Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


23rd week of 2013 patent applcation highlights part 58
Patent application numberTitlePublished
20130144997SYSTEM AND METHOD FOR MANAGING SERVER CONFIGURATIONS - Disclosed are systems and method for synchronizing configuration parameters on a server with a database of stored configuration parameters. One such method includes updating an application configuration parameter on a network server. The update occurs in response to receiving an update of a corresponding stored application configuration parameter in a database. The update is initiated by a particular customer of a web hosting provider. Each application configuration parameter defines at least in part a quantity of a resource on the server available to the particular customer of a web hosting provider.2013-06-06
20130144998METHODS FOR AUTO-CONFIGURING A ROUTER ON AN IP SUBNET - An autoconfiguring data router is connected to a communications network subnet having a second network data router. The autoconfiguring data router includes a configuration determination module that determines configuration attributes for operably connecting the autoconfiguring data router to the subnet, and an autoconfiguration module that configures the autoconfiguring data router according to the configuration attributes so that the autoconfiguring data router is operably connected to the subnet.2013-06-06
20130144999METADATA DRIVEN AUTOMATIC DEPLOYMENT OF DISTRIBUTED SERVER SYSTEMS - Automatic and reliable deployment of system topology to computing devices within an enhanced communication system is provided. Specific roles and features associated with individual devices such as servers are defined in a centrally managed topology document, which is replicated to devices to be configured along with one or more modules for performing local configuration. Upon deployment, the module(s) determine a local device configuration, a desired configuration for the device, and update the device's configuration installing and activating roles and features assigned to the device by the topology document. Feedback regarding the results of the configuration is provided to a central management store such that administration can monitor status of devices within the system. Modifications to the assigned roles and prerequisites for supporting those roles are made dynamically through the same mechanism as system topology changes.2013-06-06
20130145000METHOD AND SYSTEM FOR PROVISIONING DEVICES IN A USER NETWORK IDENTITY ADDRESS PROVISIONING SERVER - A number of computing devices associated with a particular user have a network capability between them for management and control, said capability to enable these devices, running on different, physically distributed hardware, to interwork securely and privately.2013-06-06
20130145001UTILITY-BASED MODEL FOR CACHING PROGRAMS IN A CONTENT DELIVERY NETWORK - Methods, devices, and storage media for receiving one or more utility preferences that indicate one or more criteria for measuring one or more utilities of programs; calculating utility solutions for the programs based on the one or more utility preferences; selecting one or more programs to store for at least one of downloading or streaming based on the utility solutions; and storing the one or more programs for downloading or streaming to users.2013-06-06
20130145002Enabling Co-Existence of Hosts or Virtual Machines with Identical Addresses - A method, an apparatus and an article of manufacture for enabling co-existence of multiple machines with identical addresses within a single data center network. The method includes assigning a unique pseudo identifier to each machine in the network that can be used for routing a packet to a destination machine, replacing a sender media access control address on an address resolution protocol request with a pseudo identifier of the sender at an edge network switch, retrieving a private network identifier from a mapping table based on the sender pseudo identifier and returning a pseudo identifier for the destination address based on the private network identifier, and replacing the pseudo identifier of the destination address with an actual identifier at a destination edge network switch for routing the packet to the destination machine.2013-06-06
20130145003Constructing A Logical, Regular Axis Topology From An Irregular Topology - Constructing a logical regular topology from an irregular topology including, for each axial dimension and recursively, for each compute node in a subcommunicator until returning to a first node: adding to a logical line of the axial dimension a neighbor specified in a nearest neighbor list; calling the added compute node; determining, by the called node, whether any neighbor in the node's nearest neighbor list is available to add to the logical line; if a neighbor in the called compute node's nearest neighbor list is available to add to the logical line, adding, by the called compute node to the logical line, any neighbor in the called compute node's nearest neighbor list for the axial dimension not already added to the logical line; and, if no neighbor in the called compute node's nearest neighbor list is available to add to the logical line, returning to the calling compute node.2013-06-06
20130145004PROVISIONING USING PRESENCE DETECTION - Methods, systems, and computer program products may provision a software application on a computer in a computer system. A software provisioning method may include receiving by a server on a computer system information for provisioning a software application on a computer on the computer system, obtaining by the server one or more indicia of user presence for the computer, determining by the server a time interval for provisioning the computer based upon the obtained indicia of user presence, and provisioning the computer by the server during the determined time interval.2013-06-06
20130145005METHOD AND APPARATUS OF PERFORMING SIMULTANEOUS MULTI-AGENT ACCESS FOR COMMAND EXECUTION THROUGH A SINGLE CLIENT - Disclosed are an apparatus and method of managing a multiple agents via a session client. One example method of operation may include selecting multiple endpoint devices to manage, establishing a connection to a server, and identifying at least two agent identifiers identifying multiple agents corresponding to the multiple endpoint devices. The method may also include transmitting a session setup command to the server including the at least two agent identifiers and receiving a confirmation that a session has been established between the session client and the multiple agents of the multiple endpoint devices.2013-06-06
20130145006MULTI-TENANT INFRASTRUCTURE - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for providing a multi-tenant infrastructure. In one aspect, a method includes establishing a plurality of tenant containers for a plurality of tenants, each tenant container being a logical separation of data and functionality for a multi-tenant application, each tenant container being isolated from the other tenant containers. A request is received from a client device. The request is determined to be associated with one of the tenant containers. The request is directed to the tenant container associated with the request.2013-06-06
20130145007REMOTE MOBILE DEVICE MANAGEMENT - Remote mobile device management is provided. a master user account is established based on a request from a master user and a request to associate a remote mobile device with the master user account is received. The remote mobile device is associated with the master user account and management information is received from the master user account that is associated with the remote mobile device including restriction activation information. An indication of movement is received when the remote mobile device is moving at a speed above a restriction threshold and the restriction or monitoring of at least one device capability of the remote mobile device is provided based on the restriction activation information and the indication of movement. An indication of deceleration is received when the remote mobile device has decelerated and the restoration of the at least one device capability is provided based on the indication of deceleration.2013-06-06
20130145008Enabling Co-Existence of Hosts or Virtual Machines with Identical Addresses - A method for enabling co-existence of multiple machines with identical addresses within a single data center network. The method includes assigning a unique pseudo identifier to each machine in the network that can be used for routing a packet to a destination machine, replacing a sender media access control address on an address resolution protocol request with a pseudo identifier of the sender at an edge network switch, retrieving a private network identifier from a mapping table based on the sender pseudo identifier and returning a pseudo identifier for the destination address based on the private network identifier, and replacing the pseudo identifier of the destination address with an actual identifier at a destination edge network switch for routing the packet to the destination machine.2013-06-06
20130145009METHOD AND SYSTEM FOR DYNAMIC APPLICATION LAYER GATEWAYS - A method and system are disclosed for providing functionality on a network. A mobile agent moves from a first node to a target node and, at the target node, performs as an application layer gateway.2013-06-06
