35th week of 2013 patent applcation highlights part 80 |
Patent application number | Title | Published |
20130227495 | ELECTRONIC DEVICE AND METHOD OF CONTROLLING A DISPLAY - A method comprises detecting, by a portable electronic device having a display, a gesture, selecting a category of selectable items based on the gesture. The method further comprises identifying one or more selectable items within the selected category to be displayed, and displaying the one or more selectable items. | 2013-08-29 |
20130227496 | IMAGE PROCESSING DEVICE, NON-TRANSITORY COMPUTER READABLE MEDIUM, AND IMAGE PROCESSING METHOD - Provided is an image processing device including a display unit that displays a function setting screen, a recognition unit that recognizes a trail of an operation of a user on the function setting screen displayed on the display unit, a determining unit that determines a function selected by the user based on a position of the trail of the operation recognized by the recognition unit, an identification unit that identifies an operation condition designated by the user with respect to the function determined by the determining unit based on the trail of the operation recognized by the recognition unit, and a setting unit that performs setting for executing image processing of the function determined by the determining unit using the operation condition identified by the identification unit. | 2013-08-29 |
20130227497 | APPARATUS AND METHOD FOR GENERATING STANDBY SCREEN - An apparatus and method for generating a standby screen in a mobile terminal generates a standby screen which includes more than one image and may periodically replace or alter the displayed image. The method determines a grid layout of an output area of a screen and may configure each image to match a base cell or a random cell in size. The screen may include multiple layers and each layer may have a different image displayed thereon. | 2013-08-29 |
20130227498 | PATTERN BASED METHOD FOR IDENTIFYING DESIGN FOR MANUFACTURING IMPROVEMENT IN A SEMICONDUCTOR DEVICE - A method includes receiving a design layout file for an integrated circuit device in a computing apparatus. The design layout file specifies dimensions of a plurality of features. Outer markers are generated in the computing apparatus for at least a subset of the features based on the proximity of the features to one another and spacing requirements. Features are identified in the computing apparatus where the associated outer marker has at least one dimension greater than the dimensions specified for the feature. | 2013-08-29 |
20130227499 | LAYOUT METHOD FOR SOFT-ERROR HARD ELECTRONICS, AND RADIATION HARDENED LOGIC CELL - This invention comprises a layout method to effectively protect logic circuits against soft errors (non-destructive errors) and circuit cells, with layout, which are protected against soft errors. In particular, the method protects against cases where multiple nodes in circuit are affected by a single event. These events lead to multiple errors in the circuit, and while several methods exist to deal with single node errors, multiple node errors are very hard to deal with using any currently existing protection methods. The method is particularly useful for CMOS based logic circuits in modem technologies (.ltoreq.90 nm), where the occurrence of multiple node pulses becomes high (due to the high integration level). It uses a unique layout configuration, which makes the circuits protected against single event generated soft-errors. | 2013-08-29 |
20130227500 | Calculation System For Inverse Masks - A system for calculating mask data to create a desired layout pattern on a wafer reads all or a portion of a desired layout pattern. Mask data having pixels with transmission values is defined along with corresponding optimal mask data pixel transmission values. An objective function is defined that compares image intensities as would be generated on a wafer with an optimal image intensity at a point corresponding to a pixel. The objective function is minimized to determine the transmission values of the mask pixels that will reproduce the desired layout pattern on a wafer. | 2013-08-29 |
20130227501 | SEMICONDUCTOR DEVICE DESIGN METHOD, SYSTEM AND COMPUTER-READABLE MEDIUM - In a semiconductor device design method performed by at least one processor, first and second electrical components are extracted from a layout of a semiconductor device. The semiconductor device has a semiconductor substrate and the first and second electrical components in the semiconductor substrate. Parasitic parameters of a coupling in the semiconductor substrate between the first and second electrical components are extracted using a first tool. Intrinsic parameters of the first and second electrical components are extracted using a second tool different from the first tool. The extracted parasitic parameters and intrinsic parameters are combined into a model of the semiconductor device. The parasitic parameters of the coupling are extracted based on a model of the coupling included in the second tool. | 2013-08-29 |
20130227502 | ALGORITHM OF CU INTERCONNECT DUMMY INSERTING - The present invention disclosed an algorithm of Cu interconnect dummy inserting, including: divide the surface of semiconductor chip into several square windows with an area of A, each of which is non-overlap; perform a logic operation on each square window; and divide the window into two parts: {circle around (1)} the area to-be-inserted; {circle around (2)} the non-inserting area; determine the metal density of the dummy pattern that should be inserted to each square window and the line width; determine the dummy pattern that should be inserted to the windows according to the metal density, line width, the pre-set dummy pattern and the layouting rules. The beneficial effects of the present invention is: avoided the shortcomings of fill density maximization in the rule-based filling method by using reasonable metal density and line width. And with a combination of the influence of line width and density to the copper plating process and chemical mechanical polishing morphology in model-based filling method, it can achieve a better planarization effect. | 2013-08-29 |
20130227503 | DATA FLOW ANALYZER - A system and method for generating physical design of an integrated circuit, based on schematic design. The system includes graphical user interface and integrated circuit design and layout system. The integrated circuit design and layout system creates and analyzes logical slices of the integrated circuit based on the schematic design; creates and edits macros based on the logical slices; and traces and analyzes data paths through the physical design based on the schematic design. The method includes providing the schematic design of the integrated circuit, and generating logical slices of the integrated circuit from the schematic design. The method also includes generating, grouping and manipulating macros, responsive to identification of multiple occurrences of logical slices. The method further includes performing data flow analysis to identify data paths for the physical design, quantifying weight indices for the data paths, and positioning objects in the physical design based on the weight indices. | 2013-08-29 |
20130227504 | SYSTEM AND METHOD FOR DESIGN, PROCUREMENT AND MANUFACTURING COLLABORATION - A method for designing an electronic component includes receiving a device criteria (e.g., a parametric value, procurement value, etc.) from a designer, querying a database for devices corresponding to the device criteria, querying the database for procurement data and/or engineering data associated with the corresponding devices, presenting the devices to the designer based on the procurement data, and receiving input from the designer identifying one of the presented devices as a selected device. In a particular method, the returned devices are sorted based on one or more procurement values (e.g., manufacturer, price, availability, manufacturer status, etc.), and presented to the designer in a ranked list. Objects representative of the selected devices are then entered into a design file, and the objects are associated with the device's engineering and/or procurement data. In a particular embodiment, the objects are associated with the engineering data by embedding the engineering data in the file object. Optionally, data can be associated with the objects via links to the database. Types of engineering data that can be associated with design file objects include, but are not limited to, device footprint data, device pinout data, device physical dimension data, parametric data, and packaging data. Additionally, connection data and annotation data can be entered into the design file objects by the designer. | 2013-08-29 |
20130227505 | Equivalence Checking Method, Equivalence Checking Program, and Equivalence Checking Device - Specific characteristics of a branch structure between a behavioral description and a hardware description, a structural dependence relation therebetween, and the like are extracted and used to shorten the time of processing for equivalence checking, thereby contributing to the shortening of a processing time required for equivalence checking for a high-level description and a behavioral synthesis result. Upon checking of the equivalence of a high-level description and a synthesis result obtained by performing a behavior synthesis on the high-level description according to a behavioral synthesis restriction, correspondence information between flip-flops with a feedback loop in the synthesis result and variables associated therewith with a backward data dependence relation in a high-level description is generated and used. | 2013-08-29 |
