45th week of 2014 patent applcation highlights part 53 |
Patent application number | Title | Published |
20140330940 | Method and Apparatus for Customized Provisioning of On-Line Application Channels - A method for a computer system includes receiving an identifier associated with a client streaming player, determining one or more attributes associated with the identifier from a data structure in response to the identifier, determining available channels from a plurality of channels that are to be made available to the client streaming player in response to the identifier, wherein available channels comprises a first channel, but not the second channel, determining a first graphical identifier associated with the first channel, providing the first graphical identifier to the client streaming player, receiving a user selection of the first graphical identifier indicating a user request to associate the first channel with the computer system, and providing an indicator of a server network address associated with the first channel to the client streaming player. | 2014-11-06 |
20140330941 | INTERNET PROVIDER SUBSCRIBER COMMUNICATIONS SYSTEM - A system, method, and computer readable medium for communicating at least one real-time specially-composed bulletin message to at least one subscriber of a provider of Internet services, comprising a first device, and a second device communicably coupled to the first device, wherein the first device: accesses only subscriber upstream traffic to a destination web site requested by the subscriber, wherein the first device inter-connects between the at least one subscriber and the destination web site, identifies the at least one subscriber's identification based on the accessed subscriber upstream traffic automatically provided by the subscriber, and provides the unique subscriber identification to the second device located at the provider of Internet services providing data services and management control to the first device, wherein the second device determines the subscriber associated with the unique subscriber identification. | 2014-11-06 |
20140330942 | METHOD AND APPARATUS FOR PROVIDING CONTENT ACCORDING TO TYPE OF COMMUNICATION NETWORK - Method and apparatus for providing content according to the type of communication network. IP address included in received content provision request is extracted, it is determined whether the extracted IP address is private IP address. Content transmission request is determined to be via mobile communication network when the extracted IP address is private IP address, and requested content is transmitted to the extracted IP address. Content server replies to content transmission request even from a private IP address. Mobile communication network requests content transmission from content server without involving a NAT device. Content is provided through mobile communication network and Internet communication network by operating a single content server while distinguishing between such two networks. Content is provided more quickly by distinguishing between the mobile communication network and the Internet communication network. Content in different formats can be provided according to the type of communication network. | 2014-11-06 |
20140330943 | Logical Address Configuration And Management - Methods and systems for configuring a network are disclosed. An example method can comprise receiving a request from a first device to connect to a first network. An example method can also comprise determining a first logical address. The first logical address can comprise one or more bits configured to identify the first device on the first network and specify configuration information for the first device. An example method can further comprise providing the first logical address to the first device. | 2014-11-06 |
20140330944 | Time-based Configuration Policy Toggling - Time-based configuration profile toggling may be provided. Configuration profiles associated with user devices may be identified, determinations of whether the user devices are authorized to enable the configuration profiles on the user devices may be made based at least in part on time constraints, and the configuration profiles may be enabled on the user devices if the time constraints are satisfied. | 2014-11-06 |
20140330945 | Location-based Configuration Policy Toggling - Location-based configuration profile toggling may be provided. Configuration profiles associated with user devices may be identified, determinations of whether the user devices are authorized to enable the configuration profiles on the user devices may be made based at least in part on location constraints, and the configuration profiles may be enabled on the user devices if the location constraints are satisfied. | 2014-11-06 |
20140330946 | NETWORK ELEMENT OF A SOFTWARE-DEFINED NETWORK - A network element of a software-defined network includes line interface modules capable of transferring data between each other and providing connections to other network elements. Each line interface module is configurable with configuration data received from a controller of the software-defined network. The line interface modules are configured, in accordance with the configuration data, to support external data-forwarding functionality between the network element and other network elements and to support internal data-forwarding functionality between the line interface modules within the network element. Thus, the controller can manage the line interface modules, as separately controlled devices. The line interface modules are further adapted to support, in accordance with the configuration data, signaling functionality between the line interface modules. The signaling functionality provides internal functionalities of the network element, such as work sharing between the line interface modules, so that also the internal functionalities can be controllable via the controller. | 2014-11-06 |
20140330947 | EFFICIENT USE OF DYNAMIC HOST CONFIGURATION PROTOCOL IN LOW POWER AND LOSSY NETWORKS - In one embodiment, each of a plurality of devices in a computer network is configured to i) transmit a unicasted dynamic host configuration protocol (DHCP) solicit message to a neighbor device having a route to a border router as an assumed DHCP relay without regard to location of a DHCP server, and ii) operate as a DHCP relay to receive unicasted DHCP solicit messages and relay the solicit message to the border router of the network without regard to location of the DHCP server, and to relay a DHCP reply to a corresponding requestor device. | 2014-11-06 |
20140330948 | UNDIFFERENTIATED SERVICE DOMAINS - Guest domains (virtual machines) may execute at a virtualization server. During execution, the guest domains may request various services to facilitate their operation. The virtualization server may disaggregate the services requested by the guest domains among various service domains. A service domain may be configured to provide one the services. The virtualization server may also maintain a pool of partially initialized service domains. When a guest domain requests a particular service, one of the partially initialized service domains may be selected from the pool, and the partially initialized service domain may complete initialization to become an initialized service domain. The initialized service domain may thus be configured to provide the service requested by a guest domain. The virtualization server may periodically replenish the pool of partially initialized service domains to ensure that a partially initialized service domain is available upon demand from one of the guest domains. | 2014-11-06 |
20140330949 | SYSTEM AND METHOD FOR OPTIMIZING AND DIGITALLY CORRECTING ERRORS ON A COMPUTER SYSTEM - A method for optimizing a computer system, the method comprising the steps of receiving at least one key corresponding to at least one attribute of at least one configurable computer system; accessing an electronic key database stored in a memory that includes computer configuration information; comparing the received keys with entries in the key database; generating recommendations where the recommendations include commands selected from the group consisting of deleting, Disabling, suspending, changing process priority, and delaying the execution of the attribute corresponding to the key received from the configurable computer system; and transmitting the recommendations to the configurable computer system based upon the comparison of the received keys with entries in the key database. | 2014-11-06 |
20140330950 | SYSTEM AND METHOD FOR ENABLING THE ESTABLISHMENT AND USE OF A PERSONAL NETWORK - A personal network may be established by interconnecting a plurality of satellites as part of the personal network. Each satellite may be configured to communicate with one or more other satellites. On any given one of the plurality of satellites, data indicating a connectivity status for the one or more other satellites is automatically received, and information indicating a capability of the one or more other satellites is automatically received. The given satellite may be configured to enable at least one other corresponding satellite in the plurality of satellites to be made available for use, so that a capability of the at least one other corresponding satellite is made available for the given satellite. | 2014-11-06 |
20140330951 | DIGITAL CONTENT CONNECTIVITY AND CONTROL VIA A PLURALITY OF CONTROLLERS THAT ARE TREATED DISCRIMINATIVELY - Methods, a system, and a computer readable medium for managing the separation and distribution of digital content and associated controls wherein the digital content in a network system includes receiving a request from any one of control devices, host server response to control device request (and output devices), host server may either non-discriminatively or discriminatively broadcast to any of the control devices, and control device handling responses throughout home network system. The methods, system, and computer readable medium include user experience optimized application types for (optimally) separating and distributing the associated control, digital content, and associated status information elements during active streaming sessions from the host server to the control devices and output devices within a home network system. | 2014-11-06 |
