Patent application number | Description | Published |
20110236960 | APPARATUS AND METHODS FOR INTEGRATED SAMPLE PREPARATION, REACTION AND DETECTION - Cartridges for the isolation of a biological sample and downstream biological assays on the sample are provided. In one embodiment, a nucleic acid sample is isolated from a biological sample and the nucleic acid sample is amplified, for example by the polymerase chain reaction. The cartridges provided herein can also be used for the isolation of non-nucleic acid samples, for example proteins, and to perform downstream reactions on the proteins, for example, binding assays. Instruments for carrying out the downstream biological assays and for detecting the results of the assays are also provided. | 09-29-2011 |
20130266948 | Apparatus and Methods for Integrated Sample PReparation, Reaction and Detection - Cartridges for the isolation of a biological sample and downstream biological assays on the sample are provided, as are methods for using such cartridges. In one embodiment, a nucleic acid sample is isolated from a biological sample and the nucleic acid sample is amplified, for example by the polymerase chain reaction. The cartridges provided herein can also be used for the isolation of non-nucleic acid samples, for example proteins, and to perform downstream reactions on the proteins, for example, binding assays. Instruments for carrying out the downstream biological assays and for detecting the results of the assays are also provided. | 10-10-2013 |
20150258548 | APPARATUS AND METHODS FOR INTEGRATED SAMPLE PREPARATION, REACTION AND DETECTION - Cartridges for the isolation of a biological sample and downstream biological assays on the sample are provided, as are methods for using such cartridges. In one embodiment, a nucleic acid sample is isolated from a biological sample and the nucleic acid sample is amplified, for example by the polymerase chain reaction. The cartridges provided herein can also be used for the isolation of non-nucleic acid samples, for example proteins, and to perform downstream reactions on the proteins, for example, binding assays. Instruments for carrying out the downstream biological assays and for detecting the results of the assays are also provided. | 09-17-2015 |
Patent application number | Description | Published |
20090150893 | HARDWARE UTILIZATION-AWARE THREAD MANAGEMENT IN MULTITHREADED COMPUTER SYSTEMS - A device, system, and method are directed towards managing threads in a computer system with one or more processing units, each processing unit having a corresponding hardware resource. Threads are characterized based on their use or requirements for access to the hardware resource. The threads are distributed among the processing units in a configuration that leaves at least one processing unit with threads that have an aggregate zero or low usage of the hardware resource. Power may be reduced or turned off to the instances of the hardware resource that have zero or low usage. Distribution may be based on one or more of a number of specifications or factors, such as user power management specifications, power usage, performance, and other factors. | 06-11-2009 |
20090217277 | USE OF CPI POWER MANAGEMENT IN COMPUTER SYSTEMS - A device, system, and method are directed towards managing power consumption in a computer system with one or more processing units, each processing unit executing one or more threads. Threads are characterized based on a cycles per instruction (CPI) characteristic of the thread. A clock frequency of each processing unit may be configured based on the CPI of each thread assigned to the processing unit. In a system wherein higher clock frequencies consume greater amounts of power, the CPI may be used to determine a desirable clock frequency. The CPI of each thread may also be used to assign threads to each processing unit, so that threads having similar characteristics are grouped together. Techniques for assigning threads and configuring processor frequency may be combined to affect performance and power consumption. Various specifications or factors may also be considered when scheduling threads or determining processor frequencies. | 08-27-2009 |
Patent application number | Description | Published |
20130102317 | ON-DEMAND DIRECTORY NUMBER CONTROL FUNCTION FOR A MOBILE DEVICE - The present invention a method for assigning a temporary dialable number to a device having a non-dialable number so that the device may have the capability to be connected with, such as in being called back. In addition to the numerous benefits provides by the present invention, mobile device user in particular, are provided benefits to enable the health, safety and security of individuals who utilize emergency-based systems that do not have a dialable mobile device number (MDN) by the present invention. | 04-25-2013 |
20130225201 | SYSTEM AND METHOD FOR LARGE-SCALE AND NEAR-REAL-TIME SEARCH OF MOBILE DEVICE LOCATIONS IN ARBITRARY GEOGRAPHICAL BOUNDARIES - A system and method for generating a one-dimensional spatial index and a temporal index in relation to one or more two-dimensional location points of one or more mobile devices to enable near-real-time searching of devices having fast-changing location information is provided for. The present invention may be used in a variety of implementations including being used in conjunction with searching for mobile devices within a geographical area for a time period; finding nearby devices within a time period; tracking device movement within a time period; determining clusters of devices for identification and location across different geographical regions at once. | 08-29-2013 |
