29th week of 2009 patent applcation highlights part 25 |
Patent application number | Title | Published |
20090182921 | GENERAL PURPOSE INTERFACE CONTROLLER OF RESOURE LIMITED SYSTEM - The invention discloses a general purpose interface controller, including a slave interface controller and a master interface controller, used to exchange data among master devices and slave devices in an electronic device. The slave interface controller receives data and a first control signal from one of the master devices, and converts the first control signal to a request signal. The master interface controller receives the data and the request signal from the slave interface controller, converts the request signal to a second control signal recognized by at least one of the slave devices, and forwards the data and the second control signal to the slave device. | 2009-07-16 |
20090182922 | BACKPLANE AND COMMUNICATION APPARATUS - The present invention discloses a communication apparatus. The communication apparatus includes one or more board and a backplane. The board includes a connector and a function processing unit circuit connected to the connector. The backplane includes at least one group of board connectors. Each group of the board connectors includes two board connectors that receive signals from different boards. The board connector includes connection terminals connected to the connector on boards. The two board connectors are distributed up and down, and the connection terminals of the two board connectors are distributed symmetrically around a center. The foregoing communication apparatus and backplane are cost-efficient. | 2009-07-16 |
20090182933 | DURABLE DATA STORAGE SYSTEM AND METHOD - A method of operating a storage system, comprising: issuing a first command to write a first data to a first nonvolatile storage device; writing the first data to a second nonvolatile storage device if write condition is unstable; retrieving the first data from the second nonvolatile storage device; and writing the first data to the first nonvolatile storage device during a stable write condition, wherein whether write condition is stable is determined based on one of a sensor output or a memory access status signal, and wherein the memory access status signal is one of a predetermined value of retries, idling, access commands, or any combination thereof. | 2009-07-16 |
20090182934 | Memory device and method of multi-bit programming - Memory devices and multi-bit programming methods are provided. A memory device may include a plurality of memory units; a data separator that separates data into a plurality of groups; a selector that rotates each of the plurality of groups and transmits each of the groups to at least one of the plurality of memory units. The plurality of memory units may include page buffers that may program the transmitted group in a plurality of multi-bit cell arrays using a different order of a page programming operation. Through this, evenly reliable data pages may be generated. | 2009-07-16 |
20090182935 | MASS STORAGE DEVICE, IN PARTICULAR OF THE USB TYPE, AND RELATED METHOD FOR TRANSFERRING DATA - A mass storage device of the present invention includes one or more memory elements and a logic module adapted to interface the one or more memory elements for exchanging data according to a data exchange protocol, in particular of the USB type, through a first port. The mass storage device has a module for detecting the presence of a power voltage associated with a first connector of the first port, and the logic module can set the storage device to either a Host or a Function device configuration depending on the detection carried out by the module for detecting the presence of a power voltage. The device also includes a second port adapted to implement a direct data exchange with further storage devices. The device additionally offers the possibility of communicating with radio or optical wireless ports exchanging data through a data bus, e.g. of the USB type. | 2009-07-16 |
20090182936 | SEMICONDUCTOR MEMORY DEVICE AND WEAR LEVELING METHOD - Disclosed is a semiconductor memory device and wear leveling method thereof. The semiconductor memory device including: a nonvolatile memory having pluralities of memory blocks, at least one of the memory blocks storing erasing counts of the memory blocks; and a memory controller managing wear leveling of the nonvolatile memory. The memory controller adjusts a period of managing the wear leveling with reference to the erasing counts. | 2009-07-16 |
20090182937 | SEMICONDUCTOR MEMORY CARD, AND PROGRAM FOR CONTROLLING THE SAME - A semiconductor memory card that has a sufficient storage capacity when an EC application writes data to a storage is provided. A usage area for the EC application in an EEPROM | 2009-07-16 |
20090182938 | CONTENT ADDRESSABLE MEMORY AUGMENTED MEMORY - Embodiments of the present disclosure provide methods, apparatuses, and systems including a memory device including content addressable memory configured to store an address associated with one or more memory cells while an access operation is performed on the one or more memory cells. Other embodiments may be described. | 2009-07-16 |