20130227506 | TIMING VERIFICATION METHOD FOR DETERMINISTIC AND STOCHASTIC NETWORKS AND CIRCUITS - The timing verification method for deterministic and stochastic networks and circuits is a computerized method that includes a non-enumerative path length analysis algorithm for deterministic and stochastic directed acyclic graphs (DAGs) with applications to timing verification of circuits, the algorithm computing statistical measures of path lengths without storing and/or manipulating the paths in such networks. The timing verification method is able to compute deterministic or probabilistic costs assigned to edges, vertices, or both. | 2013-08-29 |
20130227507 | Recursive Hierarchical Static Timing Analysis - A method for recursive hierarchical static timing analysis. The method includes accessing a lower-level netlist representing a lower-level block of a circuit design to be realized in physical form, and accessing constraints for the lower-level block. Static timing analysis is performed on the lower-level block. The method includes accessing an upper-level netlist representing an upper-level block of the circuit design to be realized in physical form, and accessing constraints for the upper-level block. Static timing analysis is performed on the upper-level block while incorporating results from the static timing analysis on the lower-level block. Subsequently, recursive static timing analysis is performed on the lower-level block and the upper-level block, wherein results from static timing analysis on the upper-level block are feedback for updating the constraints for the lower-level block, and wherein results from static timing analysis on the lower-level block are feedback for updating the constraints for the upper-level block. | 2013-08-29 |
20130227508 | COMPUTER SYSTEM AND METHOD FOR DETERMINING A TEMPERATURE RISE IN DIRECT CURRENT (DC) LINES CAUSED BY JOULE HEATING OF NEARBY ALTERNATING CURRENT (AC) LINES - A computer system performs a verification process that quickly and efficiently determines a temperature rise of DC conductor lines of an IC design caused by Joule heating in nearby AC conductor lines of the IC design, and whether the temperature rise is acceptable in terms of an electromigration performance of the IC design. | 2013-08-29 |
20130227509 | PROTOTYPE AND EMULATION SYSTEM FOR MULTIPLE CUSTOM PROTOTYPE BOARDS - A test system for testing prototype designs includes a host workstation, multiple interface devices, and multiple prototype boards. The prototype boards include programmable devices which implement one or more partitions of a user design and an associated verification modules. The verification modules probe signals of the partitions and transmit the probed signals to the interface devices. The verification modules can also transmit output signals generated by one or more partitions on the prototype boards to the host workstation via the interface devices, and transmit input signals, which are received from the host workstation via the interface devices, to one or more partitions on the prototype boards. | 2013-08-29 |
20130227510 | DATABASE BASED TIMING VARIATION ANALYSIS - A method for timing analysis of a circuit design includes, for each group of one or more instances of a cell of a cell library in the circuit design, determining timing related data for the group according to circuit context of the group in the design. The context includes at least one of a path depth, an output load, and an input slew rate. The determined timing related data are applied to analyze the circuit design. | 2013-08-29 |
20130227511 | METHOD FOR REPEATED BLOCK MODIFICATION FOR CHIP ROUTING - In various embodiments, each possible different instance of a repeated block can be concurrently modified for chip routing. Repeated blocks can be implemented where all instances of a repeated block are identical or substantially identical. Pin placement may be determined based on analysis of the I/O for all instances. The pin placement may be generated to be identical or substantially similar for all instances. Flyover blockages can be designed into repeated blocks to enable the global router to wire through the repeated block. Buffers and associated pins can be inserted into repeated block within the flyover space where the global router wires to the needed buffer through area pins. | 2013-08-29 |
20130227512 | OPTIMIZATION FOR CIRCUIT DESIGN - Methods for optimizing design parameters of a circuit are disclosed. In one aspect, an optimization problem includes one or more performance specifications that represent an exponent of a design parameter to be optimized. Various parameters of passive and active circuit devices may be efficiently and accurately optimized as a result. In another aspect, linear performance specifications are included for accurately calculating voltages. In yet other aspects of the invention, three special types of convex optimization problems are disclosed for enabling the above use of exponents of design parameters which provide efficient and accurate calculations of a virtually unlimited array of circuit parameters and performance characteristics. | 2013-08-29 |
20130227513 | GATING TAP REGISTER CONTROL BUS AND AUXILIARY/WRAPPER TEST BUS - In a first embodiment a TAP | 2013-08-29 |
20130227514 | Method of Generating RC Technology File - A method of generating resistance-capacitance (RC) technology files is disclosed. The method comprises receiving a plurality of metal schemes from an IC foundry and dividing the plurality of metal schemes into one or more modular RC groups. The method further comprises identifying a modular RC structure; calculating capacitance values of the modular RC structure by means of a field solver; calculating an equivalent dielectric constant and an equivalent height of the RC structure based upon a variety of interconnect layers not having interconnects; calculating an equivalent dielectric constant and an equivalent height for each of the plurality of metal schemes; and deriving capacitance values of each of the plurality of metal schemes from the capacitance values of the modular RC structure. | 2013-08-29 |
20130227515 | FORECASTING OF REUSABLE SOFTWARE ASSETS - Systems and methods for forecasting reusable software assets are described. In one embodiment, the method comprises receiving a forecast comprising forecast information pertaining to at least one forecasted software asset. Further, the method comprises mapping the forecast to a domain map based on the forecast information, wherein the domain map includes a plurality of domain constituents. Based in part on the mapping, a development request for creation of the at least one forecasted software asset is generated. | 2013-08-29 |
20130227516 | METHODS AND SYSTEMS FOR PROVIDING FEEDBACK AND SUGGESTED PROGRAMMING METHODS - The techniques and supporting systems described herein provide a comprehensive and customizable approach to identifying the use of best practices during the design and development of software applications, as well as recommending additional enhancements or courses of action that may be implemented to further improve the application. Target software application code is received specific application security best practices applicable to the target software application are identified. Locations in the code where the various best practices ought to be implemented are then identified, and a determination is made whether the relevant best practices are implemented for each location. Finally, positive feedback is provided to the developers for what appears to be their correct implementation of best practices. | 2013-08-29 |
20130227517 | METHOD AND SYSTEM FOR MONITORING METADATA RELATED TO SOFTWARE ARTIFACTS - Collecting and storing an artifact identifier for one or more artifacts, project identifiers for one or more software projects that use each artifact, and information about the temporal version for the artifacts. Collecting and storing project information related to the software projects, including a project identifier for each project, and contact information for a user of each software project. Collecting Metadata associated with the software artifacts, which includes information identifying the artifact, information about security risks associated with the artifact, information about a license associated with the artifact, or information indicative of a level of use or user rating of the artifact. The metadata is periodically or continually monitored to determine whether there has been any actionable change, and notifying the user about the actionable change. | 2013-08-29 |
20130227518 | Software Modeling System and Method - A device for modeling a software application includes an environmental model that includes a first set of attributes. The first set of attributes includes a value attribute, a declaration, and a set of meta-attributes. A behavioral model includes a second set of attributes, including a portion of the first set of attributes, wherein the environmental and behavioral models share the portion. The second set of attributes includes a value attribute and set of meta-attributes, each having at least one of a declaration and function. Changes to an attribute in the behavioral model reflect in all models that share the attribute. A design model includes a first decomposition of the second set of attributes into a first plurality of groups. A run-time model includes a second decomposition of the second set of attributes into a second plurality of groups, and records the decomposition of the behavioral model into run-time components. | 2013-08-29 |
20130227519 | METHODS AND SYSTEMS FOR PARSING DATA OBJECTS - Methods and apparatuses for use in applying an update to a communication protocol in a software application that is executed by a computing device are described herein. The computing device receives a protocol definition corresponding to a communication protocol and indicating positions of data elements within data objects corresponding to the communication protocol. When the computing device determines that the received protocol definition differs from a previous protocol definition corresponding to the communication protocol, the computing device creates a machine-executable object parser based on the received protocol definition. The machine-executable object parser is accessible to a software application executed by the computing device. The software application receives a data object corresponding to the communication protocol, and the computing device executes the machine-executable object parser to parse at least a portion of the data elements in the data object received by the software application. | 2013-08-29 |