20140330952 | Device Triggering - Service layer and application triggering may be used in a machine-to-machine environment. In an embodiment, an existing service layer procedure, such as registration, may allow a device or gateway service layer or application to indicate to a machine-to-machine server what port is listened to for triggers. In another embodiment, triggering may be used to provide bootstrapping instructions, including temporary bootstrapping identifiers, in trigger requests. In another embodiment, triggering may be used to assist with event notification. Service layer or application instructions may be embedded inside of trigger payloads. A trigger payload format is defined. | 2014-11-06 |
20140330953 | ROBUST FILTERS FOR SOCIAL NETWORKING ENVIRONMENTS - Networking systems and methods according to exemplary embodiments of the present invention can provide robust filtering to enable users to customize their networking environments. A networking system can comprise a plurality of interfaces, a request unit, a management unit, and a filter unit. Each interface can include a plurality of displayable objects, each of which can represent some user of the networking system. The request unit can receive from a client a request for one of the interfaces. The management unit can manage filters, where each active filter hides one or more users from one or more other users. When an interface is requested by a client associated with a first user, the filter unit can apply the active filters to the requested interface to exclude displayable objects that represent users hidden from the first user by one or more active filters. | 2014-11-06 |
20140330954 | METHOD AND APPARATUS FOR PROCESSING INFORMATION BASED ON SOCIAL PLATFORM - Method and device for processing information based on a social platform are disclosed. The method for processing information based on a social platform, comprising: acquiring, by a server, a request for characteristic data from a requester, wherein the request comprises identification information of the requester and/or identification information of a requested user; calculating, by the server, the characteristic data under a particular scenario in response to the request; transmitting, by the server, the calculated characteristic data to the requester or the requester. Through the methods and devices as disclosed, different social platform users may be able to communicate with each other in different virtual scenarios. | 2014-11-06 |
20140330955 | Monitoring the Health of a Home Area Network - Systems and methods are disclosed for monitoring the health of a home area network. An example system includes multiple devices communicatively coupled via a home area network and a gateway device communicatively coupled to the devices via the home area network. The home area network is configured for communicating information regarding a resource consumed at a geographical area serviced by the home area network. The gateway device includes a processor and a computer-readable medium. The processor can execute instructions embodied in the computer-readable medium to perform operations. The operations include monitoring communication metrics describing communications among the devices via the home area network. The operations also include monitoring application-level events generated by applications executed by the devices. The operations also include generating a status indicator for the home area network based on the communication metrics and the application-level events. The status indicator describes a health of the home area network. | 2014-11-06 |
20140330956 | METHOD AND SYSTEM FOR GENERATING DIRECTED GRAPHS - A method for generating a directed graph for a transaction in an application, comprising: receiving event information for events included in the transaction at a processor, each event having a link directed from a first endpoint to a second endpoint in the application; assigning an identification (“ID”) number to each event and including the ID number in the event information for each event; based on endpoint, correlating the event information to produce dyadic event information representative of dyadic events, each dyadic event including a first event and a second event associated with the endpoint, the dyadic event information for each dyadic event including a first ID number and a second ID number for the first event and the second event, respectively; based on ID number, combining the dyadic event information to produce correlation fragments associated with the ID number; and, combining the correlation fragments to produce the directed graph for the transaction. | 2014-11-06 |
20140330957 | WIDI CLOUD MODE - A method and system is provided for WiDi cloud mode. The method includes sending a command from a computing device to a cloud network. A connection between the cloud network and a remote adapter based on the command may be monitored. A data stream sent from the cloud network to the remote adapter via the connection may be controlled. | 2014-11-06 |
20140330958 | COMPUTING DEVICE PERFORMANCE MONITOR - Technologies are generally described for systems, devices and methods effective to monitor performance of a computing device. A computing device may receive a specified counting rate. The computing device may count at the specified counting rate to generate a sequence of counting numbers. The computing device may identify a first output of a process, such as results from computations performed on data, and may identify a first counting number when the first output is identified. The computing device may identify a second output of the process, such as additional results from the computations, and may identify a second counting number when the second output is identified. The computing device may then determine whether an alert should be generated based on the first and second counting numbers such as when a difference between the first and second counting numbers exceeds a threshold value. | 2014-11-06 |
20140330959 | Method, device and system for monitoring internet- of-things device remotely - The disclosure discloses a method for monitoring an Internet-of-things device remotely. The method includes that: a User Equipment (UE) acquires an Internet Protocol (IP) address of a required Internet-of-things device from a remote router, and acquires device-detail information of the Internet-of-things device corresponding to the IP address according to the acquired IP address; draws a virtual control panel of the Internet-of-things device according to the acquired device-detail information, and maps keys of the virtual control panel and a control logic of the keys of the virtual control panel; and monitors the Internet-of-things device remotely by operating the virtual control panel. The disclosure further discloses a device and system for monitoring an Internet-of-things device remotely. With the disclosure, it is possible to implement visualized, remote, and smart monitoring of an Internet-of-things device, so that operation by a user at a UE is as simple, clear, and easy as operation of a real Internet-of-things device, thereby reducing difficult in operation greatly. | 2014-11-06 |
20140330960 | Systems and Methods for Identifying Applications in Mobile Networks - A method for identifying an application installed in a user device of a communication system is disclosed. Based on user device and network resources utilized by the user device and installation information about applications installed application, an identification of an application can be performed. An advantage with embodiments of this invention is that an application can be identified, without prior information how the application affects user device and network resources. Malicious and noxious applications can thereby be identified. Also, a resource consumption reporting service offered to the subscribers by the operator is enabled. | 2014-11-06 |
20140330961 | COMPREHENSIVE BOTTLENECK DETECTION IN A MULTI-TIER ENTERPRISE STORAGE SYSTEM - Embodiments of the present invention provide approaches (e.g., online methods) to analyze end-to-end performance issues in a multi-tier enterprise storage system (ESS), such as a storage cloud, where data may be distributed across multiple storage components. Specifically, performance and configuration data from different storage components (e.g., nodes) is collected and analyzed to identify nodes that are becoming (or may become) performance bottlenecks. In a typical embodiment, a set of components distributed among a set of tiers of an ESS is identified. For each component, a total capacity and a current load are determined. Based on these values, a utilization of each component is determined. Comparison of the utilization with a predetermined threshold and/or analysis of historical data allows one or more components causing a bottleneck to be identified. | 2014-11-06 |
20140330962 | UNIFIED TRACKING DATA MANAGEMENT - Methods and apparatuses that collect tracking data items into a plurality of data stores for one or more domain in response to resources received from the domains are described. Each tracking data item may be accessible for one of the domains. Relationships of the domains may be identified among the tracking data items across multiple data stores according to the resources received. One or more of the domains may be selected according to the identified relationships to control accessibility of the tracking data items for the domains. The data stores may be updated to prohibit accessing at least a portion of the tracking data items for the selected domains. | 2014-11-06 |
