33rd week of 2011 patent applcation highlights part 54 |
Patent application number | Title | Published |
20110202642 | BROADCAST RECEIVER APPARATUS - There is provided a broadcast receiver apparatus capable of receiving correct channel information any time even if a network to which the broadcast receiver apparatus is connected changes to another one. The broadcast receiver apparatus includes storage means ( | 2011-08-18 |
20110202643 | COMMUNICATION DEVICE, AND CONTROL METHOD THEREFOR - When a communication device detects another communication device operating as a providing device that provides a communication parameter and when a communication parameter has already been set between the communication device and a different communication device or when the communication device is participating in the same network as that in which the different communication device is present, the communication device transmits a session overlap notice to the detected communication device. | 2011-08-18 |
20110202644 | METHOD OF FACILITATING IP CONNECTIONS TO HOSTS BEHIND MIDDLEBOXES - The present invention relates to a method and arrangement of facilitating the establishment of peer-to-peer IP connections between a public network and hosts in a private or home network. The method uses a port mapping table residing in a NAT that maps external public IP addresses and external port numbers to private IP addresses and internal port numbers. This table has so far been configured manually by a user of the private or home network. Apart from being cumbersome, it demands skills in router and network technology, skills an ordinary user of a home network often does not have. The present invention solves this problem by automatically configuring the table comprising the steps of scanning the hosts using a port scanner and detecting the internal ports in the hosts that are in an open state. | 2011-08-18 |
20110202645 | Methods and Apparatus to Test Network Elements - Described are computer-based methods and apparatuses, including computer program products, for testing network elements in a communication network. A record file is received, comprising one or more record file elements, each record file element including data indicative of a request received by a network element in a network during normal operation. A virtual client is created for each of one or more identified sources. One or more regenerated requests are generated, each of the one or more regenerated requests being generated based on data in a corresponding record file element from the one or more record file elements. For each of the one or more regenerated requests, the virtual client associated with the regenerated request transmits the regenerated request to a subject network element to test the subject network element, wherein the one or more regenerated requests simulate requests received by the network element during normal operation. | 2011-08-18 |
20110202646 | POLICY CONTROLLED TRAFFIC OFFLOAD VIA CONTENT SMART-LOADING - An example method includes receiving at a user device a policy from a communication network node, and loading the user device with content data based on the policy. The policy specifies a rule set and a corresponding action to undertake in the event of a condition satisfying the rule set and may be received at the user device in response to connection of the user device to the network node. The policy received may be an updated policy, and may be based on network conditions. Example apparatuses and methods determine how (for example, what access technology and what times, to best deliver content given the particulars for a user and the device state of the user, using a rules set that can be dynamically updated without user intervention by network operators based on network management policies. Delivery includes upload, download and sideload of a user device. | 2011-08-18 |
20110202647 | Method and Apparatus for Handling Policy and Charging Control Rule or Quality of Service Rule Modification Failures - Methods and apparatuses are provided that facilitate handling failures in policy rule installation and/or related bearer modification procedures. A set of modified policy rules can be provided to a gateway for enforcement thereof and/or correlation with a bearer of a device. The gateway can attempt to install the modified rules and can utilize a credit control request (CCR)/credit control answer (CCA) exchange to notify of a status of the modified rule installation and/or related bearer modification. A policy charging and rules function (PCRF) can, thus, determine the status based on the CCR/CCA exchange. If the status indicates failure, the PCRF can revert to previous policy rules. In addition, an application function can be notified of the status. | 2011-08-18 |
20110202648 | NETWORK NODE FOR AN AD-HOC NETWORK AND PROCESS FOR PROVIDING APPLICATION SERVICES IN AN AD-HOC NETWORK - A network node for an ad-hoc network having a plurality of network nodes of the same type, which provide one another with application services via wireless connections. The network node generates a list of all application services provided to it by other network nodes including associated quality classes and makes this list available to other network nodes as list of the application services provided by it with such quality classes. The quality class is at least dependent on the number of consecutive network nodes, via which the application service is provided, and the quality class specified by the last of these network nodes. The invention also relates to a method for providing application services in an ad-hoc network. | 2011-08-18 |
20110202649 | USER-CENTRIC LAYERED SERVICE DELIVERY PLATFORM FOR ENABLING I-CENTRIC SERVICES AND SERVICE PROVIDING METHOD USING THE SAME - An apparatus for providing I-centric services using a service delivery platform which is user-centric layered and a service providing method using the same are provided. The apparatus includes a media service platform providing an enabler obtained by abstracting resources and an I-centric enabler, a service creation environment providing a layered service creation and execution environment for each user, and a service execution environment. A personal user, a third party service provider and a service provider can create and provide various personalized services using the media service platform, the service creation environment and the service execution environment. | 2011-08-18 |
20110202650 | METHOD AND SYSTEM FOR MONITORING DATA FLOWS IN A NETWORK - One embodiment of the present invention provides a switching system that facilitates data flow monitoring at the logical-unit level. The switching system includes a traffic monitoring mechanism configured to monitor a data flow between a host and a logical unit residing on a target device. The switching system further includes a storage mechanism configured to store data-flow statistics specific to the host and the logical unit and a communication mechanism configured to communicate the data-flow statistics to a traffic management module. | 2011-08-18 |
20110202651 | PRICE-AWARE NEIGHBORHOOD SELECTION FOR PEER-TO-PEER NETWORKS - A method and apparatus for peer-to-peer file sharing is provided. In some embodiments, the method includes receiving a request for a list of neighbor peers, where the request is made by a requesting peer device, and where the requesting peer device has a local internet service provider (ISP). The method may also include employing a server device to rank each neighbor peer in a plurality of neighbor peers based on whether the respective neighbor peer is external to the local ISP, and if the respective neighbor peer is external to the ISP, further based on a cost metric associated with a next ISP hop from the requesting peer device to the respective neighbor peer. The method may also include generating the list of neighbor peers based on the ranking of the neighbor peers, and enabling transmission of the list of neighbor peers to the requesting peer device. | 2011-08-18 |
20110202652 | METHOD AND APPARATUS FOR MONITORING A KAD NETWORK - A method and apparatus are described including determining if a received message is from a monitored peer, forwarding the received message to a coordinator responsive to said determination, determining if the received message is a request message, opening a port for the peer responsive to the second determination, forwarding the request message to a monitored peer via the opened port and forwarding a response message to the monitored peer responsive to the second determination. | 2011-08-18 |
20110202653 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR SERVICE DETECTION OVER AN RX INTERFACE - According to one aspect, the subject matter described herein includes a method for communicating service data flow (SDF) event information. The method includes steps occurring at a policy charging and rules function (PCRF) node. The method also includes communicating, via an Rx interface, a request to a deep packet inspection (DPI) node to be notified when an SDF event occurs. The method further includes receiving notification from the DPI node that the SDF event has occurred. | 2011-08-18 |
20110202654 | CONFIGURABLE CONTENT INJECTION SERVICE SYSTEM - A configurable content injection service system and method of injecting a new content into data of a data traffic between a data source and a user device uses configuration information set by one or more content injection service users. The configuration information includes at least one condition related to the data traffic between the data source and the user device to inject the new content if the at least one condition is satisfied. | 2011-08-18 |
