selection algorithm is executed to generate a placement solution when a remediation request in response to a remediation-requiring condition in the distributed computer system for at least one client running in one of the multiple clusters of host computers is detected and a remediation placement problem for the client is constructed. The placement solution is then implemented for the client for remediation | 2015-04-30 |
20150120932 | PROFILE-BASED PLACEMENT OF CLIENTS - A client placement module and method for placing a client in a distributed computer system uses at least one requirement profile with profile parameters to determine whether any host computer in the distributed computer system satisfies resource requirements of the client and also matches the profile parameters in the at least one requirement profile. | 2015-04-30 |
20150120933 | Sharing Network Resources - A network resource allocator comprising: processing means configured to: receive, from each of a plurality of applications connected to a network providing an available network resource, a request for network resource of the available network resource; and for each of the plurality of applications: determine an allocation of the available network resource for use by the application based on said received requests; and transmit, an indication of said allocation to the application for use by said application. | 2015-04-30 |
20150120934 | EFFICIENT PROXIMITY SERVICE DISCOVERY RESOURCE REPORT AND ALLOCATION - Effective proximity service discovery resource reporting and allocation. Embodiments of the invention relate to a method for enhancing proximity service (ProSe) device to device discovery resource allocation, the method comprising: allocating, by a network processing device, network resources to a plurality of user devices including at least one user device in a connected mode and at least one user device in an idle mode, the allocating comprising: restricting network resources allocated to the user device in the idle mode for proximity service discovery compared to the network resources allocated to the user device in the connected mode for proximity service discovery, such that the network resources maintain reliable discovery services for the user device in the connected mode as well as provide acceptable discovery services for the user device in the idle mode. | 2015-04-30 |
20150120935 | INFORMATION PROCESSING APPARATUS AND METHOD, INFORMATION PROCESSING SYSTEM, AND NON-TRANSITORY COMPUTER READABLE MEDIUM - An information processing apparatus includes a communication section, a calculator, and a sender. The communication section communicates with a processing providing apparatus which utilizes a different amount of resource in accordance with a load of processing to be performed on data. The calculator calculates an amount of resource to be utilized for performing processing on the data by the processing providing apparatus, at plural time points corresponding to different steps of processing performed by the information processing apparatus before sending the data to the processing providing apparatus. The sender sends a request to get or release the resource based on the amount of resource calculated by the calculator to the processing providing apparatus via the communication section. | 2015-04-30 |
20150120936 | COORDINATION OF PROCESSES IN CLOUD COMPUTING ENVIRONMENTS - Methods and systems of managing computer cloud resources, including at least one database, at least one server configured to, act as an orchestration site, wherein the orchestration site is configured to receive at least one cloud resource management plan from at least one user and store the at least one plan in the at least one database and act as an orchestration manager. The orchestration manager is configured to retrieve the at least one plan from the at least one database and execute the plan with at least one site controller. | 2015-04-30 |
20150120937 | SYSTEM AND METHOD FOR PLACEMENT LOGIC IN A CLOUD PLATFORM ENVIRONMENT - In accordance with an embodiment, described herein is a system and method for providing multitenancy support in a platform as a service or cloud computing environment. A platform component enables a service runtime to be shared by multiple tenants, by providing each tenant with a dedicated share or slice of a runtime instance. Each share/slice can be isolated from other shares/slices with respect to factors such as, for example, configuration, or quality of service. In accordance with an embodiment, during provisioning of a particular service runtime, a runtime definition associated with the service runtime can be utilized, for example by a service management engine, to configure the platform component to install one or more services within the service runtime. A particular service and its service runtimes can also be provisioned, within one or more runtime pools, according to a service runtime definition and placement configuration. | 2015-04-30 |
20150120938 | SYSTEM AND METHOD FOR SUPPORTING MULTITENANCY IN A CLOUD PLATFORM ENVIRONMENT - In accordance with an embodiment, described herein is a system and method for providing multitenancy support in a platform as a service or cloud computing environment. A platform component enables a service runtime to be shared by multiple tenants, by providing each tenant with a dedicated share or slice of a runtime instance. Each share/slice can be isolated from other shares/slices with respect to factors such as, for example, configuration, or quality of service. In accordance with an embodiment, during provisioning of a particular service runtime, a runtime definition associated with the service runtime can be utilized, for example by a service management engine, to configure the platform component to install one or more services within the service runtime. A particular service and its service runtimes can also be provisioned, within one or more runtime pools, according to a service runtime definition and placement configuration. | 2015-04-30 |
20150120939 | SYSTEM AND METHOD FOR SUPPORTING SERVICE RESOURCES AND FEATURE SETS IN A CLOUD PLATFORM ENVIRONMENT - In accordance with an embodiment, described herein is a system and method for providing service resources for consumption by an application deployed to a service in a cloud environment. A service definition package (SDP) for the service can specify a dependency on a provider, and include association rules that define actions to be taken with regard to a runtime of the provider. When the service is provisioned, a service resource type which is derived from a provider SDP can be associated with the service. As a result of the association, a service resource can be automatically created from the service resource type in accordance with the association rules, to provide resources for consumption by the application. In accordance with an embodiment, the provider SDP can include a plurality of feature sets associated with different sets of configurable properties, which allows different provider types or service resource types to be created. | 2015-04-30 |