20140330963 | METHODS AND APPARATUS FOR NONINTRUSIVE MONITORING OF WEB BROWSER USAGE - Example methods disclosed herein for monitoring web browsing include processing a video image obtained from a video signal of a device implementing a web browser to identify a first image region less than the entire video image, the first image region having a first shape corresponding to an address bar of the web browser. Disclosed example methods also include tagging first textual information identified in the first image region as corresponding to an address of a web page displayed by the web browser in response to determining that the first textual information includes a first string of text matching a reference string of text. Disclosed example methods further include reporting the tagged first textual information to determine usage of the web browser. | 2014-11-06 |
20140330964 | TECHNIQUE FOR OPTIMIZED ROUTING OF DATA STREAMS ON AN IP BACKBONE IN A COMPUTER NETWORK - A technique optimizes routing of application data streams on an Internet Protocol (IP) backbone in a computer network. According to the novel technique, a client router learns of server states (e.g., number of pending requests, etc.) of a plurality of application servers and also determines metrics of intermediate links between the application servers and the client router (intermediate link metrics), e.g., particularly link metrics in a direction from the application servers to the client router. Upon receiving an application request from an application client (“client request”), the client router determines to which of the application servers the client request is to be sent based on the server states and intermediate link metrics, and sends the client request accordingly. | 2014-11-06 |
20140330965 | SERVER CLUSTER MONITORING - A master monitor spawns a local monitor in each node of a server cluster. Each local monitor, responsive to a database event, determines a metric of a performance-related variable. A maximum period between measurements may be imposed to reduce irrelevant results, as may a minimum period. The metric may be stored in a measurement file on the respective node and/or may be reported to the master monitor. The master monitor may make any reported metrics available to a user via a front end. | 2014-11-06 |
20140330966 | SYSTEM, METHODS, APPARATUSES AND COMPUTER PROGRAM PRODUCTS FOR PROVIDING STEP-AHEAD COMPUTING - A system for providing step-ahead computing may include a client and a server. The client may include a communication element, a user interface element and a processor. The communication element may be configured to receive a set of pre-computed actions. The set of pre-computed actions may be based on at least one possible future state of the client. The user interface element may be configured to receive a user input corresponding to a particular action. The processor may be in communication with the communication element and the user interface element. The processor may be configured to determine whether the set of pre-computed actions include an action corresponding to the particular action and to execute the action in response to a determination that the set of pre-computed actions include the action corresponding to the particular action. The server may include a processing element, a pre-computing element and a server side communication element. The processing element may be configured to receive an indication of a current state of the client. The pre-computing element may be in communication with the processing element and configured to determine the set of pre-computed actions based on the at least one possible future state of the client. The server side communication element may be in communication with the processing element and configured to communicate the pre-computed actions to the client. | 2014-11-06 |
20140330967 | COMMUNICATION DEVICE, CONTROL METHOD FOR COMMUNICATION DEVICE, AND PROGRAM - A communication device capable of handling, even in the case where requests for provision of a service are received from a plurality of devices, the requests appropriately, is provided. | 2014-11-06 |
20140330968 | METHOD AND TREND ANALYZER FOR ANALYZING DATA IN A COMMUNICATION NETWORK - A method and apparatus for performing analysis of client related data obtained from a communication network. A trend analyzer analyzes a trend of a client segment, which trend has been detected by a data stream analysis of the client related data. The trend reflects a change over time of at least one feature derived from the client related data. The trend analyzer then requests a batch based deep analysis when the trend fulfils a trigger condition, to find a cause for the trend. A result of the deep analysis is then provided to a result consumer. Thereby, the deep analysis may be performed only when a trend has been detected thus being more responsive to trends by the stream analysis and reguiring less resources, as compared to when data is always subjected to deep analysis regardless of whether a trend occurs or not. | 2014-11-06 |
20140330969 | System and Method for As Needed Connection Escalation - A method includes selecting a first connection between a connection manager and a managed system, the first connection being associated with a first privilege level, communicating by the connection manager a first command to the managed system via the first connection, determining that a second command is executable on the managed system using a connection that is associated with a second privilege level, the second privilege level being a lower privilege level than the first privilege level, selecting a second connection between the connection manager and the managed system, the second connection being associated with the second privilege level, and communicating, by the connection manager, the second command to the managed system via the second connection. | 2014-11-06 |
20140330970 | METHODS AND SYSTEMS FOR CONNECTING A MOBILE DEVICE TO A NETWORK - A method and system for obtaining network access modes of mobile devices are disclosed. An exemplary method may include obtaining network connection information once a mobile device connects to a network and obtaining network access point information from the network connection information. In addition, the method includes determining a network access mode corresponding to the network access point information. The method and system consistent with the present disclosure may improve the accuracy for identifying network access modes of mobile devices. | 2014-11-06 |
20140330971 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND RECORDING MEDIUM RECORDING INFORMATION PROCESSING PROGRAM - An information processing device includes: an acquisition unit configured to acquire country information of one or a plurality of devices, which are positioned on a path to a destination of data, acquired from position information of the one or plurality of devices; and a determination unit configured to compare the country information acquired by the acquisition unit and information of countries in which passing of data is prohibited stored in a storage unit, determine whether a country in which passing of data is prohibited is included on the path, and if a country in which passing of data is prohibited is not included on the path, permit transmission of the data to the destination. | 2014-11-06 |
20140330972 | METHOD FOR MANAGING PERSONAL NETWORK - Provided is a method for requesting to add an adminee and to assign a PN (personal network) admin and changing information about the adminee in a personal network (PN). The method may be initiated by a PN element which desires to be the PN admin and change the information about the adminee or a PN gateway in the PN. If the PN element initiates the method, the PN element can request assignment of the PN admin to a CPNS (converged personal network service) server when a result of requesting addition of the adminee for another PN element is successful. Also, the PN element which has become the PN admin can request change of specific information about the adminee to the CPNS server when a result of requesting to change the specific information from the adminee is successful. | 2014-11-06 |
20140330973 | SYSTEM AND METHOD FOR BROKERING AND PROVISIONING IN HIGH-SPEED NETWORKS - Network resources are provisioned within an application broker according to aggregated requests in an optical network. Resource requests are sorted to form sorted resource requests. The sorted resource requests are sorted according to destinations of the resource requests. The sorted resource requests are aggregated to form aggregated resource requests. Resource allocation is requested for each of the aggregated resource requests from a network border controller based on requirements of the set of set of aggregated resource requests. A set of allocated resources is received from the network border controller. The set of allocated resources is based on requirements of the aggregated resource requests. For each of the aggregated resource requests, network transmissions network receptions are executed utilizing associated allocated resources. | 2014-11-06 |
20140330974 | POLICY BASED APPLICATION ELASTICITY ACROSS HETEROGENEOUS COMPUTING INFRASTRUCTURE - A system and method for provisioning resources in a cloud environment are provided. An example system includes a communication module that receives from a requestor running in a cloud environment a request for one or more cloud resources. The example system also includes an identification module that identifies a set of provision policies for the requestor. The example system further includes a resource manager that determines, based on the set of provision policies, whether to approve the request for one or more cloud resources, and that when the request is determined to be approved, determines, based on the set of provision policies, whether to provision one or more physical computing machines and one or more virtual machines for the requestor. The one or more cloud resources is at least one of one or more physical computing machines and one or more virtual machines. | 2014-11-06 |
