Patent application number | Description | Published |
20080262638 | Apparatus and Method to Integrate Hardware Adapter Diagnostics with a Host OS Diagnostics Through Signaling - The present invention provides a system and method for controlling diagnostic functions on a remote device. The system includes a host, and a network adapter in communication with the host. The system performs a method comprising receiving a diagnostic signal from the host device on the remote device, associating the diagnostic signal with a diagnostic state of the remote device, and performing a diagnostic function indicated by the diagnostic signal. | 10-23-2008 |
20080263408 | APPARATUS AND METHOD TO INTEGRATE HARDWARE ADAPTER TRACING WITH A HOST OS TRACING THROUGH SIGNALING - The present invention provides a system and method for controlling tracing functions on a remote device. The system includes means for receiving a diagnostic signal from a host device on the remote device and means for associating the diagnostic signal with a tracing state of the remote device. In addition, the system includes means for performing a tracing function indicated by the diagnostic signal. The present invention can also be viewed as a method for controlling tracing functions on a remote device. The method operates by receiving a diagnostic signal from a host device on the remote device and associating the diagnostic signal with a tracing state of the remote device. Then, the method performs a tracing function indicated by the diagnostic signal | 10-23-2008 |
20090112891 | System and Method for Implementing a Stackable Tabbed Interface in a Data Processing System - A system and method for implementing a stackable tabbed interface in a data processing system. According to an embodiment of the present invention, a file system receives a collection of organizational schemes for arranging a collection of graphical indicia associated with a collection of files in a file system. In response to receiving a collection of organizational schemes, the file system displays the collection of graphical indicia on a collection of axes, wherein each axis among the collection of axes corresponds to each organizational scheme among the collection of organizational schemes. | 04-30-2009 |
20090144278 | METHOD AND SYSTEM FOR IMPROVING SOFTWARE QUALITY, USABILITY AND SUPPORT THROUGH AUTOMATED USAGE PATTERN DETECTION - A method, system and computer-readable medium for automatically determining common usage patterns of a data processing system and dynamically displaying the information back to a user are disclosed. The method includes automatically recording one or more usage patterns of a data processing system; storing the usage patterns in a repository; identifying one or more common usage patterns among the stored usage patterns; detecting a current usage pattern of a user; comparing the current usage pattern to the common usage patterns; selecting one or more of the common usage patterns that are similar to the current usage pattern; and displaying to the user an indication of one or more common usage patterns similar to the current usage pattern. | 06-04-2009 |
20090153481 | DATA OUTPUT DEVICE HAVING A PLURALITY OF KEY STICK DEVICES CONFIGURED FOR READING OUT DATA TO A USER AND METHOD THEREOF - A data output device and associated method for reading out data to a computer user. The data output device includes a keyboard having a plurality of key stick devices configured for reading out data. Each key stick device is coupled to a key stick positioning actuator that is responsive to electronic signals corresponding to a unique conventional key. Moreover, the key stick device is actively positioned in one of a plurality of output modes by the key stick positioning actuator. Each one of the plurality of output modes indicates the unique conventional key. The unique conventional key corresponds to a change in a height, or an azimuth, or a tilt angle of the key stick device. | 06-18-2009 |
20090153487 | DATA INPUT DEVICE HAVING A PLURALITY OF KEY STICK DEVICES FOR FAST TYPING AND METHOD THEREOF - A data input device and associated method for fast typing. The data input device includes a keyboard having a plurality of key stick devices for entering data. A sensor element is coupled to each key stick device in a first position. The sensor element is responsive to a change in at least one azimuth and tilt angle of one of the plurality of key stick devices. The at least one azimuth and tilt angle, which defines the resulting position of the key stick device, represents an input mode for one of the plurality of key stick devices. The input mode is formed by tilting one of the plurality of key stick devices relative to the keyboard. The (i) change in the azimuth and/or tilt angle, and (ii) a return to the first position, when combined, correspond to a selection of a conventional key. | 06-18-2009 |