20150120940 | APPARATUS AND METHOD FOR CHANGING RESOURCE USING PATTERN INFORMATION, AND RECORDING MEDIUM USING THE SAME - Provided is an apparatus for determining whether to change resources using pattern information. The apparatus includes a reception unit which receives resource information which is information about an amount of resources used of a plurality of servers which exist in a data center which provides resources to a user, a basic data generation unit which generates basic data about predetermined items in preset time units using the resource information, a pattern information generation unit which generates pattern information using the basic data, and a resource change determination unit which determines whether to increase, maintain, or reduce the resources using the generated pattern information. | 2015-04-30 |
20150120941 | PROVISIONING AVAILABLE NETWORK RESOURCES - Systems and methods are provided that allow network resources to be shared across geographical distances. This can be achieved by changing the resources available for establishing and handling call or data session processing in an area. A mobility management device can alone or in combination with a DNS server change the size or the resource pool available in some embodiments. The change in resources can be dynamic according to certain predefined conditions or can be setup beforehand to account for daily demand. This sharing of resources can allow more efficient usage of resources available across a geographic region, rather than needed to over-provision each region to account for peak demands. | 2015-04-30 |
20150120942 | Distributed Computing in a Wireless Communication System - Distributed computing in a wireless communication system. Reports may be received from a plurality of nodes in a wireless communication system. Each respective report may include information regarding computing resources at the respective node. A notification of a request for a computing resource may be received from a first wireless user equipment device. A first node may be selected from the plurality of nodes to provide the computing resource based on the reports received from the plurality of nodes. The first node may be assigned to provide the computing resource. | 2015-04-30 |
20150120943 | Secure mobile access to resources within a private network - A technique is disclosed that provides a secure end-to-end connection between a mobile station in a public network and a resource server in a private network. First, a virtual private network (VPN) connection is established by the resource server within the private network, to a VPN/socket secure (SOCKS) proxy in the public network. Subsequently, the SOCKS proxy receives an access request from the mobile station and, in response, sets up a Hypertext Transport Protocol Secure (HTTPS) connection between the resource server and mobile station. Then, a reverse proxy service operating at the resource server retrieves data packets from a resource device, such as a webcam, and encrypts and pushes the packets to the mobile station. | 2015-04-30 |
20150120944 | SIP ANCHOR POINTS TO POPULATE COMMON COMMUNICATION LOGS - The concept of a centralized communication log is provided. Anchor points, and specifically Session Initiation Protocol (SIP) anchor points, serve as a media and call control point that is established on a per-user basis which can then be leveraged by a communication log application. Such a communication log application is able to determine accurate and real-time communicant information for a communication session and populate a centralized communication log with the same. Such a communication log is, therefore, accurate with respect to multiple users in a system, highly available, and scaled horizontally. | 2015-04-30 |
20150120945 | Push Channel Based Creation of Web-Based User Interface Sessions - Systems and methods for instantiating new web UI sessions and web UI agents using push channels are disclosed. When a new web UI session is created in an application server in response to a function request from an existing web UI agent, its network address is pushed to the existing web UI agent to create a new web UI agent. The new web UI agent can then be attached to the new web UI session using the address provided to the existing web UI agent. To push the network address to the original web UI agent, a dedicated bi-directional network connection is established between the existing web UI agent and an application push channel session. The new web UI session can push its address to the existing web UI agent through an AMC. | 2015-04-30 |
20150120946 | Method, Server and System for a Network Multimedia Content Component Service in an Internet Protocol Multimedia Subsystem - Method, server ( | 2015-04-30 |
20150120947 | METHOD AND A PROXY-CALL SESSION CONTROL FUNCTION NODE FOR DEREGISTRATION OF A USER EQUIPMENT FROM AN INTERNET MULTIMEDIA SUBSYSTEM - The present invention relates to a method for deregistration of a UE from an IMS, the deregistration being initiated from and performed by a P-CSCF node. The present invention also relates to a P-CSCF node comprising a processor and a memory storing a computer program, which when run in the processor, causes the P-CSCF node to perform the method. The method includes monitoring at least one parameter associated with UE behaviour in the IMS and triggering generation of a message in response to that the monitored parameter meets predefined criteria. The message is inserted in a SIP header message and sent to the S-CSCF node which forwards it to the HSS. The P-CSCF node then receives an acknowledgement from the S-CSCF node that the UE has been deregistered from the HSS and terminates the UE session with the IMS. | 2015-04-30 |
20150120948 | INFORMATION PROCESSING DEVICE - The information processing device includes a communication means for transmitting connection request information to a server device, and receiving response information which is a response to the connection request information; and a determination means for determining whether or not a connection with the server device succeeded, based on display information which is included in the received response information and displayed on a display device. If the determination means determines that a connection with the server device failed, the communication means transmits the connection request information to the server device. | 2015-04-30 |