20130145010Mobile Device And Method To Utilize The Failover Mechanism For Fault Tolerance Provided For Mobile Traffic Management And Network/Device Resource - A mobile device and method to utilize the failover mechanism for fault tolerance provided for mobile traffic management are disclosed. One embodiment includes a method, which may be implemented on a system or a mobile device which responsive to detecting a failed attempt to connect to a proxy server, determines whether the proxy server is reachable. In one embodiment, in response to determining that the proxy server is reachable, initiates a failover process by reconfiguring DNS routing rules.2013-06-06
20130145011SYSTEM FOR USER SETUP IN A USER NETWORK IDENTITY ADDRESS PROVISIONING SERVER - A number of computing devices associated with a particular user have a network capability between them for management and control, said capability to enable these devices, running on different, physically distributed hardware, to interwork securely and privately.2013-06-06
20130145012CONSTRUCTING A LOGICAL, REGULAR AXIS TOPOLOGY FROM AN IRREGULAR TOPOLOGY - Constructing a logical regular topology from an irregular topology including, for each axial dimension and recursively, for each compute node in a subcommunicator until returning to a first node: adding to a logical line of the axial dimension a neighbor specified in a nearest neighbor list; calling the added compute node; determining, by the called node, whether any neighbor in the node's nearest neighbor list is available to add to the logical line; if a neighbor in the called compute node's nearest neighbor list is available to add to the logical line, adding, by the called compute node to the logical line, any neighbor in the called compute node's nearest neighbor list for the axial dimension not already added to the logical line; and, if no neighbor in the called compute node's nearest neighbor list is available to add to the logical line, returning to the calling compute node.2013-06-06
20130145013COMMUNICATION TERMINAL AND CONTENT UPDATE METHOD - A communication terminal and a content update method in a communication terminal that can update content at the optimum time according to the content type, the communication terminal includes a content storage unit that stores content containing first time information indicating the maximum time unit of information representing a time, a terminal information storage unit that stores terminal information containing second time information indicating a time unit shorter than the maximum time unit and assigned to each communication terminal, a time determination unit that determines whether it has reached a time consisting of the first and the second time information, and a content update unit that updates content when the time determination unit determines that it has reached a time consisting of the first and the second time information, thereby delivering content at the optimum time according to the content type.2013-06-06
20130145014PROVIDING NOTIFICATION OF DOCUMENT REPOSITORY EVENTS TO EXTERNAL SYSTEMS - Remote event receivers can register with a document repository computing system to receive notifications of events occurring at a document repository. The remote event receivers may register to receive notifications synchronously, whereby the remote event receivers can provide a response to the notification prior to the occurrence of the event, or asynchronously, whereby the remote event receivers provide no response. Synchronous remote event receivers can also specify in a response to the notification that the event should be canceled or may specify properties that should be changed. Remote event receivers can be pre-event receivers that receive notifications prior to the occurrence of an event, or post-event receivers that receive notifications following the event. When an event is to occur at the document repository, notifications are provided to the pre-event remote event receivers. Once the event has occurred, notifications are provided to the post-event remote event receivers.2013-06-06
20130145015OVERHEAD MANAGEMENT FOR EVENT TRACING - The present invention relates to managing data generated by software transactions, such as event tracing software. In one embodiment, data generated by event tracing software is monitored. The throughput of the data generated may then be modulated based on various criteria, such as a target data rate. The throughput target may be specified on a per-system basis or individual basis. Based on the throughput, the level of detail recorded is modulated. Individual processes may determine a limit or quota depending on their contribution to the throughput. In one embodiment, the method calls for a trace are modified with different property specifications to meet a desired throughput of event tracing data.2013-06-06
20130145016METHODS AND APPARATUSES FOR DOMAIN MANAGEMENT - The distribution of media content within a subscriber domain is controlled at a server. A subscriber domain is defined as an association including one or more subscriber devices, which can be protected with different Digital Rights Management (DRM) systems and one or more gateways, which can source different media content, with different format using different content distribution networks. The server is responsible for distributing, authorizing and monitoring media content within a subscriber domain of devices.2013-06-06
20130145017OPTIMIZATION OF MOBILE TRAFFIC DIRECTED TO PRIVATE NETWORKS AND OPERATOR CONFIGURABILITY THEREOF - Systems and methods for optimization of mobile traffic directed to private networks and operator configurability thereof are disclosed. One embodiment includes a method, which may be implemented on a system, for identifying a network accessed by mobile traffic at a mobile device, identifying an operator of the network, and/or determining whether the mobile traffic is directed towards a private or public network. In response to determining that the mobile traffic is directed towards a private network, determining whether the private network is owned by or operated by the operator. Optimization of the mobile traffic is performed based on policies set by the operator. In general, the system maintains and/or enforces different sets of policies regarding mobile traffic optimization set by different and multiple operators.2013-06-06
20130145018OPERATION DELAY MONITORING METHOD, OPERATION MANAGEMENT APPARATUS, AND OPERATION MANAGEMENT PROGRAM - A delay in a configuration changing operation of a computer system including a manual procedure and an automatic procedure is detected.2013-06-06
20130145019METHOD AND APPARATUS FOR OPTIMIZING RESPONSE TIME TO EVENTS IN QUEUE - A system for optimizing response time to events or representations thereof waiting in a queue has a first server having access to the queue; a software application running on the first server; and a second server accessible from the first server, the second server containing rules governing the optimization. In a preferred embodiment, the software application at least periodically accesses the queue and parses certain ones of events or tokens in the queue and compares the parsed results against rules accessed from the second server in order to determine a measure of disposal time for each parsed event wherein if the determined measure is sufficiently low for one or more of the parsed events, those one or more events are modified to a reflect a higher priority state than originally assigned enabling faster treatment of those events resulting in relief from those events to the queue system load.2013-06-06
20130145020Method and System for Identifying Website Visitors - A website server computer hosting a website can identify a visitor to the website by using information provided by a visitor server computer that interacts with the visitor. The information provided by the server computer, in some embodiments, can be a combination of an IP address and characteristics of a computing device from where the visitor visits the website. In some embodiments, the IP address of the visitor server computer is used. In embodiments where the visitor may be sharing the computing device with other users, the characteristics may include at least one characteristic that is uniquely associated with the visitor. The website server computer can use a visitor identifier thus generated to start tracking the pages that the visitor requests during the session and can generate and customize pages for the visitor by using characteristics originated from the visitor.2013-06-06
20130145021Intelligent Network Alarm Status Monitoring - Systems and methods enable automated, transparent and efficiently scalable alarm monitoring, display, notification, redundant alarm suppression and root-defect resolution in telecom networks, resulting in transparent visibility with intuitive navigation from a network management GUI down to the network element hardware status registers of concern. A logical alarm propagation hierarchy enables efficient root defect resolution in large networks with extensive amounts of individual defects capable of causing alarms, based on hyperlinked navigation from top-level NE alarm indicators down to bottom-level defect status registers. Un-monitored defects (e.g., non-service affecting defects) are prevented from causing unnecessary alarms, and alerts are produced to notify the network operations staff of new NE alarms. Techniques are used to minimize the frequency of such alarm notifications while providing a comprehensive and clear view of the network alarm status, even under heavy loads of defect activity.2013-06-06