20090192961 | ADAPTING MEDIA STORAGE BASED ON USER INTEREST AS DETERMINED BY BIOMETRIC FEEDBACK - The present invention discloses a system, method, apparatus, and computer usable product code adapting a media stream based upon biometric feedback. The system can include one or more biometric sensor, a media handling component, an importance inference engine, and a media processing component. The biometric sensor can be able to receive biometric feedback from at least one user. The media handling component can be a media creation component (e.g., video recorder, camera, etc.) and/or a media playback component (e.g., video player, music player, etc.). The importance inference engine can be configured to analyze biometric feedback received from the biometric sensor to determine an emotional interest level that a provider of the biometric feedback has in the media of the media handling component. The media processing component can modify the media of the media handling component based upon the emotion interest level determined by the importance inference engine. | 07-30-2009 |
20110169603 | DISTINGUISHING BETWEEN USER PHYSICAL EXERTION BIOMETRIC FEEDBACK AND USER EMOTIONAL INTEREST IN A MEDIA STREAM - The present invention discloses a method, system, and computer program product for determining user interest in media. The invention can select one of a set of different activity profiles specified within a data store. Each activity profile can include biometric attributes and associated baseline attribute values specific to an activity state. A media stream can be manipulated (e.g., created from environmental inputs and/or played upon a presentation device). Biometric data can be received from a user in proximity to the media stream. The received biometric data can be compared values in the selected activity profile. An interest level in the media stream can be determined based on comparison differences. A programmatic action can be performed relating to the media stream based upon the determined interest level. For example, a bitrate of the media and/or a marker in the media can be modified based on interest level. | 07-14-2011 |
20110287745 | ENHANCED COMMUNICATIONS LOG FOR A MOBILE COMMUNICATIONS DEVICE - A set of context incidents can be logged for a mobile communication device. Communication incidents to and from the mobile communication device can also be logged. The context data can be associated with the communication incidents. One or more of the context incidents can be associated with a set of different ones of the communication incidents. A call log window can be displayed upon a screen of the mobile communication device. The call log window can include a listing showing at least a portion of the communication incidents and an associated context incident. | 11-24-2011 |
20120317289 | Transparent heterogenous link pairing - A method, system and computer program product for managing at least two physical links. A TCP/IP stack configures a first interface with attributes. The TCP/IP stack activates the first interface. The TCP/IP stack detects a channel path identifier (CHPID). The TCP/IP stack creates a second interface. The TCP/IP stack associates the second interface with the first interface. The first interface and the second interface are logically linked to exchange traffic corresponding to a single internet protocol address. The TCP/IP stack configures the second interface with at least one attribute. The TCP/IP stack activates the second interface. The two physical links may rely on two different physical link types. | 12-13-2012 |
20130186956 | ACQUIRING INFORMATION DYNAMICALLY REGARDING A HARDWARE COMPONENT IN THE CLOUD COMPUTING SYSTEM WHILE ON THE FLOOR OF THE DATA CENTER - A method, system and computer program product for managing hardware components in a cloud computing environment. A mobile device captures an image of a bar code placed on a rack that is associated with an identifier that references an Internet resource of the management software that manages the rack. The mobile device transmits a request to the management software for information regarding a component in the rack, where the request includes a unique identifier (e.g., serial number) associated with the component. The management software uses the unique identifier to identify the component of interest and transmits information regarding the component of interest to the mobile device. In this manner, the client device can conveniently access the management software as well as conveniently acquire information dynamically from the management software about specific hardware components in these racks while the user is on the floor of the data center. | 07-25-2013 |
20130191527 | DYNAMICALLY BUILDING A SET OF COMPUTE NODES TO HOST THE USER'S WORKLOAD - A method, system and computer program product for dynamically building a set of compute nodes to host a user's workload. An administrative server receives workload definitions that include the types of workloads that are to be run in a cloud group as well as a number of instances of each workload the cloud group should support. These workload definitions are used to determine the virtual machine demands that the cloud group will place on the cloud environment. The administrative server further receives the demand constraints, placement constraints and license enforcement policies. The administrative server identifies a set of compute nodes to host the user's workload based on the virtual machines demands, the demand constraints, the placement constraints and the license enforcement policies. In this manner, a set of compute nodes is dynamically built for consideration in forming a cloud group without the user requiring knowledge of the cloud's composition. | 07-25-2013 |