20130282227 | METHOD AND APPARATUS FOR REMOTELY COMMUNICATING VEHICLE INFORMATION TO THE CLOUD - The present invention relates generally to the communication of vehicle data, diagnostics and related information with a network remote from the vehicle, and more particularly to communications and storage of vehicle data in the cloud. In one or more preferred embodiments, vehicle information is securely gathered from a vehicle, processed in accordance with instructions and a profile set remotely, and stored at a remote data store, where remote access to such information can be accommodated through applications, smartphones and other remote devices. | 10-24-2013 |
20140279129 | REAL-TIME PRICED (RTP) CELLULAR SERVICE MARKETPLACE - A computer-implemented method and system for buying and selling cellular service in a market allowing real-time pricing is disclosed. The computer-implemented method and system comprise storing at least one offer to sell a specified quantity of cellular service (which may be voice minutes, messages, data or other available service parameters) initiated by a seller, and processing one or more requests to purchase cellular service initiated by one or more buyers. The processing of the requests to purchase cellular service further comprises implementing a method for matching one or more requests to purchase cellular service with any stored offers; wherein when a match occurs the buyer is able to purchase the desired quantity of cellular service. The computer-implemented method and system includes deducting the purchased quantity of cellular service from a service profile of the seller and adding the purchased quantity of cellular service to a service profile of the buyer. | 09-18-2014 |
20140280157 | MANAGEMENT OF DATA FEEDS FROM DEVICES AND PUBLISHING AND CONSUMPTION OF DATA - The present invention is directed towards a computer-implemented method and system for managing device data feeds. The computer-implemented method and system comprise using a data model to describe type of data received from the devices, grouping the received type of data based on a data description, and forwarding the device data to a receiver endpoint as directed by the subscription information comprising a receiver endpoint and a rule uniquely identified by the subscription identifier using application programming interface key to manage access to the device data. | 09-18-2014 |
20150111529 | PAIR-THE-PLAN SYSTEM FOR DEVICES AND METHOD OF USE - A method and system are disclosed for connecting a device to subscriptions and cellular billing plans of separate users and for managing the concurrent use of the device by the separate users. A computer-implemented method comprises enrolling a device in a cellular subscription and billing plan of a user. The enrollment includes providing an identifier for the device to a cellular subscription, effectively adding the device to the cellular subscription and billing plan selected by the user. The method and system allows the user to use capabilities of the device as governed by the cellular subscription and an associated billing plan as selected by that user, while the device is also available for use by another user via another cellular billing plan, as selected by that user. | 04-23-2015 |
Patent application number | Description | Published |
20120310393 | Audio Configuration Based On Selectable Audio Modes - An operating system of a device receives, from an application executing on that device, data that identifies a category of hardware resources that the application needs to use in order to function. That category is mapped to a specified set of hardware resources of the device. The operating system also receives, from the application, data that identifies a mode. The mode corresponds to an intended use of a set of hardware resources and is mapped to a group of hardware resource settings that are consistent with the intended use. The operating system allocates, to the application, a particular set of hardware resources that are mapped to the category. The operating system configures one or more hardware resources in the particular set of hardware resources in conformity with a particular group of settings that are mapped to the mode. | 12-06-2012 |
20150045921 | AUDIO CONFIGURATION BASED ON SELECTABLE AUDIO MODES - An operating system of a device receives, from an application executing on that device, data that identifies a category of hardware resources that the application needs to use in order to function. That category is mapped to a specified set of hardware resources of the device. The operating system also receives, from the application, data that identifies a mode. The mode corresponds to an intended use of a set of hardware resources and is mapped to a group of hardware resource settings that are consistent with the intended use. The operating system allocates, to the application, a particular set of hardware resources that are mapped to the category. The operating system configures one or more hardware resources in the particular set of hardware resources in conformity with a particular group of settings that are mapped to the mode. | 02-12-2015 |