20130145022METHODS AND APPARATUS TO DETERMINE MEDIA IMPRESSIONS - Examples to determine media impressions are disclosed. An example method includes detecting a cookie identifier established by a database proprietor at a computing device, determining an impression of media, wherein the impression occurs after the cookie identifier is established, determining a first panelist identifier associated with the impression based on the cookie identifier, determining a second panelist identifier associated with the impression based on determination of a user identity by a panelist meter associated with the computing device, and storing an adjustment factor determined by comparing the first panelist identifier and the second panelist identifier.2013-06-06
20130145023PERSONALIZATION OF INFORMATION CONTENT BY MONITORING NETWORK TRAFFIC - A home network system that personalizes the selection of information content in accordance with an interest of a user of the network is disclosed. More specifically, a method and apparatus are described for automatically presenting an information content of interest to the user, being provided by an Internet site external to the network. The contents of interest may be determined in accordance with an access pattern of the user or a frequency of the use of particular topic in the content.2013-06-06
20130145024METHOD AND APPARATUS FOR TRANSFER OF RADIO RESOURCE ALLOCATION - An approach is provided for initiating a device action in response to determining context information associated with a device, a user of the device, or a combination thereof. Activity information on at least one of the device and one or more other devices is monitored by a context processing platform. The context processing platform defines a context based on the activity information. An action is then executed by the device or the one or more other devices based on the determined context.2013-06-06
20130145025PROGRAMMABLE CONTROLLER - The present invention includes a connection unit that performs reception of a request from an upper-level device and transmission of a response thereto via the established connection for each application; a communication buffer that temporarily stores requests received by the connection unit for each connection; a system main unit that reads a requested device value from the input/output memory area; a priority storage area that stores setting of a priority level for each connection; and a communication scheduling unit that successively obtains requests from the communication buffer, transfers the obtained request to the system main unit, and transfers the device value read by the system main unit to the connection unit as a response, wherein the communication scheduling unit obtains requests with a higher frequency for a connection for which a higher priority is set in the priority storage area.2013-06-06
20130145026SIGNAL MANAGER - A signal manager includes a signal monitor [2013-06-06
20130145027REGULATORY COMPLIANCE ACROSS DIVERSE ENTITIES - Regulatory compliance techniques are provided for dynamically modifying access to data based on the jurisdiction a user seeking access to the data is located within. Dynamically modifying access to data provides for a more efficient and accurate solution to regulatory compliance issues faced when hosting data in a central repository. Users can be notified when their access to data is modified due to a compliance issue. In addition, an audit history can be associated with data packets that allow an administrator or the like to view the history of data packet access. Finally, signatures associated with a data packet can be used to search data store(s) to track access to information within the data packet that may have been subsequently modified.2013-06-06
20130145028Access Control List - A system, computer-implemented method, and computer-readable medium manage access control for a magazine edition. A set of roles are assembled that correspond to a principal. Each role defines a set of rules that specify access permissions to the magazine edition, defined at an edition level, a section level and a post level. A set of user access permissions is built, based on the access permissions. An access request is received from the principal, wherein the access request requires a set of necessary access permissions to be granted, defined at an edition level, a section level and a post level. It is determined if the set of user access permissions provides the necessary access permissions. When the user access permissions provide the necessary access permissions, the access request is granted, and otherwise the necessary access permissions, the access request is denied.2013-06-06
20130145029SYSTEM AND METHOD FOR PROVIDING THRESHOLD-BASED ACCESS TO COMPUTE RESOURCES - The invention relates to systems, methods and computer-readable media for controlling access to compute resources in a compute environment such as a cluster or a grid. The method of providing conditional access to a compute environment comprises associating a required service level threshold with a compute environment, associating a service level with a requestor, receiving a request for access to the compute environment from the requestor; and, if the service level of the requestor meets the specified service level threshold, then allowing access to the compute resources. The threshold-based access may be enforced by reservations, policies or some other method.2013-06-06
20130145030CONTROL DEVICE, TERMINAL APPARATUS, AND COMMUNICATION SYSTEM - A control device includes: an authentication unit that performs authentication of a terminal apparatus to be connected to the control device; a main control signal transmitting unit that transmits, at first transmission intervals, a main control signal that is a control signal including information for performing data communication in synchronization with the terminal apparatus; a sub-control signal transmitting unit that transmits a sub-control signal notifying the terminal apparatus that the authentication unit is in a state of accepting a request for authentication; and a signal control unit that controls the main control signal transmitting unit and the sub-control signal transmitting unit, wherein the signal control unit causes the sub-control signal transmitting unit to transmit the sub-control signal at second transmission intervals shorter than the first transmission intervals when it is determined that the authentication unit is in the state of accepting the request for authentication.2013-06-06
20130145031AGILE HOSTPOOL ALLOCATOR - A stream application may use small chunks of executable code configured to process data tuples flowing into a processing element. A scheduler allocates the processing elements to individual compute nodes or hosts for execution. However, the stream application may assign various constraints that stipulate which hosts are suitable for a particular processing element. To assign hosts to processing elements such that the constraints are satisfied, the scheduler may use hostpools associated with the processing elements. Once a host is identified that satisfies the constraints, it may be pinned at a particular index within the hostpool.2013-06-06
20130145032CANDIDATE SET SOLVER WITH USER ADVICE - A stream application uses small chunks of executable code configured to process data tuples flowing into a processing element. A scheduler allocates the processing elements to individual compute nodes or hosts for execution. However, the stream application may assign various constraints that stipulate which hosts are suitable for a particular processing element. If a host meets the constraints, it may be categorized as an unconditional candidate host. In addition, the scheduler may also track conditional candidate hosts that would be suitable for the processing element if a certain user action is performed—e.g., modifying a constraint, removing a constraint, modifying a stream element, and the like. The list of conditional candidate hosts may then be displayed to the user who can choose to perform the one or more actions to change the conditional candidate host to an unconditional candidate host for the processing element.2013-06-06
20130145033AUTOMATIC CLOUD TEMPLATE APPROVAL - Systems, methods, and computer-readable and executable instructions are provided for automatic cloud template approval. Automatic cloud template approval can include mapping a request to a chargeback package of a user, the request being for cloud service including a plurality of cloud service components. The automatic cloud template approval can include determining if the request is within the chargeback package of the user based on each of the plurality of cloud service components and, in response to the request being within the chargeback package of the user, automatically approving a cloud template to allocate the cloud service requested by the user. After approval resources will be allocated based on the availability, else resource analysis will be done and allocation will be done appropriately.2013-06-06
20130145034AGILE HOSTPOOL ALLOCATOR - A stream application may use small chunks of executable code configured to process data tuples flowing into a processing element. A scheduler allocates the processing elements to individual compute nodes or hosts for execution. However, the stream application may assign various constraints that stipulate which hosts are suitable for a particular processing element. To assign hosts to processing elements such that the constraints are satisfied, the scheduler may use hostpools associated with the processing elements. Once a host is identified that satisfies the constraints, it may be pinned at a particular index within the hostpool.2013-06-06