20150120949 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD AND PROGRAM - According to the present disclosure, there is provided an information processing apparatus including a connection control unit configured to generate or update a connection table on the basis of status of communication performed by a communication unit at a time of an operation to establish a session or status of communication regularly performed by the communication unit after the operation to establish the session. | 2015-04-30 |
20150120950 | Portable Short-Range Input Device - Techniques for sharing a shared resource. A connection is established between a sharing control device and a shared resource to control sharing of the shared resource with one or more source devices. The sharing control device is external from the shared resource and the one or more source devices. A data transfer is initiated between the sharing control device and the shared resource. Control of the shared resource is granted to a selected source device from the one or more source devices in response to the sharing control device granting control of the shared resource to the selected source device. | 2015-04-30 |
20150120951 | METHOD AND SYSTEM FOR CONTROLLING ACCESS TO SHARED DEVICES - A non-transitory computer readable medium includes computer readable program code including instructions for subsequent to a client device associating with an access point, receiving a request for a set of allowed shared devices, removing, by the access point and to obtain the set of allowed shared devices, a shared device from a set of shared devices based on a client device user of the client device failing to have a permission required by a device sharing policy of the shared device, and transmitting the set of allowed shared devices to the client device. | 2015-04-30 |
20150120952 | AGGRESSIVE PREFETCHING - A method is provided for distributing data content in a P2P live streaming network comprising a plurality of peers and a streaming source periodically producing segments representing the data content to be distributed, wherein a group of the peers are assigned to download the data content from the streaming source and to distribute the data content to remaining peers. The method comprises a first peer making requests for a current segment produced by the streaming source, the requests being made at a rate higher than a rate with which the segments are produced by the streaming source. If the first peer is the first to download the current segment, then the current segment has been downloaded, wherein the network peers can download the current segment from the first peer. Otherwise, a second peer downloads the current segment and it announces this to the group on the P2P network. | 2015-04-30 |
20150120953 | SYNCHRONIZING MEDIA PRESENTATION AT MULTIPLE DEVICES - A system that incorporates the subject disclosure may include, for example, a device to perform operations including determining, a first playback latency of a streaming media signal at a first media processor and a second playback latency of the same signal at a second media processor. A coordinated time is determined according to a target latency not less than a greater of the first and second playback latencies. A first buffer, when adjusted by a first buffer value, causes an in-content reference to be encountered at the coordinated time during playback by the first media processor. Likewise, a second buffer, when adjusted by a second buffer value, causes the in-content reference to be encountered at the coordinated time during playback by the second media processor. The suitably adjusted buffers allow playback of the streaming media to be synchronized between the first and second media processors. Other embodiments are disclosed. | 2015-04-30 |
20150120954 | METHOD AND APPARATUS FOR ENCODING A VIDEO STREAM - A method for encoding a video stream divided in macroblocks using an encoding scheme, the video stream comprising a transparency level channel, said method comprising: —classifying said macroblocks into inner macroblocks, for which a transparency value provided by said transparency information channel is substantially uniform, and transition macroblocks, for which a transparency value provided by said transparency level channel is not substantially uniform; —determining a statistic of said transparency value for each one of said inner macroblocks; and —configuring a respective parameter of said encoding scheme for each one of said inner macroblocks in function of its respective statistic. | 2015-04-30 |
20150120955 | Alignment Markers in Multi-Lane Networking - A marker spacing between two consecutive alignment marker (AM) blocks is defined for virtual lanes in a multi-virtual-lane networking protocol. A system using the networking protocol includes circuitry configured to identify virtual and physical lane groupings and numbers based on the AM blocks. The system may use error coding groups to allow for distribution of the AM blocks to the physical lanes in integer numbers of error correction blocks. The identification scheme may be based on sequences derived from a known bit pattern and the bit inverse of the bit pattern. The system may include matching units identify instances of the bit pattern and its bit inverse. | 2015-04-30 |
20150120956 | CONTENT PRESENTATION FOR MPEG MEDIA TRANSPORT - A method for simplified MPEG Media Transport (MMT) content presentation is provided. Two or more assets of an MMT package Processing Unit (MPU) are identified. The method also includes defining at least one of the two or more assets as a default asset and a remaining one or more assets as enriched assets. The at least one default asset does not include a composition function. The method further includes configuring the at least one default asset for independent presentation from the one or more enriched assets. The method includes transmitting the MPU including the at least one default asset and the one or more enriched assets. | 2015-04-30 |
20150120957 | APPARATUS AND METHOD FOR RECEIVING VIDEO SERVICE IN HYBRID NETWORK - A receiving terminal in a hybrid network receives a video stream through a broadcasting network. The receiving terminal receives a high speed video stream streamed at a high speed for a defined first period from a first time when switching from the broadcasting network to a communication network depending on a receiving state of the broadcasting network is determined, receives a live video stream streamed in a live form from any one time of the first period, and generates a continuous video stream using the video stream received through the broadcasting network, the high speed video stream, and the live video stream. | 2015-04-30 |