20130227520 | Rapid process integration through visual integration and simple interface programming - In a first aspect, the invention features a method. A method of simplifying object interaction comprises defining objects whose public interface contains only properties; creating structured data objects; locating references to objects in the structured data object; associating said structured data object with at least one thread; locating said references; initializing said objects; accessing said objects; wherein said objects are persist-able; wherein said properties contain values or locators containing a reference to values. | 2013-08-29 |
20130227521 | VALIDATION OF APPLICATIONS FOR GRAPHICS PROCESSING UNIT - The techniques described in this disclosure are directed to validating an application that is to be executed on a graphics processing unit (GPU). For example, a validation server device may receive code of the application. The validation server device may provide some level of assurance that the application satisfies one or more performance criteria. In this manner, the probability of a problematic application executing on the device that includes the GPU may be reduced. | 2013-08-29 |
20130227522 | Integrated Application Localization - Integrated application localization techniques are described in which support for application localization is provided as an integrated component of a development environment. Localizations for selected languages/locales integrate with application builds in the development environment so that updates are synchronized with project resources for multiple languages. This involves creating and employing localization files corresponding to source content of a project using a designated file format suitable to enable translations. Localization files that are created in the designated format may be exposed in various ways for translation via the system, a developer, a translation service, or other selected translation sources. A single multilingual resource file for an application is then generated to contain resources in multiple languages based on translations made available through the translation sources. | 2013-08-29 |
20130227523 | Software-Developing Structured-Data-File Creating Apparatus and Method Capable of Efficiently Creating Data File Used in Developing Program for Device - A software-developing structured-data-file creating apparatus of the present disclosure includes a storage unit configured to store a specification list comprising specific values associated with a plurality of individual items indicative of specifications of a device and a location-path list comprising location paths associated with individual portions of the plurality of individual items. The software-developing structured-data-file creating apparatus also includes an input unit, configured to associate common portions of the location paths. The software-developing structured-data-file creating apparatus additionally includes a structured-data-file creating unit configured to create a data file comprising the common portions of the location paths in the location-path. The corresponding values in the specification list are added to the individual location paths. | 2013-08-29 |
20130227524 | METHOD AND APPARATUS FOR ANALYZING APPLICATION PROGRAM BY ANALYSIS OF SOURCE CODE - A method and an apparatus for analyzing source codes of an application program having open source codes and analyzing features which are used in the application program are provided. The method includes analyzing the application program according to the source codes in the application program, determining application program configuration information used in the application program, and classifying and outputting the application program configuration information according to the determined application program configuration information. | 2013-08-29 |
20130227525 | Delivery of Changesets by Environment - A method for allowing selective delivery of changesets by environment includes selecting at least one value in software code of a software program; specifying at least one environment for the selected at least one value; compiling the software code in each specified at least one environment; delivering the software code to a central repository; determining how the specified at least one environment is defined; and choosing at least one environment to build against, thereby ensuring that only software code for the chosen environment is pulled from the central repository. | 2013-08-29 |
20130227526 | SOFTWARE DEVELOPMENT AND DISTRIBUTION WORKFLOW EMPLOYING META-OBJECT TIME STAMPING - A method and system facilitating the development and distribution of software is provided. The system includes tracking revisions to elements of a database on the computing device by establishing time stamps for each stored element changed at a specified time, enabling a user to select an applicable time period comprising a beginning time point and an end time point, and assembling elements for execution based on time stamps limited to the selected applicable time period. | 2013-08-29 |
20130227527 | METHOD AND APPARATUS FOR DEPENDENCY TRACKING IN JAVASCRIPT - A method and apparatus for dependency tracking in a JavaScript is disclosed. The method comprises defining a plurality of properties as JavaScript property objects, evaluating at least one expression containing at least one property object in the plurality of property objects to define at least one dependent property, notifying the at least one dependent property when a state of the property object changes, and updating the state of the at least one dependent property based on the changed state of the property object. | 2013-08-29 |
20130227528 | PARADIGM FOR CONCURRENCY TESTCASE GENERATION - A concurrency testcase generation includes providing a concurrency testcase template for features built into a concurrency testcase generation infrastructure that requires no compilation. Through the concurrency testcase template, testers may input directives for managing activities of concurrent threads, directives for configuring timing tests by the concurrent threads, directives for configuring responses to errors by the concurrent threads, and directives for configuring logging of data for the concurrent threads. The directives for managing activities of the concurrent threads may include directives for managing creation of the concurrent threads, directives for customizing actions of each concurrent thread, directives for managing a sequence of the concurrent threads, directives for exchanging of information between the concurrent threads, and directives for configuring throughput for the concurrent threads. The inputted directives collectively define the concurrency testcase. In this manner, the testcase generation infrastructure masks the programming complexities of the features from testers. | 2013-08-29 |
20130227529 | Runtime Memory Settings Derived from Trace Data - An analysis system may perform network analysis on data gathered from an executing application. The analysis system may identify relationships between code elements and use tracer data to quantify and classify various code elements. In some cases, the analysis system may operate with only data gathered while tracing an application, while other cases may combine static analysis data with tracing data. The network analysis may identify groups of related code elements through cluster analysis, as well as identify bottlenecks from one to many and many to one relationships. The analysis system may generate visualizations showing the interconnections or relationships within the executing code, along with highlighted elements that may be limiting performance. | 2013-08-29 |
20130227530 | METHOD AND APPARATUS FOR DEBUGGING A PROGRAM OF A BUSINESS PROCESS - A method and apparatus for debugging a program of a business process, the method comprising: displaying a flowchart of the process on a display, said displaying being enabled by one or more plug-ins; enabling setting of a debugging breakpoint in the displayed flowchart of the process of the program; operating a simulator for creating a simulated runtime environment for executing the program as if the program is operating in actual application; executing the program using the simulator; continuously communicating status of the executing program from the simulator to one of the plug-ins; determining at one of the plug-ins whether the status of the executing program has reached the breakpoint set in the displayed flowchart of the process of the program; and suspending execution of the program when the plug-in determines that the status of the executing program has reached the breakpoint set in the displayed flowchart of the process of the program. | 2013-08-29 |
20130227531 | Methods and Systems for Modifying A Compiler to Generate A Profile of A Source Code - Systems and methods for modifying a compiler to generate a profile of a source code are described. One of the methods includes receiving the source code. The source code excludes instrumentation and includes functions. The method also includes compiling the source code with the compiler to generate metrics that are associated with execution of the functions within the source code. The compiling operation includes applying function tracking commands that were inserted into a compiler. The commands are used for tracking beginnings and ends of the functions to be tested. | 2013-08-29 |