20110202655 | Data Center Manager - A computer-implemented data center manager includes an evaluation engine configured to receive information pertaining to an operating policy, a system manager configured to collect information pertaining to system devices and to communicate the collected system device information to the evaluation engine, and a facility manager configured to collect information pertaining to facility devices and to communicate the collected facility device information to the evaluation engine. The evaluation engine is configured to determine target policies for coordinated operations of the system devices and the facility devices to satisfy the operating policy. | 2011-08-18 |
20110202656 | CENTRALIZED APPLICATION RESOURCE MANAGER - An application resource manager is provided to organize, prioritize, and optimize data transmissions from several connected applications. Through inter-process communication, the several connected applications may pass all transmission requests to the centralized manager, which will perform all transmissions according to priority. When the transmission includes a download (e.g., file, email, etc.), the manager will pass the complete file (or a pointer to the same) to the originally requesting application. The original application may perform post-processing and then use the downloaded data, including making the data available to the user. If however, the requesting application is offline, the manager may also perform, e.g., the essential post-processing, via a plug-in given to the manager by the application when the application initially connected to the manager. A full sized user interface and a smaller user interface may be provided for un-intrusive execution. | 2011-08-18 |
20110202657 | METHOD FOR SCHEDULING CLOUD-COMPUTING RESOURCE AND SYSTEM APPLYING THE SAME - Provided is a method for scheduling cloud-computing resource, and a system applying the method is herein disclosed. It is featured that the load history record becomes a basis to obtain a computing pattern for each computing node based on a request. The load history is the basis to predict the future computing capability, and accordingly to distribute the computing task. The cloud-computing capability can therefore be advanced. The method firstly receives a computing request. The request includes a number of computing nodes, a start time of computing, and a length of computing time. A computing resource table is established based on the load history for each node, and used to calculate availability and confidence. After that, a resource expectation value is obtained from the availability and confidence. After sorting the expectation values, one or more computing nodes are selected for further task distribution. | 2011-08-18 |
20110202658 | INFORMATION SYSTEM, APPARATUS AND METHOD - A system permitting alteration of the information processing position, where an existing information system is used, while minimizing alterations in configuration or the like, is to be provided. Intelligent nodes each having an information processing section and any desired address altering section are arranged on boundaries of a network where packets are likely to pass. This node has a flow table for recognizing as a flow a group of packets transmitted from each user's terminal, a flow status table for determining the connection state and the next destination address or the final destination address of each flow, and a module to observe the loaded state of its own information processing function. It rewrites the destination address of any flow not in a connection-established state in the flow status table to a less loaded one out of its own information processing function section or external information processing apparatus. | 2011-08-18 |
20110202659 | METHODS AND APPARATUS FOR CREATION AND TRANSPORT OF MULTIMEDIA CONTENT FLOWS - System for creation and transport of multimedia content flows. The system includes a method for transporting a content flow to a wireless access network for broadcast to devices coupled to the wireless access network. The method includes transmitting a request message to add the content flow to the wireless access network, wherein the request message includes a scheduled delivery time. The method also includes receiving a response message indicating that the content flow will be added to the wireless access network, waiting until the scheduled delivery time, and delivering the content flow to the wireless access network. | 2011-08-18 |
20110202660 | DIVERSE SOURCE MESSAGE ASSOCIATION - Various exemplary embodiments relate to a method and related network node and machine-readable storage medium including a policy and charging rules node (PCRN) receiving a plurality of related service requests from different devices. The PCRN may proceed to generate a policy and charging control (PCC) rule based on at least one service request and other information stored in the PCRN if a mate service request does not arrive during the duration of a waiting timer. If the mate service request arrives subsequent to the expiry of the waiting timer, the PCRN may then generate a subsequent PCC rule to replace the previously generated rule, with the new PCC rule incorporating information from both of the mate service requests. | 2011-08-18 |
20110202661 | SESSION-BASED TELECOMMUNICATIONS - A method for establishing bi-directional and session-based communication between IMS and GSM subscribers with the purpose of sending text information by using the SIP protocol and USSD services. The method defines an IP-USSD gateway that converts messages between the SIP and USSD protocols before relaying them. The communication session can be initiated by either party; the GSM subscriber or the IMS subscriber. A message, which an SIP client has sent, is thereby converted into a USSD message and conveyed to the GSM subscriber. Thus, the GSM subscriber can read the USSD message sent to the mobile phone, and in addition can see the name and surname of the sender and write an answer. Similarly, the SIP subscriber can read the message received and write an answer. | 2011-08-18 |
20110202662 | NETWORK NODE FOR AN AD-HOC NETWORK AND PROCESS FOR PROVIDING APPLICATION SERVICES IN AN AD-HOC NETWORK - A network node for an ad-hoc network having a plurality of network nodes of the same type, which provide one another with application services via wireless connections. The network node is configured to generate a list of all application services provided to it by other network nodes with associated quality classes and makes the list available to other network nodes as a list of the application services provided by it with such quality classes. At least one of the quality classes is dependent on movement vectors of at least one wireless connection, via which the respective application service is provided. The invention also relates to a method for providing application services in an ad-hoc network. | 2011-08-18 |
20110202663 | Method and Apparatus for Mobility Agent Recovery - Techniques for recovering Mobile Internet Protocol (IP) session(s) of a mobility agent in a Mobile IP network are described herein. In one embodiment of the invention, for each mobility session associated with a mobility agent, the mobility agent distributively backs up mobility agent specific information to the mobility agent peer associated with that mobility session. The mobility agent specific information is not used by the mobility agent peer. Upon the mobility agent inadvertently losing at least one mobility session, the mobility agent recovers the stored mobility agent specific information associated with those sessions from the mobility agent peers respectively associated with those sessions. Other methods and apparatuses are also described. | 2011-08-18 |
20110202664 | Method and Apparatus for Mobility Agent Recovery - Techniques for recovering Mobile Internet Protocol (IP) session(s) of a mobility agent in a Mobile IP network are described herein. In one embodiment of the invention, for each mobility session associated with a mobility agent, the mobility agent distributively backs up mobility agent specific information to the mobility agent peer associated with that mobility session. The mobility agent specific information is not used by the mobility agent peer. Upon the mobility agent inadvertently losing at least one mobility session, the mobility agent recovers the stored mobility agent specific information associated with those sessions from the mobility agent peers respectively associated with those sessions. Other methods and apparatuses are also described. | 2011-08-18 |
20110202665 | Establishing Unique Sessions for DNS Subscribers - A system establishes virtual DNS servers that are supported by a DNS server. Target IP addresses are assigned for the virtual DNS servers. Network capable devices are uniquely assigned to the virtual DNS servers for domain name resolution. Each network capable device accesses the communication network through a corresponding network device associated with a corresponding source IP address. A client's service plan is assigned to a first network capable device used by the client. The service plan is implemented through a DNS request under a session established between the first network capable device and its assigned first virtual DNS server. The session is uniquely identified by a first source IP address of a first network device used by the first network capable device to access the communication network and a first target IP address of the first virtual DNS server. | 2011-08-18 |