20140330975 | ENHANCED COMMAND SELECTION IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for identifying commands for virtual resource instances in a networked computing environment (e.g., a cloud computing environment). Specifically, in a typical embodiment, a set of commands for an instance of a virtual resource may be received in a computer memory medium or the like. The commands may then be analyzed and information pertaining to the commands may be stored in a computer storage device or the like. When a user/requester later wishes to identify a command to be utilized for another instance of the virtual resource, the requester can access the information and be provided with a set of suggested commands that are typically utilized for similar and/or previous instances of the virtual resource. | 2014-11-06 |
20140330976 | STATELESS LOAD BALANCING OF CONNECTIONS - A capability is provided for statelessly load balancing Transmission Control Protocol (TCP) connections across a set of servers. A load balancer receives a TCP SYN packet from a client, selects a server for a TCP connection for the client, forms a modified TCP SYN packet including an address of the client, and propagates the modified TCP SYN packet toward the server. The server receives the modified TCP SYN packet, forms a TCP SYN+ACK packet including an identifier (e.g., n bits of an address, an n-bit server index based on mapping information of the load balancer, or the like) of the server, and propagates the modified TCP SYN+ACK packet toward the load balancer. The load balancer receives a TCP packet from the client on the TCP connection, determines a server associated with the TCP connection based on information included within the TCP packet, and propagates the TCP packet toward the server. | 2014-11-06 |
20140330977 | STATELESS RECOGNITION OF KEEP-ALIVE PACKETS - A capability is provided for statelessly recognizing Transmission Control Protocol (TCP) keep-alive packets. A server receives a TCP SYN packet including an initial client sequence number and selects an initial server sequence number for the TCP connection based on the parity of the initial client sequence number and a parity rule. A server receives a TCP packet from a client and uses a parity rule for determining whether to manipulate a TCP response packet to be sent by the server to the client responsive to the received TCP packet (to ensure that the next TCP packet to be sent by the client is not incorrectly identified as a TCP keep-alive packet). A network device receives a TCP packet and uses a parity rule to determine whether the TCP packet is a TCP keep-alive packet. The parity rule is indicative of an expected parity of TCP keep-alive packets. | 2014-11-06 |
20140330978 | Accelerating USB Redirection over a Network - In particular embodiments, a client computing device identifies a USB device connected to the client computing device. The client computing device redirects the USB device to a remote server computing device. The client computing device determines whether the USB device is of a particular device type, and if the USB device is determined to be of the particular device type, then the client computing device requests data from the USB device. Upon receiving a response from the USB device comprising data, the client computing device sends the data to the remote server computing device. | 2014-11-06 |
20140330979 | SIMPLE INTEGRATION OF ON-DEMAND COMPUTE ENVIRONMENT - Disclosed are a system and method of integrating an on-demand compute environment into a local compute environment. The method includes receiving a request from an administrator to integrate an on-demand compute environment into a local compute environment and, in response to the request, automatically integrating local compute environment information with on-demand compute environment information to make available resources from the on-demand compute environment to requestors of resources in the local compute environment. | 2014-11-06 |
20140330980 | MANAGING CONTENT DELIVERY NETWORK SERVICE PROVIDERS BY A CONTENT BROKER - A system, method, and computer readable medium for managing network storage provider and CDN service providers are provided. A content broker component obtains client computing device requests for content provided by a content provider. The content broker processes the client computing device requests and determines whether a subsequent request for the resource should be directed to a network storage provider or a CDN service provider as a function of the updated or processed by the content broker. | 2014-11-06 |
20140330981 | MANAGING DISTRIBUTED EXECUTION OF PROGRAMS - Techniques are described for managing distributed execution of programs. In some situations, the techniques include determining configuration information to be used for executing a particular program in a distributed manner on multiple computing nodes and/or include providing information and associated controls to a user regarding ongoing distributed execution of one or more programs to enable the user to modify the ongoing distributed execution in various manners. Determined configuration information may include, for example, configuration parameters such as a quantity of computing nodes and/or other measures of computing resources to be used for the executing, and may be determined in various manners, including by interactively gathering values for at least some types of configuration information from an associated user (e.g., via a GUI that is displayed to the user) and/or by automatically determining values for at least some types of configuration information (e.g., for use as recommendations to a user). | 2014-11-06 |
20140330982 | FACILITATING SECURE NETWORK TRAFFIC BY AN APPLICATION DELIVERY CONTROLLER - Facilitation of secure network traffic by an application delivery controller is provided herein. In some examples, a method includes: (a) receiving a data packet with information from a client indicating that the client is a trusted source; (b) embedding in the data packet a transmission control protocol (TCP) options header, the TCP options header comprising information including at least a sequence number for a protocol connection; and (c) forwarding the embedded data packet to a server. | 2014-11-06 |
20140330983 | LOAD BALANCING - A method and network device for managing a multi-homed network are provided. The method comprises receiving a request from a client within a client computer network directed to a remote server computer within a remote computer network, wherein the client and the remote server computer are connected through a plurality of data routes, each of the plurality of data routes is connected to a router; selecting a data route from the plurality of data routes to route the received request, wherein the selection of the data route is based on a decision function; translating a source IP address of the client to an IP address corresponding to the selected data route; and routing the received request from the client to the remote server computer over the selected data route. | 2014-11-06 |
20140330984 | HIP Node Reachability - A method of configuring a plurality of rendezvous servers to provide a Host Identity Protocol, HIP, based mobility service to HIP nodes, where the servers are arranged in a hierarchical branching structure. For each HIP node, a Host Identity Tag, HIT,-and contact address mapping is registered with a rendezvous server ( | 2014-11-06 |
20140330985 | SYSTEM AND METHOD OF UTILIZING A FRAMEWORK FOR INFORMATION ROUTING IN LARGE-SCALE DISTRIBUTED SYSTEMS USING SWARM INTELLIGENCE - In some embodiments, the invention involves information routing in networks, and, more specifically, to defining a framework using swarm intelligence and utilization of the defined framework for routing information in the network, especially for cloud computing applications. In an embodiment, information about available information/services is pushed to network nodes using information packets (ants). Nodes requiring services send query packets (ants) and a node may send a response to a query ant when information is available. Ants may be forwarded throughout the network based on popularity of nodes, freshness of information/requests, routing table information, and requests or interest by consumer nodes captured in information routing table. Other embodiments are described and claimed. | 2014-11-06 |
20140330986 | COMPRESSION OF CONTENT PATHS IN A DIGITAL CERTICATE - An example method of compressing a set of content paths includes identifying a set of content paths associated with a client. The method also includes determining a condensed path tree expressing the set of content paths. The method further includes determining a path node tree including a set of path nodes. Each path node of the set of path nodes represents from the condensed path tree a connector node including one or more segment strings as a name and one or more nodes referenced by the connector node. The method also includes encoding, based on a frequency of appearance of a segment string as a name in the set of path nodes, the set of content paths. The method further includes compressing the set of content paths. The method also includes providing a digital certificate including the compressed and encoded set of content paths. | 2014-11-06 |
20140330987 | METHOD OF PROGRAMMING A USB DEVICE - The invention is a method of programming a device comprising a USB® connector and a USB® chip. The USB® connector comprises first and second sets of connection pins. The USB® chip comprises a USB® interface and a programming interface. The method comprises a step of activating a selecting pin of said first set for selecting the programming interface and a step of sending programming data to the USB® chip through said second set and through the programming interface. | 2014-11-06 |
