Patent application number | Description | Published |
20130328923 | DIALOG NOTIFICATION - A user interface in which a notification is to be displayed in the context of a dialog already being displayed over a primary application work area. Rather than pop up an additional dialog to show the notification, the notification is displayed adjacent the existing dialog. If the notification is a confirmation request, the display of the confirmation request disables an advancement control in the dialog that would otherwise enable the user to advance to the next step in the dialog, or to close the dialog. | 12-12-2013 |
20130332310 | BILLING IMPACT NOTIFICATION - A user interface in which a control is presented in which a user may edit the control in a manner that if the edit is finalized, a bill would be affected. The user interface also displays a billing impact element that displays an effect on the bill should the edit be finalized. For instance, as edits are made to the control, corresponding effects are illustrated in the billing impact element in real-time. Thus, the user can see more immediately an impact of billing in response to possible edits, rather than wait until final payment before seeing the effect on the bill of all prior edits. | 12-12-2013 |
20130332865 | ACTIVITY INITIATION AND NOTIFICATION USER INTERFACE - A user interface that includes an activity initiation area that includes an activity initiation control that may be interacted with in order to initiate respective activities, and a notification area in which one or more notifications related to the activity may be displayed. The notification area is spatially related to the activity initiation control in a fixed manner for multiple activities. The activity initiation area may appear along a lower boundary of the display much as a partially pulled out drawer as viewed from above. The notification area may also appear along the lower boundary of the display, but extend further vertically, much as a fully pulled out drawer as viewed from above. This helps give a contextual understanding of the subject matter of the notifications in relation to the activities that have been, or may be, initiated from the activity initiation area. | 12-12-2013 |
20150095811 | CONTEXT AWARE USER INTERFACE PARTS - A model for displaying multiple user interface elements such that each control includes a container that includes standard functionality across at least a majority of the user interface elements. For instance, such standard functionality might include a part status indication, a title, a content status indication, a command invocation function, a part resizing function, and so forth. The model may also provide for standardization of resizing of user interface elements. For a given user interface element, there would be a predetermined number of possible size and shapes, each corresponding to a different projection of data. For instance, all of the user interface elements on a screen may fall within the predetermined number of possible size and shapes, thereby allowing more functional layout of the user interface on the display. | 04-02-2015 |
20150095812 | EXTENSIBLE AND CONTEXT-AWARE COMMANDING INFRASTRUCTURE - Computing systems in which multiple non-context-sensitive or core commands may be initiated from each of a number of different user interface contexts. There are also multiple context-sensitive mechanism for visualizing the commands depending on which of the multiple possible user interface contexts that the commands appear. At least some embodiments described herein also related to the presentation of dialogs at various stages of the command lifecycle without the system needing to know the underlying operations of the command, and allowing the developer to specify when dialogs are to appear in that lifecycle. | 04-02-2015 |
20150095813 | MULTI-ACT CREATION USER INTERFACE ELEMENT - A multi-act creation user interface element that is displayed when a user instructs a computing system to initiate creation of a resource that has multiple associated creation processing acts. For each of some or all of the creation processing acts, the multi-act creation user interface element causes a set of one or more controls to appear, which the user may then enter creation information into. The multi-step creation user interface element persists creation information so entered so that the creation information is available for further creation processing acts. | 04-02-2015 |
20150095846 | PAN AND SELECTION GESTURE DETECTION - A user interface that has a canvas that is extendable in an extendable dimension and on which multiple selectable elements may be placed. In this context, when a selecting control is associated with a particular selectable element, and further user gestures are provided, a pan detection mechanism is configured to distinguish between an intent to pan the canvas and an intent to select the particular selectable element. When a selecting control is associated with a particular orthogonally scrollable element, the pan detection mechanism may be distinguish between an intent to pan the canvas and an intent to scroll the orthogonally scrollable element in a direction perpendicular to the extendible dimension of the canvas. | 04-02-2015 |
20150095849 | DIALOGS POSITIONED WITH ACTION VISUALIZATION - Dialogs within a user interface. The user interface has one or more selectable elements, the selection of each of which initiating a corresponding action. Each time that any of the elements is selected, and a corresponding action initiated, there is the potential for the user interface to display a dialog associated with the initiated action. The dialogs are displayed so as to be positioned with respect to the element whose selection caused the corresponding action to be initiated. | 04-02-2015 |