20130191543 | PERFORMING MAINTENANCE OPERATIONS ON CLOUD COMPUTING NODE WITHOUT REQUIRING TO STOP ALL VIRTUAL MACHINES IN THE NODE - A method, system and computer program product for performing maintenance operations on a cloud computing node. An administrative server receives an indication that a maintenance operation is to be performed on a cloud computing node. The administrative server identifies which virtual machine(s) on the cloud computing node will be affected by the maintenance operation. The administrative server relocates the virtual machine(s) to be affected by the maintenance operation to other suitable cloud computing node(s) prior to the maintenance operation being performed. The administrative server then performs the maintenance operation on the cloud computing node. The virtual machine(s) may be relocated back to the cloud computing node after the maintenance operation is completed in response to a need to rebalance resources in such a manner. In this manner, maintenance operations may be performed on a cloud computing node without requiring to stop all the virtual machines in the node. | 07-25-2013 |
20130204985 | TRANSPARENT HETEROGENOUS LINK PAIRING - A method, system and computer program product for managing at least two physical links. A TCP/IP stack configures a first interface with attributes. The TCP/IP stack activates the first interface. The TCP/IP stack detects a channel path identifier (CHPID). The TCP/IP stack creates a second interface. The TCP/IP stack associates the second interface with the first interface. The first interface and the second interface are logically linked to exchange traffic corresponding to a single internet protocol address. The TCP/IP stack configures the second interface with at least one attribute. The TCP/IP stack activates the second interface. The two physical links may rely on two different physical link types. | 08-08-2013 |
20130221096 | ACQUIRING INFORMATION DYNAMICALLY REGARDING A HARDWARE COMPONENT IN THE CLOUD COMPUTING SYSTEM WHILE ON THE FLOOR OF THE DATA CENTER - A method, system and computer program product for managing hardware components in a cloud computing environment. A mobile device captures an image of a bar code placed on a rack that is associated with an identifier that references an Internet resource of the management software that manages the rack. The mobile device transmits a request to the management software for information regarding a component in the rack, where the request includes a unique identifier (e.g., serial number) associated with the component. The management software uses the unique identifier to identify the component of interest and transmits information regarding the component of interest to the mobile device. In this manner, the client device can conveniently access the management software as well as conveniently acquire information dynamically from the management software about specific hardware components in these racks while the user is on the floor of the data center. | 08-29-2013 |
20130227131 | DYNAMICALLY BUILDING A SET OF COMPUTE NODES TO HOST THE USER'S WORKLOAD - A method, system and computer program product for dynamically building a set of compute nodes to host a user's workload. An administrative server receives workload definitions that include the types of workloads that are to be run in a cloud group as well as a number of instances of each workload the cloud group should support. These workload definitions are used to determine the virtual machine demands that the cloud group will place on the cloud environment. The administrative server further receives the demand constraints, placement constraints and license enforcement policies. The administrative server identifies a set of compute nodes to host the user's workload based on the virtual machines demands, the demand constraints, the placement constraints and the license enforcement policies. In this manner, a set of compute nodes is dynamically built for consideration in forming a cloud group without the user requiring knowledge of the cloud's composition. | 08-29-2013 |
20130232268 | PERFORMING MAINTENANCE OPERATIONS ON CLOUD COMPUTING NODE WITHOUT REQUIRING TO STOP ALL VIRTUAL MACHINES IN THE NODE - A method, system and computer program product for performing maintenance operations on a cloud computing node. An administrative server receives an indication that a maintenance operation is to be performed on a cloud computing node. The administrative server identifies which virtual machine(s) on the cloud computing node will be affected by the maintenance operation. The administrative server relocates the virtual machine(s) to be affected by the maintenance operation to other suitable cloud computing node(s) prior to the maintenance operation being performed. The administrative server then performs the maintenance operation on the cloud computing node. The virtual machine(s) may be relocated back to the cloud computing node after the maintenance operation is completed in response to a need to rebalance resources in such a manner. In this manner, maintenance operations may be performed on a cloud computing node without requiring to stop all the virtual machines in the node. | 09-05-2013 |