20150120958 | Media Stream Sharing Method and Terminal - A media stream sharing method and terminal, where the method includes, after a first terminal receives a start instruction triggered by a user to start a service of sharing audio and video, searching for, according to the start instruction, a terminal capable of implementing sharing of a media stream with the first terminal, and displaying the found terminal or terminal list; when the first terminal determines that a terminal selected by a user according to the displayed terminal or terminal list is a second terminal, obtaining a playing attribute of the second terminal; and synchronizing, by the first terminal according to the playing attribute, a media stream currently played to the second terminal, causing the second terminal to decode and play the media stream. The method solves problems of audio and video asynchronization, operational complexity, and high costs during media stream sharing in the prior art. | 2015-04-30 |
20150120959 | METHOD AND SYSTEM FOR MONITORING AND ANALYSIS OF NETWORK TRAFFIC FLOWS - Network traffic flow records received from a network probe are filtered and short traffic flows are selected so that the total number of short traffic flows is high but the number of bytes in the short traffic flows is negligible, followed by discarding of the short traffic flows. Traffic flow data is recorded in multiple sets of buckets of different granularity, optimized for the purpose of almost instant analysis and display as well as for longer term report generation. The traffic flow data is pre-processed and stored redundantly in parallel in multiple bucketized data base tables of different time window sizes. A corresponding method and system are provided. | 2015-04-30 |
20150120960 | Method and system of data routing through time-variant contextual trust - A method of data routing in a network through time-variant contextual trust includes: determining, by the network, a level and a nature of confidentiality of data to be transmitted from at least one network component to at least one recipient network component; determining, by the network, a time-variant availability of at least one hop node; determining, by the network, an owner of the at least one hop node and a profile of the owner of the at least one hop node; determining, by the network, a time-variant contextual trust between an owner of the at least one network component and the owner of the at least one hop node; and determining, by the network, a hop routing strategy for data routing. | 2015-04-30 |
20150120961 | Dynamic Content Packaging - To be accessed on different media players, requested content must be delivered in a format that is supported by the requesting device. A dynamic content packager for encrypting and packaging requested content for different requesting devices at the time of consumption is disclosed. | 2015-04-30 |
20150120962 | SHARING A JAVA VIRTUAL MACHINE - A JAVA virtual machine with multiple tenants is shared by allocating an IP address to each of the tenants, creating a separate virtual network interface for each of the tenants and configuring each separate virtual network interface with the respective separate IP address allocated for each tenant. For each of the tenants, network operations are performed via the virtual network interface created for that tenant, to provide for network isolation of each tenant sharing a JAVA virtual machine. | 2015-04-30 |
20150120963 | TRANSPORT MODE DATA TRANSFER BETWEEN A CHANNEL SUBSYSTEM AND INPUT/OUTPUT DEVICES - A computer program product is provided for performing a method that includes receiving a command message at a control unit from a channel subsystem in a host computer system, the command message including a command for data to be transferred from the host computer system to an I/O device. The method also includes receiving a data transfer message at the control unit, the data transfer message having an amount of the data to be transferred that is less than or equal to a maximum amount of data, the maximum amount of data corresponding to a number of buffers associated with the control unit and a size of each of the number of buffers, the number of buffers indicated by a buffer credit value maintained in the host computer system, and the size indicated by a buffer size value sent from the control unit and maintained in the host computer system. | 2015-04-30 |
20150120964 | PERIPHERAL DEVICE COMPLYING WITH SDIO STANDARD AND METHOD FOR MANAGING SDIO COMMAND - The invention provides a method of managing SDIO commands at a host device and a peripheral device. The host device connected to the peripheral device by a bus comprising a command transmission line and a data transmission line, both of which are arranged to transmit single end signal. The host device converts operation requests into converted commands and combines a first SDIO complied data packet with the converted commands to generate a first combined data packet. Then, the host device transmits the first combined data packet through the data transmission line, wherein the first combined data packet comprises a first header for indicating whether the first combined data packet comprises the converted commands. After receiving the first combined data packet, the peripheral device parses the first combined data packet to obtain the converted commands, and then performs processing procedures according to the converted commands. | 2015-04-30 |
20150120965 | APPARATUS AND METHOD FOR COPYING RULES BETWEEN DEVICES - Devices, systems, and methods are described for allowing rules that are applied to one device to be applied to another device based on a user's interaction with only the devices. A rule-copy action, such as simultaneous shaking of the two devices, proximity of the two devices to each other, and/or the relative positions of the two devices, may be detected at one of the devices (e.g., a first device to which the user desires the rules or a copy of the rules to apply). In response to the rule-copy action, another device (e.g., a second device configured to operate according to the at least one rule) may be identified. The at least one rule may then be caused to be applied to the first device in response to detection of the rule-copy action, so as to configure the first device to operate according to the at least one rule. | 2015-04-30 |