20130145035TCP PROCESSING FOR DEVICES - A data processing system comprising: a host processing device supporting a host transport engine operable to establish one or more transport streams over a network with a remote peer, the host transport engine maintaining state for each transport stream; and device hardware comprising: a device application; a device transport engine operable to perform transport processing of a transport stream on behalf of the device application; wherein the host transport engine is configured to, on establishing a first transport stream for termination at the device application, pass sufficient state to the device transport engine so as to permit the device transport engine to perform transport processing of the first transport stream.2013-06-06
20130145036CONNECTION FORWARDING - Two or more network traffic processors connected with the same LAN and WAN are identified as neighbors. Neighboring network traffic processors cooperate to overcome asymmetric routing, thereby ensuring that related sequences of network traffic are processed by the same network proxy. A network proxy can be included in a network traffic processor or as a standalone unit. A network traffic processor that intercepts a new connection initiation by a client assigns a network proxy to handle all messages associated with that connection. The network traffic processor conveys connection information to neighboring network traffic processors. The neighboring network traffic processors use the connection information to redirect network traffic associated with the connection to the assigned network proxy, thereby overcoming the effects of asymmetric routing. The assigned network proxy handles redirected network traffic in much the same way that it would handle network traffic received directly.2013-06-06
20130145037UNICAST/MULTICAST MEDIA EDGE PROXY WITH FAST CHANNEL SWITCHING - A system, method, and media edge proxy, MEP, for providing media data such as Internet Protocol Television, IPTV, or Internet radio channels to a media client. The MEP obtains the media data from a media server utilizing a temporary unicast connection and provides the media data obtained from the server to the media client for an initial time period. Upon determining that the initial time period has expired, the MEP obtains the media data via multicast from a multicast router, provides the media data obtained from the router to the media client, and releases the temporary unicast connection. The invention reduces channel switching delay and thus improves quality-of-experience for the end-user. The invention also avoids excessive IGMP JOIN/LEAVE signaling when a user switches quickly through channels.2013-06-06
20130145038Method and system for establishing session - A method for establishing a session is disclosed, in which the first policy server sends a request message to the second policy server when needing to establish the session with the second policy server, for requesting the second policy server to initiate and establish a session with the first policy server; the second policy server initiates and establishes the session with the first policy server, based on the request message. A system for establishing a session is also disclosed. With the disclosure, even if the first policy server cannot establish a session with the second policy server, it may send a request to the second policy server, for requesting the second policy server to establish the session. Therefore, the session is established more flexibly. In addition, in the case that the session established by the second policy server is applicable to policy control, the effectiveness of session establishment is improved.2013-06-06
20130145039SYSTEM AND METHOD FOR MULTIPLE DATA CHANNEL TRANSFER USING A SINGLE DATA STREAM - A number of channels of data, including audio, image, text, and support data are collected at one or more centralized servers. The individual channels are edited and processed for content and format, including the deletion and insertion of advertising content and markers to indicate locations for additional content. These channels are then sent to a plurality of transmission servers for processing one or more of the channels including the insertion of content at designated markers and the combination of the channels of data into a single, packetized data transfer stream. The transmission servers broadcast the data transfer stream to a plurality of receiving units which de-packetize the original data channels and present any selected channel to the user of the receiving unit. The receiving units send status information back to the centralized servers where the data is processed and analyzed to evaluate the present and future use of advertisements.2013-06-06
20130145040HOST-BASED INTELLIGENT RESULTS RELATED TO A CHARACTER STREAM - Information may be presented to a user by using a first application to receive a character stream of one or more noncompletion characters. The noncompletion characters indicate that additional characters may be received. The character stream is exchanged with a host that analyzes the character stream to generate results that are responsive to the user's predicted interest. Results are received and displayed so that the user may select one of the results to launch a code segment related to the selected result.2013-06-06
20130145041Optimizing Timing Packet Transport - The invention relates to networking in general and in particular to an improved packet timing transport mechanism. The present invention provides a method of optimizing timing packet transport in a network comprising a first network node connected to a second network node. The method comprises forwarding a timing packet received at the first network node to the second network node, and transmitting the timing packet from the second network node a pre-determined duration K after receiving the timing packet at the first network node.2013-06-06
20130145042Proximity Detection for Media Proxies - A method of detecting proximity between a media proxy and a client uses a proximity probe to query a plurality of media proxies, forcing the media proxies to respond to a proximity server. The proximity server uses an algorithm to determine which media proxy is closest to the client based on the responses. In an alternate embodiment, the same sorts of proximity probes may be used to determine if two media endpoints have a direct connection such that they may bypass a media proxy.2013-06-06
20130145043MAPPING NETWORK ADDRESSES TO GEOGRAPHICAL LOCATIONS - A network address mapping system is described. The network address mapping system can identify a set of Web pages, collects information from the Web pages indicating geographical locations (“geolocations”), and correlate the geolocations with the network addresses from which the identified Web pages are served. The collected information can be weighted based on various factors, such as its relative position in a Web page. The collected information can then be used to identify a geolocation. The network mapping system can deduce geolocations for portions of ranges of network addresses based on the score, and can infer geolocations for other portions based on the deduced geolocations. This mapping can then be stored in a database and provided as a geomapping service. The network address mapping system is able to map network addresses to geographical locations. Thereafter, when a user's client computing device accesses a Web server, the Web server can easily and accurately determine a geographical location by querying the database storing the mapping or a geomapping service.2013-06-06
20130145044Discovering Security Devices Located on a Call Path and Extending Bindings at those Discovered Security Devices - In one embodiment, an endpoint elicits a pattern of STUN responses to identify security devices located on a call path. The endpoint then uses address information from the identified security devices to establish an efficient media flow with a remote endpoint. The endpoint can optimize the number of network devices and network paths that process the endpoint's keepalive message. Additionally, the endpoint may request custom inactivity timeouts with each of the identified security devices for reducing bandwidth consumed by keepalive traffic.2013-06-06
20130145045SYSTEMS AND METHODS FOR MANAGING NETWORK ADDRESS INFORMATION - Systems, methods and apparatus for managing network address information. In some embodiments, an appropriate address authority is queried to obtain information useful for address mapping. For example, the address authority may be selected by determining whether an address to be mapped is within one or more blocks of addresses for which the address authority is authoritative. In some further embodiments, address mapping information may be distributed from an address authority to a network device, so that the network device may perform address mapping using locally available information.2013-06-06