20110202666 | SESSION ESTABLISHMENT IN A COMMUNICATION NETWORK - A method and apparatus for establishing a communication session in an IMS Centralized Services communication network. A Service Centralization and Continuity Application Server (SCC AS) receives a request from an originating device to establish a session with a target device. The request includes a plurality of codec identifiers that could be used by the originating device. The SCC AS sends a second request to establish the session to the target device. The SCC AS subsequently receives, from an intermediate node between the SCC AS and the target device, an invite message. The invite message includes an indication that a codec identifier has been selected from the plurality of codec identifiers. The SCC AS then sends a message to the intermediate node instructing the intermediate node to establish the session. | 2011-08-18 |
20110202667 | Database Virtualization - Aspects of the subject matter described herein relate database virtualization. In aspects, clusters of database servers may be located at various locations of the Internet. When a client seeks to access a logical database, the client may send a logical server and logical database name in a data structure. These names may be used to find a physical server(s) and database(s) that correspond to the logical database. Once the location is determined, a proxy component is used to intercept and/or forward communications between the client and the physical server(s) and database(s) corresponding to the logical database. Using this system, a client may access data from a logical database without knowing the physical address of the logical user database. | 2011-08-18 |
20110202668 | Methods for Creating and Using a Telecommunications Link between Two Users of a Telecommunications Network - A technique is disclosed for the creation and the use of a telecommunications link between two users of a telecommunications network. Disclosed in particular is the technical creation of a social links network employing a telecommunications network. A method is disclosed for creating a telecommunications link between a first set of communications devices associated with a first user and a second set of communications devices associated with a second user, including generating a pair of certified identifiers of the first and second users allowing a communications session to be set up between at least a communications device of the first set and a communications device of the second set. | 2011-08-18 |
20110202669 | Method for Network Domain Name Resolution and the Resolution Device Thereof - The invention relates to a method for network domain name resolution, the domain name comprises a first portion domain name and a second portion domain name, and the resolution method comprising following steps: In a first network system, resolving the first portion domain name into a first network address; In the first network system, searching for a first network node corresponding to the first network address according to the resolved first network address; In a second network system, resolving the second portion domain name into a second network node address, and the domain name resolution system of the second network system being independent of the domain name resolution system of the first network system. As the resolution structure of the domain name in the Intranet is independent of the resolution structure of the domain name in the Internet, the IP address of the Intranet will not occupy the IP address resource of the Internet. | 2011-08-18 |
20110202670 | METHOD, DEVICE AND SYSTEM FOR IDENTIFYING IP SESSION - A method, a device, and a system for identifying an Internet Protocol (IP) session are provided. The method includes: a network gateway generates an IP session identity (ID) for an IP session during an IP address configuration process for a user equipment (UE), according to preset rules for generating the IP session ID; and filters a received IP session packet from the UE according to the IP session ID. By applying the technical solutions, a coupling relation between a data communication process and an authentication process or an IP address configuration process of the IP session is established, and the security of the IP session is enhanced. | 2011-08-18 |
20110202671 | Method and Apparatus for Mobility Agent Recovery - Techniques for recovering Mobile Internet Protocol (IP) session(s) of a mobility agent in a Mobile IP network are described herein. In one embodiment of the invention, for each mobility session associated with a mobility agent, the mobility agent distributively backs up mobility agent specific information to the mobility agent peer associated with that mobility session. The mobility agent specific information is not used by the mobility agent peer. Upon the mobility agent inadvertently losing at least one mobility session, the mobility agent recovers the stored mobility agent specific information associated with those sessions from the mobility agent peers respectively associated with those sessions. Other methods and apparatuses are also described. | 2011-08-18 |
20110202672 | APPLICATION IDENTIFICATION - A method may include receiving a communication from a client device and identifying a port number, a protocol and a destination associated with the communication. The method may also include identifying a first application being executed by the first client device based on the port number, the protocol and the destination associated with the first communication. | 2011-08-18 |
20110202673 | NETWORK CHARACTERISTIC-BASED COMPRESSION OF NETWORK TRAFFIC - A network optimization device may receive a stream of data and identify a selected compression dictionary from among a number of compression dictionaries based on the received stream of data. A receiving network device may be notified regarding the selected compression dictionary. The stream of data may be compressed using the selected compression dictionary and transmitted to the receiving device. | 2011-08-18 |
20110202674 | Dynamic Adjustments of Video Streams - A method and apparatus for the dynamic adjustments of video streams sent from a server to a client is provided. Using both short term and long term thinning mechanisms, the server reduces its data transfer rate when bandwidth is reduced and increases its data transfer rate when bandwidth is available. In the short term mechanism, the server will dynamically adjust the transmission rate of the video or the quality of the video based on parameters returned by the client. These parameters include currently-buffered data-size, buffered-data duration, and packet loss rate. In the long term mechanism, the server will adjust the current maximum quality level allowed depending upon the round trip times of data packets transmitted. This invention decreases client rebuffering and packet loss and increases the efficiency of available bandwidth. | 2011-08-18 |
20110202675 | VIRTUAL INSERTION INTO A NETWORK - A network appliance is virtually inserted in a data path within a network. Packet data that matches a criteria is intercepted at a logical point within the data path. The intercepted packet data is forwarded to an application running on the virtually inserted network appliance. | 2011-08-18 |
20110202676 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR PROVIDING PEER ROUTING AT A DIAMETER NODE - Methods, systems, and computer readable media for providing local application routing at a Diameter node are disclosed. In one example, the method includes receiving, at an ingress Diameter message processor associated with a DSR, a Diameter message from a first Diameter node. The method further includes accessing, using the ingress Diameter message processor, Diameter peer routing information to determine an egress Diameter message processor among a plurality of egress Diameter message processors within the DSR and associated with a second Diameter node that is a peer of the DSR and to which the Diameter message is to be forwarded. The method also includes forwarding the Diameter message to the determined egress Diameter message processor. | 2011-08-18 |
20110202677 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR INTER-MESSAGE PROCESSOR STATUS SHARING - According to one aspect, the subject matter described herein includes a method of operating a Diameter signaling router (DSR) for routing Diameter messages. The method includes steps occurring at a DSR comprising a plurality of Diameter message processors, each configured to perform at least one Diameter function. The method also includes detecting, at a first of the plurality of Diameter message processors, a change in status relating to the at least one Diameter function. The method further includes communicating, by the first of the plurality of Diameter message processors and to a second of the plurality of Diameter message processors, an indication of the change in status. | 2011-08-18 |
20110202678 | Delegated Resource Use in a Content Based Routing Environment - A router or router process directs computer network traffic by, upon receipt of an access request to a network resource, determining that the request contains at least one routing cookie; determining a cookie scope of the routing cookie; responsive to the cookie scope being unequivalent to a root value, designating the at least one routing cookie as a delegate cookie; adding a path value associated the delegate cookie to a session lookup table entry for a user associated with the network traffic; and subsequently, using the lookup table entry to determine a destination address for redirecting computer network traffic for the user having the delegate cookie to a delegated resource located in the network at the path. | 2011-08-18 |