20150286343 | ORGANIZATION MODE SUPPORT MECHANISMS - An organization mode in a user interface that displays multiple user interface elements. The multiple user interface elements fit over a grid positions that are at least conceptually imposed over a canvas. In organization mode, the grid positions are displayed, allowing the user to more easily see where user interface elements may be placed. As the user moves and/or resizes a user interface element, one or more corresponding grid positions are highlighted to show where the user interface element would be placed if the move or resize operation were to conclude at that moment. The organization mode may also provide a contextual actions menu with respect to a particular user interface element. The contextual actions menu includes multiple organization mode commands, including one or more that may be directed selected from the contextual actions menu to invoke the command. | 10-08-2015 |
20150286370 | SERVICE GALLERY USER INTERFACE PRESENTATION - A gallery user interface element that includes multiple selectable service user interface elements. Each of the selectable service user interface elements, when selected, initiates a corresponding predetermined action. Thus, the gallery may be used to initiate any number of predetermined actions by selecting appropriate service user interface elements. The predetermined actions may be performed by a number of user interface elements that are collectively offered by a variety of different applications, application extensions, or the system itself. The predetermined actions may include at least one predetermined action that extends an extendible canvas with one or more additional user interface elements. The gallery may include multiple pinnable elements and have different versions depending on a context in which the gallery was opened. | 10-08-2015 |
Patent application number | Description | Published |
20100083362 | METHOD AND SYSTEM OF MANAGING AND ALLOCATING COMMUNICATION RELATED RESOURCES - A system and method for managing communication. The system and method applying to but not limited to settop boxes (STBs) and other devices used to interface services. The management including any number of features and processes associated with achieving Quality of Service (QoS) across different domains and according to network limitations associated with the same. | 04-01-2010 |
20100251312 | Selection of a Proxy Device for a Network - Multiple devices in a user's premises may each be configured to separately communicate with an external network, but the signal strength available to each may vary significantly depending on the wiring of the premises. The disclosure provides methods wherein the various devices may coordinate with one another, and determine which among them has the best signal connection and the most available capacity, and a subset of the devices may be chosen to act as network proxies to relay communications to/from the other devices in the premises. | 09-30-2010 |
20110091025 | Service Entry Device - A system is described in which, in some embodiments, a centralized service entry device may be used to coordinate communications going into and out of a home or premises. The service entry device may be physically connected to a plurality of external access networks, such as a cable television coaxial or fiber connection and a twisted-pair wire connection, and may coordinate access to those networks by a plurality of in-home devices. Within the home, the system may include a plurality of client devices to assist in the coordination of communications with devices in different rooms within the home. | 04-21-2011 |
20110242276 | Video Content Distribution - A stereoscopic production solution, e.g., for live events, that provides 3D video asset distribution to multiple devices and networks is described. In some embodiments, live or recorded 3D video content may be accessible by different service providers with different subscribers/users and protocols across a network of the content provider. A first video signal corresponding to a first video feed for one eye of a viewer may be received and a second video signal corresponding to a second video feed for the second eye of the viewer may be received. The first video signal and the second video signal may be encoded. The encoded first video signal and the encoded second video signal may be transmitted independently over a network. The two video signals may be received and frame synced at an off-site location for eventual rendering to a display device. | 10-06-2011 |
20110258463 | LOW POWER PAGING OF CONSUMER ELECTRONICS - Systems, apparatuses, and methods are configured to monitor signals received via a transmission medium by a paging monitor to detect an activity trigger. Systems, apparatuses, and methods are further configured to, in response to detecting the activity trigger, cause, by the paging monitor, a main receiver to transition from an energy conservation mode to an active mode to monitor the transmission medium for data traffic. | 10-20-2011 |
20110261889 | Remote User Interface - An interactive user interface, such as a remote terminal user interface, is compressed prior to transmission to a video client. The compression may be performed independently of any other video that may be simultaneously transmitted to the video client. At the client side, two compressed video streams (remote user interface and video content) may be decompressed independently of each other. In some cases, technology already existing in some client devices, such as picture-in-picture (PiP) capability, may be leveraged to decompress the received compressed remote user interface without needing to modify the hardware of those client devices. | 10-27-2011 |
20120173746 | Quality of Service for Distribution of Content to Network Devices - A gateway device configured to receive IP video content may select and use transmission methods that maintain a certain quality of service for delivering the content. A transmission method may be selected based on a network to which the client device is connected. The gateway device may select a network through which the content is to be delivered depending on a variety of factors including bandwidth availability, client compatibility, quality of service provided and the like. A gateway device may further be configured to convert multicast transmissions to unicast, to provide dynamic storage of content for pre-positioning and other purposes and/or to provide other functions. | 07-05-2012 |