20130145046SYSTEM FOR COMMUNICATING BETWEEN A PLURALITY OF REMOTE ANALYTICAL INSTRUMENTS - A method for allowing communication between a remote analytical instrument and a client component is provided. The method includes communicating a first software message in a first message format from a client component to a first connectivity driver, translating the first software message from the first message format to the second message format using the first connectivity driver, and communicating the software messages in the second message format directly to the first remote analytical instrument from the first connectivity driver. The first software message relates to the operation of a first remote analytical instrument. The first software message is selected from a standardized command set. The first remote analytical instrument is configured to receive messages in a second message format different than the first message format which are capable of inducing operation of the first remote analytical instrument.2013-06-06
20130145047Flow-Based Compression Management - Flow-based data compression is achieved by selecting which of a set flows are compressed, which packets within each flow are compressed, and the level of effort applied to compress each packet. Compression scheduling across multiple flows excludes certain packets in respective flows from compression by way of skip patterns in a table or that are generated by a geometrically progressive skip scheme. Compression scheduling may include adjusting the level of compression effort.2013-06-06
20130145048System and Method Automatically of Personalized Media Device Selection and Data Management in Smart Media Cloud Environment - The disclosure relates to a system, and a method, for automatically selecting a personal media apparatus and managing data under a smart media cloud environment. Specifically, the system, and the method, for automatically selecting a personal media apparatus and managing data under a smart media cloud environment, provide functions of determining the degree of control of a device and the automatic conversion of media service between a smart media contents and a cloud media contents under a private network environment by means of automatically selecting and controlling, in accordance with a media contents, a variety of output device under UPnP and DLNA environments, and under the structure of converting a cloud media streaming data with a media renderer connected in a smart device.2013-06-06
20130145049MECHANISM FOR CLOCK SYNCHRONIZATION - A method and apparatus for synchronizing time between a master device and a target device arranged across a network, wherein the target device communicates to the master device through a PCIe interconnect includes transmitting a first message at a first time from the master device to the target device, the first message including a message indicator; and receiving a reply message at a subsequent time from the target device to the master device, the reply message including the message indicator.2013-06-06
20130145050WIRELESS DOCKING - Systems, methods, and devices are disclosed that identify a first peripheral and a second peripheral, receive information from the first peripheral and the second peripheral, communicate the information received from the first peripheral to the second peripheral, and communicate the information received from the second peripheral to the first peripheral. The information communicated to the first and second peripherals allow the first and second peripherals to communicate directly with one another.2013-06-06
20130145051Direct Device Assignment - A system is enabled for configuring an IOMMU to provide direct access to system memory data by at least one I/O device/peripheral. Further, the IOMMU is configured to pass a pointer to at least one I/O device without having to translate the pointer. Further, commands are sent from a process within a guest operating system (OS) directly to a peripheral without intervention from a hypervisor. Further, the IOMMU is configured to grant peripherals access permissions to memory blocks to maintain isolation among peripherals.2013-06-06
20130145052Method and a Portable Computing Device (PCD) For Exposing a Peripheral Component Interface Express (PCIE) Coupled Device to an Operating System Operable on the PCD - In a portable computing device having a system-on-chip (SoC) Acorn RISC Machine (ARM)-based resource architecture, a peripheral component interconnect express (PCIe) bus is used to insert PCIe device memory into system memory absent a PCIe driver. During a PCIe initialization, the contents of PCIe base address registers (BARs) are mapped or otherwise updated to coincide with values assigned to the PCIe device in the advanced configuration and power interface (ACPI) tables.2013-06-06
20130145053METHOD AND SYSTEM FOR RECOGNIZING ACCESSORY IN PORTABLE TERMINAL - A method and a system for recognizing an accessory in a portable terminal are provided. The system for the recognizing of the accessory includes the accessory which is connected to a portable terminal through a first Universal Serial Bus (USB) interface unit, and an auxiliary accessory connected to the accessory through a second USB interface unit or a ear jack interface unit, wherein the portable terminal senses a connection of the auxiliary accessory to the accessory according to a voltage variation of an identification terminal of a third accessory USB interface unit which is connected to the first USB interface unit.2013-06-06
20130145054SUPERVISING A DATA STORAGE SYSTEM - A method and system for use in supervising a data storage system is disclosed. The status of an operational feature in the data storage system is monitored. A human perceptible signal is outputted in response to monitoring the status of the operational feature in the data storage system. The data storage system outputs the human perceptible signal locally thereto indicating the current status of the operational feature in the data storage system.2013-06-06
20130145055Peripheral Memory Management - The present system enables an input/output (I/O) device to request memory for performing a direct memory access (DMA) of system memory. Further, the system uses an input/output memory management unit (IOMMU) to determine whether or not the system memory is available. The IOMMU notifies an operating system associated with the system memory if the system memory is not available, such that the operating system allocates non-system memory for use by the I/O device to perform the DMA.2013-06-06
20130145056UTILIZING USB RESOURCES - At least one downstream interface may be configured to be simultaneously connected to both a USB 3.0 compliant device and a USB 2.0 compliant device. The interface may be used for communicating with a USB 3.0 compliant device via a downstream port and simultaneously communicating with a USB 2.0 compliant device via the downstream port.2013-06-06
20130145057COMMUNICATION BETWEEN A HOST DEVICE AND AN ACCESSORY USING MULTIPLE-ENDPOINT IDENTIFICATION - Techniques for facilitating communication between a portable media device (PMD) and an accessory via multiple communication paths. The accessory has a unique accessory identifier that it can send to the PMD upon establishing a connection via each communication path. The PMD can determine whether the same accessory is connected via multiple communication paths based on the accessory identifier received via each communication path. The PMD can route information to the accessory and control routing of information from the accessory based on the set of communication paths that are currently connected and can dynamically change the routing as communication paths are connected and disconnected.2013-06-06
20130145058METHOD OF OPERATING A ROUTER - A router has multiple channel inputs and multiple channel outputs and a switch core for selectively connecting at least two of the channel outputs to respective channel inputs. Each channel output is connected to an output signal path containing a FIFO register and the router is configured so that first and second channel outputs are connected to a pair of channel inputs respectively. The router configuration is changed so that the first and second channel outputs are connected to first and second channel inputs respectively. The FIFO registers in the output signal paths of the first and second channel outputs are forced to equal fullness.2013-06-06
20130145059DATA STORAGE SYSTEM WITH PRIMARY AND SECONDARY COMPRESSION ENGINES - Aspects of the subject technology relate to a data storage system controller including a host interface configured to be coupled to a host device, to receive data from the host device, and to send data to the host device. In certain aspects, the data storage system includes a primary compression engine configured to compress data received from the host device via the host interface, and a secondary compression engine configured to decompress and compress data associated with operations internal to the data storage system. In some implementations, the data storage systems can further include a processor configured to transfer data between the host interface and the primary compression engine, between the primary compression engine and a non-volatile storage medium, between a memory and the secondary compression engine, and between the secondary compression engine and the memory. A data storage system is also provided.2013-06-06