20110202679 | Classification and Verification of Static File Transfer Protocols - Classification and verification of static file transfer protocols is provided. A network node sitting in the path of packets classifies traffic according to its content, and then statistically verifies that the content actually matches the initial classification. Classification and verification are standard building blocks in networks systems that provide quality-of-service. However, unlike traditional quality-of-service building blocks, a system of the present invention takes a trust-but-verify approach, and thus can rely on longer-timescale statistical online or offline verification to reduce computational requirements. This improves scalability and reduces the cost and complexity that in part has prevented prior service differentiation systems from succeeding in the Internet. Internet Service Providers (ISPs) can combine the classification and verification building blocks with a networked directory service to allow further classification as to whether particular content is for pay. | 2011-08-18 |
20110202680 | MOBILE COMMUNICATIONS DEVICE ACCESS FROM PERSONAL COMPUTER - A method is described for providing files to a mobile communications device from an associated personal computer over one of a plurality of potential communication paths between the mobile communications device and the computer. The method includes receiving at the computer a user request that a selected file stored on the computer be provided to the mobile communications device; selecting a communications path from among the plurality of potential communication paths; and causing a copy of the selected file to be provided to the mobile communications device over the selected communication path. | 2011-08-18 |
20110202681 | DISTRIBUTED MEANS OF ORGANIZING AN ARBITRARILY LARGE NUMBER OF COMPUTERS - A technique for organizing a plurality of computers such that message broadcast, content searching, and computer identification of the entire collection or a subset of the entire collection may be performed quickly without the use of a controlling computer. The technique describes the creation, operation, and maintenance of a connection scheme by which each computer in the collection appears to be the top level of a hierarchical array. The maintenance of this hierarchical connection scheme allows one to many communications throughout the collection of computers to scale geometrically rather than linearly. | 2011-08-18 |
20110202682 | NETWORK STRUCTURE FOR DATA CENTER UNIT INTERCONNECTION - A number of data center units in a data center system may be directly connected with each other via switch interfaces. The data center system is server-centric and scalable by storing routing logics (e.g., inter-data center unit logic and/or inner-data center unit logic) at each server to achieve routing, load balancing, and/or fault tolerance. Switch interfaces of the data center units, thus, may be dumb devices and a centralized router for routing data among data center units may be omitted. | 2011-08-18 |
20110202683 | Inband Data Gathering with Dynamic Intermediary Route Selections - Included are a method to manage subscriptions over a network, where the network may comprise intermediaries, clients, and service providers, and the method may include, receiving a subscription at a network intermediary, the subscription having management application data and having application level header information. The method may further include reviewing the application level header information of the received subscription and redirecting the subscription over the network using the reviewed application level header information. | 2011-08-18 |
20110202684 | METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR INTER-DIAMETER-MESSAGE PROCESSOR ROUTING - According to one aspect, the subject matter described herein includes a method for routing Diameter messages. The method includes steps occurring at a Diameter signaling router (DSR) comprising a plurality of Diameter message processors. The method also includes receiving, by a first of the plurality of Diameter message processors and from a first Diameter node, a Diameter message, wherein the Diameter message is received via a first Diameter connection. The method further includes determining, by the first Diameter message processor, a next-hop Diameter node for the Diameter message. The method further includes communicating, by the first of the plurality of Diameter message processors and to a second of the plurality of Diameter message processors, the Diameter message. The method further includes communicating, by the second Diameter message processor and to the next-hop Diameter node, the Diameter message, wherein the Diameter message is communicated via a second Diameter connection. | 2011-08-18 |
20110202685 | System and Method for Communication Between an Information Handling System and Management Controller Through a Shared LOM - Communications between a host information handling system and its management controller sent through a shared LOM are re-directed at the LOM from communication through a network to instead communicate directly between the host information handling system and management controller. A management module compares destination addresses of packets sent from the host information handling system and the management controller with host information handling system and management controller network addresses stored on the LOM. Packets having destination address that match a host information handling system or management controller network address are redirected from communication across the network to communicate directly between the host information handling system and management controller. | 2011-08-18 |
20110202686 | Network Based Conversion System - The invention is a network-based personalized media conversion system, process, and method for receiving original media data from a client-end device connected to a network, transmitting back converted digital data from a server-end device to the client-end external device, and manipulating the converted data through a client-end editing and a server-end editing interface. The transmitted signal is reproduced into a digital format that may or may not have additional meta-data appended to it based on use of the editing interface. A server-end payment transaction system, used to monitor a client's session, communicates with a server-end dispatcher that transmits compressed and converted data back to the client-end device. A server-end archive stores client reproductions during the client's session with the conversion system, and for a designated time interval after a client's session has ended. | 2011-08-18 |
20110202687 | SYNCHRONIZING AUDIENCE FEEDBACK FROM LIVE AND TIME-SHIFTED BROADCAST VIEWS - An audio channel of a time-based media presentation provides a basis for synchronizing to the presentation across a variety of platforms independent of when and where the presentation is being viewed. By pre-processing the media into a series of non-unique hashes, and similarly processing an audio stream of the media captured at a client device, a comparison can be made that yields an accurate time offset within the presentation. The comparison may usefully be performed over a data network using a server that hosts data from the pre-processed media, and a variety of applications may be deployed on the client device based on the resulting synchronization. | 2011-08-18 |
20110202688 | MACRO FUNCTION BLOCK FOR ENCAPSULATING DEVICE-LEVEL EMBEDDED LOGIC - The present invention provides techniques for encapsulating device-level embedded logic into user-defined instructions using configuration software. More specifically, the disclosed embodiments enable add-on instructions for device configuration embedded logic. Programming interfaces specific to an application or device may be combined into a single instruction as a reusable Macro component that may be reused in the same or different applications or devices. | 2011-08-18 |
20110202689 | ASSIGNMENT OF CONTROL OF PERIPHERALS OF A COMPUTING DEVICE - Techniques for enabling software-assisted assignment of control of peripherals (e.g., assigning ownership of or assigning access to the peripherals) by a computing device. In accordance with techniques described herein, assignment of control of peripherals is aided by input from software facilities that instruct a peripheral management facility regarding assignment of peripherals. Software facilities may instruct the peripheral management facility in different ways. In some cases, a software facility may instruct the peripheral management facility how to assign control of a peripheral in a particular way, while in other cases a software facility may instruct the peripheral management facility how to assign control of a group of peripherals. In other cases, a software facility may not instruct a peripheral management facility how to assign control of peripherals, but may identify one or more groups of peripherals for which control should be assigned as a group. | 2011-08-18 |
20110202690 | DATA WRITING METHOD FOR NON-VOLATILE MEMORY, AND CONTROLLER AND STORAGE SYSTEM USING THE SAME - A data writing method for writing data from a host system into a plurality of memory dies of a rewritable non-volatile memory storage apparatus is provided. The data writing method includes determining whether the data transmission interface of the host system complies with a first interface standard or a second interface standard. The data writing method also includes using a general mode to write the data into the memory dies when the data transmission interface of the host system complies with the first interface standard and using a power saving mode to write the data into the memory dies when the data transmission interface of the host system complies with the second interface standard. Accordingly, the data writing method can effectively prevent the stability of the rewritable non-volatile memory storage apparatus from reducing due to insufficient power supplied by the data transmission interface. | 2011-08-18 |