20130159752 | LOW POWER PAGING OF CONSUMER ELECTRONICS - Systems, apparatuses, and methods are configured to monitor signals received via a transmission medium by a paging monitor to detect an activity trigger. Systems, apparatuses, and methods are further configured to, in response to detecting the activity trigger, cause, by the paging monitor, a main receiver to transition from an energy conservation mode to an active mode to monitor the transmission medium for data traffic. | 06-20-2013 |
20140026170 | SERVICE ENTRY DEVICE - A system is described in which, in some embodiments, a centralized service entry device may be used to coordinate communications going into and out of a home or premises. The service entry device may be physically connected to a plurality of external access networks, such as a cable television coaxial or fiber connection and a twisted-pair wire connection, and may coordinate access to those networks by a plurality of in-home devices. Within the home, the system may include a plurality of client devices to assist in the coordination of communications with devices in different rooms within the home. | 01-23-2014 |
20140189383 | Low Power Paging of Consumer Electronics - Systems, apparatuses, and methods are configured to monitor signals received via a transmission medium by a paging monitor to detect an activity trigger. Systems, apparatuses, and methods are further configured to, in response to detecting the activity trigger, cause, by the paging monitor, a main receiver to transition from an energy conservation mode to an active mode to monitor the transmission medium for data traffic. | 07-03-2014 |
20140267900 | Systems And Methods For Providing Services - Systems and methods for providing services are disclosed. One method can comprise receiving data having a first format and transmitting the data to a first device. The method may also comprise detecting a second device, automatically recognizing a supported second format of the detected second device, converting the data to the second format, and transmitting the converted data to the second device via wireless communication. | 09-18-2014 |
20150106859 | Selection of a Proxy Device for a Network - Multiple devices in a user's premises may each be configured to separately communicate with an external network, but the signal strength available to each may vary significantly depending on the wiring of the premises. The disclosure provides methods wherein the various devices may coordinate with one another, and determine which among them has the best signal connection and the most available capacity, and a subset of the devices may be chosen to act as network proxies to relay communications to/from the other devices in the premises. | 04-16-2015 |
20150332732 | Audio Modification for Adjustable Playback Rate - Features described herein relate to providing the capability to playback audiovisual content in a comprehensible manner at a rate adjustable by the viewer. For example, if a viewer wishes to watch a one hour news program, but the viewer only has thirty minutes to view the program, playback of the program at twice the rate, but in a comprehensible manner is provided. To provide the playback of the video at the adjustable rate, substitute audio is generated by adding or removing audio content without changing the playback rate of the audio. The video at the adjusted playback rate and the substitute audio at the normal playback rate may have the same duration and in some embodiments, may be presented synchronously. | 11-19-2015 |
Patent application number | Description | Published |
20120191930 | DATA INTEGRITY PROTECTION IN STORAGE VOLUMES - A plurality of logical volumes are stored at a plurality of sites. A command to execute an operation on a logical volume is received. A determination is made as to whether a rule associated with the logical volume permits execution of the operation on the logical volume. In response to determining that the rule associated with the logical volume permits execution of the operation on the logical volume, the operation is executed on the logical volume. | 07-26-2012 |
20120198148 | ADAPTIVE PRESTAGING IN A STORAGE CONTROLLER - In one aspect of the present description, at least one of the value of a prestage trigger and the value of the prestage amount, may be modified as a function of the drive speed of the storage drive from which the units of read data are prestaged into a cache memory. Thus, cache prestaging operations in accordance with another aspect of the present description may take into account storage devices of varying speeds and bandwidths for purposes of modifying a prestage trigger and the prestage amount. Still further, a cache prestaging operation in accordance with further aspects may decrease one or both of the prestage trigger and the prestage amount as a function of the drive speed in circumstances such as a cache miss which may have resulted from prestaged tracks being demoted before they are used. Conversely, a cache prestaging operation in accordance with another aspect may increase one or both of the prestage trigger and the prestage amount as a function of the drive speed in circumstances such as a cache miss which may have resulted from waiting for a stage to complete. In yet another aspect, the prestage trigger may not be limited by the prestage amount. Instead, the pre-stage trigger may be permitted to expand as conditions warrant it by prestaging additional tracks and thereby effectively increasing the potential range for the prestage trigger. Other features and aspects may be realized, depending upon the particular application. | 08-02-2012 |