20130227532 | APPLICATION GENERATION SYSTEM AND METHOD FOR GENERATING AN APPLICATION - The application generation system includes: a first managing unit to extract at least one execution component from at least one application; and a second management unit to generate an extracted execution component into a container application. The system provides the ability to generate an application configured by extracting operations among the operations of applications stored in a terminal. | 2013-08-29 |
20130227533 | CODE TRANSFORMATION - The invention concerns the transformation of executable code from one language to another. In particular, the invention concerns the automated transformation of code. The invention concerns methods software and computer systems for the creation of a tree comprised of nodes to be used in the transformation of code. The invention also concerns the methods, software and computer systems for the building of a parser to be used in the transformation of code. Finally, the invention also concerns an automated and iterative method of transforming, assessing and re-transforming code. The invention is advantageous in its ability to avoid usage of an intermediate transformation language and its high level of automation that reduces manual transformation and accordingly is more efficient and less costly. | 2013-08-29 |
20130227534 | SIMULATION APPARATUS, METHOD AND MEDIUM - A code converter | 2013-08-29 |
20130227535 | HARDWARE IMPLEMENTATION OF INTERPRETED PROGRAMMING LANGUAGE STACKS - Methods and systems for implementing “virtual machine” interpreters in a hardware component. The virtual machine interpreter may be implemented in the hardware component (e.g., a processor) by configuring the hardware component to include programming language interpreter logic. The hardware component is configured to include multiple logic gates and arrays representing a hardware-based implementation of a virtual machine interpreter. | 2013-08-29 |
20130227536 | Increasing Performance at Runtime from Trace Data - An analysis system may perform network analysis on data gathered from an executing application. The analysis system may identify relationships between code elements and use tracer data to quantify and classify various code elements. In some cases, the analysis system may operate with only data gathered while tracing an application, while other cases may combine static analysis data with tracing data. The network analysis may identify groups of related code elements through cluster analysis, as well as identify bottlenecks from one to many and many to one relationships. The analysis system may generate visualizations showing the interconnections or relationships within the executing code, along with highlighted elements that may be limiting performance. | 2013-08-29 |
20130227537 | CONTROL STRUCTURE REFINEMENT OF LOOPS USING STATIC ANALYSIS - A system and method for discovering a set of possible iteration sequences for a given loop in a software program is described, to transform the loop representation. In a program containing a loop, the loop is partitioned into a plurality of portions based on splitting criteria. Labels are associated with the portions, and an initial loop automaton is constructed that represents the loop iterations as a regular language over the labels corresponding to the portions in the program. Subsequences of the labels are analyzed to determine infeasibility of the subsequences permitted in the automaton. The automaton is refined by removing all infeasible subsequences to discover a set of possible iteration sequences in the loop. The resulting loop automaton is used in a subsequent program verification or analysis technique to find violations of correctness properties in programs. | 2013-08-29 |
20130227538 | SECURITY CHIP USED IN A CONTENTS DATA PLAYING DEVICE, UPDATE MANAGEMENT METHOD, AND UPDATE MANAGEMENT PROGRAM - A security chip is used in a contents data playing device. The security chip includes a storage unit configured to store firmware data including a firmware program, and a firmware update management unit configured to determine whether an update process is to be executed on the firmware data based on a comparison between expiration information set for the firmware data and time information received via a network, in response to a request input to the security chip to acquire a contents key or to decrypt contents data, and to reject the request when the update process is to be executed. The firmware program causes the security chip to function as a contents key acquisition control unit configured to acquire, via the network, the contents key for decrypting the contents data, and a decryption unit configured to decrypt the contents data by using the contents key. | 2013-08-29 |
20130227539 | UPDATING APPLICATIONS - Portions of an application can be delivered through a network without having to download the entire application. When an application is installed, HTML, CSS and javascripts or other User Interface (UI) files can be copied into local cache. A version number can also be stored with this code, so that when the application is launched, a web service checks the latest version on a server computer. If the latest version differs from the cached version, then an update is needed. New UI files can then be downloaded to the local cache. The local cache can be a folder that is used by the application, wherein the folder is stored on a hard drive of the client device. Binaries associated with the application can be stored in a different folder. | 2013-08-29 |
20130227540 | UPDATING PERIPHERAL DEVICE FIRMWARE VIA A PORTABLE DEVICE - An application running on a portable device detects a firmware update for a peripheral device. The firmware update is available via an external network. The firmware update is downloaded to the portable device from the external network via the application, and the firmware update is uploaded to the peripheral device from the application via a proximity network. The firmware update is uploaded via an application program interface of the peripheral device that facilitates applying the update in response to the uploading of the firmware | 2013-08-29 |
20130227541 | UPDATING A WEB SERVICES DESCRIPTION LANGUAGE FOR A SERVICE TEST - Methods, systems, and computer-readable media with executable instructions stored thereon for updating a Web Services Description Language (WSDL) for a service test are provided. Updating a WSDL for a service test can include identifying a first WSDL and a second WSDL for a service and mapping the first WSDL to the second WSDL. Updating a WSDL for a service test can include performing an action to update a call within the service test from the second WSDL to the first WSDL. | 2013-08-29 |
20130227542 | VERSION CONFLICT CHECKING TO INSTALLABLE UNIT - According to an aspect of the present invention, there is provided a method, system, and computer program product for version conflict checking of installable units (IUs). The method includes receiving a request for version conflict checking of specified IU, the request including a version dependency relationship between IUs that are in a dependency relationship with the specified IU. A version dependency relationship between installed IUs is obtained. The version dependency relationship between the installed IUs is updated according to the version dependency relationships between the IUs that are in a dependency relationship with the specified IU. It is checked whether the specified IU has a version conflict with the updated version dependency relationship between the installed IUs. | 2013-08-29 |
20130227543 | SERVER DEPLOYMENT SYSTEM AND METHOD FOR UPDATING DATA - A server deployment system and a method for updating data are provided. A system management server is added to the server deployment system for providing an update data. In a server system, a main server receives the update data from the system management server. The update data includes a controller firmware and a main server software. A firmware updating instruction is transmitted to a device controller to allow the device controller to update its original firmware into the controller firmware. If the controller firmware is successfully updated, the main server updates its original software into the main server software. If the main server software is not successfully updated, a firmware rollback instruction is transmitted to the device controller to allow the device controller to rollback to its original firmware. If the main server software is successfully updated, the system management server is notified. | 2013-08-29 |
20130227544 | Systems and Methods for Enhancing Performance of Software Applications - A system for enhancing performance of a software application obtains a list of files to be processed by the software application, and sorts that list in the order of the physical position of files in the list on a hard drive. The files are loaded in the sorted order which can decrease or minimize the total file seeking time, thereby increasing the speed of execution of the software. | 2013-08-29 |
20130227545 | APPLICATION VIRTUALIZATION - A virtual application packaged for a specific executing environment may be executed on a processing device having an executing environment different from the specific executing environment. A reference, included in extracted installer metadata, to one or more key paths of a hierarchically-structured data store may be modified according to a set of rules related to the executing environment detected in the processing device. The modified extracted installer metadata may be provided to an installer for installing the virtual application. During execution of the virtual application, a request to read, write, or modify the hierarchically-structured data store may be intercepted and changed, such that a first key path included in the request may be mapped to a second key path, based on the detected executing environment. Similarly, a response to the request, which may include the second key path, may be intercepted and modified, to the first key path. | 2013-08-29 |