Patent application number | Description | Published |
20120159006 | MONITORING INPUT/OUTPUT OPERATIONS TO SPECIFIC STORAGE LOCATIONS - Provided are techniques for storing one or more storage rules for each of one or more storage locations, along with one or more actions to be taken for each storage rule that is violated, intercepting an I/O operation issued to the storage subsystem, and determining whether the I/O operation violates one or more of the storage rules. In response to determining that the I/O operation violates one or more of the storage rules, an application that issued the I/O operation is identified and each of the one or more actions associated with the one or more violated storage rules are performed. | 06-21-2012 |
20130018852 | DELETED DATA RECOVERY IN DATA STORAGE SYSTEMSAANM Barton; Leslie A.AACI San JoseAAST CAAACO USAAGP Barton; Leslie A. San Jose CA USAANM Johnson; Gavin S.AACI San JoseAAST CAAACO USAAGP Johnson; Gavin S. San Jose CA USAANM Koester; Michael J.AACI HollisterAAST CAAACO USAAGP Koester; Michael J. Hollister CA USAANM Van Noorden; Carrie J.AACI SaratogaAAST CAAACO USAAGP Van Noorden; Carrie J. Saratoga CA US - In one embodiment, a system includes a data storage device for storing one or more storage volumes, logic adapted for associating an indicator with a data set on the one or more storage volumes, wherein the indicator is in a first state indicating that the data set is accessible, logic adapted for storing the indicator associated with the data set in a data set descriptor record, wherein the record is stored in at least one mapping of the one or more storage volumes, logic adapted for receiving a request to delete the data set, logic adapted for changing the indicator to a second state indicating that the data set is inaccessible in response to the request to delete the data set, with the proviso that the data set is unchanged, logic adapted for receiving a request to restore the deleted data set, and logic adapted for restoring the indicator from the second state to the first state in response to the request to restore the deleted data set. | 01-17-2013 |
20130293978 | SYSTEM UTILITY FOR CONTROLING DATA SYNCHRONIZATION IN A TAPE DATA STORAGE SYSTEM - A computer-implemented method, apparatus and computer-program product for writing data to a tape data storage medium. The method comprises providing a system service that an application invokes to handle data synchronization events associated with writing a group of files to the tape medium; keeping track of the files and data blocks in each file while writing the files to the tape medium based on file boundaries; and responsive to a data writing failure, invoking the system service to determine the files affected by the data writing failure. | 11-07-2013 |
20140022663 | MONITORING OF RESIDUAL ENCRYPTED DATA TO IMPROVE ERASE PERFORMANCE ON A MAGNETIC MEDIUM - In one embodiment, a system includes a processor, logic in the processor and/or memory configured to determine a physical position on a magnetic medium that corresponds to an end of encrypted data written over residual unencrypted data, and logic configured to store an indicator of the physical position on at least one of the magnetic medium and a memory coupled thereto. In another embodiment, a method includes determining a physical position on a magnetic medium that corresponds to an end of encrypted data written over residual unencrypted data, storing an indicator of the physical position on at least one of the magnetic medium and a memory coupled thereto. | 01-23-2014 |
20140025885 | MONITORING OF EXTENT OF WRITING OF UNOBSCURED DATA TO IMPROVE ERASE PERFORMANCE ON A MAGNETIC MEDIUM - A system according to one embodiment includes a processor; logic in the processor and/or a memory configured to determine a furthest physical position on a magnetic medium that unobscured data has been written to; and logic configured to store an indicator of the furthest physical position on at least one of the magnetic medium and a memory coupled thereto. A system according to another embodiment includes a processor; logic in the processor and/or a memory configured to receive an instruction to obscure data on a magnetic medium; logic configured to read an indicator of a furthest physical position on the magnetic medium that unobscured data has been written to; and logic configured to cause obscuring of the unobscured data on the magnetic medium, and terminating the obscuring upon reaching the physical position in the indicator. | 01-23-2014 |
20140032957 | SYNCHRONOUS MODE REPLICATION TO MULTIPLE CLUSTERS - Provided are a computer program product, system, and method for synchronous mode replication to multiple clusters receiving a write to a volume from a host. A received write is cached in a memory. A determination is made of a replication rule indicating one of a plurality of replication modes for a first cluster and a second cluster used for replication for the write, wherein one of the replication modes comprises a synchronous mode. A determination is made that the replication rule indicates a synchronous mode for the first and the second clusters. The write is transmitted from the memory to the first cluster to store in a first non-volatile storage of the first cluster and to the second cluster to store in a second non-volatile storage in response to determining that the replication rule indicates the synchronous mode. | 01-30-2014 |