20140330988 | MULTIPLE-SPEED INTERFACE - The present invention provides a security module having a communication interface being capable of operating according to any from a selection from a plurality of predetermined operation modes or communication protocols. The security module further comprises a voltage detector to detect the voltage on the module's power supply connection. Depending on the value of the detected voltage or to which of a plurality of predetermined voltage ranges the detected voltage may be categorized, the security module is made to function according to one from the plurality of predetermined communication protocols. According to an embodiment of the present invention the plurality of communication protocols require that the security module operate at a plurality of different frequencies | 2014-11-06 |
20140330989 | Intelligent Power Strip - A method and implementing computer system are provided in which a smart power strip is controlled by a master device which is also plugged-into the power strip. In an exemplary implementation, a computer or PC operates as a master device and a direct line of communication from the computer allows the OS to make a decision based on settings whether or not to power on or off individual power outlets on the power strip used in common by the computer and various peripheral devices. Thus, only selected peripheral devices are powered-on along with the computer when the computer or other master device is powered-on at a common power strip. | 2014-11-06 |
20140330990 | Application with Multiple Operation Modes - A method and system for operating an application with multiple modes are described. A plurality of applications may be presented to a user on a mobile device and one of the displayed applications may be selected. The selected application may have one or more contexts that are determined based on one or more operational parameters. For example, a context for the selected application may be that the application is configured to access an enterprise account. Based on the context, the selected application may be run on the mobile device in one of a plurality of operations modes. The operation modes may comprise managed, unmanaged, and partially managed modes, among others. | 2014-11-06 |
20140330991 | EFFICIENT COMPLEX NETWORK TRAFFIC MANAGEMENT IN A NON-UNIFORM MEMORY SYSTEM - A network appliance includes a first processor, a second processor, a first storage device, and a second storage device. A first status information is stored in the first storage device. The first processor is coupled to the first storage device. A queue of data is stored in the second storage device. The first status information indicates if traffic data stored in the queue of data is permitted to be transmitted. The second processor is coupled to the second storage device. The first processor communicates with the second processor. The traffic data includes packet information. The first storage device is a high speed memory only accessible to the first processor. The second storage device is a high capacity memory accessible to multiple processors. The first status information is a permitted bit that indicates if the traffic data within the queue of data is permitted to be transmitted. | 2014-11-06 |
20140330992 | USB Device Communication Method, Device and System - A universal serial bus (USB) device communication method that relates to the field of communications includes: receiving, by a USB device, a device type query message sent by a peer device, where a human interface device (HID) descriptor and a HID report descriptor are added to a driver of the USB device; sending, by the USB device according to the HID descriptor and HID report descriptor, a query response message that carries a HID identifier to the peer device, where the HID identifier is used to enable the peer device to identify the USB device as a HID device; and encoding and encapsulating, by the USB device, data to be sent to generate a HID packet, and sending the HID packet to the peer device, or receiving a HID packet from the peer device, and decapsulating and decoding the received HID packet, where the HID packet carries a data type and data usage manner information. | 2014-11-06 |
20140330993 | DRIVERLESS DATA TRANSFER DEVICE - The present invention includes a driverless data transfer device and method for accessing and downloading item data from an item storage unit associated with an item. The driverless data transfer device includes, inter alia, a data downloading unit configured to download the item data, an interface unit for transferring the downloaded data to an item checking unit via a communications bus, and a decoder configured to decode said stored data to conform to data processing requirements of the item checking unit. | 2014-11-06 |
20140330994 | SYNCHRONOUS DATA-LINK THROUGHPUT ENHANCEMENT TECHNIQUE BASED ON DATA SIGNAL DUTY-CYCLE AND PHASE MODULATION/DEMODULATION - A synchronous data-link throughput enhancement technique based on data signal duty-cycle and phase modulation demodulation is disclosed. A method includes receiving multiple bits to be transmitted, encoding the multiple bits to generate a multi-bit signal that represents the multiple bits, and transmitting, via a synchronous interface, the multi-bit signal during a time period that corresponds to one-half of a cycle of a synchronization signal. | 2014-11-06 |
20140330995 | DATA STORAGE SYSTEM - In an embodiment, a storage device may include a tangible non-transitory physical storage for storing information. The storage device may also include an interface. The interface may be used to receive a signal that may be associated with one of a plurality of different protocols. The signal may be received serially. The storage device may include circuitry which may be used to identify a protocol associated with the received signal. The protocol may be identified based on an attribute associated with the received signal. Alternatively or in addition to, the protocol may be identified based on information encoded in the received signal. The information encoded in the received signal may include, for example, a data header that may be associated with the protocol. | 2014-11-06 |
20140330996 | DEVICES AND METHODS FOR AN ENHANCED DRIVER MODE FOR A SHARED BUS - A device includes a transmission circuit that is configured and arranged to transmit data in accordance with a signal bus protocol that uses passive bias to set a signal bus to a recessive value in the absence of an actively-driven signal value. The transmission circuit includes a first driver circuit that is configured and arranged to actively drive the signal bus to a dominant value that is different from the recessive value. The transmission circuit also includes a second driver circuit that is configured and arranged to actively drive the signal bus to the recessive value. A control circuit is configured and arranged to disable the second driver circuit in response to the device operating in a first data transmission mode, and to enable the second driver circuit in response to the device entering a second transmission mode. | 2014-11-06 |
20140330997 | SYSTEM AND METHOD FOR MONITORING TWO-WIRE COMMUNICATION IN A NETWORK ENVIRONMENT - An example method is provided and includes receiving, from a host device, a first signal over a two-wire bus to an address on the two-wire bus corresponding to a small form factor (XFP) module, the host device being located outside the XFP module, the two-wire bus coupling the host device with a first controller inside the XFP module and a second controller inside the XFP module that share the address such that the first controller and the second controller receive the first signal, and blocking a second signal from the second controller to the host device using digital isolation buffers. A third signal from the first controller to the host device over the two-wire bus is not blocked. In specific embodiments, the first controller includes a XFP compliant controller and the second controller includes an optical controller. | 2014-11-06 |
20140330998 | METHOD AND APPARATUS FOR CONFIGURATION AND CONTROL OF WIRELESS DOCKING - Configurability and controllability over the initiation of automatic docking for a portable device seeking to dock wirelessly with a docking station in a wireless docking system environment are achieved by the method and system disclosed herein. The portable device detects the docking station in the wireless docking environment. When the docking station is detected, a communication path is established between the portable device and the docking station. A received signal characteristic level is measured for a received signal. The received signal characteristic level is compared to a determined threshold so that, at least when the received signal level exceeds the determined threshold, docking the portable device to the docking station is able to be completed. The determined threshold is preferably based on signal measurements made for the received signal characteristic level which exceeds a minimum signal strength level required for establishing communication between the portable device and the docking station. | 2014-11-06 |
20140330999 | COMPUTER SYSTEM AND A COMPUTER DEVICE - A computer system is provided. The computer system includes a hub board, a common bus, and a plurality of Sibling boards. The hub board has an I/O controller hub, which includes a main communication chipset. The plurality of Sibling boards is coupled to the hub board by the common bus. Each of the Sibling boards includes a memory and at least one CPU. The memory is operative to host a Sibling operating system. The CPU is coupled to the memory. The Southbridge type chipset which resides in the hub board is shared amongst the plurality of Sibling boards. At least one of the plurality of Sibling boards functions as a master processing unit of the system. Sibling boards offer processing flexibility through the means of how they are configured in the system. | 2014-11-06 |