20120233422 | DATA INTEGRITY PROTECTION IN STORAGE VOLUMES - A plurality of logical volumes are stored at a plurality of sites. A command to execute an operation on a logical volume is received. A determination is made as to whether a rule associated with the logical volume permits execution of the operation on the logical volume. In response to determining that the rule associated with the logical volume permits execution of the operation on the logical volume, the operation is executed on the logical volume. | 09-13-2012 |
20130204854 | EFFICIENT METADATA INVALIDATION FOR TARGET CKD VOLUMES - A method for invalidating metadata associated with a target count-key-data (CKD) volume is disclosed. The method initially receives a command for a target CKD volume. The command is either an “establish” command for establishing a point-in-time copy relationship, or a “withdraw” command for withdrawing a point-in-time copy relationship. The method determines a track range, spanning a number of data tracks in the CKD volume, associated with the command. Each data track in the track range is associated with a metadata track. For each metadata track whose associated data tracks are fully contained in the track range, the method performs a first procedure. For each metadata track whose associated data tracks are not fully contained in the track range, the method performs a second procedure different from the first procedure. A corresponding apparatus and computer program product are also disclosed. | 08-08-2013 |
20130246691 | ADAPTIVE PRESTAGING IN A STORAGE CONTROLLER - In one aspect of the present description, at least one of the value of a prestage trigger and the value of the prestage amount, may be modified as a function of the drive speed of the storage drive from which the units of read data are prestaged into a cache memory. Thus, cache prestaging operations in accordance with another aspect of the present description may take into account storage devices of varying speeds and bandwidths for purposes of modifying a prestage trigger and the prestage amount. Other features and aspects may be realized, depending upon the particular application. | 09-19-2013 |
20140059309 | MULTI-VOLUME INSTANT VIRTUAL COPY FREEZE - Provided are a computer implemented method, computer program product, and system for creating a consistency group. For each source volume that has an instant virtual copy relationship with a target volume, an indicator for the source volume is set to true in a Fast Incremental with Freeze (FIF) map. The consistency group for each source volume whose indicator is set to true in the FIF map and each associated target volume is created by: performing a quick Instant Virtual Copy (IVC) freeze command to freeze each source volume whose indicator is set to true in the FIF map and performing a consistency group created command to thaw each source volume whose indicator is set to true in the FIF map. | 02-27-2014 |
20140108680 | QUIESCING INPUT/OUTPUT (I/O) REQUESTS TO SUBSETS OF LOGICAL ADDRESSES IN A STORAGE FOR A REQUESTED OPERATION - Provided are a computer program product, system, and method for quiescing Input/Output (I/O) requests to subsets of logical addresses in a storage for a requested operation. A requested operation is received to a subset of addresses in the storage that requires that Input/Output (I/O) requests to the subset of addresses received following the requested operation be quiesced. The subset of addresses is indicated in quiesce information. I/O requests received following the receiving of the requested operation are quiesced when one address subject to the I/O request is included in the subset of addresses. If there are in-progress I/O requests pending against the subset of addresses when the requested operation was received, then the requested operation is indicated as executable. A quiesced I/O request is executed when no address subject to the quiesced I/O request is included in the subset of addresses indicated in the quiesce information. | 04-17-2014 |
20140108750 | ESTABLISHING A POINT-IN-TIME COPY RELATIONSHIP BETWEEN SOURCE LOGICAL ADDRESSES AND TARGET LOGICAL ADDRESSES - Provided are a computer program product, system, and method for establishing a point-in-time copy relationship between source logical addresses and target logical addresses. A point-in-time (PiT) copy establish command specifies a source set comprising a subset of source logical addresses in at least one storage and a target set comprising a subset of target logical addresses in the at least one storage. The source set of source logical addresses are copied to the target set of target logical addresses. The source logical addresses map to source tracks and wherein the target logical addresses map to target tracks. Copy information is generated indicating whether the source logical addresses in the source set have been copied to the target set. Complete is returned to the PiT copy establish command after generating the copy information and before copying all the source logical addresses to the target logical addresses. | 04-17-2014 |
20140108751 | PROCESSING A COPY COMMAND DIRECTED TO A FIRST STORAGE ARCHITECTURE FOR DATA THAT IS STORED IN A SECOND STORAGE ARCHITECTURE - Provided are a computer program product, system, and method for processing a copy command indicating a source set comprising a subset of source logical addresses to copy to an indicated target set comprising a subset of target logical addresses. Complete is expected to be returned to the copy command in response to completing the copying of the source set to the target set. A point-in-time (PiT) copy establish command is generated in response to receiving the copy command, indicating the source and target sets in the copy command, The generated PiT copy command is executed to generate copy information indicating the source and target sets of source logical addresses and whether they have been copied to the target set. Complete is returned to the copy command after generating the copy information and before copying all the source logical addresses to the target logical addresses. | 04-17-2014 |