20140344535 | ACCIDENTAL SHARED VOLUME ERASURE PREVENTION - Various embodiments of accidental shared volume erasure prevention include systems, methods, and/or computer program products for receiving a request to access a volume from a requesting system, determining whether the volume is associated with any system other than the requesting system, and preventing accidental erasure of the volume based on the determination. | 11-20-2014 |
20150187383 | MONITORING OF RESIDUAL ENCRYPTED DATA TO IMPROVE ERASE PERFORMANCE ON A MAGNETIC MEDIUM - In one embodiment, a system includes a processor and logic integrated with and/or executable by the processor, the logic being configured to: determine a physical position on a magnetic medium that corresponds to an end of an encrypted data set; store an indicator of the physical position on the magnetic medium and/or a memory coupled thereto; and cause obscuring of an unencrypted data set positioned after the physical position without overwriting the encrypted data set. In another embodiment, a computer program product includes a computer readable storage medium and program instructions embodied therewith, the program instructions readable and/or executable by the processor to cause the processor to: read an indicator of a physical position on a magnetic medium that corresponds to an end of an encrypted data set; and cause obscuring of an unencrypted data set positioned after the physical position without overwriting the encrypted data set. | 07-02-2015 |
20150193145 | TAPE VOLUME ACCESS BLOCK HAVING DATA SET INFORMATION STORED THEREIN - In one embodiment, an apparatus includes a processor and logic integrated with and/or executable by the processor, the logic being configured to write one or more data sets to a magnetic tape volume, the magnetic tape volume being configured to store data thereon, determine metadata corresponding to the one or more written data sets, and write the metadata corresponding to the one or more written data sets to a tape volume access block (TVAB) stored to the magnetic tape volume after a last written data set. In yet another embodiment, a method for managing a magnetic tape volume includes auditing a magnetic tape volume to determine a plurality of data sets stored thereto, determining metadata corresponding to the plurality of data sets, storing the metadata corresponding to the plurality of data sets to a TVAB, and writing the TVAB to the magnetic tape volume after a last written data set. | 07-09-2015 |
20150234600 | SELECTIVE COPYING OF TRACK DATA THROUGH PEER-TO-PEER REMOTE COPY - In one embodiment, a method includes receiving a request to establish a Peer-to-Peer Remote Copy (PPRC) relationship between a primary storage system and a secondary storage system, and copying one or more data tracks of a primary storage device in the primary storage system to the secondary storage system without copying at least one other data track of the primary storage device to the secondary storage system. The one or more data tracks of the primary storage device comprise one or more data tracks of a first characteristic. Other portions of the primary storage device comprise one or more other data tracks of a second characteristic. | 08-20-2015 |
20150355860 | EXTENT-LEVEL RESERVE AND RELEASE FOR A DIRECT ACCESS STORAGE DEVICE (DASD) VOLUMES - In one embodiment, a computer program product for managing a reserve command includes a computer readable storage medium having program code embodied therewith, the program code readable and/or executable by a processor to receive, by the processor, a request to access a data set on one or more volumes of at least one direct access storage device (DASD), the request including a reserve command, and each of the one or more volumes including a consecutive set of one or more tracks of the at least one DASD, and reserve one or more extents of the at least one DASD while reserving less than a volume of the at least one DASD and not allowing any other entity than an entity which requested the reserve to access the one or more extents of the at least one DASD that have been reserved. | 12-10-2015 |
20160004439 | TAPE VOLUME ACCESS BLOCK HAVING DATA SET INFORMATION STORED THEREIN - In one embodiment, an apparatus includes a processor and logic integrated with and/or executable by the processor. The logic is configured to position a magnetic tape volume to a position corresponding to an end of a last data set stored to the magnetic tape volume, and read an existing tape volume access block (TVAB) from the magnetic tape volume in response to a determination that the existing TVAB is stored to the magnetic tape volume. The logic is also configured to write one or more data sets to the magnetic tape volume subsequent to reading the existing TVAB in response to the determination that the existing TVAB is stored to the magnetic tape volume, determine metadata corresponding to the one or more written data sets, and update the existing TVAB with the metadata corresponding to the one or more written data sets to produce an updated TVAB. | 01-07-2016 |