20110202691 | System circuit and method for software reload of peripheral devices - Disclosed is a method, circuit and system for facilitating software of firmware reload of a peripheral device. According to embodiments of the present invention, one or more circuit or modules on the peripheral device or on a host device may emulate normal peripheral operation when the peripheral device is engaged in a software/firmware reload operation. | 2011-08-18 |
20110202692 | COMPUTER PERIPHERAL APPARATUS - The present invention discloses a computer peripheral apparatus. The computer peripheral apparatus includes an USB hub, at least one build-in card reader, and a controller. Each build-in card reader is electrically connected to one built-in downstream port of the USB hub. The controller connects to the USB hub and the build-in card reader to monitor the connection requirement of the build-in card reader. When the controller determines the build-in card reader does not need to be kept connected, the controller sets the status of its corresponding built-in downstream port as a “first status,” which defines the corresponding built-in downstream port is not connected. Thus, the computer system is informed that the built-in downstream port is not connected. Therefore, if there are no USB devices connecting to other downstream ports of the USB hub, the entire computer peripheral apparatus can enter into hibernation mode, thereby lowering the power consumption | 2011-08-18 |
20110202693 | INPUT-OUTPUT MANAGEMENT DEVICE AND INFORMATION PROCESSING DEVICE - When the activation of an output device is detected, the response prompt screen on which a response by an input device is requested is displayed on the activated output device, and when a response from the input device is received through the displayed response prompt screen, the input device which has returned a response is associated with the output device whose response prompt screen is displayed. | 2011-08-18 |
20110202694 | COMMUNICATION SYSTEM, COMMUNICATION CONTROL APPARATUS, AND COMMUNICATION METHOD - According to one embodiment, a communication system includes a first communication control apparatus and a second communication control apparatus. The first communication control apparatus includes an acquiring unit, a generating unit, and a transferring unit. The second communication control apparatus includes a receiving unit and a processing unit. The acquiring unit acquires a computer file. The generating unit generates transfer information including the computer file and added information indicating a content of processing designated by a user of the first communication control apparatus from among plural contents of processing relating to the computer file. The transferring unit transfers the transfer information to the second communication control apparatus. The receiving unit receives the transfer information. The processing unit performs processing on the computer file included in the transfer information in accordance with the content of processing indicated by the added information included in the transfer information. | 2011-08-18 |
20110202695 | METHOD AND SYSTEM FOR PADDING IN A VIDEO PROCESSING SYSTEM - A method and system for padding an array of data on-the-fly in a direct memory access (DMA) controller. The method includes receiving the array of data in the DMA controller. The method also includes identifying edge groups of pixels at edges of the array of data and creating a padded region of data words along a periphery of the array of data. Each data word includes pixels of a corresponding edge group. The data words are then stored in a memory along with received array of data. Further, the method includes sending a request for padded data at a location in the memory, the padded data defining the array of data and the padded region of data words. Further, the method also includes translating the location of the padded data to addresses of one of, the data words and the array of data in the memory and retrieving the padded data at the addresses in the memory. | 2011-08-18 |
20110202696 | CONTROLLER, DATA TRANSFER DEVICE, INFORMATION PROCESSING DEVICE, PROCESSOR, AND CONTROL METHOD OF INFORMATION PROCESSING DEVICE - A controller is provided that controls data transfer between a processor and a data transfer device and that includes: a storage unit that stores first data outputted from the processor; a determination unit that compares control information of the first data and control information of second data received from the processor after the first data, and determines whether a first case in which the first data and the second data include the same data body holds according to a result of the comparison; a management unit that stores a portion of the control information of the second data as duplicate information associated with the first data in the first case, and stores the second data in the storage unit in a second case other than the first case; and a control unit that controls output of data stored in the storage unit to the data transfer device. | 2011-08-18 |
20110202697 | Information Processor and Information Processing Method - An information processor includes: a plurality of master cores, a plurality of slave cores, a plurality of slave adapters each connected to a respective slave core of the plurality of slave cores, and an interconnected network for connecting the master cores and slave adapters by way of a plurality of router nodes. The slave adapters compare a first access request transmitted by a first master core among the plurality of master cores and a second access request transmitted by a second master core other than the first master core among the plurality of master cores based on a request from the first master core and a request from the second master core, and transmit the first access request or the second access request to the slave core that is connected to the slave adapter when the first access request and the second access request match. | 2011-08-18 |
20110202698 | APPARATUS AND METHOD FOR INCREASED ADDRESS RANGE OF AN I2C OR I2C COMPATIBLE BUS - An integrated circuit (IC) configured to operate as a slave on an inter-integrated circuit (I | 2011-08-18 |
20110202699 | PREFERRED INTERRUPT BINDING - A method and system for binding interrupts to central processing units (CPUs). An interrupt controller receives an interrupt that is generated by a device coupled to the computer system. The interrupt controller identifies a preferred CPU associated with the device based on a predetermined binding. If the preferred CPU is currently available, the interrupt is sent to the preferred CPU. If the preferred CPU is not currently available, the interrupt is sent to another CPU in the computer system that is currently available. | 2011-08-18 |
20110202700 | DATA PROCESSING APPARATUS, METHOD OF CONTROLLING THE SAME, AND STORAGE MEDIUM STORING PROGRAM - A data processing apparatus which circulates a packet on a ring bus by connecting a plurality of communication modules to the ring bus and causing each communication module to send the packet to an adjacent communication module in synchronism with a predetermined periodical signal includes a plurality of data process modules each connected to a corresponding one of the plurality of communication modules to process data held in the packet, and an input/output module connected to at least one of the plurality of communication modules to receive/output data from/to the communication module. The number of circulations of data through the ring bus, which is input from the input/output module to one of the communication modules, until the data completes a predetermined processing and is received by the input/output module is acquired. The frequency of the periodical signal is changed in accordance with the number of circulations. | 2011-08-18 |
20110202701 | UNIFIED SYSTEM AREA NETWORK AND SWITCH - A network switch, based on the PCI Express protocol, is disclosed. The switch includes a processor, local memory and a plurality of non-transparent bridges. By configuring the non-transparent bridges appropriately, the network switch can facilitate a number of different communication mechanisms, including TCP/IP communication between servers, server clusters, and virtualized I/O device utilization. For example, the network switch may configure the non-transparent bridges so as to have access to the physical memory of every server attached to it. It can then move data from the memory of any server to the memory of any other server. In another embodiment, the network switch is connected to an I/O device, and multiple servers are given access to that I/O device via virtualized connections. | 2011-08-18 |
20110202702 | METHOD AND SYSTEM FOR PCI HYBRID FUNCTION - A single root I/O virtualization (SR-IOV) capable peripheral component interconnect (PCI) device may be operable to configure resources to transparently operate in a non-SR-IOV environment utilizing a physical function (PF) and one or more hybrid functions (HFs). In instances when the SR-IOV capable PCI device is operating in a SR-IOV environment, the SR-IOV capable PCI device may expose a VF configuration space in the hybrid function to an associated PCI driver for configuring the hybrid function as a virtual function. In instances when the SR-IOV capable PCI device is operating in a non-SR-IOV environment, the SR-IOV capable PCI device may hide a SR-IOV extended header in the physical function from the associated PCI driver and expose a PF configuration space in the hybrid function to the associated PCI driver for configuring the hybrid function as a physical function. | 2011-08-18 |