20130145060SIGNAL COLLECTION SYSTEM AND METHOD WITH SIGNAL DELAY - An exemplary signal collection system includes a signal transmitting module, a computer, and a data collection card. The signal transmitting module includes a signal source and a delay chip. The delay chip receives a first path high-speed signal output from the signal source and transmits the first path high-speed signal to the data collection card in real time. The computer sends a delay command to the data collection card and the data collection card transfers the delay command to the delay chip. The delay chip generates a second path high-speed signal by delaying the first path high-speed signal in response to the delay command and transmits the second path high-speed signal to the data collection card. The data collection card transmits the high-speed signals output from the delay chip to the computer. A signal collection method based upon the signal collection system is also provided.2013-06-06
20130145061PERIPHERAL DEVICE MAPPING - Systems and methods related to providing peripheral device functionality is described herein. In one embodiment, a method of operating a host computing device is described. The method includes communicatively coupling with a keyboard and querying the keyboard for a descriptor. Receiving the descriptor from the keyboard, wherein the descriptor includes data representative of a language, layout, and key mappings for the keyboard. Storing the data from the descriptor at the host and publishing strings for proper translation and interpretation of input received from the keyboard.2013-06-06
20130145062UNIVERSAL SERIAL BUS PRE-DETERMINING CIRCUIT - A universal serial bus pre-determining circuit for determining whether a universal serial bus is connected to a host or a device includes an input unit, a detection unit, a processing unit, and a switch unit. The input unit is connected to the host or the device. Once the input unit is connected to the host, the detection unit will enable the host, allowing the host to generate and send a synchronous signal to the input unit. Once the input unit is connected to the device, no synchronous signal will be generated. The processing unit determines accurately whether the universal serial bus is connected to the host or the device by judging the synchronous signal.2013-06-06
20130145063Microcontroller resource sharing - A system includes one or more master modules configured to execute instructions embedded in non-transitory machine-readable media and controllable by a processor. The system also includes one or more peripheral modules that are configured to execute instructions embedded in non-transitory machine-readable media and controllable by the processor. The system also includes a system bus with instructions embedded in a non-transitory machine-readable medium and configured to allow data transfer between the processor and the one or more peripheral modules. A data processing module of the one or more peripheral modules includes a master interface and a slave interface. Both master and slave interfaces are coupled to the system bus.2013-06-06
20130145064Scalable Data Storage Architecture And Methods Of Eliminating I/O Traffic Bottlenecks - A Storage Area Network (SAN) system has host computers, front-end SAN controllers (FE_SAN) connected via a bus or network interconnect to back-end SAN controllers (BE_SAN), and physical disk drives connected via network interconnect to the BE_SANs to provide distributed high performance centrally managed storage. Described are hardware and software architectural solutions designed to eliminate I/O traffic bottlenecks, improve scalability, and reduce the overall cost of SAN systems. In an embodiment, the BE_SAN has firmware to recognize when, in order to support a multidisc volume, such as a RAID volume, it is configured to support, it requires access to a physical disk attached to a second BE_SAN; when such a reference is recognized it passes assess commands to the second BE_SAN. Further, the BE_SAN has firmware to make use of the physical disk attached to the second BE_SAN as a hot-spare for RAID operations.2013-06-06
20130145065CONTROL OF DEVICE FEATURES BASED ON VEHICLE STATE - Methods and systems for a controlling device features based on vehicle state and device location are provided. Specifically, the device may be any type of electrical device capable of transmitting and/or receiving a signal (such as a phone, tablet, computer, music player, and/or other entertainment device). In some instances, the device may be associated with one or more vehicles. Although the device may be configured to run one or more applications, the functionality of the one or more applications may be controlled by a system associated with the vehicle. In some cases, this control may depend on the device application type, device location (either inside or outside of a vehicle), law, operator state, and/or vehicle state.2013-06-06
20130145066ANALOG-TO-DIGITAL CONVERTER WITH EARLY INTERRUPT CAPABILITY - An early interrupt feature enables generation of interrupts prior to completion of an analog-to-digital conversion to be used in a processor PID calculation. Even though an analog-to-digital conversion is still in process, the PID application software can use the early interrupt time to begin execution of an interrupt service routine (ISR). The early interrupt can improve the throughput and response time of the PID control loop by overlapping the completion of the ADC conversion with the processor overhead associated with the interrupt request. A plurality of pipelined registers, each having substantially the same delay time as the pipelined stages of the ADC, are selectable to provided a delay time that may be used to generate an early interrupt, wherein the latency time between an ADC conversion and processing of an interrupt relating to that ADC conversion may thereby be shortened.2013-06-06
20130145067ELECTRONIC DEVICE CAPABLE OF CONNECTING DIFFERENT EXPANDING DEVICES THROUGH SAS EXPANDER AND CONNECTING METHOD THEREOF - An electronic device is capable of connecting different expanding devices. The electronic device includes a Serial Attached Small Computer System interface (SAS) Expander, which includes a storage unit for storing a firmware of the SAS Expander, the firmware accommodating a physical layer attribute of any expanding device to be connected to the SAS Expander. The device further includes a processing unit to detect a physical layer attribute of an expanding device and parameters of the physical layer attribute when the expanding device is first connected to the SAS Expander, determine whether a firmware stored in the storage unit corresponds to the detected physical layer attribute, and write the detected parameters into the storage unit to form a new firmware if there is no firmware stored in the storage unit corresponding to the detected physical layer attribute.2013-06-06
20130145068UNIVERSAL SERIAL BUS DEVICE FOR HIGH-EFFICIENT TRANSMISSION - The present invention discloses a Universal Serial Bus (“USB”) device that includes an Ethernet port configured to receive a first Ethernet packet, and an input control circuit including a data register memory, a header register memory and an input data control circuit. The input data control circuit, upon receiving a first Ethernet packet, stores first packet data of the first Ethernet packet in the data register memory, transmits the first packet data to a USB host, and, in response to the transmission of the first packet data, stores first header data of the first Ethernet packet in the header register memory.2013-06-06
20130145069HARDWARE CONTROL INTERFACE FOR IEEE STANDARD 802.11 - A standardized 802.11 hardware control interface may be provided such that a driver may communicate with any one or more of a variety of network adapters.2013-06-06
20130145070METHOD OF DEBUGGING CONTROL FLOW IN A STREAM PROCESSOR - Disclosed is a method of monitoring operation of programmable logic for a streaming processor, the method comprising: generating a graph representing the programmable logic to be implemented in hardware, the graph comprising nodes and edges connecting nodes in the graph; inserting, on each edge, monitoring hardware to monitor flow of data along the edge. Also disclosed is a method of monitoring operation of programmable logic for a streaming processor, the method comprising: generating a graph representing the programmable logic to be implemented in hardware, the graph comprising nodes and edges connecting the nodes in the graph; inserting, on at least one edge, data-generating hardware arranged to receive data from an upstream node and generate data at known values having the same flow control pattern as the received data for onward transmission to a connected node.2013-06-06
20130145071ELECTRONIC DEVICE AND METHOD FOR SWITCHING MODES OF THUNDERBOLT CONNECTOR THEREOF - An electronic device and a method for switching mode of a thunderbolt connector thereof are provided. The electronic device includes a core unit, a PCIE device, a thunderbolt control unit, a first switch circuit and a second switch circuit. The thunderbolt control unit has a host mode and an end-point device mode. A common terminal of the first switch circuit is coupled to a PCIE port of the PCIE device. A first selection terminal of the first switch circuit is coupled to a first PCIE port of the core unit. A common terminal of the second switch circuit is coupled to a PCIE port of the thunderbolt control unit. A first selection terminal of the second switch circuit is coupled to a second PCIE port of the core unit. A second selection terminal of the first switch circuit is coupled to a second selection terminal of the second switch circuit.2013-06-06