20150120966 | TECHNIQUES FOR USING AN ASSIGNED SWITCH IDENTIFICATION AT AN INPUT/OUTPUT DEVICE - Examples are disclosed for assigning a switch identification to data received at an input/output device coupled to a host device. In some examples, the data may be associated with a virtual station interface (VSI) for a virtual machine implemented at the host device. For these examples, a switch identification may be assigned to the data based on identification information for the data or an originator of at least a portion of the identification information. The assigned switch identification may then be used as part of a lookup table to determine one or more actions for processing the data at the input/output device. Other examples are described and claimed. | 2015-04-30 |
20150120967 | Communication Device Ingress Information Management System and Method - The components of communication network device ingress systems and methods cooperate to manage information ingress and prevent denial of service attempts. A classifier classifies incoming information. A classification filter filters the information on a classification basis to prevent denial of service. The classification filter includes a classification filter counter for tracking the flow of information associated with the classification filter. A zero value in the classification filter counter indicates that a buffer capacity limit associated with the classification is reached. The counter permits information to flow to a packet buffer if the classification filter counter value is not zero and discards information if the classification filter counter value is zero. In one exemplary implementation the classification filter counter decrements a classification filter counter value when the information is placed in the buffer. The classification filter counter value is incremented when the information is processed out of the buffer. | 2015-04-30 |
20150120968 | CONTROL METHOD AND INFORMATION PROCESSING SYSTEM - A control method for an information processing system including a first computer, a second computer, and a plurality of storage devices coupled to the first computer and the second computer through a switch, a processing performance of the second computer being higher than a processing performance of the first computer, the control method includes setting, by the switch, the first computer as a target for connection of the plurality of storage devices; transmitting, by the first computer, data to be processed from the first computer to the plurality of storage devices and thereby storing the data in the plurality of storage devices; switching, by the switch, the target from the first computer to the second computer when the storing is completed; and executing, by the second computer, processing of the data stored in the plurality of storage devices. | 2015-04-30 |
20150120969 | DATA PROCESSING SYSTEM AND DATA PROCESSING METHOD - Embodiments of the present invention provide a data processing system and a data processing method. An MMIO address of a data request is obtained, where data stored in a PCIe storage device can be directly obtained from the MMIO address, and according to the MMIO address, a network adapter can directly read the data from the PCIe storage device of the data processing system, and transmit the data to a second data processing system, or directly write the data received from the second data processing system into the PCIe storage device. Therefore, the processing system can implement transmitting data directly from the PCIe storage device to the network adapter without using memory. During data transmission between the two data processing systems, a usage ratio of a resource, such as memory and a CPU, is reduced, and efficiency of data transmission is improved | 2015-04-30 |
20150120970 | METHOD AND APPARATUS FOR PROVIDING PERFORMANCE DATA OVER A DEBUG BUS - A device and method for providing performance information about a processing device. A stream of performance data is generated by one or more devices whose performance is reflected in the performance data. This performance data stream is then provided to a parallel port for outputting thereof. | 2015-04-30 |
20150120971 | SERVER SYSTEM AND STORAGE SYSTEM - A storage system includes a communication unit configured to perform communication with a server, a storage unit including a plurality of storage media, an input/output (I/O) controller configured to transmit/receive data to/from the server through the communication unit, and transmit/receive the data to/from the storage unit, and a board unit in which the storage unit and the I/O controller are disposed, and configured to transmit/receive the data between the storage unit and the I/O controller by using a pattern. | 2015-04-30 |
20150120972 | I/O MODULE - An I/O module includes a base plate, a plurality of universal-circuits, and an option-module. The base plate includes a plurality of connection terminals. A plurality of field devices is electrically connectable to the connection terminals. The universal-circuits correspond to the connection terminals. The universal-circuits are provided on the base plate, and configured to perform an input of analog signals from the field device, an output of analog signals to the field device, an input of discrete signals from the field device, and an output of discrete signals to the field device. The option-module is detachably provided in the base plate. The option-module is provided between a first connection terminal of the connection terminals and a first universal-circuit of the universal-circuits. The option-module includes a first circuit configured to performing transmitting and receiving of signals between the first connection terminal and the first universal-circuit. The first connection terminal corresponds to the first universal-circuit. | 2015-04-30 |
20150120973 | METHOD FOR DETECTING RECEIVE END, DETECTION CIRCUIT, OPTICAL MODULE, AND SYSTEM - A method for detecting a receive end, a detection circuit, an optical module, and a system are provided, and relate to the field of optical communications. The method includes: transmitting a first detection code pattern to a PCI-E receive end through optical transmission, so that after receiving the first detection code pattern, the PCI-E receive end feeds back a second detection code pattern through the optical transmission; detecting whether the second detection code pattern fed back by the PCI-E receive end through the optical transmission is received; and determining that the PCI-E receive end is in position if a detection result is that the second detection code pattern fed back by the PCI-E receive end through the optical transmission is received. | 2015-04-30 |