20130227546 | APPLICATION VIRTUALIZATION - A virtual application packaged for a specific executing environment may be executed on a processing device having an executing environment different from the specific executing environment. A reference, included in extracted installer metadata, to one or more key paths of a hierarchically-structured data store may be modified according to a set of rules related to the executing environment detected in the processing device. The modified extracted installer metadata may be provided to an installer for installing the virtual application. During execution of the virtual application, a request to read, write, or modify the hierarchically-structured data store may be intercepted and changed, such that a first key path included in the request may be mapped to a second key path, based on the detected executing environment. Similarly, a response to the request, which may include the second key path, may be intercepted and modified, to the first key path. | 2013-08-29 |
20130227547 | ADAPTABLE MIDDLEWARE LAYER - A middleware layer running on a computing device determines capabilities of the computing device in response to receiving a request for an application. The middleware layer identifies a service level agreement associated with the application. The middleware layer selects one or more services of the middleware layer to assign to the application based on the service level agreement and the capabilities of the computing device. The middleware layer determines whether to install the one or more services on the computing device or on a remote computing device based on the service level agreement, the capabilities of the computing device and properties of the one or more services. | 2013-08-29 |
20130227548 | PACKAGE DESIGN AND GENERATION - Solution packages for a product for deployment on a collection of servers can be designed using one or more designers that provide user interfaces for visually arranging and configuring elements of the product. A package object model includes a managed object model that represents a package or feature manifest as defined by a product manifest XML schema. The object model can be used to create references to other project item and feature definitions. The extended object model can be used to generate an equivalent package or feature manifest XML file. | 2013-08-29 |
20130227549 | MANAGING UTILIZATION OF PHYSICAL PROCESSORS IN A SHARED PROCESSOR POOL - Systems, methods and computer program products may provide managing utilization of one or more physical processors in a shared processor pool. A method of managing utilization of one or more physical processors in a shared processor pool may include determining a current amount of utilization of the one or more physical processors and generating an instruction message. The instruction message may be at least partially determined by the current amount of utilization. The method may further include sending the instruction message to a guest operating system, the guest operating system having a number of enabled virtual processors. | 2013-08-29 |
20130227550 | SYSTEM AND METHOD FOR ISOLATED VIRTUAL IMAGE AND APPLIANCE COMMUNICATION WITHIN A CLOUD ENVIRONMENT - Provided herein are systems and methods for providing isolated virtual image communication in a virtual computing environment. Initially, a guest virtual machine that is activated in a virtual computing environment may be isolated into a private network. A service request may then be formulated at the guest virtual machine and addressed to a predetermined non-existent address. The request is then ostensibly sent to the predetermined address, whereupon the service request is actually transmitted to a shared resource with a security appliance machine in the virtual computing environment. The request is then forwarded to the security appliance machine and a reply formulated. The reply is sent back to the guest virtual machine via the shared resource. | 2013-08-29 |
20130227551 | SYSTEM AND METHOD FOR HYPERVISOR VERSION MIGRATION - Methods and systems for managing migration of a virtual machine from a source hypervisor to a destination hypervisor. A migration manager of the source hypervisor is provided which is configured to determine a state of the virtual machine and identify multiple state fields as either an optional field or an obligatory field. During restoration of the state by a migration manager of the destination hypervisor, the migration manager reviews the state fields and terminates the state restoration process if an obligatory field is encountered which is not recognized by the migration manager of the destination hypervisor. If during restoration, an optional field that is not recognized is encountered, the migration manager may choose to ignore the optional state field and proceed with the restoration process. | 2013-08-29 |
20130227552 | PERSISTENT VOLUME AT AN OFFSET OF A VIRTUAL BLOCK DEVICE OF A STORAGE SERVER - Example embodiments disclosed herein relate to a persistent volume at an offset of a virtual block device of a storage server. Example embodiments include requesting that a persistent volume be dissociated from a virtual block device in response to the termination of a virtual machine. | 2013-08-29 |
20130227553 | HIBERNATION VIA PARAVIRTUALIZATION - A system and method for hibernating virtual machines (VMs) are disclosed. In accordance with one embodiment, a computer system that executes a hypervisor and a virtual machine (VM) receives a request from a first virtual processor of the VM to put the VM to sleep. In response, the hypervisor stops a second virtual processor of the VM. | 2013-08-29 |
20130227554 | HYPERVISOR-DRIVEN HIBERNATION - A system and method for hibernating virtual machines (VMs) are disclosed. In accordance with one embodiment, a computer system that executes a hypervisor and a virtual machine (VM) determines that the virtual machine is to be put to sleep, wherein the determining is performed without involvement of a guest operating system hosted by the virtual machine. In response, the hypervisor stops a first virtual processor of the VM and persists the state of the first virtual processor. | 2013-08-29 |
20130227555 | MANAGEABLE EXTERNAL WAKE OF VIRTUAL MACHINES - A system and method for waking hibernating virtual machines (VMs) are disclosed. In particular, a host operating system (OS) may decide to wake a hibernating VM in response to a message received by the host, such as an incoming networking packet, a message generated by an external event (e.g., a hardware device fault, an interrupt, etc.), etc. In accordance with one embodiment, the decision whether to wake a hibernating VM may be based on a sender of the message. | 2013-08-29 |
20130227556 | GUEST-DRIVEN HOST EXECUTION - A system and method by which a host computer system can run executables on behalf of a virtual machine (VM) are disclosed. In accordance with one embodiment, an executable of a guest application of a virtual machine is received by a hypervisor and is run via the host operating system on behalf of the virtual machine. | 2013-08-29 |
20130227557 | SYSTEMS AND METHODS FOR PROVIDING PRIORITY BUILD EXECUTION IN A CONTINUOUS INTEGRATION SYSTEM - A mechanism for priority build execution in a continuous integration system is disclosed. A method includes executing, by a computing device in a continuous integration system, a low priority job of the continuous integrations system using a resource of the computing device. The method also includes receiving a high priority job to be executed by the computing device and identifying a conflict at the resource when the high priority job is assigned to execute using the same resource that is currently being used for executing the low priority job. When the conflict is identified, the method further includes suspending the execution of the low priority job, recording a state of the low priority job at a time of the suspension of the execution and executing the high priority job using the resource. | 2013-08-29 |
20130227558 | PROVISIONING OF DISTRIBUTED COMPUTING CLUSTERS - Embodiments perform automated provisioning of a cluster for a distributed computing platform. Target host computing devices are selected from a plurality of host computing devices based on configuration information, such as a desired cluster size, a data set, code for processing the data set and, optionally, a placement strategy. One or more virtual machines (VMs) are instantiated on each target host computing device. Each VM is configured to access a virtual disk that is preconfigured with code for executing functionality of the distributed computing platform and serves as a node of the cluster. The data set is stored in a distributed file system accessible by at least a subset of the VMs. The code for processing the data set is provided to at least a subset of the VMs, and execution of the code is initiated to obtain processing results. | 2013-08-29 |
20130227559 | MANAGEMENT OF I/O REQEUSTS IN VIRTUAL MACHINE MIGRATION - Management of input/output (I/O) requests in virtual machine (VM) migration is provided. More specifically, tracking of I/O requests associated with a VM selected for migration from an origin host machine to a destination host machine may be provided. A data record providing a listing of tracked I/O requests may be generated and stored. When a determination is made that a migrated VM is ready for operation at the destination host machine, processing of I/O requests associated with the migrated VM may be canceled on the origin host machine. The stored data record providing the listing of tracked I/O requests may then be retrieved when the migrated VM is resumed at the destination host machine to determine the completion status of the I/O requests canceled on the origin host machine and complete processing of the same on the destination host machine. | 2013-08-29 |