20110202703 | RELIABILITY OF A COMPUTER SYSTEM EMPLOYING PCI EXPRESS DEVICES - An improved PCI Express multiplier device is disclosed. The PCI Express multiplier device comprises two or more device attachers to attach at least two identical PCI Express devices; a root complex attacher to attach a PCI Express root complex; a copier to copy and forward PCI Express data packets from the root complex to all of the attached identical devices; a collector to collect PCI Express data packets sent from the attached identical devices to the root complex; a selector responsive to the collector to select and forward PCI Express data packets from the collected PCI Express data packets to the root complex. | 2011-08-18 |
20110202704 | MEMORY CONTROLLER, METHOD OF CONTROLLING MEMORY ACCESS, AND COMPUTING APPARATUS INCORPORATING MEMORY CONTROLLER - A computing apparatus for accessing a multiple bank memory is provided. The computing apparatus includes a processor, a memory and a memory controller which is configured to store data in a data buffer by accessing the memory in an aligned word unit and output, in response to a request for an unaligned memory access by the processor, requested data by extracting the request data from the data buffer. | 2011-08-18 |
20110202705 | METHOD AND APPARATUS TO MANAGE OBJECT BASED TIER - Exemplary embodiments provide a technique to manage object based tier to improve allocation of media to unallocated area. In one embodiment, a method of allocating an area of a logical volume to an unallocated area of a virtual volume for a write command comprises: calculating an object location of an object based on the write command and an object allocation information, the write command containing a virtual volume name and a virtual volume address of a virtual volume; selecting a tier from a plurality of tiers based on the calculated object location and an object and tier definition information; selecting a media type from a plurality of media types based on the selected tier and a tier and media definition information; and selecting a logical volume from a plurality of logical volumes based on the virtual volume specified by the write command, the object allocation information, a pool information, and the selected media type. | 2011-08-18 |
20110202706 | METHOD AND DRIVER FOR PROCESSING DATA IN A VIRTUALIZED ENVIRONMENT - A data processing method and driver capable of reducing transactions between operating systems (OS) in a virtualization environment that supports a plurality of operating systems are provided. The data processing driver reads, when reading data, an Inode of next data. Then, the data processing driver determines whether or not to request an Inode to a host OS by comparing the read Inode with a requested Inode. | 2011-08-18 |
20110202707 | NVMHCI ATTACHED HYBRID DATA STORAGE - A hybrid data storage device includes a solid-state memory device, a disc-type memory device and a hybrid data storage device controller in communication with the solid-state memory device and the disc-type memory device. The hybrid data storage device controller is configured to receive Non-Volatile Memory Host Controller Interface (NVMHCI) commands from a host and use logic to make decisions for the optimization and efficient performance of the solid-state memory device and the disc-type memory device. | 2011-08-18 |
20110202708 | Integrating A Flash Cache Into Large Storage Systems - An I/O enclosure module is provided with one or more I/O enclosures having a plurality of slots for receiving electronic devices. A host adapter is connected a first slot of the I/O enclosure module and is configured to connect a host to the I/O enclosure. A device adapter is connected to a second slot of the I/O enclosure module and is configured to connect a storage device to the I/O enclosure module. A flash cache is connected to a third slot of the I/O enclosure module and includes a flash-based memory configured to cache data associated with data requests handled through the I/O enclosure module. A primary processor complex manages data requests handled through the I/O enclosure module by communicating with the host adapter, device adapter, and flash cache to manage to the data requests. | 2011-08-18 |
20110202709 | OPTIMIZING STORAGE OF COMMON PATTERNS IN FLASH MEMORY - One embodiment of the present invention provides a method of operation within a flash memory system. During operation, the system receives write data and a corresponding logical address. The system then determines whether the write data matches a predetermined data pattern. If the write data does match the predetermined data pattern, instead of writing the data, the system records an indication that the predetermined data pattern corresponds to the logical address. | 2011-08-18 |
20110202710 | PROTECTION AGAINST DATA CORRUPTION FOR MULTI-LEVEL MEMORY CELL (MLC) FLASH MEMORY - Apparatus having corresponding methods and non-transitory computer-readable media comprise a flash controller configured to control a multi-level memory cell (MLC) flash memory, wherein the MLC flash memory includes a plurality of memory blocks, wherein each memory block includes a plurality of memory cells defining a plurality of pages, wherein each memory cell spans a group of the pages in one of the memory blocks, and wherein the flash controller comprises circuitry configured to receive data to be written to the MLC flash memory, select only one page, from each group of the pages, in one or to more of the memory blocks, and write the data only to the selected pages. | 2011-08-18 |
20110202711 | ADAPTIVE READ AND WRITE SYSTEMS AND METHODS FOR MEMORY CELLS - An apparatus including: a plurality of multi-level memory cells configured to store data, wherein one or more of the multi-level memory cells are designated as pilot memory cells, and wherein each pilot memory cell is configured to store known, pre-determined data; an estimation block configured to, based on the known, pre-determined data, determine (i) estimated mean values of level distributions of the multi-level memory cells and (ii) estimated standard deviation values of level distributions of the multi-level memory cells; and a computation block configured to compute at least optimal or near optimal detection threshold values of level distributions of the multi-level memory cells based, at least in part, on (i) the estimated mean values and (ii) the estimated standard deviation values, wherein the optimal or near optimal detection threshold values are to be used in order to facilitate reading of the data stored in the multi-level memory cells. | 2011-08-18 |
20110202712 | STORAGE DEVICE INCLUDING FLASH MEMORY AND CAPABLE OF PREDICTING STORAGE DEVICE PERFORMANCE - A storage device includes a semiconductor memory storing data. A controller instructs to write data to the semiconductor memory in accordance with a request the controller receives. A register holds performance class information showing one performance class required to allow the storage device to demonstrate best performance which the storage device supports, of performance classes specified in accordance with performance. | 2011-08-18 |
20110202713 | Semiconductor Memory Asynchronous Pipeline - An asynchronously pipelined SDRAM has separate pipeline stages that are controlled by asynchronous signals. Rather than using a clock signal to synchronize data at each stage, an asynchronous signal is used to latch data at every stage. The asynchronous control signals are generated within the chip and are optimized to the different latency stages. Longer latency stages require larger delays elements, while shorter latency states require shorter delay elements. The data is synchronized to the clock at the end of the read data path before being read out of the chip. Because the data has been latched at each pipeline stage, it suffers from less skew than would be seen in a conventional wave pipeline architecture. Furthermore, since the stages are independent of the system clock, the read data path can be run at any CAS latency as long as the re-synchronizing output is built to support it. | 2011-08-18 |
20110202714 | TECHNIQUES FOR DYNAMIC DISK PERSONALIZATION - Techniques for dynamic disk personalization are provided. A virtual image that is used to create an instance of a virtual machine (VM) is altered so that disk access operations are intercepted within the VM and redirected to a service that is external to the VM. The external service manages a personalized storage for a principal, the personalized storage used to personalize the virtual image without altering the virtual image. | 2011-08-18 |
20110202715 | MANAGEMENT-PARTITIONABLE STORAGE SYSTEM, USE METHOD AND MANAGEMENT METHOD THEREOF, AND CONTROLLER THEREOF - A management partitionable storage system, a use method for the management partitionable storage system, a management method and a controller thereof are provided. Herein, whether the management-partitionable storage system is connected into a host is determined. The management-partitionable storage system includes a simulated compact disc (CD) partition and a data storage partition. When the management-partitionable storage system is coupled to the host, the simulated compact disc partition is mounted on a mount point of the host. A command is received from the mount point, wherein the command includes an identification code corresponding to the data storage partition. The command is executed to the data storage partition according to the identification code. | 2011-08-18 |