20140108752 | MANAGING UPDATES AND COPYING DATA IN A POINT-IN-TIME COPY RELATIONSHIP EXPRESSED AS SOURCE LOGICAL ADDRESSES AND TARGET LOGICAL ADDRESSES - Provided are a computer program product, system, and method for managing updates and copying data in a point-in-time copy relationship expressed as source logical addresses and target logical addresses. A copy relationship indicates a source set of a subset of source logical addresses to copy to a target set comprising a subset of target logical addresses. An update is received to a source logical address that has not been copied. Determinations are made of the target logical address corresponding to the source logical address to be updated according to the copy relationship, a target group of target logical addresses in the target set that include the determined target logical address, and the source logical addresses in the source set that correspond to the target logical addresses in the target group. The determined source logical addresses are copied to the target logical addresses in the determined target group. | 04-17-2014 |
20140108756 | BITMAP SELECTION FOR REMOTE COPYING OF UPDATES - In one embodiment of the present description, a copy relationship is established between a storage location at a first site and a storage location at a second site in a data storage system, wherein a dynamically assignable bitmap preset to one of a plurality of different predetermined bit patterns is selected as a function of both the availability of the selected bitmap and the type of predetermined bit pattern identified for the selected bitmap. The selected bitmap may be assigned as an out-of-sync bitmap wherein updates to the storage location at one site, which are to be copied to the storage location at the other site, are indicated in the selected bitmap, and data writes being written to the storage location at the one site, are copied to the storage location at the other site, using the selected bitmap as an out-of-sync bitmap. Other aspects are described. | 04-17-2014 |
20140108757 | PROCESSING A COPY COMMAND DIRECTED TO A FIRST STORAGE ARCHITECTURE FOR DATA THAT IS STORED IN A SECOND STORAGE ARCHITECTURE - Provided are a computer program product, system, and method for processing a copy command indicating a source set comprising a subset of source logical addresses to copy to an indicated target set comprising a subset of target logical addresses. Complete is expected to be returned to the copy command in response to completing the copying of the source set to the target set. A point-in-time (PiT) copy establish command is generated in response to receiving the copy command, indicating the source and target sets in the copy command, The generated PiT copy command is executed to generate copy information indicating the source and target sets of source logical addresses and whether they have been copied to the target set. Complete is returned to the copy command after generating the copy information and before copying all the source logical addresses to the target logical addresses. | 04-17-2014 |
20140108857 | BITMAP SELECTION FOR REMOTE COPYING OF UPDATES - In one embodiment of the present description, a copy relationship is established between a storage location at a first site and a storage location at a second site in a data storage system, wherein a dynamically assignable bitmap preset to one of a plurality of different predetermined bit patterns is selected as a function of both the availability of the selected bitmap and the type of predetermined bit pattern identified for the selected bitmap. The selected bitmap may be assigned as an out-of-sync bitmap wherein updates to the storage location at one site, which are to be copied to the storage location at the other site, are indicated in the selected bitmap, and data writes being written to the storage location at the one site, are copied to the storage location at the other site, using the selected bitmap as an out-of-sync bitmap. Other aspects are described. | 04-17-2014 |
20140223081 | POINT IN TIME COPY OPERATIONS FROM SOURCE VOLUMES TO SPACE EFFICIENT TARGET VOLUMES IN TWO STAGES VIA A NON-VOLATILE STORAGE - A request is received to perform a point in time copy operation from a source volume to a space efficient target volume. A controller copies data stored in a group of data storage units, from the source volume to a non-volatile storage, to preserve the point in time copy operation. A background process asynchronously copies the data from the non-volatile storage to the space efficient target volume to commit a physical point in time copy of the data from the source volume to the target volume. | 08-07-2014 |
20140223121 | POINT IN TIME COPY OPERATIONS FROM SOURCE VOLUMES TO SPACE EFFICIENT TARGET VOLUMES IN TWO STAGES VIA A NON-VOLATILE STORAGE - A request is received to perform a point in time copy operation from a source volume to a space efficient target volume. A controller copies data stored in a group of data storage units, from the source volume to a non-volatile storage, to preserve the point in time copy operation. A background process asynchronously copies the data from the non-volatile storage to the space efficient target volume to commit a physical point in time copy of the data from the source volume to the target volume. | 08-07-2014 |
20140351533 | PARALLEL PROCESSES FOR PERFORMING MULTIPLE INCREMENTAL COPIES - A storage controller receives a write command with respect to a track, from a host. A first process determines that the track is a source track and also determines that at least one corresponding target track is in an incremental copy relation to the source track. A second process is generated to modify a target change recording structure, where the second process executes in parallel with the first process. | 11-27-2014 |
20140372718 | DATA INTEGRITY PROTECTION IN STORAGE VOLUMES - A plurality of logical volumes are stored at a plurality of sites. A command to execute an operation on a logical volume is received. A determination is made as to whether a rule associated with the logical volume permits execution of the operation on the logical volume. In response to determining that the rule associated with the logical volume permits execution of the operation on the logical volume, the operation is executed on the logical volume. | 12-18-2014 |