20130227560 | Mechanism for System Resource Sharing in a Multi-Tenant Platform-as-a-Service (PaaS) Environment in a Cloud Computing System - A mechanism for system resource sharing in a multi-tenant PaaS environment in a cloud computing system is disclosed. A method of embodiments includes receiving, by a virtual machine (VM), identification of resource-usage groups that each define resource constraints to apply to applications having a type of the resource-usage group, establishing a resource control policy on the VM for each of the identified resource-usage groups, the resource control policy to enforce the resource constraints of its associated resource-usage group, configuring a plurality of resource control tools of the VM to implement each resource control policy, identifying a resource-usage group of an application to be created on the VM, applying, by the one or more resource control tools to the application, the resource control policy of the identified resource-usage group of the application, and executing the application with the defined resource constraints on the VM. | 2013-08-29 |
20130227561 | Mechanism for Applying a Custom Security Type Label to Multi-Tenant Applications of a Node in a Platform-as-a-Service (PaaS) Environment - A mechanism for applying security category labels to multi-tenant applications of a node in a PaaS environment is disclosed. A method of embodiments includes receiving, by a virtual machine (VM) executing on a computing device, a custom security type label (STL) and a custom security policy associated with the custom STL, the custom STL and associated custom security policy applied to one or more multi-tenant applications executed by the VM. The method further include receiving a request to initialize an application on the VM, the request identifying the custom STL as an STL to apply to the application, assigning a local UID maintained by the VM to the application, recording a mapping of the assigned local UID to the custom STL, assigning the custom STL to files of the application, and assigning the custom STL to a running process of the application. | 2013-08-29 |
20130227562 | SYSTEM AND METHOD FOR MULTIPLE QUEUE MANAGEMENT AND ADAPTIVE CPU MATCHING IN A VIRTUAL COMPUTING SYSTEM - A method and system for managing multiple queues providing a communication path between a virtual machine and a hypervisor in a virtual machine system. The multiple queues are bundled together and identified on a polled list. When one of the queues on the polled list is used to communicate a request from the virtual machine to the hypervisor, a virtual machine exit is performed and a virtual machine exit is disabled for all of the queues on the polled list. The queues on the polled list are assigned to an initial host CPU to service requests from the virtual machine. If a particular queue on the polled list experiences a load that exceeds a load threshold, the particular queue is removed from the polled list and assigned to a different host CPU. | 2013-08-29 |
20130227563 | Mechanism for Creating and Maintaining Multi-Tenant Applications in a Platform-as-a-Service (PaaS) Environment of a Cloud Computing System - A mechanism for creating and maintaining multi-tenant applications in a Platform-as-a-Service (PaaS) environment of a cloud computing system is disclosed. A method includes receiving, by a virtual machine (VM), a request to start an application on the VM, wherein the VM hosts multi-tenant applications associated with owners different than an owner of the requested application, creating unique kernel namespace directories for the application, wherein each unique kernel namespace directory corresponds to one of a plurality of standard directories on an OS of the VM, providing identification of the created unique namespace directories to the application, wherein the application does not update code of the application to access the unique kernel namespace directories, receiving an access request to one of the standard directories, mapping the requested standard directory to a corresponding unique kernel namespace directory of the application, and directing the application to the corresponding unique kernel namespace directory. | 2013-08-29 |
20130227564 | INFORMATION PROCESSING APPARATUS, CLIENT MANAGEMENT SYSTEM, AND CLIENT MANAGEMENT METHOD - According to one embodiment, in response to a connection request from a second virtual machine corresponding to a second client terminal on which a first user has newly executed a logon operation, an information processing apparatus determines whether a first user profile associated with a first identifier of the first user is being used by another client terminal. If the first user profile is being used, the apparatus causes a first virtual machine corresponding to the another client terminal to unmount the first storage location, and transmits the information indicative of the path to the first storage location to a second virtual machine corresponding to the second client terminal. | 2013-08-29 |
20130227565 | APPARATUS AND METHOD FOR MANAGING APPLICATION FOR GUEST OPERATING SYSTEM - An apparatus includes a processor to operate a host OS, a host application managing unit to receive a request for managing a guest application operable in the guest OS, the request including application information of the guest application, and a guest application managing unit under the operation of the host OS to receive the request from the host application managing unit and to manage the guest application according to the request. A method includes operating a host operating system (OS), receiving a request for managing an application under the operation of the host OS, determining whether the application is operable in a guest OS, and transmitting application information of the application and the request to a guest application managing unit that is operable via a virtual machine monitor in response to the determination that the application is operable in the guest OS. | 2013-08-29 |
20130227566 | DATA COLLECTION METHOD AND INFORMATION PROCESSING SYSTEM - According to a data collection method, an allocation determination unit detects one or more pairs of virtual machines communicating with each other from virtual machines on the basis of communication data exchanged between the virtual machines. The allocation determination unit selects one of information processing apparatuses, and determines how to reallocate the virtual machines in order that, out of the detected pairs, at least one of paired virtual machines running on a non-selected information processing apparatus runs on the selected information processing apparatus. A control unit reallocates the virtual machines in accordance with the determined reallocation, and controls the selected information processing apparatus so as to collect communication data relayed by the relay unit running on the selected information processing apparatus. | 2013-08-29 |
20130227567 | THIN CLIENT SYSTEM, CONNECTION MANAGEMENT SERVER, CONNECTION MANAGEMENT METHOD AND CONNECTION MANAGEMENT PROGRAM - A thin client system comprises a virtual machine server, a thin client terminal, a connection management server, and a virtual machine management server which executes reverting processing of the virtual machine, wherein the connection management server includes a session management unit which determines the virtual machine to be allocated to the thin client terminal based on a to-be-reverted list stored in which virtual machines to be reverted are arranged in descending order of differential disk capacities, and a maintenance processing management unit which requests the virtual machine management server to execute reverting processing, wherein the session management unit when a virtual machine not included in the to-be-reverted list exists, allocates the virtual machine in question to the thin client terminal, and when all the virtual machines are included in the to-be-reverted list, allocates the virtual machine whose differential disk capacity is the smallest to the thin client terminal. | 2013-08-29 |
20130227568 | SYSTEMS AND METHODS INVOLVING VIRTUAL MACHINE HOST ISOLATION OVER A NETWORK - Systems and methods for virtual machine host isolation are disclosed. According to one implementation, an illustrative system may include a first compute node configured to be operatively coupled to a second compute node via a first application server, and to a third compute node via a second application server. In operation, the first compute node may be configured to receive an instruction from the second compute node via the first server to define a virtual machine, and send an instruction to the third compute node via the second server to define the virtual machine. | 2013-08-29 |
20130227569 | SYSTEM AND METHOD FOR INFORMATION ACQUISITION OF WIRELESS SENSOR NETWORK DATA AS CLOUD BASED SERVICE - A system and a method for information acquisition of Wireless Sensor Network (WSN) data as a cloud based service are provided. An apparatus in the system including a WSN, a service cloud, and a device, includes a virtual sensor configured to receive data from a physical sensor in the WSN. The apparatus further includes a virtual sensor controller configured to receive a request for the data from the service cloud or the device, and spawn a virtual machine (VM) based on the request. The apparatus further includes the VM configured to transmit the data to the service cloud or the device. | 2013-08-29 |
20130227570 | REMOTE MANAGEMENT OF VIRTUAL MACHINES HOSTED IN A PRIVATE NETWORK - Management of virtual machines within a private network may be provided from a server application, such as a web application, on a machine remote from a private network. The server application receives management commands and communications the management commands in a vendor independent format to a client application within the private network. The client application receives the management commands, instantiates the management commands into a vendor specific definition and redirects the management commands to the virtual machine host for appropriate execution. | 2013-08-29 |