20110202716 | STORAGE SYSTEM AND DATA WRITING METHOD - A storage system includes: storage devices storing data and varying in data-writing speed; a cash memory storing the write data until the write data is written to the storage device; a storage section that stores the write data received from an external device in the cash memory; and a writing section that takes the write data from the cash memory and writes the taken write data to the storage device. The storage section stores the write data received from the external device, in a storage area according to the type of the storage device to which the write data is to be written, among storage areas resulting from division according to the types of the storage devices. The writing section sequentially takes the write data from the storage area sequentially selected from among the storage areas on the cash memory and writes the taken data to the storage device. | 2011-08-18 |
20110202717 | STORAGE SYSTEM AND CONTROL METHOD THEREOF - The plurality of host systems or the plurality of applications include an insertion unit for sending the identifier. The storage controller includes an analysis unit for identifying a host system or an application based on the identifier contained in the access information and analyzing an access pattern of access information sent from the identified host system or application, a management unit for managing the identifier, the analysis result of the access pattern analyzed with the analysis unit, and a control method for controlling the processing of data to be sent from a host system based on the analysis result or data to be stored in a logical volume, and a data processing controller for controlling the processing of data to be sent from a host system or data to be stored in a logical volume according to the control method managed by the management unit. | 2011-08-18 |
20110202718 | DUAL WRITING DEVICE AND ITS CONTROL METHOD - A data storing system include a first and second storage system, each including a cache memory and a disk drive, and a third storage system coupled to the first and second storage systems and including a third disk drive to provide a third logical volume based on the third disk drive. First and second write data is transmitted from the first storage system to the second storage system according to copy pair management information. A certain storage system, which is one of the first and second storage systems, destages the second write data from a cache memory of the certain storage system to the third logical volume in the third storage system according to a volume and storage conversion table in the certain storage system. | 2011-08-18 |
20110202719 | Logical Drive Duplication - There is provided a method of, and apparatus for, duplicating a logical drive. The method includes sequentially copying data from a source logical drive to a destination logical drive, and determining whether a write request to the source logical drive is received during the sequential copying. If so, the step of copying data in the write-requested data area to an additional storage area is carried out prior to executing the write request. It is further specified that the data in the write-requested data area is to be ignored and not copied during the sequential copying. The method further includes copying, upon completion of the sequential copying, data from the additional storage area to the destination logical drive. | 2011-08-18 |
20110202720 | Snapback-Free Logical Drive Duplication - There is provided a method of duplicating a logical drive. The method includes sequentially copying data from a source logical drive to a destination logical drive and determining whether a write request is received to a data area on the source logical drive which has not yet been copied to the destination logical drive. If a write request is detected, the data at the write-requested data area is copied to the destination logical drive prior to executing the write request. By providing such a method, the destination logical drive can be used as the change-data store while in the process of the duplication operation, removing the need for a snapshot logical drive in the duplication process. This results in improvements in duplication speed and reduces drive wear due to the reduced number of data reads/writes. | 2011-08-18 |
20110202721 | REDUNDANT ARRAY OF INDEPENDENT STORAGE - A data storage system includes three or more storage devices, each associated with a unique data volume. A first one of the data storage devices at least has two or more data storage areas but can have more storage areas, which can be either data storage areas or parity storage areas. A second data storage device at least has two storage areas, one of which is a data storage area. A third data storage device at least has a parity storage area but can have more storage areas, which can be either data storage areas or parity storage areas. A first group of corresponding storage areas is defined by at least the data storage areas of the first and second storage devices and the parity storage area of the third storage device. A second group of corresponding storage areas is defined by at least the storage areas of the first and second storage devices. When a data segment is written to one of the data storage areas of a storage device, parity information can be updated using information read from one or more storage areas of the group of corresponding storage areas having the data storage area to which the data segment is written. | 2011-08-18 |
20110202722 | Mass Storage System and Method of Operating Thereof - There are provided a storage system and a method of operating thereof. The method comprises: caching in the cache memory a plurality of data portions matching a certain criterion, thereby giving rise to the cached data portions; analyzing the succession of logical addresses characterizing the cached data portions; if the cached data portions cannot constitute a group of N contiguous data portions, where N is the number of RG members, generating a virtual stripe being a concatenation of N data portions wherein at least one data portion among said data portions is non-contiguous with respect to any other portion in the virtual stripe, and wherein the size of the virtual stripe is equal to the size of the stripe of the RAID group; destaging the virtual stripe and writing it to a respective storage device in a write-out-of-place manner. The virtual stripe can be generated responsive to receiving a write request from a client and/or responsive to receiving a write instruction from a background process. | 2011-08-18 |
20110202723 | Method of allocating raid group members in a mass storage system - There are provides an allocation module and a method of allocating a logical disk to a next member of a given RAID group. The method comprises: identifying one or more physical disks comprising at least one logical disk with already allocated member of said given RAID group, thus giving rise to allocated physical disks; identifying one or more pairs constituted by at least one allocated physical disk with non-allocated physical disks, said pairs having minimal number of RAID groups with members allocated to both physical disks in the pair, thus giving rise to a first group of pairs with minimal contention value; and selecting among the first group of pairs with minimal contention value one or more non-allocated physical disks as candidate physical disks for allocating said next member MEM | 2011-08-18 |
20110202724 | IOMMU Architected TLB Support - Embodiments allow a smaller, simpler hardware implementation of an input/output memory management unit (IOMMU) having improved translation behavior that is independent of page table structures and formats. Embodiments also provide device-independent structures and methods of implementation, allowing greater generality of software (fewer specific software versions, in turn reducing development costs). | 2011-08-18 |
20110202725 | SOFTWARE-ACCESSIBLE HARDWARE SUPPORT FOR DETERMINING SET MEMBERSHIP - A method and processor supporting architected instructions for tracking and determining set membership, such as by implementing Bloom filters. The apparatus includes storage arrays (e.g., registers) and an execution core configured to store an indication that a given value is a member of a set, including by executing an architected instruction having an operand specifying the given value, wherein executing comprises hashing applying a hash function to the value to determine an index into one of the storage arrays and setting a bit of the storage array corresponding to the index. An architected query instruction is later executed to determine if a query value is not a member of the set, including by applying the hash function to the query value to determine an index into the storage array and determining whether a bit at the index of the storage array is set. | 2011-08-18 |
20110202726 | Apparatus and method for handling data in a cache - A data processing apparatus for forming a portion of a coherent cache system comprises at least one master device for performing data processing operations, and a cache coupled to the at least one master device and arranged to store data values for access by that at least one master device when performing the data processing operations. Cache coherency circuitry is responsive to a coherency request from another portion of the coherent cache system to cause a coherency action to be taken in respect of at least one data value stored in the cache. Responsive to an indication that the coherency action has resulted in invalidation of that at least one data value in the cache, refetch control circuitry is used to initiate a refetch of that at least one data value into the cache. Such a mechanism causes the refetch of data into the cache to be triggered by the coherency action performed in response to a coherency request from another portion of the coherent cache system, rather than relying on any actions taken by the at least one master device, thereby providing a very flexible and efficient mechanism for reducing cache latency in a coherent cache system. | 2011-08-18 |