20130145072High availability and I/O aggregation for server environments - Methods and apparatus are provided for virtualizing port adapter resources such as network interface cards (NICs) used to connect servers to packet based networks. Resources are offloaded from individual servers onto a resource virtualization switch. Servers connected to the resource virtualization switch using an I/O bus connection share access to NICs. Redundancy can be provided using multipathing mechanisms implemented at individual servers or high availability mechanisms implemented at the resource virtualization switch. Switchover can occur between ports on the same port adapter, between ports on separate adapters, or between ports on separate resource virtualization switches.2013-06-06
20130145073MEMORY DEFRAGMENTATION IN A HOSTED HYPERVISOR - Machine memory fragmentation in a computer system having a host operating system and virtual machine running on a hypervisor hosted by the host operating system is reduced by having the hypervisor identify and release those machine memory pages that are more likely than others to reduce the fragmented state of the host machine memory.2013-06-06
20130145074LOGIC DEVICE HAVING A COMPRESSED CONFIGURATION IMAGE STORED ON AN INTERNAL READ ONLY MEMORY - Systems and methods for using an internal read only memory (ROM) to configure a logic device are described. The ROM and the logic device may be located on a single chip. The ROM may be adapted to store highly compressed configuration images and be non-reprogrammable. The logic device may be configured based on the compressed configuration image.2013-06-06
20130145075DYNAMICALLY MANAGING MEMORY LIFESPAN IN HYBRID STORAGE CONFIGURATIONS - A system, and computer program product for managing the lifespan of a memory using a hybrid storage configuration are provided in the illustrative embodiments. A throttling rate is set to a first value for processing memory operations in the memory device. The first value is set using a health data of the memory device for determining the first value. A determination is made whether a memory operation can be performed on the memory device within the first value of the throttling rate, the first value of the throttling rate allowing a first number of memory operations using the memory device per time period. In response to the determining being negative, the memory operation is performed using a secondary storage device.2013-06-06
20130145076SYSTEM AND METHOD FOR MEMORY STORAGE - A memory storage system includes multiple flash memory storage devices, multiple transmission interfaces and a central control device. The central control device has a cache and respectively coupled to the flash memory storage devices through the transmission interfaces. The central control device is for maintaining a block map table (BMT) to record a mapping relationship between multiple logical blocks and the physical blocks of the flash memory storage devices and the BMT is temporarily stored in the cache. In addition, the central control device uses the communication commands to access the physical blocks of the flash memory storage devices, in which the communication commands are transmitted to multiple controllers in the flash memory storage devices through the transmission interfaces and the controllers access the physical blocks according to communication commands. In this way, the system can effectively manage multiple flash memory storage devices.2013-06-06
20130145077DYNAMICALLY MANAGING MEMORY LIFESPAN IN HYBRID STORAGE CONFIGURATIONS - A method for managing the lifespan of a memory using a hybrid storage configuration is provided in the illustrative embodiments. A throttling rate is set to a first value for processing memory operations in the memory device. The first value is set using a health data of the memory device for determining the first value. A determination is made whether a memory operation can be performed on the memory device within the first value of the throttling rate, the first value of the throttling rate allowing a first number of memory operations using the memory device per time period. In response to the determining being negative, the memory operation is performed using a secondary storage device.2013-06-06
20130145078METHOD FOR CONTROLLING MEMORY ARRAY OF FLASH MEMORY, AND FLASH MEMORY USING THE SAME - A control method for a Flash memory array and a Flash memory is disclosed. The Flash memory array includes a plurality of blocks which are classified into groups and each group includes at least one block. The control method includes the steps of: recognizing an attribute of data transferred from a host, obtaining a storage group selected from the groups based on the attribute of the data, and storing the data into the blocks of the storage group and thereby the blocks of a same group store data of a same attribute; and performing a valid data collection, restricted to the blocks belonging to a same group, to release blocks of space.2013-06-06
20130145079MEMORY SYSTEM AND RELATED WEAR-LEVELING METHOD - A method is provided for performing wear-leveling in a memory system comprising a nonvolatile memory device and a memory controller configured to control the nonvolatile memory device. The method comprises setting a wear-level grade for each of a plurality of memory blocks based on a plurality of wear parameters, and determining an order in which to perform program and/or erase (P/E) operations on the memory blocks based on their respective wear-level grades.2013-06-06
20130145080Processing IC with Embedded Non Volatile Memory - There is disclosed an Integrated Circuit, IC, for use into a mobile device such as a cellular phone. The IC comprises a main processing unit (2013-06-06
20130145081SEMICONDUCTOR DEVICE WITH NON-VOLATILE MEMORY AND RANDOM ACCESS MEMORY - A semiconductor device including a large capacity non-volatile memory and at least one random access memory, said the access time of said device being matched to the access time of each random access memory. The semiconductor memory device is comprised of: a non-volatile memory FLASH having a first reading time; a random access memory DRAM having a second reading time which is more than 100 times shorter than the first reading time; a circuit that includes a control circuit connected to both the FLASH and the DRAM and enabled to control accesses to those FLASH and DRAM; and a plurality of I/O terminals connected to the circuit. As a result, FLASH data is transferred to the DRAM before the DRAM is accessed, thereby matching the access time between the FLASH and the DRAM. Data is written back from the DRAM to the FLASH as needed, thereby keeping data matched between the FLASH and the DRAM and storing the data.2013-06-06
20130145082MEMORY ACCESS CONTROL APPARATUS AND MEMORY ACCESS CONTROL METHOD - A memory is readable by page and erasable by block including a plurality of pages. After a read request to the memory is issued, a memory controller specifies all blocks which can be accessed based on an address specified by a read command, as candidate blocks, and specifies an inspection target page out of pages included in the candidate blocks on the basis of a predetermined rule. The memory controller inspects whether or not there is an error in the inspection target page.2013-06-06
20130145083Semiconductor Memory Device - According to one embodiment, a semiconductor memory device includes a memory which comprises an area accessible from outside and a confidential information area storing confidential information and a set flag. A controller reads the flag from the memory when instructed to erase data in the confidential information area, determines whether the flag is set, erases data in the confidential information area when the flag is clear, and abandons process requested by the data erase instruction when the flag is set. An authenticator uses data in the confidential information area to execute operation for authentication.2013-06-06
20130145084Electronic Apparatus - An electronic apparatus provided with a serial communication circuit achieving a baud rate adjustment with high precision is provided. For example, a bit width of each of a plurality of bits in received serial data is measured by a clock counter, and an average value of the bit width is calculated detecting its maximum value and minimum value. Moreover, for example, a maximum tolerance and a minimum tolerance are calculated as a value substantially 1.5 times the average value and a value substantially 0.5 times the average value, and determination is made as to whether or not the maximum value and the minimum value are within a range between the maximum tolerance and the minimum tolerance. If they are within the range, the corresponding average value is set in a baud rate setting register.2013-06-06
20130145085Virtual Memory Device (VMD) Application/Driver with Dual-Level Interception for Data-Type Splitting, Meta-Page Grouping, and Diversion of Temp Files to Ramdisks for Enhanced Flash Endurance - A Virtual-Memory Device (VMD) driver and application execute on a host to increase endurance of flash memory attached to a Super Enhanced Endurance Device (SEED) or Solid-State Drive (SSD). Host accesses to flash are intercepted by the VMD driver using upper and lower-level filter drivers and categorized as data types of paging files, temporary files, meta-data, and user data files, using address ranges and file extensions read from meta-data tables. Paging files and temporary files are optionally written to flash. Full-page and partial-page data are grouped into multi-page meta-pages by data type before storage by the SSD. ramdisks and caches for storing each data type in the host DRAM are managed and flushed to the SSD by the VMD driver. Write dates are stored for pages or blocks for management functions. A spare/swap area in DRAM reduces flash wear. Reference voltages are adjusted when error correction fails.2013-06-06