20130227571 | VIRTUAL MACHINE AND/OR MULTI-LEVEL SCHEDULING SUPPORT ON SYSTEMS WITH ASYMMETRIC PROCESSOR CORES - Different processor cores in a computing device can support different features. In one or more embodiments, the features supported by each of multiple physical processor cores of a computing device are identified. A set of one or more features of the multiple physical processor cores to make available to virtual processor cores of the virtual machine are determined based at least in part on both the one or more features supported by each of the multiple physical processor cores and a number of virtual processor cores of the virtual machine. In additional embodiments, a multi-level scheduling model is used. An operating system level scheduler of an operating system schedules multiple applications for execution on multiple processor cores, and a user level scheduler of an application schedules application threads of that application for execution on one or more of the multiple processor cores. | 2013-08-29 |
20130227572 | TEST DEVICE, A SYSTEM, A PROGRAM AND A METHOD - A test device includes: an identifier storage means for storing: an identifier of a server information storage means for storing a server specification for each of a plurality of servers; an identifier of an application information storage means for storing application information including a module name for each of a plurality of applications; and an identifier of a deployment information storage means for storing deployment information which makes correspond each of the plurality of applications and either of the plurality of servers; and a deployment means for, by referring to the identifier storage means, acquiring the server specification and the module name which correspond for each of the plurality of applications indicated by the deployment information; and deploying a module of the application which the module name concerned indicates on a virtual server on its own device which reflected the server specification concerned. | 2013-08-29 |
20130227573 | MODEL-BASED DATA PIPELINE SYSTEM OPTIMIZATION - A computer-implemented method for optimizing a data pipeline system includes processing a data pipeline configuration manifest to generate a framework of the data pipeline system and a data flow logic package of the data pipeline system. The data pipeline configuration manifest includes an object-oriented metadata model of the data pipeline system. The computer-implemented method further includes monitoring performance of the data pipeline system during execution of the data flow logic package to obtain a performance metric for the data pipeline system, and modifying, with a processor, the framework of the data pipeline system based on the data pipeline configuration manifest and the performance metric. | 2013-08-29 |
20130227574 | INFORMATION PROCESSING DEVICE - An information processing device | 2013-08-29 |
20130227575 | SCHEDULING FUNCTION IN A WIRELESS CONTROL DEVICE - A field device for use in a process control system includes a scheduling module configured to receive a time input which specifies a scheduled time for performing a scheduled action or a scheduled sequence of actions and to receive an action input which specifies the scheduled action or the scheduled sequence of actions. At the scheduled time, the scheduling module automatically initiates the scheduled action or the scheduled sequence of actions. After initiating the action or the sequence of actions, the scheduling module causes an initiation status indicating that the action or the sequence of actions has been initiated to be sent to a host and/or causes the initiation status to be stored in a local memory of the field device. | 2013-08-29 |
20130227576 | METHOD AND APPARATUS FOR CONTROLLING TASK EXECUTION - A method and an apparatus for controlling task execution are disclosed in the present invention which relates to the field of wireless communications technologies, addressing the problem that power consumption of a terminal in standby mode is wasted because tasks of the terminal in a standby state are fixed and corresponding time periods cannot be flexibly set for different tasks. The method includes: receiving standby state parameters sent by a terminal management module; configuring the terminal according to the standby parameters so that the terminal enters a sleeping state; enabling a timer to start timing; stopping timing when the time of the timer reaches the time point at which a current task will be executed; configuring the terminal according to working state parameters of the terminal so that the terminal enters a working state; and receiving paging information sent by the terminal management module. | 2013-08-29 |
20130227577 | Automated Administration Using Composites of Atomic Operations - Various techniques for automatically administering software systems using composites of atomic operations are disclosed. One method, which can be performed by an automation server, involves accessing information representing an activity that includes a first operation and a second operation. The information indicates that the second operation processes a value that is generated by the first operation. The method generates a sequence number as well as an output structure, which associates the sequence number with an output value generated by the first operation, and an input structure, which associates the sequence number with an input value consumed by the second operation. The method sends a message, via a network, to an automation agent implemented on a computing device. The computing device implements a software target of the first operation. The message includes information identifying the first operation as well as the output structure. | 2013-08-29 |
20130227578 | Method and System for Controlling a Scheduling Order Per Category in a Music Scheduling System - A system and method for controlling a scheduling order per category is disclosed. A scheduling order can be designated for the delivery and playback of multimedia content (e.g., music, news, other audio, advertising, etc) with respect to particular slots within the scheduling order. The scheduling order can be configured to include a forward order per category or a reverse order per category with respect to the playback of the multimedia content in order to control the scheduling order for the eventual airplay of the multimedia content over a radio station or network of associated radio stations. A reverse scheduling technique provides an ideal rotation of songs when a pre-programmed show interferes with a normal rotation. Any rotational compromises can be buried in off-peak audience listening hours of the programming day using the disclosed reverse scheduling technique. | 2013-08-29 |
20130227579 | INFORMATION PROCESSING APPARATUS, COMPUTER PRODUCT, AND INFORMATION PROCESSING METHOD - An information processing apparatus includes a computer configured to set respectively a storage location for each value of a common variable among threads of a thread group having write requests to write the values of the common variable of the threads in a given process, from a specific storage location defined in the write requests, to the storage locations respectively set for the threads; store, for each thread of the thread group, a value of the common variable to the storage location set for the thread; and read out in order of execution of the threads of the thread group defined in the given process and when all the threads in the thread group have ended, each value of the common variable stored at the first storing, and in the order of execution, overwrite a value in the specific storage location with each read value of the common variable. | 2013-08-29 |
20130227580 | Information Delivery Method and Device - The application discloses an information delivery method and device. The device includes: a receiving module configured to receive information to be delivered and a name of a target task which are sent from a source task; a searching module configured to search, according to the name of the target task, a preset global relationship table for a core number corresponding to the name of the target task; and a sending module configured to search a multi-core system for a core corresponding to the core number and to send the information to be delivered to the task corresponding to the name of the target task in the core. The information delivery method and device provided by the disclosure enable the delivery of information within a multi-core system or between multi-core systems with high reliability. | 2013-08-29 |
20130227581 | Technique for Providing Task Priority Related Information Intended for Task Scheduling in a System - A technique for providing task priority related information intended for task scheduling in a system ( | 2013-08-29 |
20130227582 | Prediction Based Priority Scheduling - Systems and methods are provided that schedule task requests within a computing system based upon the history of task requests. The history of task requests can be represented by a historical log that monitors the receipt of high priority task request submissions over time. This historical log in combination with other user defined scheduling rules is used to schedule the task requests. Task requests in the computer system are maintained in a list that can be divided into a hierarchy of queues differentiated by the level of priority associated with the task requests contained within that queue. The user-defined scheduling rules give scheduling priority to the higher priority task requests, and the historical log is used to predict subsequent submissions of high priority task requests so that lower priority task requests that would interfere with the higher priority task requests will be delayed or will not be scheduled for processing. | 2013-08-29 |