Patent application number | Description | Published |
20120246437 | METHOD AND APPARATUS FOR USING UNUSED BITS IN A MEMORY POINTER - The disclosed embodiments provide a system that uses unused bits in a memory pointer. During operation, the system determines a set of address bits in a address space that will not be needed for addressing purposes during program operation. Subsequently, the system stores data associated with the memory pointer in this set of address bits. The system masks this set of address bits when using the memory pointer to access the memory address associated with the memory pointer. Storing additional data in unused pointer bits can reduce the number of memory accesses for a program and improve program performance and/or reliability. | 09-27-2012 |
20130080673 | VALIDATING MESSAGE-SIGNALED INTERRUPTS - The disclosed embodiments provide a system that validates message-signaled interrupts. During operation, the system receives a message-signaled interrupt from a requesting device. This message-signaled interrupt includes an interrupt vector that identifies an interrupt, and is accompanied by an identification tag that identifies the source of the interrupt. The system uses the interrupt vector to access a stored tag from a tracking mechanism that associates source devices with their assigned interrupt vector(s). The system then compares the identification tag and the stored tag to validate the message-signaled interrupt. | 03-28-2013 |
20140095805 | REMOTE-KEY BASED MEMORY BUFFER ACCESS CONTROL MECHANISM - A system and method implementing revocable secure remote keys is disclosed. A plurality of indexed base secrets is stored in a register of a coprocessor of a local node coupled with a local memory. When it is determined that a selected base secret expired, the base secret stored in the register based on the base secret index is changed, thereby invalidating remote keys generated based on the expired base secret. A remote key with validation data and a base secret index is received from a node requesting access to the local memory. A validation base secret is obtained from the register based on the base secret index. The coprocessor performs hardware validation on the validation data based on the validation base secret. Hardware validation fails if the base secret associated with the base secret index has been changed in the register of the selected coprocessor. | 04-03-2014 |
20140095810 | MEMORY SHARING ACROSS DISTRIBUTED NODES - A method and apparatus are disclosed for enabling nodes in a distributed system to share one or more memory portions. A home node makes a portion of its main memory available for sharing, and one or more sharer nodes mirrors that shared portion of the home node's main memory in its own main memory. To maintain memory coherency, a memory coherence protocol is implemented. Under this protocol, load and store instructions that target the mirrored memory portion of a sharer node are trapped, and store instructions that target the shared memory portion of a home node are trapped. With this protocol, valid data is obtained from the home node and updates are propagated to the home node. Thus, no “dirty” data is transferred between sharer nodes. As a result, the failure of one node will not cause the failure of another node or the failure of the entire system. | 04-03-2014 |
20140096145 | HARDWARE MESSAGE QUEUES FOR INTRA-CLUSTER COMMUNICATION - A method and apparatus for sending and receiving messages between nodes on a compute cluster is provided. Communication between nodes on a compute cluster, which do not share physical memory, is performed by passing messages over an I/O subsystem. Typically, each node includes a synchronization mechanism, a thread ready to receive connections, and other threads to process and reassemble messages. Frequently, a separate queue is maintained in memory for each node on the I/O subsystem sending messages to the receiving node. Such overhead increases latency and limits message throughput. Due to a specialized coprocessor running on each node, messages on an I/O subsystem are sent, received, authenticated, synchronized, and reassembled at a faster rate and with lower latency. Additionally, the memory structure used may reduce memory consumption by storing messages from multiple sources in the same memory structure, eliminating the need for per-source queues. | 04-03-2014 |
20150278103 | Memory Corruption Detection Support For Distributed Shared Memory Applications - Nodes in a distributed node system are configured to support memory corruption detection when memory is shared between the nodes. Nodes in the distributed node system share data in units of memory referred to herein as “shared cache lines.” A node associates a version value with data in a shared cache line. The version value and data may be stored in a shared cache line in the node's main memory. When the node performs a memory operation, it can use the version value to determine whether memory corruption has occurred. For example, a pointer may be associated with a version value. When the pointer is used to access memory, the version value of the pointer may indicate the expected version value at the memory location. If the version values do not match, then memory corruption has occurred. | 10-01-2015 |