20130145086PROCESSOR-BUS-CONNECTED FLASH STORAGE MODULE - A method for accessing a virtual memory of a processor using a processor-bus-connected flash storage module (PFSM) as a first paging device and a hard disk drive (HDD) as a second paging device, the method including: allocating a first address partition and a second address partition of a virtual memory for a software application of a processor to the first paging device and the second paging device, respectively, identifying a virtual memory page in the first paging device responsive to a page fault of the virtual memory triggered by the software application, sending a page access request to the PFSM for accessing the virtual memory page responsive to the page fault, and receiving the virtual memory page from the PFSM based on a command of the processor bus issued by the PFSM in conjunction with performing a flash memory access in the flash memory using a flash page address.2013-06-06
20130145087MEMORY SYSTEM AND BLOCK MERGE METHOD - In one embodiment, the invention provides a memory system including a flash memory device including a plurality of memory blocks implementing a plurality of data blocks, a plurality of log blocks, and a plurality of free blocks. The memory system further includes a flash translation layer maintaining the number of the free blocks to be at least equal to a reference number by converting selected memory blocks among the data and log blocks into free blocks via at least one merge operation during a background period. Additionally, the flash translation layer converts selected ones of the free blocks into data and log blocks, respectively.2013-06-06
20130145088HIGH-SPEED MEMORY SYSTEM - The disclosed embodiments relate to a Flash-based memory module having high-speed serial communication. The Flash-based memory module comprises, among other things, a plurality of I/O modules, each configured to communicate with an external device over one or more external communication links, a plurality of Flash-based memory cards, each comprising a plurality of Flash memory devices, and a plurality of crossbar switching elements, each being connected to a respective one of the Flash-based memory cards and configured to allow each one of the I/O modules to communicate with the respective one of the Flash-based memory cards. Each I/O module is connected to each crossbar switching element by a high-speed serial communication link, and each crossbar switching element is connected to the respective one of the Flash-based memory cards by a plurality of parallel communication links.2013-06-06
20130145089CACHE MEMORY MANAGEMENT IN A FLASH CACHE ARCHITECTURE - Provided is a method for managing cache memory to cache data units in at least one storage device. A cache controller is coupled to at least two flash bricks, each comprising a flash memory. Metadata indicates a mapping of the data units to the flash bricks caching the data units, wherein the metadata is used to determine the flash bricks on which the cache controller caches received data units. The metadata is updated to indicate the flash brick having the flash memory on which data units are cached.2013-06-06
20130145090SEMICONDUCTOR STORAGE DEVICE AND METHOD OF CONTROLLING THE SAME - A semiconductor storage device includes a first nonvolatile memory to store user data of a file, a second nonvolatile memory to store management data of the file, the second nonvolatile memory being different in type from the first nonvolatile memory, and a controller to control read/write of data with respect to the first and second nonvolatile memories.2013-06-06
20130145091SYSTEM AND METHOD FOR UNBALANCED RAID MANAGEMENT - A method for dynamically balancing the allocation of data among a plurality of physical data storage devices having a plurality of RAID devices defined thereon, wherein at least one of the plurality of RAID devices is comprised of at least one of a different type of physical storage device or a different number of physical data storage devices than at least one other of the plurality of RAID devices, includes determining a usage factor unique to each RAID device and balancing data I/O based at least in part on the usage factor.2013-06-06
20130145092MANAGEMENT SYSTEM AND MANAGEMENT METHOD OF STORAGE SYSTEM THAT PERFORMS CONTROL BASED ON REQUIRED PERFORMANCE ASSIGNED TO VIRTUAL VOLUME - A storage system manages a pool to which multiple VVOLs (virtual logical volumes conforming to thin provisioning) are associated, assigns a real area (RA) from any tier in an available tier pattern associated with a write-destination VVOL to a write-destination virtual area (VA), and carries out a reassignment process for migrating data inside this RA to an RA of a different tier than the tier having this RA based on the access status of the RA assigned to the VA. A management system assumes that a specified tier has been removed from the available tier pattern of a target VVOL, predicts the performance of the target VVOL and all the other VVOL associated with the pool to which the target VVOL is associated, determines whether or not there is a VVOL for which the predicted performance is lower than a required performance, and when such a VVOL does not exist, instructs the storage system to remove the specified tier from the available tier pattern of the target VVOL.2013-06-06
20130145093NON-VOLATILE SEMICONDUCTOR MEMORY AND DATA READING METHOD THEREOF - A non-volatile semiconductor memory is provided, including a memory array having a first and a second memory planes, a page buffer, holding data transmitted by pages selected by address information from a memory array; data register, capable of serially outputting data received by the page buffer according to a clock signal. The pages selected by the first and the second memory planes are simultaneously transmitted to the page buffer. The data reading includes: transmitting the data of the second page of the second memory plane from the page buffer to the data register when the data of the first page of the first memory plane is outputted from the data register; transmitting the data of the second page of the first memory plane from the page buffer to the data register when the data of the second page of the second memory plane is outputted from the data register.2013-06-06
20130145094Information Processing Apparatus and Driver - According to one embodiment, an information processing apparatus includes a memory that comprises a buffer area, a first external storage, a second external storage and a driver. The driver is configured to control the first and second external storages in units of predetermined blocks. The driver comprises a cache reservation module configured to (i) reserve a cache area in the memory, the cache area being logically between the buffer area and the first external storage and between the buffer area and the second external storage and (ii) manage the cache area. The cache area operates as a primary cache for the second external storage and a cache for the first external storage. Part or the entire first external storage is used as a secondary cache for the second external storage. The buffer area is used to transfer data between the driver and a host system that requests data reads/writes.2013-06-06
20130145095MELTHOD AND SYSTEM FOR INTEGRATING THE FUNCTIONS OF A CACHE SYSTEM WITH A STORAGE TIERING SYSTEM - A tiered data storage system having a cache employs a tiering management subsystem to analyze data access patterns over time, and a cache management subsystem to monitor individual input/output operations and replicate data in the cache. The tiering management subsystem determines a distribution of data between tiers and determines what data should be cached while the cache management subsystem moves data into the cache. The tiered data storage system may analyze individual input/output operations to determine if data should be consolidated from multiple regions in one or more data storage tiers into a single region.2013-06-06
20130145096GENERATING AN ORDERED SEQUENCE IN A DATABASE SYSTEM USING MULTIPLE INTERLEAVED CACHES - A method, system, and computer program product is disclosed for generating an ordered sequence from a predetermined sequence of symbols using protected interleaved caches, such as semaphore protected interleaved caches. The approach commences by dividing the predetermined sequence of symbols into two or more interleaved caches, then mapping each of the two or more interleaved caches to a particular semaphore of a group of semaphores. The group of semaphores is organized into bytes or machine words for storing the group of semaphores into a shared memory, the shared memory accessible by a plurality of session processes. Protected (serialized) access by the session processes is provided by granting access to one of the two or more interleaved caches only after one of the plurality of session processes performs a semaphore altering read-modify-write operation (e.g., a CAS) on the particular semaphore. The interleaved caches are assigned values successively from the predetermined sequence using a round-robin assignment technique.2013-06-06
Website © 2025 Advameg, Inc.