20130332557 | REDUNDANCY AND LOAD BALANCING IN REMOTE DIRECT MEMORY ACCESS COMMUNICATIONS - A method for managing communications to add a first Remote Direct Memory Access (RDMA) link between a TCP server and a TCP client, where the first RDMA link references first remote memory buffer (RMB) and a second RMB, and further based on a first remote direct memory access network interface card (RNIC) associated with the TCP server and a second RNIC associated with the TCP client. The system determines whether a third RNIC is enabled. The system adds a second RDMA link, responsive to a determination that the third RNIC is enabled. The system detects a failure in the second RDMA link. The system reconfigures the first RDMA link to carry at least one TCP packet of a session formerly assigned to the second RDMA link, responsive to detecting the failure. The system communicates at least one packet of the at least one session on the first RDMA link. | 12-12-2013 |
20130332767 | REDUNDANCY AND LOAD BALANCING IN REMOTE DIRECT MEMORY ACCESS COMMUNICATIONS - A system for managing communications to add a first Remote Direct Memory Access (RDMA) link between a TCP server and a TCP client, where the first RDMA link references first remote memory buffer (RMB) and a second RMB, and further based on a first remote direct memory access network interface card (RNIC) associated with the TCP server and a second RNIC associated with the TCP client. The system determines whether a third RNIC is enabled. The system adds a second RDMA link, responsive to a determination that the third RNIC is enabled. The system detects a failure in a failed RDMA link. The system reconfigures the first RDMA link to carry at least one TCP message of a connection formerly assigned to the failed RDMA link, responsive to detecting the failure. The system communicates at least one message of the at least one connection on the first RDMA link. | 12-12-2013 |
20140068600 | PROVIDING A SEAMLESS TRANSITION FOR RESIZING VIRTUAL MACHINES FROM A DEVELOPMENT ENVIRONMENT TO A PRODUCTION ENVIRONMENT - A method, system and computer program product for providing a seamless transition for resizing virtual machines from a development environment to a production environment. An administrative server receives an instruction from a customer to resize a virtual machine running on a cloud computing node, where the resized virtual machine requires physical resources (e.g., twenty physical processor cores) to be utilized in the production environment. Instead of the administrative server utilizing the same number of physical resources in the development environment that need to be utilized in the production environment, the administrative server utilizes a fewer number of physical resources by also utilizing virtual resources (e.g., twenty virtual processor cores and only two physical processor cores) so as to provide a development environment with the same resource capacity as the production environment but with fewer physical resources thereby more efficiently utilizing the physical resources on the cloud computing node. | 03-06-2014 |
20140157038 | USING SEPARATE PROCESSES TO HANDLE SHORT-LIVED AND LONG-LIVED JOBS TO REDUCE FAILURE OF PROCESSES - A method, system and computer program product for reducing the failure of processes. After a job is received, a determination is made as whether the received job is a “short-lived job” or a “long-lived job.” A short-lived job refers to a job who accomplishes a given task in less than a threshold period of time. A long-lived job refers to a job who accomplishes a given task in greater than a threshold period of time. For an identified long-lived job, the long-lived job is executed on a single process apart from other processes; whereas, the short-lived job is executed on at least one process separate from the processes executing long-lived jobs. As a result of executing the long-lived jobs on separate processes from the short-lived jobs, the likelihood of having a process fail is lessened since the duration of time that the process is running will be lessened. | 06-05-2014 |
20140223222 | INTELLIGENTLY RESPONDING TO HARDWARE FAILURES SO AS TO OPTIMIZE SYSTEM PERFORMANCE - A method, system and computer program product for intelligently responding to hardware failures so as to optimize system performance. An administrative server monitors the utilization of the hardware as well as the software components running on the hardware to assess a context of the software components running on the hardware. Upon detecting a hardware failure, the administrative server analyzes the hardware failure to determine the type of hardware failure and analyzes the properties of the workload running on the failed hardware. The administrative server then responds to the detected hardware failure based on various factors, including the type of the hardware failure, the properties of the workload running on the failed hardware and the context of the software running on the failed hardware. In this manner, by taking into consideration such factors in responding to the detected hardware failure, a more intelligent response is provided that optimizes system performance. | 08-07-2014 |