20150120974 | ELECTRONIC CONTROLLER TO BE CONNECTED TO PROGRAM TOOL - A first external tool ( | 2015-04-30 |
20150120975 | CAMERA CONTROL SLAVE DEVICES WITH MULTIPLE SLAVE DEVICE IDENTIFIERS - System, methods and apparatus are described that facilitate transmission of data, particularly between two devices within an electronic apparatus. An address list may associate each of a plurality of slave devices coupled to a control data bus with a plurality of slave device identifiers. Access to the control data bus may be controlled based on the address list such that, in a first mode of operation information may be broadcast to multiple slave devices using a first group slave device identifier and, in a second mode of operation, information may be exchanged with a single slave device using an individualized slave device identifier. | 2015-04-30 |
20150120976 | METHOD AND APPARATUS FOR PERFORMING A BUS LOCK AND TRANSLATION LOOKASIDE BUFFER INVALIDATION - A method and apparatus for performing a bus lock and a translation lookaside buffer invalidate transaction includes receiving, by a lock master, a lock request from a first processor in a system. The lock master sends a quiesce request to all processors in the system, and upon receipt of the quiesce request from the lock master, all processors cease issuing any new transactions and issue a quiesce granted transaction. Upon receipt of the quiesce granted transactions from all processors, the lock master issues a lock granted message that includes an identifier of the first processor. The first processor performs an atomic transaction sequence and sends a first lock release message to the lock master upon completion of the atomic transaction sequence. The lock master sends a second lock release message to all processors upon receiving the first lock release message from the first processor. | 2015-04-30 |
20150120977 | INTER-COMPONENT COMMUNICATION INCLUDING SLAVE COMPONENT INITIATED TRANSACTION - Component apparatuses with inter-component communication capabilities, and system having such component apparatuses are disclosed herein. In embodiments, such a component may include a number of control pins including a clock pin, a number of data pins, and a logic unit. The logic unit may be configured to receive a clock signal from another component through the clock pin, to provide an alert signal to the other component through a selected one of the control and data pins to initiate a transaction with the other component, to receive in response to the alert signal from the other component through the data pins a status request to determine nature of the transaction, and to provide in response to the status request to the other component through the data pins a status to indicate the nature of the transaction. The provision of the alert signal, the receipt of the status request and the provision of the status may be in reference to the clock signal. Other embodiments may be disclosed or claimed. | 2015-04-30 |
20150120978 | INPUT/OUTPUT MEMORY MAP UNIT AND NORTHBRIDGE - The present invention provides for page table access and dirty bit management in hardware via a new atomic test[0] and OR and Mask. The present invention also provides for a gasket that enables ACE to CCI translations. This gasket further provides request translation between ACE and CCI, deadlock avoidance for victim and probe collision, ARM barrier handling, and power management interactions. The present invention also provides a solution for ARM victim/probe collision handling which deadlocks the unified northbridge. These solutions includes a dedicated writeback virtual channel, probes for IO requests using 4-hop protocol, and a WrBack Reorder Ability in MCT where victims update older requests with data as they pass the requests. | 2015-04-30 |
20150120979 | METHOD OF CONTROLLING COMPUTER AND COMPUTER - A computer, having: a first OS to which a first processor core group is allocated; and a virtualization module to which a second processor core group is allocated, wherein a virtualization module registers interrupt handler processing for resetting the second processor core group, wherein a first OS has: a monitoring module for monitoring the virtualization module; and an interrupt control module for obtaining identifiers of the second processor core group at a time of booting of the virtualization module, and, when the monitoring module determines to reboot the virtualization module, issuing resetting interrupt to the processor cores of the second processor core group that are associated with the kept identifiers, wherein the second processor core group receives the resetting interrupt and executes the interrupt handler processing to reset its own processor cores, wherein the interrupt control module issues startup interrupt to the second processor core group. | 2015-04-30 |
20150120980 | PORTABLE COMPUTING DEVICE DOCKING APPARATUS - A portable computing device docking apparatus includes an input unit to input a user command, a mounting unit disposed on one side of the input unit, into which one end portion of a portable computing device is separately inserted, and a hinge unit to interconnect the input unit and the mounting unit, and selectively lock and release the portable computing device according to an angle formed by the portable computing device mounted on the mounting unit and the input unit. | 2015-04-30 |
20150120981 | Data Interface for Point-to-Point Communications Between Devices - A data interface is provided for point-to-point communications between two devices, such as a read channel and a disk controller in an HDD system. An interface for communications from a transmitting device to a receiving device comprises a data bus configured to communicate m bits of data and a corresponding n bit data tag, wherein a given n bit data tag identifies a data type of a corresponding m bits of data on the data bus. An acknowledge signal from the receiving device optionally indicates that data on the data bus has been received and that the data on the data bus can be changed to a new value. A valid flag optionally indicates when a new predefined m-bit data value and corresponding n-bit tag value are on the data bus. | 2015-04-30 |
20150120982 | MULTI-CHANNEL UNIVERSAL SERIAL BUS (USB) TO SUBRATE CHANNEL SYSTEMS AND METHODS - Multi-channel universal serial bus (USB) to subrate channel methods are disclosed. According to an aspect, a method includes providing a system comprising a USB interface and a multi-channel interface configured to communicatively connect to a plurality of subrate channels. The method also includes communicatively connecting the subrate channels with a computing device via the USB interface. Further, the method includes communicating, to the computing device, connection specifications for the subrate channels. | 2015-04-30 |