20140331000 | Computer System, Method for Accessing Peripheral Component Interconnect Express Endpoint Device, and Apparatus - A computer system and a method are provided for accessing a peripheral component interconnect express (PCIe) endpoint device. The computer system includes: a processor, a PCIe bus, and an access proxy. The access proxy connects to the processor and the PCIe endpoint device; the processor acquires an operation instruction, where the operation instruction instructs the processor to access the PCIe endpoint device through the access proxy, and send an access request to the access proxy according to the operation instruction; and the access proxy sends a response message of the access request to the processor after receiving the access request sent by the processor. Because the processor does not directly access the PCIe endpoint device to be accessed but completes access through the access proxy, thereby avoiding an MCE reset for the processor. | 2014-11-06 |
20140331001 | Command Barrier for a Solid State Drive Controller - Methods and systems may perform one or more operations for solid state device administrative command execution including, but not limited to: receiving, in at least one administrative command queue, at least one administrative command affecting at least one submission queue; halting enqueuing of one or more submission commands in the at least one submission queue in response to the receiving the at least one administrative command affecting the at least one submission queue; adding at least one barrier command to at least one submission queue affected by the at least one administrative command; processing one or more commands in the at least one submission queue until the at least one barrier command in the at least one submission queue is processed; and processing the at least one administrative command affecting the at least one submission queue in response to the processing of the at least one barrier command. | 2014-11-06 |
20140331002 | Systems and Methods for Internal Initialization of a Nonvolatile Memory - Methods and systems are provided that may include a memory device having a physical nonvolatile memory, a memory space, and a controller. At least a portion of a physical nonvolatile memory may permit a direct read operation of the physical nonvolatile memory and prohibit a direct write operation of the physical nonvolatile memory. A memory space may comprise at least open one write overlay window available after a reset operation. Such a memory space may be adapted to permit at least one read overlay window to be opened that is logically separate from at least one open write overlay window. A controller may be included to open at least one read overlay window. | 2014-11-06 |
20140331003 | FAULT-TOLERANT NON-VOLATILE INTEGRATED CIRCUIT MEMORY - Apparatus and methods are disclosed, such as those that store data in a plurality of non-volatile integrated circuit memory devices, such as NAND flash, with convolutional encoding. A relatively high code rate for the convolutional code consumes relatively little extra memory space. In one embodiment, the convolutional code is spread over portions of a plurality of memory devices, rather than being concentrated within a page of a particular memory device. In one embodiment, a code rate of m/n is used, and the convolutional code is stored across n memory devices. | 2014-11-06 |
20140331004 | Write Spike Performance Enhancement In Hybrid Storage Systems - In an embodiment, a hybrid storage array one uses two or more storage device tiers provided by solid state drives (SSDs) and hard disk drives (HDDs). Random writes are collected and written to a write cache extension, such as a portion of the SSD storage tier. The write cache extension absorbs such accesses that would otherwise be written to HDD storage directly. Data structures are created in a cache memory local to an array controller representing the location on the write cache extension to which the writes were committed and a location in the storage system where they were originally intended to go. The write cache extension can be enabled all of the time, or only when the array controller write cache experiences certain operating conditions, such as when its utilization exceeds a predetermined amount. The approach improves the overall performance of the hybrid array. | 2014-11-06 |
20140331005 | MEMORY SYSTEM AND BUS SWITCH - A memory system includes a nonvolatile memory having a plurality of nonvolatile memory chips incorporated therein, a control circuit that controls the nonvolatile memory, an MPU that controls the control circuit, and an interface circuit that communicates with a host, all of which are mounted on a board of the memory system, and the memory system further includes a bus switch that switches connection of a signal line between the control circuit and the nonvolatile memory chips. | 2014-11-06 |
20140331006 | SEMICONDUCTOR MEMORY DEVICES - A semiconductor memory device includes a memory cell array, a data inversion/mask interface and a write circuit. The data inversion/mask interface receives a data block including a plurality of unit data, each of the plurality of unit data having a first data size, and the data inversion/mask interface selectively enables each data mask signal associated with each of the plurality of unit data based on a number of first data bits in a second data size of each unit data. The second data size is smaller than a first data size of the unit data. The write circuit receives the data block and performs a masked write operation that selectively writes each of the plurality of unit data in the memory cell array in response to the data mask signal. | 2014-11-06 |
20140331007 | VIRTUAL LIBRARY CONTROLLER AND CONTROL METHOD - A virtual library controller includes: a substitution logical volume creation unit to create, in a case that a logical volume subject to an instruction to write data from a superior device is not present in a cache disk, a substitution logical volume in the cache disk; and a write process unit to carry out write of the data in the created substitution logical volume. | 2014-11-06 |
20140331008 | CONTROLLING METHODS OF STORAGE CONTROL DEVICE AND VIRTUAL VOLUMES - The storage control device of this invention allocates the physical storage area in RAID groups to virtual volumes in units of chunks including multiple pages. | 2014-11-06 |
20140331009 | SELECTIVELY SECURING A HOT-SWAPPABLE DATA STORAGE DEVICE TO PREVENT DATA CORRUPTION - A method and computer program product secure a hot-swap data storage device against being manually physically removed from an operable position within a chassis bay of a computer system. The hot-swap data storage device is released to be manually physically removed from the operable position within the chassis bay of the computer system in response to determining that the data storage device is not active. The hot-swap data storage device may, for example, be secured and released using an electronically-actuated lock. | 2014-11-06 |
20140331010 | SOFTWARE PERFORMANCE BY IDENTIFYING AND PRE-LOADING DATA PAGES - Embodiments relate to methods, computer systems and computer program products for improving software performance by identifying and preloading data pages. Embodiments include executing an instruction that requests a data page from the one or more auxiliary storage devices. Based on determining that the instruction is present in the long-running instruction list, embodiments include examining one or more characteristics of a plurality of data pages that will be requested by the instruction. Based on determining that the plurality of data pages are located on a single auxiliary storage device and that the plurality of data pages can be efficiently retrieved by the single auxiliary storage device, embodiments include initiating a pre-load operation to move the plurality of data pages to the main memory. | 2014-11-06 |
20140331011 | SYSTEMS AND METHODS FOR INSTANTANEOUS CLONING - Techniques to clone a writeable data object in non-persistent memory are disclosed. The writeable data object is stored in a storage structure in non-persistent memory that corresponds to a portion of a persistent storage. The techniques enable cloning of the writeable data object without having to wait until the writeable data object is saved to the persistent storage and without needing to quiesce incoming operations (e.g., reads and writes) to the writeable data object. | 2014-11-06 |
20140331012 | SYSTEM AND METHOD OF ARBITRATING CACHE REQUESTS - This disclosure relates to arbitration of different types of requests to access a cache. Features of this disclosure can be implemented in a graphics processing unit (GPU). In one embodiment, an arbiter can receive requests from a color processor and a depth processor and determine which of the received requests has the highest priority. The request with the highest priority can then be provided to the cache. The priority can be configurable. The arbiter can determine priority, for example, based on whether a location in the cache associated with a request is available, a weight associated with the request, a number of requests of a particular type processed by the arbiter, or any combination thereof. | 2014-11-06 |
20140331013 | ARITHMETIC PROCESSING APPARATUS AND CONTROL METHOD OF ARITHMETIC PROCESSING APPARATUS - An arithmetic processing apparatus according to one embodiment of the present invention includes: a plurality of arithmetic processing units configured to perform arithmetic operations to output access requests; a cache memory to retain data undergoing the arithmetic processes of the arithmetic processing units in cache blocks; a retaining unit configured to retain a control target address specifying a control target cache block and control target identifying information specifying an arithmetic processing unit of a control target access requester; and a control unit configured to control an access request for the cache block specified by the control target address and the control target identifying information on the basis of an access target address contained in an access request issued by any one of the arithmetic processing units and requester identifying information specifying the arithmetic processing unit having issued the access request. | 2014-11-06 |