20150026423 | DATA INTEGRITY PROTECTION IN STORAGE VOLUMES - A plurality of logical volumes are stored at a plurality of sites. A command to execute an operation on a logical volume is received. A determination is made as to whether a rule associated with the logical volume permits execution of the operation on the logical volume. In response to determining that the rule associated with the logical volume permits execution of the operation on the logical volume, the operation is executed on the logical volume. | 01-22-2015 |
20150089509 | DATA PROCESSING RESOURCE MANAGEMENT - In accordance with one aspect of the present description execution of a particular command by a data processor such as a storage controller, may include obtaining priority over a resource which is also associated with execution of another command, setting a timer for the duration of a dynamically set timeout period, and detecting a potential deadlock condition as a function of expiration of the dynamically set timeout period before execution of the particular command is completed. In one embodiment, the particular command releases priority over the resource upon detection of the potential deadlock condition, and then reobtains priority over the resource in a retry of the command. It is believed that such an arrangement can relieve a potential deadlock condition, allowing execution of one or more commands including the particular command to proceed. Other features and aspects may be realized, depending upon the particular application. | 03-26-2015 |
20150268889 | DATA INTEGRITY PROTECTION IN STORAGE VOLUMES - A plurality of logical volumes are stored at a plurality of sites. A command to execute an operation on a logical volume is received. A determination is made as to whether a rule associated with the logical volume permits execution of the operation on the logical volume. In response to determining that the rule associated with the logical volume permits execution of the operation on the logical volume, the operation is executed on the logical volume. | 09-24-2015 |
20150268893 | DATA INTEGRITY PROTECTION IN STORAGE VOLUMES - A plurality of logical volumes are stored at a plurality of sites. A command to execute an operation on a logical volume is received. A determination is made as to whether a rule associated with the logical volume permits execution of the operation on the logical volume. In response to determining that the rule associated with the logical volume permits execution of the operation on the logical volume, the operation is executed on the logical volume. | 09-24-2015 |
20150269069 | PROCESSING A POINT-IN-TIME COPY ESTABLISH COMMAND TO COPY DATA - Provided are a computer program product, system, and method for processing a copy command indicating a source set comprising a subset of source logical addresses to copy to an indicated target set comprising a subset of target logical addresses. Complete is expected to be returned to the copy command in response to completing the copying of the source set to the target set. A point-in-time (PiT) copy establish command is generated in response to receiving the copy command, indicating the source and target sets in the copy command, The generated PiT copy command is executed to generate copy information indicating the source and target sets of source logical addresses and whether they have been copied to the target set. Complete is returned to the copy command after generating the copy information and before copying all the source logical addresses to the target logical addresses. | 09-24-2015 |
20150277798 | MANAGING UPDATES AND COPYING DATA IN A POINT-IN-TIME COPY RELATIONSHIP EXPRESSED AS SOURCE LOGICAL ADDRESSES AND TARGET LOGICAL ADDRESSES - Provided are a computer program product, system, and method for managing updates and copying data in a point-in-time copy relationship expressed as source logical addresses and target logical addresses. A copy relationship indicates a source set of a subset of source logical addresses to copy to a target set comprising a subset of target logical addresses. An update is received to a source logical address that has not been copied. Determinations are made of the target logical address corresponding to the source logical address to be updated according to the copy relationship, a target group of target logical addresses in the target set that include the determined target logical address, and the source logical addresses in the source set that correspond to the target logical addresses in the target group. The determined source logical addresses are copied to the target logical addresses in the determined target group. | 10-01-2015 |
20150286538 | BITMAP SELECTION FOR REMOTE COPYING OF UPDATES - In one embodiment of the present description, a copy relationship is established between a storage location at a first site and a storage location at a second site in a data storage system, wherein a dynamically assignable bitmap preset to one of a plurality of different predetermined bit patterns is selected as a function of both the availability of the selected bitmap and the type of predetermined bit pattern identified for the selected bitmap. The selected bitmap may be assigned as an out-of-sync bitmap wherein updates to the storage location at one site, which are to be copied to the storage location at the other site, are indicated in the selected bitmap, and data writes being written to the storage location at the one site, are copied to the storage location at the other site, using the selected bitmap as an out-of-sync bitmap. Other aspects are described. | 10-08-2015 |