20140223241 | INTELLIGENTLY RESPONDING TO HARDWARE FAILURES SO AS TO OPTIMIZE SYSTEM PERFORMANCE - A method, system and computer program product for intelligently responding to hardware failures so as to optimize system performance. An administrative server monitors the utilization of the hardware as well as the software components running on the hardware to assess a context of the software components running on the hardware. Upon detecting a hardware failure, the administrative server analyzes the hardware failure to determine the type of hardware failure and analyzes the properties of the workload running on the failed hardware. The administrative server then responds to the detected hardware failure based on various factors, including the type of the hardware failure, the properties of the workload running on the failed hardware and the context of the software running on the failed hardware. In this manner, by taking into consideration such factors in responding to the detected hardware failure, a more intelligent response is provided that optimizes system performance. | 08-07-2014 |
20140223443 | DETERMINING A RELATIVE PRIORITY FOR A JOB USING CONTEXT AND ENVIRONMENTAL CONSIDERATIONS - A method, system and computer program product for determining a relative priority for a job. A “policy” is selected based on the job itself and the reason that the job is being executed, where the policy includes a priority range for the job and for an application. A priority for the job that is within the priority range of the job as established by the selected policy is determined based on environmental and context considerations. This job priority is then adjusted based on the priority of the application (within the priority range as established by the policy) becoming the job's final priority. By formulating a priority that more accurately reflects the true priority or importance of the job by taking into consideration the environmental and context considerations, job managers will now be able to process these jobs in a more efficient manner. | 08-07-2014 |
20140223521 | ALLOWING ACCESS TO UNDERLYING HARDWARE CONSOLES TO CORRECT PROBLEMS EXPERIENCING BY USER - A method, system and computer program product for providing access to underlying hardware consoles to correct problems experiencing by a user. The administrative server receives a request from the user to access a managing system configured to provide access to the underlying hardware consoles that are combined together to service a user's computing requirements. The administrative server presents a list of managing systems for the user to connect that were identified as being able to address the problem(s) the user is experiencing. The administrative server then enables access to managing systems selected in the list in response to the user providing appropriate authentication credentials. An interface is then provided to the user by the selected managing systems to select the underlying hardware consoles to access. In this manner, the user is provided access to the underlying hardware consoles in an easy manner without presenting numerous options and configurations. | 08-07-2014 |
20140297893 | EMULATING MULTIPLE UNIVERSAL SERIAL BUS (USB) KEYS SO AS TO EFFICIENTLY CONFIGURE DIFFERENT TYPES OF HARDWARE - A method, system and computer program product for efficiently configuring different types of hardware components. A computing device is connected to a hardware component to be configured. The computing device detects the type of the hardware component upon being connected to the hardware component. The computing device then identifies a profile from among multiple profiles associated with the detected type of hardware component, where each profile contains a configuration file(s) for configuring its associated type of hardware component. Upon identifying the profile associated with the connected hardware component, the computing device emulates a Universal Serial Bus (USB) key presenting the configuration file(s) contained in the identified profile to the detected hardware component. Such a process may be repeated for configuring another type of hardware component. In this manner, the user is able to efficiently configure different types of hardware by having the computing device emulate multiple USB keys. | 10-02-2014 |
20140297894 | UNIVERSAL SERIAL BUS (USB) KEY FUNCTIONING AS MULTIPLE USB KEYS SO AS TO EFFICIENTLY CONFIGURE DIFFERENT TYPES OF HARDWARE - A method, data storage device and computer program product for efficiently configuring different types of hardware components. A Universal Serial Bus (USB) key is preloaded with multiple profiles, where each profile contains a configuration file(s) associated with a particular type of hardware component. Upon plugging the USB key into a hardware component, the USB key recognizes the type of hardware component based on the properties of the hardware component available on the USB interface. The USB key identifies a profile containing the configuration file(s) associated with the recognized type of hardware component. The USB key then presents the configuration file(s) contained in the identified profile to the connected hardware component. Such a process may be repeated for configuring another type of hardware component. In this manner, the user is able to efficiently configure different types of hardware by having the USB key function as multiple USB keys. | 10-02-2014 |