20090182939 | Asynchronous and Distributed Storage of Data - In one example, multimedia content is requested from a plurality of storage modules. Each storage module retrieves the requested parts, which are typically stored on a plurality of storage devices at each storage module. Each storage module determines independently when to retrieve the requested parts of the data file from storage and transmits those parts from storage to a data queue. Based on a capacity of a delivery module and/or the data rate associated with the request, each storage module transmits the parts of the data file to the delivery module. The delivery module generates a sequenced data segment from the parts of the data file received from the plurality of storage modules and transmits the sequenced data segment to the requester. | 2009-07-16 |
20090182940 | STORAGE CONTROL SYSTEM AND CONTROL METHOD - A storage control system in which a first storage controller is connected to a storage device in a second storage controller and the first storage controller is configured to be able to read and write data from/to the storage device in the second storage controller in response to a request from a host device connected to the first storage apparatus, the first storage controller including: a controller for controlling data transmission and reception between the host device and the storage device in the second storage controller; and a cache memory for temporarily storing the data, wherein the controller sets a threshold value for storage capacity in the cache memory assigned to the storage device according to the properties of the storage device. | 2009-07-16 |
20090182941 | Web Server Cache Pre-Fetching - A method and apparatus for a server that includes a file processor that interprets each requested data file, such as a web page, requested by a client in a process analogous to that of a browser application or other requesting application. The file processor initiates the loading of each referenced data item within the requested document in anticipation that the client will make the same requests upon receiving the requested data file. Each referenced data item is loaded into the server cache. When the client browser application requests these referenced data items they can be returned to the client browser application without accessing a slower persistent data storage. The requested data items are loaded from the server cache, which has a faster access time than the persistent data storage. | 2009-07-16 |
20090182942 | Extract Cache Attribute Facility and Instruction Therefore - A facility and cache machine instruction of a computer architecture for specifying a target cache cache-level and a target cache attribute of interest for obtaining a cache attribute of one or more target caches. The requested cache attribute of the target cache(s) is saved in a register. | 2009-07-16 |
20090182963 | SYSTEM AND METHOD FOR PERFORMING A SNAPSHOT AND FOR RESTORING DATA - The present invention relates to a method for tracking a plurality of snapshots of an information store. The present invention comprises performing a first snapshot of an information store that indexes the contents of the information store, copying the contents of the information store to a first storage device, using the first snapshot, and updating a replication volume table indicating the storage of the contents of the first information store using the first snapshot on the first storage device. A second snapshot is performed of the information store that indexes the contents of the information store, the contents of the information store are copied to a second storage device using the second snapshot and the replication volume table is updated to indicate the storage of the contents of the first information store using the second snapshot on the second storage device. | 2009-07-16 |
20090182964 | DYNAMIC ADDRESS TRANSLATION WITH FORMAT CONTROL - What is provided is an enhanced dynamic address translation facility. In one embodiment, a virtual address to be translated and an initial origin address of a translation table of the hierarchy of translation tables are obtained. An index portion of the virtual address is used to reference an entry in the translation table. If the format control field is enabled, a frame address of a large block of data in main storage is obtained from the translation table entry. The large block of data is a block of at least 1M byte in size. The frame address is then combined with an offset portion of the virtual address to form the translated address of a desired block of data within the large block of data in main storage. The desired large block of data addressed by the translated address is then accessed. | 2009-07-16 |
20090182965 | Securing data in memory device - The various embodiments of the invention relate generally to semiconductors and memory technology. More specifically, the various embodiment and examples of the invention relate to memory devices, systems, and methods that protect data stored in one or more memory devices from unauthorized access. The memory device may include third dimension memory that is positioned on top of a logic layer that includes active circuitry in communication with the third dimension memory. The third dimension memory may include multiple layers of memory that are vertically stacked upon each other. Each layer of memory may include a plurality of two-terminal memory elements and the two-terminal memory elements can be arranged in a two-terminal cross-point array configuration. At least a portion of one or more of the multiple layers of memory may include an obfuscation layer configured to conceal data stored in one or more of the multiple layers of memory. | 2009-07-16 |