20150370722 | ESTABLISHING A POINT-IN-TIME COPY RELATIONSHIP BETWEEN SOURCE LOGICAL ADDRESSES AND TARGET LOGICAL ADDRESSES - Provided are a computer program product, system, and method for establishing a point-in-time copy relationship between source logical addresses and target logical addresses. A point-in-time (PiT) copy establish command specifies a source set comprising a subset of source logical addresses in at least one storage and a target set comprising a subset of target logical addresses in the at least one storage. The source set of source logical addresses are copied to the target set of target logical addresses. The source logical addresses map to source tracks and wherein the target logical addresses map to target tracks. Copy information is generated indicating whether the source logical addresses in the source set have been copied to the target set. Complete is returned to the PiT copy establish command after generating the copy information and before copying all the source logical addresses to the target logical addresses. | 12-24-2015 |
20150378620 | FLASH COPY RELATIONSHIP MANAGEMENT - A method for combining storage array copy requests for a disk storage system is disclosed. The method may include receiving a BGC (background copy) request, determining that the BGC request satisfies a set of background copy (BGC) criteria, and adding, based on the determining, the BGC request to a sorted position in the wait accumulation queue (WAQ). The method may also include combining, based on a set of track combining criteria, the BGC request and an adjacent BGC request into a combined BGC request including data locations corresponding to the BGC request and to the adjacent BGC request. The method may also include replacing, in a sorted position in the WAQ, the BGC request and the adjacent BGC request with the combined BGC request, and moving, based on the set of BGC criteria, the combined BGC request to a BGC queue. | 12-31-2015 |
20150378832 | PERFORMING A REMOTE POINT-IN-TIME COPY TO A SOURCE AND TARGET STORAGES IN FURTHER MIRROR COPY RELATIONSHIPS - Provided are a computer program product, system, and method for performing a remote point-in-time copy to a source and target storages in further mirror copy relationships. Each of a plurality of source copy relationships is from the source storage to one corresponding source copy storage. Each of a plurality of target copy relationships is from the target storage to one corresponding target copy storage, where in each relationship an indicator indicates whether to use a remote first type copy operation. The first type copy operation is used to copy data from the source storage to the target storage and copy data from the source copy storage to the target copy storage for the determined source and target copy relationships having the indicator set. A second type of copy operations is used for source and target relationships not having the indicator set. | 12-31-2015 |
Patent application number | Description | Published |
20100122715 | SCREENING ARRANGEMENT FOR A DISHWASHING APPLIANCE, AND ASSOCIATED APPARATUS - A screening arrangement for screening washing fluid in a dishwashing appliance is provided. Such a screening arrangement comprises intersecting wall members forming a latticework structure, defining opposing inlet and outlet planes, for receiving the washing fluid therethrough. The wall members have inlet and outlet ends disposed toward the respective inlet and outlet planes. The wall member inlet ends, in cross section, have a non-planar apex portion tapering toward the outlet plane. A circumferential member extends about a periphery of the latticework structure, and at least a portion of the circumferential member is sloped toward the latticework structure so as to direct washing fluid received thereby toward the latticework structure. An associated apparatus is also provided. | 05-20-2010 |
20100288306 | FILTRATION SYSTEM FOR A DISHWASHER, AND ASSOCIATED APPARATUS AND METHOD - A filtration system for a dishwasher, and an associated apparatus and method, are provided, comprising a macerator chamber adapted to house a macerator device. The macerator chamber is configured to receive washing fluid for the macerator device to comminute contaminants within the washing fluid. A drain chamber is in fluid communication with the macerator chamber and is configured to receive the washing fluid and comminuted contaminants therefrom via a fluid port therebetween. The drain chamber has a vented member associated therewith, which defines at least one first vent providing fluid communication between the drain chamber and the washing fluid circulation system. The vented member is spaced apart from the fluid port, and is configured to strain the comminuted contaminants from the washing fluid so as to retain the comminuted contaminants within the drain chamber while allowing the washing fluid to pass therethrough to the washing fluid circulation system. | 11-18-2010 |
20110030742 | FLUID CIRCULATION ARRANGEMENT FOR PROVIDING AN INTENSIFIED WASH EFFECT IN A DISHWASHER AND AN ASSOCIATED METHOD - According to embodiments of the present invention, a dishwasher may provide an intensified wash effect. The dishwasher may include a rack defining a bottom and a sidewall, wherein the rack is adapted to receive dishware therein. A dishwashing fluid supply channel may be configured to supply dishwashing fluid to a spray assembly. The spray assembly may comprise at least one nozzle member. Thereby, the spray assembly may be adapted to receive the dishwashing fluid from the dishwashing fluid supply channel and to dispense the dishwashing fluid therethrough. The spray assembly may be coupled to the sidewall of the rack. Further, the nozzle member may be attached to an arm which is moveable between at least a first position wherein the arm is adjacent the sidewall of the rack and a second position wherein the arm is adjacent the bottom of the rack. | 02-10-2011 |