20140331014 | Scalable Matrix Multiplication in a Shared Memory System - High performance computing systems perform complex or data-intensive calculations using a large number of computing nodes and a shared memory. Disclosed methods and systems provide nodes having a special-purpose coprocessor to perform these calculations, along with a general-purpose processor to direct the calculations. Computational data transfer from the shared memory to the coprocessor incurs a data copying latency. To reduce this latency as experienced by the coprocessor, a complex computation is divided into work units, and one or more threads executing on the processor copy the work units from the shared memory to a local buffer memory of a computing node. By buffering these data for transfer from the local memory to coprocessor memory, and by ensuring that new data are copied while the coprocessor operates on older data, data copying latency is hidden from the coprocessor. | 2014-11-06 |
20140331015 | RECOVERING FROM UNCORRECTED MEMORY ERRORS - A method for recovering from uncorrected memory errors may include receiving, at an operating system, a correctable error (CE) associated with a first memory page. The correctable error is marked in a page table entry describing the first memory page. The first memory page is then migrated, by the operating system, to a second memory page based on the received correctable error. | 2014-11-06 |
20140331016 | APPLICATION-DIRECTED MEMORY DE-DUPLICATION - In a computing system including an application executing on top of a virtualization control layer, wherein the virtualization control layer maps portions of a virtual memory to portions of a physical memory, a method for managing memory including: identifying, by the application, a range of virtual memory whose probability of being replicated in the virtual memory exceeds a given threshold; obtaining, by the application, at least one memory address corresponding to the range of virtual memory; and passing, from the application to the virtualization control layer, an identifier for the range of virtual memory and the memory address corresponding to the range of virtual memory, wherein the identifier is useable by the virtualization control layer to identify similar ranges within the virtual memory. | 2014-11-06 |
20140331017 | APPLICATION-DIRECTED MEMORY DE-DUPLICATION - In a computing system including an application executing on top of a virtualization control layer, wherein the virtualization control layer maps portions of a virtual memory to portions of a physical memory, an apparatus for managing memory configured to: identify, by the application, a range of virtual memory whose probability of being replicated in the virtual memory exceeds a given threshold; obtain, by the application, at least one memory address corresponding to the range of virtual memory; and pass, from the application to the virtualization control layer, an identifier for the range of virtual memory and the memory address corresponding to the range of virtual memory, wherein the identifier is useable by the virtualization control layer to identify similar ranges within the virtual memory. | 2014-11-06 |
20140331018 | METHOD AND DEVICE FOR SAVING DATA IN AN IT INFRASTRUCTURE OFFERING ACTIVITY RESUMPTION FUNCTIONS - The saving of data in an information technology (IT) infrastructure offering activity resumption functions is disclosed. For these purposes, a saving system is provided with at least one first and one second sets of data storage and at least one first and one second memory controllers associated with the first and second data storage, respectively. The saving system is furthermore provided with a microcontroller configured to duplicate a stream of commands and of data destined for the first memory controller to the second memory controller in a mode of normal use allowing a local replication of data in the second set of data storage and to address a distinct stream of commands and of data to each of the first and second memory controllers in a mode of remote replication. | 2014-11-06 |
20140331019 | INSTRUCTION SET SPECIFIC EXECUTION ISOLATION - A system on a chip (SoC) or other integrated system can include a first processor and at least one additional processor sharing a page table. The shared page table can include permission bits including a first permission indicator supporting the processor and a second permission indicator supporting at least one of the at least one additional processor. In one implementation, that page table can include at least one additional bit to accommodate encodings that support the at least one additional processor. When one of the processors accesses memory, a method is performed in which a shared page table is accessed and a value of the permission indicator(s) is read from the page table to determine permissions for performing certain actions including executing a page; read/write of the page; or kernel mode with respect to the page. | 2014-11-06 |
20140331020 | MEMORY CONTROLLER MAPPING ON-THE-FLY - Systems, methods, and devices for dynamically mapping and remapping memory when a portion of memory is activated or deactivated are provided. In accordance with an embodiment, an electronic device may include several memory banks, one or more processors, and a memory controller. The memory banks may store data in hardware memory locations and may be independently deactivated. The processors may request the data using physical memory addresses, and the memory controller may translate the physical addresses to hardware memory locations. The memory controller may use a first memory mapping function when a first number of memory banks is active and a second memory mapping function when a second number is active. When one of the memory banks is to be deactivated, the memory controller may copy data from only the memory bank that is to be deactivated to the active remainder of memory banks. | 2014-11-06 |
20140331021 | MEMORY CONTROL APPARATUS AND METHOD - A memory control apparatus that minimizes memory bank collisions by rescheduling memory requests. The memory control apparatus includes a scheduler configured to, in response to at least two memory requests existing in a current cycle, schedule a plurality of elements included in the at least two memory requests based on information about memory banks determined for the plurality of elements; and a request generator configured to, in response to the scheduling of the plurality of elements by the scheduler, generate a scheduled memory request for the current cycle using at least one element in the at least two memory requests in order to prevent a memory bank collision. | 2014-11-06 |
20140331022 | SERVICE ASSOCIATED WITH PERSISTENT STORAGE - Examples are disclosed for allocating a block of persistent storage or accessing a block of persistent storage based on a storage service string that includes a universally unique identifier and associated metadata. | 2014-11-06 |
20140331023 | MULTI-CORE PAGE TABLE SETS OF ATTRIBUTE FIELDS - A device includes a memory that stores a first page table that includes a first page table entry, wherein the first page table entry further includes a physical address, an alternative location associated with the page table entry, and a physical page of memory associated with the physical address. A first processing unit is configured to: read the first page table entry, and determine the physical address from the first page table entry. The second processing unit is configured to: read the physical address from the first page table entry, determine second page attribute data from the alternative location, wherein the second page attribute data define one or more accessibility attributes of the physical page of memory for the second processing unit, and access the physical page of memory associated with the physical address according to the one or more accessibility attributes. | 2014-11-06 |
20140331024 | Method of Dynamically Adjusting Mapping Manner in Non-Volatile Memory and Non-Volatile Storage Device Using the Same - A method of dynamically adjusting a mapping manner for a non-volatile memory includes mapping a plurality of logical addresses to a plurality of physical addresses by a first mapping unit; storing data in the non-volatile memory by the first mapping unit; and mapping at least one logical address to at least one physical address by a second mapping unit according to the stored data. | 2014-11-06 |
20140331025 | RECONFIGURABLE PROCESSOR AND OPERATION METHOD THEREOF - A reconfigurable processor and an operation method thereof are provided. The reconfigurable processor may include: a controller configured to control operations of a first mode, in which a first portion of a program that does not utilize loop acceleration is processed, and a second mode, in which a second portion for the program that utilizes the loop acceleration is processed, based on whether an instruction to control parallel operations of the first mode and the second mode is executed; and a shared register file configured to transfer data between the first mode and the second mode. | 2014-11-06 |
20140331026 | MULTI-FRAME DATA PROCESSING APPARATUS AND METHOD USING FRAME DISASSEMBLY - A multi-frame data processing apparatus and method using frame disassembly is provided. The multi-frame data apparatus includes a data communication unit, a frame processing unit, and a data processing unit The data communication unit receives a transmission signal from a Line Adaptation Unit (LAU). The frame processing unit disassembles each frame of the transmission signal and acquires information data that is included in the transmission signal. The data processing unit transfers the information data to an Algorithm Processing Unit (APU), and acquires processed information data that is obtained by processing the information data via the APU based on a corresponding algorithm. | 2014-11-06 |