20150120983 | DIRECT MEMORY ACCESS CONTROLLER, CONTROL METHOD THEREOF, AND INFORMATION PROCESSING SYSTEM - Two channels of a main CPU channel and a sub CPU channel each including a reception channel and a transmission channel, and performing a data transfer by a DMA in accordance with a descriptor are provided, a channel switching part selects the main CPU channel or the sub CPU channel in accordance with information set at a mode setting register, and performs a switching of channels at a boundary of a packet to be transferred to thereby enable the switching of channels without interrupting a DMA operation. | 2015-04-30 |
20150120984 | MEMORY SYSTEM HAVING HIGH DATA TRANSFER EFFICIENCY AND HOST CONTROLLER - According to one embodiment, the host controller includes a register set to issue command, and a direct memory access (DMA) unit and accesses a system memory and a device. First, second, third and fourth descriptors are stored in the system memory. The first descriptor includes a set of a plurality of pointers indicating a plurality of second descriptors. Each of the second descriptors comprises the third descriptor and fourth descriptor. The third descriptor includes a command number, etc. The fourth descriptor includes information indicating addresses and sizes of a plurality of data arranged in the system memory. The DMA unit sets, in the register set, the contents of the third descriptor forming the second descriptor, from the head of the first descriptor as a start point, and transfers data between the system memory and the host controller in accordance with the contents of the fourth descriptor. | 2015-04-30 |
20150120985 | MECHANISMS FOR ELIMINATING A RACE CONDITION BETWEEN A HYPERVISOR-PERFORMED EMULATION PROCESS REQUIRING A TRANSLATION OPERATION AND A CONCURRENT TRANSLATION TABLE ENTRY INVALIDATION - Disclosed are computers and methods employing a mechanism for eliminating a race condition between a hypervisor-performed emulation process and a concurrent translation table entry invalidation. Specifically, on a host machine, a hypervisor controls any guest operating systems. In doing so, the hypervisor emulates an instruction by performing a translation operation to acquire a physical address from a virtual address and, if applicable, further from an effective address using translation table(s) (e.g., page tables and, if applicable, segment tables); accesses the physical address; and completes the instruction. During emulation, flagged address table(s) are used to eliminate the race condition. For example, upon receiving an invalidate translation instruction associated with a virtual address, a determination is made as to whether or not the virtual address appears in a flagged virtual address table and, if so, additional action is taken to prevent an error in the translation. | 2015-04-30 |
20150120986 | DELAYED AUTOMATION TO MAXIMIZE THE UTILIZATION OF READ AND WRITE CACHE - A storage module may include a non-volatile memory module and a controller that communicates with the non-volatile memory module using a communications bus. In response to receipt of a host command, the controller may generate one or more sets of context commands for communication of data on the communications bus between the controller and an area of memory. The controller may execute the sets of context commands in a cache sequence. During execution of the context commands in the cache sequence, the controller may determine an opportunity window that occurs after execution of a context command of a prior set and before execution of a context command of a current set, during which the controller may utilize the communications bus. | 2015-04-30 |
20150120987 | APPARATUSES AND METHODS FOR IDENTIFYING AN EXTREMUM VALUE STORED IN AN ARRAY OF MEMORY CELLS - The present disclosure includes apparatuses and methods related to identifying an extremum value using sensing circuitry. An example method can include determining a location of an extremum value of a set of N data values stored as vectors in a memory array. A number of operations to determine the location of the extremum value can remain constant with respect to a value of N. | 2015-04-30 |
20150120988 | Method of Accessing Data in Multi-Layer Cell Memory and Multi-Layer Cell Storage Device Using the Same - A method of accessing data in a multi-layer cell (MLC) memory includes using single-layer cell (SLC) configuration to transfer a portion of a plurality of memory units in the MLC memory to an SLC area to form a plurality of MLC memory units and a plurality of SLC memory units; storing data in the plurality of SLC memory units when the data is assigned to be stored in an MLC memory unit; mapping the MLC memory unit to the SLC memory units; reading the data by obtaining the data in the SLC memory units corresponding to the MLC memory unit; and reallocating the SLC memory units to use MLC configuration when an update of data is involved in the MLC memory unit or a new data is assigned to be stored in at least one of the SLC memory units. | 2015-04-30 |
20150120989 | Tracking and Utilizing Second Level Map Index for Recycling of Solid State Drive Blocks - A recycling method for a solid state drive is disclosed. The method includes selecting a logical block for recycle wherein the logical block includes a plurality of pages across a plurality of flash dies. The method also includes retrieving an address map index record associated with the logical block selected for recycle. For each particular address map index stored in the address map index record, the recycling method retrieves a set of address map entries referenced by the particular address map index, determines whether any page in the logical block is referenced by the set of address map entries, and if at least one page in the logical block is referenced by the set of address map entries, the method writes the at least one page to a different logical block. The method further includes erasing the plurality of pages in the logical block. | 2015-04-30 |
20150120990 | METHOD OF DETECTING MEMORY MODULES, MEMORY CONTROL CIRCUIT UNIT AND STORAGE APPARATUS - A method of detecting a rewritable non-volatile memory module is provided. The method includes setting an output voltage of a write protect pin of a memory interface as a first logic level, giving a read status command and receiving a first status message. The method further includes determining whether a corresponding bit data in the first status message conforms to a status corresponding to the first logic level; and if yes, identifying that the rewritable non-volatile memory module has connected to the memory interface. | 2015-04-30 |