20110202727 | Apparatus and Methods to Reduce Duplicate Line Fills in a Victim Cache - Techniques and methods are used to reduce allocations to a higher level cache of cache lines displaced from a lower level cache. The allocations of the displaced cache lines are prevented for displaced cache lines that are determined to be redundant in the next level cache, whereby castouts are reduced. To such ends, a line is selected to be displaced in a lower level cache. Information associated with the selected line is identified which indicates that the selected line is present in a higher level cache or the selected line is a write-through line. An allocation of the selected line in the higher level cache is prevented based on the identified information. Preventing an allocation of the selected line saves power that would be associated with the allocation. | 2011-08-18 |
20110202728 | METHODS AND APPARATUS FOR MANAGING CACHE PERSISTENCE IN A STORAGE SYSTEM USING MULTIPLE VIRTUAL MACHINES - Methods and systems for assuring persistence of battery backed cache memory in a storage system comprising multiple virtual machines. In one exemplary embodiment, an additional process is added to the storage controller that senses the loss of power and copies the entire content of the cache memory including portions used by each of the multiple virtual machines to a nonvolatile persistent storage that does not rely on the battery capacity of the storage system. In another exemplary embodiment, the additional process calls a plug-in procedure associated with each of the virtual machines to permit the virtual machine to assure that the content of its portion of the cache memory is consistent before the additional process copies the cache memory to nonvolatile memory. The additional process may be integrated with the hypervisor or may be operable as a separate process in yet another virtual machine. | 2011-08-18 |
20110202729 | EXECUTING ATOMIC STORE DISJOINT INSTRUCTIONS - A disjoint instruction for accessing operands in memory while executing in a processor of a plurality of processes interrogates a state indicator settable by other processors to determine if the disjoint instruction accessed the operands without an intervening store operation from another processor to the operand. A condition code is set based on the state indicator. | 2011-08-18 |
20110202730 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND COMPUTER-READABLE RECORDING MEDIUM - An information processing apparatus according to the present invention is arranged in a client terminal connected to a server storing data via a network, wherein the information processing apparatus receives requests from one or a plurality of applications in the client terminal and controls transmission and reception of information to/from the server. The information processing apparatus includes an authentication information storage unit for storing authentication information of a user for accessing the server, and a request transmission unit for attaching the authentication information of the user of the client terminal to a request based on the request given by the application of the client terminal, and transmits the request to the server. | 2011-08-18 |
20110202731 | CACHE WITHIN A CACHE - In a cache memory, energy and other efficiencies can be realized by saving a result of a cache directory lookup for sequential accesses to a same memory address. Where the cache is a point of coherence for speculative execution in a multiprocessor system, with directory lookups serving as the point of conflict detection, such saving becomes particularly advantageous. | 2011-08-18 |
20110202732 | EXTENT MIGRATION SCHEDULING FOR MULTI-TIER STORAGE ARCHITECTURES - A method for scheduling the migration of extents between extent pools of a storage system is disclosed herein. In certain embodiments, such a method includes periodically profiling an extent pool to generate a historical data access profile of the extent pool. Using this historical data access profile, the method determines an optimal migration window for migrating an extent to the extent pool. The method then identifies an actual extent for migration to the extent pool. Once the actual extent is identified, the method schedules the extent for migration to the extent pool during the optimal migration window. A corresponding apparatus and computer program product are also disclosed herein. | 2011-08-18 |
20110202733 | SYSTEM AND/OR METHOD FOR REDUCING DISK SPACE USAGE AND IMPROVING INPUT/OUTPUT PERFORMANCE OF COMPUTER SYSTEMS - The present invention provides a system and/or method for reducing disk space usage and/or improving I/O performance of a computer system through the use of data compression and mapping of data page blocks to reduced size data file blocks. The system and/or method can be used to intercept activity at an interface of a computer system I/O subsystem and then map logical data page blocks to reduced sized physical file data blocks on a one-to-one basis, utilizing a suitable data compression algorithm. The system and/or method also allows data compression to be reversed when reading data from a physical disk storage medium associated with that computer system. The system may be implemented as either a device driver or a module linked to an I/O module of a computer system. | 2011-08-18 |
20110202734 | STORAGE SYSTEMS AND METHODS - Systems and methods for backup test restore are presented. In one embodiment a backup restore test method includes performing a backup process; performing a test restore virtual environment creation process, the test restore virtual environment including a plurality of virtual machines; and performing a test of the backup on the test restore virtual environment. The backup process can include backing up information associated with an application; identifying prerequisites associated with running the application; and backing up information associated with the prerequisites. The test restore virtual environment creation process can include gathering information identifying the prerequisites associated with the application; creating the plurality of virtual machines, wherein the plurality of virtual machines includes virtual machines corresponding to physical machines the application and perquisites run on; and bringing up the plurality of virtual machines utilizing the information from the backup process. | 2011-08-18 |
20110202735 | COMPUTER SYSTEM, AND BACKUP METHOD AND PROGRAM FOR COMPUTER SYSTEM - A backup is completed within a backup window designated by a user. | 2011-08-18 |
20110202736 | INFORMATION-STORAGE SYSTEM - An information-storage system storing information includes, an information-storage unit configured to store data, an encoding/decoding unit configured to encode and store input data in the information-storage unit, and decode and output the encoded data stored in the information-storage unit upon receiving a request for an information output, a transmission unit configured to output the encoded data stored in the information-storage unit, the encoded data being left undecoded, and store the encoded data in a backup spot different from the information-storage unit, a status-monitoring unit configured to monitor an unusual status of the information-storage system, and a selection unit configured to select the transmission unit between the encoding/decoding unit and the transmission unit when the status-monitoring unit confirms the unusual status of the information-storage system. | 2011-08-18 |
20110202737 | STORAGE APPARATUS AND STORAGE SYSTEM - A storage apparatus includes: an associating unit that associates a first memory area in which data to be copied are stored and a second memory area of a destination storage apparatus to which the data are copied; a detecting unit that detects a start or an end of copying the data from the first memory area to the second memory area associated by the associating unit; and an access control unit that controls access to the first memory area and the second memory area based on a result of detection performed by the detecting unit. | 2011-08-18 |
20110202738 | COMPUTER SYSTEM AND CONTROL METHOD FOR THE COMPUTER SYSTEM - A computer system including a first storage system connected to a first host computer, a second storage system connected to a second host computer and a third storage system connected to the first and second storage systems. The second storage system sets transfer setting before an occurrence of a failure, the transfer setting being provided with a dedicated storage area to be used for transferring data to the third storage system by asynchronous copy in response to a failure at the first host computer. Before the start of data transfer between the second storage system and third storage system to be executed after an occurrence of the failure, the second storage system checks the dedicated storage area, data transfer line and transfer setting information, and if an abnormal state is detected, this abnormal state is reported to the host computer as information attached to the transfer setting. | 2011-08-18 |
20110202739 | Restricting memory areas for an instruction read in dependence upon a hardware mode and a security flag - An apparatus for processing data | 2011-08-18 |
20110202740 | Storing secure page table data in secure and non-secure regions of memory - Apparatus for data processing | 2011-08-18 |
20110202741 | STORAGE SYSTEM, DATA RELOCATION METHOD THEREOF, AND RECORDING MEDIUM THAT RECORDS DATA RELOCATION PROGRAM - There is a need to improve access speed for a file in a storage system that is provided with multiple storage units having different access speeds. | 2011-08-18 |