20140331027 | ASYMMETRIC MESH NOC TOPOLOGIES - A method of interconnecting blocks of heterogeneous dimensions using a NoC interconnect with sparse mesh topology includes determining a size of a mesh reference grid based on dimensions of the chip, dimensions of the blocks of heterogeneous dimensions, relative placement of the blocks and a number of host ports required for each of the blocks of heterogeneous dimensions, overlaying the blocks of heterogeneous dimensions on the mesh reference grid based on based on a guidance floor plan for placement of the blocks of heterogeneous dimensions, removing ones of a plurality of nodes and corresponding ones of links to the ones of the plurality of nodes which are blocked by the overlaid blocks of heterogeneous dimensions, based on porosity information of the blocks of heterogeneous dimensions, and mapping inter-block communication of the network-on-chip architecture over remaining ones of the nodes and corresponding remaining ones of the links | 2014-11-06 |
20140331028 | IDENTIFICATION OF MISSING CALL AND RETURN INSTRUCTIONS FOR MANAGEMENT OF A RETURN ADDRESS STACK - A data processing apparatus and method of data processing are disclosed. A fetch unit retrieves program instructions comprising call instructions and return instructions from memory to be executed by an execution unit. A branch prediction unit generates a return address prediction for an identified return instruction with reference to a return address stack. The branch prediction unit performs a return address push onto said return address stack when the execution unit executes a call instruction and performs a return address pop from the return address stack when the execution unit executes a return instruction. An error detection unit identifies a missing call instruction or a missing return instruction in said program instructions by reference to the return address prediction, a resolved return address indicated by the execution unit when the return instruction is executed and the content of the return address stack. | 2014-11-06 |
20140331029 | SYNCHRONISATION OF EXECUTION THREADS ON A MULTI-THREADED PROCESSOR - Method and apparatus are provided for synchronising execution of a plurality of threads on a multi-threaded processor. A program executed by a thread can have a number of synchronisation points corresponding to points where execution is to be synchronised with another thread. Execution of a thread is paused when it reaches a synchronisation point until at least one other thread with which it is intended to be synchronised reaches a corresponding synchronisation point. Execution is subsequently resumed. A control core maintains status data for threads and can cause a thread that is ready to run to use execution resources that were occupied by a thread that is waiting for a synchronization event. | 2014-11-06 |
20140331030 | STATICALLY SPECULATIVE COMPILATION AND EXECUTION - A system, for use with a compiler architecture framework, includes performing a statically speculative compilation process to extract and use speculative static information, encoding the speculative static information in an instruction set architecture of a processor, and executing a compiled computer program using the speculative static information, wherein executing supports static speculation driven mechanisms and controls. | 2014-11-06 |
20140331031 | RECONFIGURABLE PROCESSOR HAVING CONSTANT STORAGE REGISTER - A reconfigurable processor configured to include a constant storage register to store a constant is provided, thereby improving efficiency in the use of a memory space. Specifically, a reconfigurable processor includes a plurality of Functional Units (FUs), a configuration memory configured to store configuration information, and a constant storage register configured to store a constant that is used as an operand for an operation in the plurality of FUs. | 2014-11-06 |
20140331032 | STREAMING MEMORY TRANSPOSE OPERATIONS - According to one general aspect, an apparatus may include a load/store unit, an execution unit, and a first and a second data path. The load/store unit may be configured to load/store data from/to a memory and transmit the data to/from an execution unit, wherein the data includes a plurality of elements. The execution unit may be configured to perform an operation upon the data. The load/store unit may be configured to transmit the data to/from the execution unit via either a first data path configured to communicate, without transposition, the data between the load/store unit and the execution unit, or a second data path configured to communicate, with transposition, the data between the load/store unit and the execution unit, wherein transposition includes dynamically distributing portions of the data amongst a plurality of elements according to an instruction. | 2014-11-06 |
20140331033 | FIRMWARE CODE LOADING METHOD, MEMORY CONTROLLER AND MEMORY STORAGE APPARATUS - A firmware code loading method for loading a firmware code from a rewritable non-volatile memory module of a memory storage apparatus is provided. The method includes: obtaining a storage address for storing a first portion firmware code copy corresponding to a first portion of the firmware code in a first memory part; and obtaining a storage address for storing a second portion firmware code copy corresponding to a second portion of the firmware code in a second memory part. The method further includes: using a parallel mode or a interleave mode to load the first portion firmware code copy and the second portion firmware code copy respectively from the first memory part and the second memory part into a buffer memory. Accordingly, the method can effectively shorten the time of loading the firmware code. | 2014-11-06 |
20140331034 | Embedded system boot from a storage device - A mechanism of booting up a system directly from a storage device and a means of initializing an embedded system prior to activating a CPU is presented. The said system is comprised of one or more CPUs, a reset controller, a storage device controller, one or more direct memory access controllers, a RAM and its controller, a ROM and its controller, a debug interface and a power-on reset (POR) sequencer. The POR sequencer controls the overall boot process of the embedded system. Said sequencer uses descriptors (POR Sequencer descriptors) which are used to update the configuration registers of the system and to enable CPU-independent data transfers with the use of DMA controllers. | 2014-11-06 |
20140331035 | FAST COMPUTER STARTUP - Fast computer startup is provided by, upon receipt of a shutdown command, recording state information representing a target state. In this target state, the computing device may have closed all user sessions, such that no user state information is included in the target state. However, the operating system may still be executing. In response to a command to startup the computer, this target state may be quickly reestablished from the recorded target state information. Portions of a startup sequence may be performed to complete the startup process, including establishing user state. To protect user expectations despite changes in response to a shutdown command, creation and use of the file holding the recorded state information may be conditional on dynamically determined events. Also, user and programmatic interfaces may provide options to override creation or use of the recorded state information. | 2014-11-06 |
20140331036 | DATA RELAY BY SERVER - Example embodiments relate to data relay by a server. In one example implementation, a master server may load a temporary operating system and a slave server may load a temporary operating system. The master server may then receive a command from a user via a user interface of a computing device. The master server may relay the command received from the user to the slave server. | 2014-11-06 |
20140331037 | SECURE BOOT OVERRIDE IN A COMPUTING DEVICE EQUIPPED WITH UNIFIED-EXTENSIBLE FIRMWARE INTERFACE (UEFI)-COMPLIANT FIRMWARE - A firmware-based system and method for detecting an indicator of an override condition during a Unified Extensible Firmware Interface (UEFI) Secure Boot sequence. The indicator of the override condition may be detected based upon the pressing of a specialized button, designated key or keys or other received input that indicates both physical presence of the user and the desire, on the current boot, to bypass UEFI Secure Boot. An embodiment may work for only a single boot, not require access into a setup application, and may be accessed by externally accessible features of the computer system. | 2014-11-06 |
20140331038 | METHODS FOR FIRMWARE SIGNATURE - A method for installing embedded firmware is provided. The method includes generating one or more firmware file instances and generating one or more digital certificate instances that are separate instances from the firmware file instances. The method includes associating the one or more digital certificate instances with the one or more firmware file instances to facilitate updating signature-unaware modules with signature-aware firmware or to facilitate updating signature-aware modules with signature-unaware firmware. | 2014-11-06 |
20140331039 | DATA CENTER POWER ADJUSTMENT - A power cap agent establishes a power cap. The power cap agent throttles a first power priority virtual machine. The power cap agent determines that the first power priority virtual machine and the additional power priority virtual machine contribute to power consumption above the power cap among the plurality of servers. The power cap agent throttles the additional power priority virtual machine, wherein the first power priority virtual machine has a first power priority lower than an additional power priority of the additional power priority virtual machine. The power cap agent determines that the first power priority virtual machine and the additional power priority virtual machine contribute to power consumption above the power cap, responsive to throttling the first power priority virtual machine and throttling the additional virtual machine. | 2014-11-06 |