20150120991 | DATA PROCESSING SYSTEM AND OPERATING METHOD THEREOF - A data processing system includes a host device comprising an application and suitable for generating information on an attribute of the application and providing the information on the attribute of the application together with a request of the application and a data storage device suitable for writing data based on the information on the attribute of the application in response to the request of the application. | 2015-04-30 |
20150120992 | NON-VOLATILE MEMORY DEVICE, NON-VOLATILE MEMORY CONTROL DEVICE, AND NON-VOLATILE MEMORY CONTROL METHOD - A non-volatile memory device includes a non-volatile memory unit, a control unit, and an interface. The control unit receives a write request, determines whether data is an object of a write of sequential management when a write size of the received data is smaller than a management unit of erasure, performs first write processing in which the received data smaller than the management unit of the erasure is sequentially written when the data is the object of the write of the sequential management, and performs second write processing in which the received data smaller than the management unit of the erasure is written by the management unit of the write when the data is not the object of the write of the sequential management. | 2015-04-30 |
20150120993 | INFORMATION PROCESSING APPARATUS, STORAGE DEVICE CONTROL CIRCUIT, AND STORAGE DEVICE CONTROL METHOD - Channels have NAND flash memories. Data processing units perform data processing on the NAND flash memories by using the channels according to a data processing command from a CPU. A configuration register stores therein a configuration of groups into which the channels are classified based on processing performances of the respective channels, and stores therein assignments of the data processing units that perform data processing by using the channels contained in each of the groups. The group identifying unit selects a group for performing data processing from among the groups stored in the configuration register based on the data processing command from the CPU, and causes the data processing unit assigned to the selected group to perform the data processing. | 2015-04-30 |
20150120994 | AUTOMATED SPACE MANAGEMENT FOR SERVER FLASH CACHE - Techniques for automatically allocating space in a flash storage-based cache are provided. In one embodiment, a computer system collects I/O trace logs for a plurality of virtual machines or a plurality of virtual disks and determines cache utility models for the plurality of virtual machines or the plurality of virtual disks based on the I/O trace logs. The cache utility model for each virtual machine or each virtual disk defines an expected utility of allocating space in the flash storage-based cache to the virtual machine or the virtual disk over a range of different cache allocation sizes. The computer system then calculates target cache allocation sizes for the plurality of virtual machines or the plurality of virtual disks based on the cache utility models and allocates space in the flash storage-based cache based on the target cache allocation sizes. | 2015-04-30 |
20150120995 | DATA STORAGE DEVICE STARTUP - When a read command is received from a host requesting data stored on a disk of a Data Storage Device (DSD), it is determined whether the DSD is in a startup period and whether the requested data is stored in a solid state memory of the DSD. The requested data is designated for storage in the solid state memory if it is determined that the DSD is in the startup period and the requested data is not stored in the solid state memory. | 2015-04-30 |
20150120996 | TRACING MECHANISM FOR RECORDING SHARED MEMORY INTERLEAVINGS ON MULTI-CORE PROCESSORS - A memory race recorder (MRR) is provided. The MRR includes a multi-core processor having a relaxed memory consistency model, an extension to the multi-core processor, the extension to store chunks, the chunk having a chunk size (CS) and an instruction count (IC), and a plurality of cores to execute instructions. The plurality of cores executes load/store instructions to/from a store buffer (STB) and a simulated memory to store the value when the value is not in the STB. The oldest value in the STB is transferred to the simulated memory when the IC is equal to zero and the CS is greater than zero. The MRR logs a trace entry comprising the CS, the IC, and a global timestamp, the global timestamp proving a total order across all logged chunks. | 2015-04-30 |
20150120997 | SEMICONDUCTOR DEVICE INCLUDING REPEATER CIRCUIT FOR MAIN DATA LINE - A semiconductor memory disclosed in this disclosure includes first and second memory cell arrays, a first main data line that transfers the read data read from the first memory cell array, a second main data line that transfers the read data read from the second memory cell array, a main amplifier coupled to the second main data line, and a repeater circuit coupled to the first main data line and the second main data line. | 2015-04-30 |
20150120998 | METHOD, APPARATUS AND SYSTEM FOR DYNAMICALLY CONTROLLING AN ADDRESSING MODE FOR A CACHE MEMORY - In an embodiment, a first portion of a cache memory is associated with a first core. This first cache memory portion is of a distributed cache memory, and may be dynamically controlled to be one of a private cache memory for the first core and a shared cache memory shared by a plurality of cores (including the first core) according to an addressing mode, which itself is dynamically controllable. Other embodiments are described and claimed. | 2015-04-30 |
20150120999 | MEMORY SYSTEM AND METHOD FOR OPERATING THE SAME - A memory system may include a memory including a cell array having a plurality of word lines and an address storage unit that stores an address in response to a capture command, wherein the memory sequentially refreshes the word lines in response to a refresh command at a set cycle, and refreshes a word line corresponding to the stored address in response to the refresh command when the address is stored in the address storage unit; and a memory controller transmitting the refresh command to the memory at the set cycle when a word line satisfying one or more of conditions that the number of activation times is equal to or more than a reference number and an activation frequency is equal to or more than a reference frequency is detected, and transmitting the capture command and an address of the detected word line to the memory. | 2015-04-30 |