20140297895 | UNIVERSAL SERIAL BUS (USB) KEY FUNCTIONING AS MULTIPLE USB KEYS SO AS TO EFFICIENTLY CONFIGURE DIFFERENT TYPES OF HARDWARE - A method, data storage device and computer program product for efficiently configuring different types of hardware components. A Universal Serial Bus (USB) key is preloaded with multiple profiles, where each profile contains a configuration file(s) associated with a particular type of hardware component. Upon plugging the USB key into a hardware component, the USB key recognizes the type of hardware component based on the properties of the hardware component available on the USB interface. The USB key identifies a profile containing the configuration file(s) associated with the recognized type of hardware component. The USB key then presents the configuration file(s) contained in the identified profile to the connected hardware component. Such a process may be repeated for configuring another type of hardware component. In this manner, the user is able to efficiently configure different types of hardware by having the USB key function as multiple USB keys. | 10-02-2014 |
20140298487 | MULTI-USER UNIVERSAL SERIAL BUS (USB) KEY WITH CUSTOMIZABLE FILE SHARING PERMISSIONS - A method, data storage device and computer program product for having multiple users share a single data storage device securely. A data storage device, such as a Universal Serial Bus (USB) key, is plugged into a computing device. A USB controller of the USB key recognizes the computing device and creates an account for the user. The created account is associated with the user as well as associated with the computing device. Data uploaded to the USB key by the user is then associated with the created account. Only that user will be able to view that data on his/her computing device (computing device associated with the created account) unless the user indicates to share that data with other users. Such a process may be repeated each time the USB key is plugged into a different computing device thereby creating multiple accounts associated with multiple computing devices and users. | 10-02-2014 |
20140298489 | MULTI-USER UNIVERSAL SERIAL BUS (USB) KEY WITH CUSTOMIZABLE FILE SHARING PERMISSIONS - A method, data storage device and computer program product for having multiple users share a single data storage device securely. A data storage device, such as a Universal Serial Bus (USB) key, is plugged into a computing device. A USB controller of the USB key recognizes the computing device and creates an account for the user. The created account is associated with the user as well as associated with the computing device. Data uploaded to the USB key by the user is then associated with the created account. Only that user will be able to view that data on his/her computing device (computing device associated with the created account) unless the user indicates to share that data with other users. Such a process may be repeated each time the USB key is plugged into a different computing device thereby creating multiple accounts associated with multiple computing devices and users. | 10-02-2014 |
20140372497 | DETERMINING LOCATION OF HARDWARE COMPONENTS IN A CLOUD COMPUTING ENVIRONMENT BASED ON HARDWARE COMPONENTS SELF-LOCATING OTHER HARDWARE COMPONENTS - A method, system and computer program product for managing hardware components in a cloud computing environment. Each hardware component in a data center of the cloud computing environment detects and identifies other hardware components within a communication range of the hardware component using a wireless protocol. Furthermore, each hardware component determines its actual location as well as its relative location with respect to the detected hardware components, such as based on a triangulation of the wireless signals. Such information is transmitted to an administrative server. An inventory of the hardware components in the data center, including their current location, is then compiled by the administrative server. In this manner, a hardware component can be more easily located after being relocated in the data center. Furthermore, the administrative server will be able to balance a workload across these hardware components based on their location. | 12-18-2014 |
20140372595 | DETERMINING LOCATION OF HARDWARE COMPONENTS IN A CLOUD COMPUTING ENVIRONMENT BASED ON HARDWARE COMPONENTS SELF-LOCATING OTHER HARDWARE COMPONENTS - A method, system and computer program product for managing hardware components in a cloud computing environment. Each hardware component in a data center of the cloud computing environment detects and identifies other hardware components within a communication range of the hardware component using a wireless protocol. Furthermore, each hardware component determines its actual location as well as its relative location with respect to the detected hardware components, such as based on a triangulation of the wireless signals. Such information is transmitted to an administrative server. An inventory of the hardware components in the data center, including their current location, is then compiled by the administrative server. In this manner, a hardware component can be more easily located after being relocated in the data center. Furthermore, the administrative server will be able to balance a workload across these hardware components based on their location. | 12-18-2014 |