20130227583 | Method and System For Scheduling Requests In A Portable Computing Device - A method and system for managing requests among resources within a portable computing device include a scheduler receiving data from a client for scheduling a plurality of requests. Each request identifies at least one resource and a requested deadline. Next, data from the client is stored by the scheduler in a database. The scheduler then determines times and a sequence for processing the requests based on requested deadlines in the requests and based on current states of resources within the portable computing device. The scheduler then communicates the requests to the resources at the determined times and according to the determined sequence. The scheduler, at its discretion, may schedule a request after its requested deadline in response to receiving a new request command from a client. The scheduler may allow a sleep set corresponding to a sleep processor state to power off a processor. | 2013-08-29 |
20130227584 | LONG-TERM RESOURCE PROVISIONING WITH CASCADING ALLOCATIONS - One embodiment of the present invention provides a system for provisioning physical resources shared by a plurality of jobs. During operation, the system establishes resource-usage models for the jobs, ranks the jobs based on quality of service (QoS) requirements associated with the jobs, and provisions the jobs for a predetermined time interval in such a way that any unused reservations associated with a first subset of jobs having higher QoS rankings are distributed to other remaining jobs with preference given to a second subset of jobs having a highest QoS ranking among the other remaining jobs. Provisioning the jobs involves making reservations for the jobs based on the resource-usage model and corresponding QoS requirements associated with the jobs. | 2013-08-29 |
20130227585 | COMPUTER SYSTEM AND PROCESSING CONTROL METHOD - A processing control method whereby a management server: assigns work to and executes said work on a computer; sets the processing start time and the processing end time for the aforementioned work as task execution information; sets a first physical resource amount, which is the amount of the physical resources of the aforementioned computer needed for execution of the aforementioned processing; acquires a second physical resource amount, which is the amount of the physical resources of the aforementioned computer that are being used; updates the processing start time for the aforementioned work to a time that is close to the current time when the aforementioned computer has the physical resources of the sum of the aforementioned first physical resource amount and the aforementioned second physical resources; and instructs the aforementioned computer to begin the aforementioned processing when the current time reaches the aforementioned processing start time. | 2013-08-29 |
20130227586 | Recording Activity of Software Threads in a Concurrent Software Environment - The present disclosure provides a method, computer program product, and activity recording system for identifying idleness in a processor via a concurrent software environment. A thread state indicator records an indication of a synchronization state of a software thread that is associated with an identification of the software thread. A time profiler identifies a processor of the computer system being idle and records an indication that the processor is idle. A dispatch monitor identifies a dispatch of the software thread to the processor. In response to the dispatch monitor determining the indication identifies that the processor is idle and the indication of a synchronization state of the software thread indicating the software thread ceases to execute in the processor, the dispatch monitor generates a record attributing the idleness of the processor to the software thread and the indicated synchronization state. | 2013-08-29 |
20130227587 | METHOD AND APPARATUS FOR CROSS-PROCESS COMMUNICATION, AND COMPUTER STORAGE MEDIUM - The present disclosure provides a method and apparatus for cross-process communication, which is related to the field of communication. The method includes: a preset container process receiving a request for cross-process communication sent by a first process; the preset container process setting up a communication channel with the first process according to the request for cross-process communication; the preset container process loading service modules corresponding to the request for cross-process communication, therefore the preset container process that is loaded with the service modules conducting a cross-process communication with the first process through the communication channel. The apparatus includes a reception module, a channel setup module and a loading module. The present disclosure simplifies the process for setting up the communication channel in the cross-process communication, saves codes and therefore improves communication efficiency. | 2013-08-29 |
20130227588 | Managing Actions that Have No End Events - A computer-implemented method for managing events that have no end events includes: determining that a first event has been generated that corresponds to a continuous action having no defined end event, the first event having an event type and being initiated by a user; determining whether at least a second event of the event type is initiated by the user within a specified time from initiation of the first event; and performing a functionality of the continuous action only if the second event is not initiated within the specified time, wherein the functionality is not performed until the specified time passes after a last initiated event of the event type. | 2013-08-29 |
20130227589 | MONITORING SYSTEM AND MONITORING PROGRAM - A monitoring system performs cause analysis of an event occurring in any of a plurality of monitoring-target objects to be monitored based on a rule. In this case, the monitoring system makes a detection during the analysis time width and determines a plurality of conclusions based on an event corresponding to the condition for determining the conclusion. Moreover, the monitoring system performs one or more of (A) displaying change of certainty to be used for determination of a conclusion in a case where the analysis time width is assumed to be changed, (B) performing sort display of the determined conclusion based on an index value showing an affected range and (C) calculating the analysis time width based on the index value. | 2013-08-29 |
20130227590 | MANAGING AND OPTIMIZING WORKFLOWS AMONG COMPUTER APPLICATIONS - A middleware system, method and program product for managing workflows among computer applications. The middleware system includes: a common construct unit and a workflow export unit. The common construct unit (i) retrieves a mapping between a component of a macro workflow of the middleware system and a micro workflow component of a first computer application and (ii) executes the macro workflow which orchestrates micro workflows of the first computer application and a second computer application. The workflow export unit generates an output that enables the second computer application to execute a workflow that corresponds to the workflow of the first computer application. | 2013-08-29 |
20130227591 | ELECTRONIC DEVICE CAPABLE OF ADAPTING TO DIFFERENT TYPES OF PERIPHERAL DEVICES AND METHOD THEREOF - An electronic device capable of adapting different types of peripheral devices which providing a same function, includes a storage device storing a plurality of device drivers corresponding to a plurality of different type peripheral devices which provide a same function and a detecting module configured to identify one of the different type of peripheral devices connected to the electronic device, when the detecting module identifies a peripheral device connected to the device, the processor calls the device driver corresponding to the identified peripheral device from the storage device. | 2013-08-29 |
20130227592 | OPTICAL-DISC PLAYER - The invention relates to an optical-disc player, which comprises a pair of optical-disc sensor levers, a conveying roller used for conveying an optical disc by clamping the optical disc on an optical-disc guide plate, a roller supporting component, a driving member embedded with the roller supporting component, a cam gear used for moving the driving member, a driving gear used for driving the cam gear, switches used for controlling the rotation of a motor, and a traverse mechanism having a pick-up and a turntable, wherein the component, embedded with the roller supporting component and used for driving the conveying roller and the optical-disc guide plate to be engaged and disengaged, on the driving member is an E-shaped cam hole; a convex portion, a first toothed portion and a second toothed portion are formed on the cam gear; and a toothless portion is formed between the two toothed portions. | 2013-08-29 |
20130227593 | DISK DEVICE - In a disk device, a disk is held between a flap and a conveyance roller conveying the disk into a loader chassis. The loader chassis includes a lid panel including a spring seat to which a holddown spring that presses the flap toward the conveyance roller is attached. The spring seat includes an L-shaped frame including a support panel (formed at an edge of an opening,) and a support shaft panel perpendicularly bent from an end of the support panel, the L-shaped frame being pulled to rise toward the flap by bending the support panel. A sloped guide edge is formed by cutting an end side of a lid-panel-side edge of the support shaft panel including a stopper portion and a support shaft main body. A coil portion of the holddown spring is moved along the sloped guide edge to be fitted onto the support shaft main body. | 2013-08-29 |
20130227594 | SYSTEMS AND METHODS FOR AN ENHANCED, STEGANOGRAPHIC, EMBEDDED SECURE TRANSACTION SYSTEM - A system for multipath contactless transaction processing, comprising a networked server comprising a processing unit, a billing entity based on a first networked computing device comprising a processing unit and a video feed, the feed interloping a television broadcast video signal, the signal made available to potential purchasers to watch, wherein, during said viewing, a cue is provided whenever a transaction or interaction is available for scanning by a mobile device, and wherein, the user is prompted accordingly to act upon using the device. | 2013-08-29 |