20120000535 | SYSTEM AND ASSOCIATED METHOD FOR PREVENTING OVERFILLING IN A DISHWASHER - A method, system, and computer-program product for preventing overfilling in a dishwasher are disclosed herein. According to one embodiment, a method for preventing overfilling in a dishwasher is provided, wherein the dishwasher includes a water valve for providing water to the dishwasher and a drain pump for removing water from the dishwasher. The method comprises detecting an overfill condition in the dishwasher with at least one detection device, wherein the overfill condition corresponds to a water level in the dishwasher that is greater than a predetermined threshold. The method further includes controlling the drain pump and the water valve in response to detecting the overfill condition in order to facilitate removal of the overfill condition. | 01-05-2012 |
20120138101 | DETERGENT DISPENSER FOR IMPROVED DETERGENT REMOVAL - Embodiments of the present invention are related to a detergent dispenser configured to attach to an interior surface of a dishwasher door. The detergent dispenser may comprise a reservoir configured to hold detergent, wherein a portion of the upper wall of the reservoir has been removed to reduce a cross-sectional length thereof such that water flowing down the dishwasher door is encouraged into the reservoir. The detergent dispenser may also comprise a dispenser door comprising a closed configuration and an open configuration, wherein the dispenser door is configured to cover the reservoir in the closed configuration. The detergent dispenser may be configured to encourage water flowing down the interior surface of the dishwasher door to enter the reservoir when the dispenser door is in the open or closed configuration. | 06-07-2012 |
20120192904 | Siphon Break Apparatus Configured To Substantially Prevent A Siphon Effect In A Fluid Conduit Of A Dishwasher And An Associated Method - According to example embodiments, a dishwasher may include a siphon break apparatus configured to substantially prevent a siphon effect in a fluid conduit configured to drain a fluid from the dishwasher. The siphon break apparatus may include a first check valve in fluid communication with the fluid conduit and exposed to a pressure therein and a second check valve in fluid communication with the first check valve. The first and second check valves may be configured to be substantially closed when pressure in the fluid conduit increases as a result of fluid being pumped through the fluid conduit and substantially open when pressure in the fluid conduit decreases as a result of the fluid no longer being pumped through the fluid conduit. Thereby the siphon effect may be substantially prevented. | 08-02-2012 |
20120199162 | METHOD AND SYSTEM FOR REMOVING A CLOG FROM A DISHWASHER - Embodiments of the present invention are related to a method and an associated system for removing a forming or fully developed clog from a drain hose in a dishwasher. According to one embodiment, the system includes a drain pump configured to remove water from the dishwasher and a drain hose in fluid communication with the drain pump. The system further includes a control device in operable communication with the drain pump and configured to execute a drain routine in response to detecting a clog in the drain hose, wherein the drain routine comprises repeatedly activating and deactivating the drain pump to facilitate removal of the clog. | 08-09-2012 |
20130025637 | SIPHON BREAK APPARATUS CONFIGURED TO PREVENT A SIPHON EFFECT IN A FLUID CONDUIT OF A DISHWASHER AND AN ASSOCIATED METHOD - According to exemplary embodiments, a dishwasher or other washing appliance includes a siphon break apparatus configured to substantially prevent a siphon effect in a fluid conduit configured to drain fluid from the dishwasher or other washing appliance. The siphon break apparatus may include a body portion that may be divided by a filter into a filter chamber and a flow chamber. The filter chamber may extend perpendicularly from the flow chamber. An aperture may be defined in the filter chamber and sealed shut by a domed closure of a normally-closed umbrella valve. The domed closure may unseal from the aperture and thereby allow air to enter the filter chamber, travel through the filter and into the flow chamber so as to relieve a low pressure region and substantially prevent a siphon effect in the fluid conduit. A related method is also provided. | 01-31-2013 |
20140158163 | METHOD AND SYSTEM FOR DETECTING AND REMOVING A CLOGGING CONDITION OF A FILTER IN A DISHWASHER - Embodiments of the present invention relate to methods and systems for detecting and removing a clogging condition of a filter in a dishwasher. According to one embodiment, the method includes determining a normal water level or a normal rate of water level change for a wash cycle of the dishwasher and monitoring a water level or a rate of water level change during execution of the wash cycle. The method further includes detecting the clogging condition of the filter by detecting a deviation thereof. A current position of the wash cycle being executed may then be determined. The method further includes executing a remedial operation to facilitate removal of the clogging condition and determining if the clogging condition has been removed. Finally, the method includes resuming operation of the dishwasher at a wash cycle position based on the current position if the clogging condition has been removed. | 06-12-2014 |
20150020887 | SYSTEM AND ASSOCIATED METHOD FOR PREVENTING OVERFILLING IN A DISHWASHER - A method, system, and computer-program product for preventing overfilling in a dishwasher are disclosed herein. According to one embodiment, a method for preventing overfilling in a dishwasher is provided, wherein the dishwasher includes a water valve for providing water to the dishwasher and a drain pump for removing water from the dishwasher. The method comprises detecting an overfill condition in the dishwasher with at least one detection device, wherein the overfill condition corresponds to a water level in the dishwasher that is greater than a predetermined threshold. The method further includes controlling the drain pump and the water valve in response to detecting the overfill condition in order to facilitate removal of the overfill condition. | 01-22-2015 |