20090182966 | DYNAMIC ADDRESS TRANSLATION WITH FRAME MANAGEMENT - What is disclosed is a frame management function defined for a machine architecture of a computer system. In one embodiment, a frame management instruction is obtained which identifies a first and second general register. The first general register contains a frame management field having a key field with access-protection bits and a block-size indication. If the block-size indication indicates a large block then an operand address of a large block of data is obtained from the second general register. The large block of data has a plurality of small blocks each of which is associated with a corresponding storage key having a plurality of storage key access-protection bits. If the block size indication indicates a large block, the storage key access-protection bits of each corresponding storage key of each small block within the large block is set with the access-protection bits of the key field. | 2009-07-16 |
20090182967 | PACKET TRANSFER IN A VIRTUAL PARTITIONED ENVIRONMENT - A computer implemented method, computer product code, and data processing system are provided for transferring data between virtual partitions. A request is received to transfer a packet from a first partition to a second partition. A free buffer is identified from a buffer pool of the second partition, and a receive descriptor is written. A bit within the receive descriptor is set to identify a receive descriptor ring of second partition. A first interrupt is generated to the second partition. The packet is then copied to the free buffer, and the receive descriptor is updated. | 2009-07-16 |
20090182968 | VALIDITY OF ADDRESS RANGES USED IN SEMI-SYNCHRONOUS MEMORY COPY OPERATIONS - A system, method, and a computer readable for protecting content of a memory page are disclosed. The method includes determining a start of a semi-synchronous memory copy operation. A range of addresses is determined where the semi-synchronous memory copy operation is being performed. An issued instruction that removes a page table entry is detected. The method further includes determining whether the issued instruction is destined to remove a page table entry associated with at least one address in the range of addresses. In response to the issued instruction being destined to remove the page table entry, the execution of the issued instruction is stalled until the semi-synchronous memory copy operation is completed. | 2009-07-16 |
20090182969 | DYNAMIC ALLOCATION OF DMA BUFFERS IN INPUT/OUTPUT ADAPTORS - A method and apparatus for dynamic allocation of DMA buffers in the DRAM banks of an I/O adaptor. The method and apparatus determine the functional status of the adaptor, allocate critical, volatile DMA buffers in non-critical DRAM banks if the adaptor is fully functional, and allocate critical, volatile DMA buffers in critical DRAM banks if the adaptor is partially functional. | 2009-07-16 |
20090182970 | Data Transmission for Partition Migration - A method, apparatus, and program product manage data during a logical partition migration. Data from a source logical partition is transformed into partition state records by a source migration services partition. The records are transmitted to a target migration services partition that processes the records and loads the data into a target logical partition. The logical partition migration may take place from a first computer to a second computer, or solely in a first computer. The migration services partitions may be configured with multiple virtual processors to create and send, or receive and process, partition state records in parallel. | 2009-07-16 |
20090182971 | DYNAMIC ADDRESS TRANSLATION WITH FETCH PROTECTION - What is provided is an enhanced dynamic address translation facility. In one embodiment, a virtual address to be translated is first obtained and an initial origin address of a translation table of the hierarchy of translation tables is obtained. Based on the obtained initial origin, a segment table entry is obtained. The segment table entry is configured to contain a format control and access validity fields. If the format control and access validity fields are enabled, the segment table entry further contains an access control field, a fetch protection field, and a segment-frame absolute address. Store operations are permitted only if the access control field matches a program access key provided by any one of a Program Status Word or an operand of a program instruction being executed. Fetch operations are permitted if the program access key associated with the virtual address is equal to the segment access control field. | 2009-07-16 |
20090182972 | DYNAMIC ADDRESS TRANSLATION WITH FORMAT CONTROL - What is provided is an enhanced dynamic address translation facility. In one embodiment, a virtual address to be translated and an initial origin address of a translation table of the hierarchy of translation tables are obtained. An index portion of the virtual address is used to reference an entry in the translation table. If a format control field contained in the translation table entry is enabled, the table entry contains a frame address of a large block of data of at least 1M byte in size. The frame address is then combined with an offset portion of the virtual address to form the translated address of a small 4K byte block of data in main storage or memory. | 2009-07-16 |
20090182983 | Compare and Branch Facility and Instruction Therefore - An atomic compare and branch instruction is executed that combines the function of a compare instruction having an option field with a conditional branch or jump instruction such that condition codes are preserved rather than setting condition codes to a value representative of the compare results. One comparand is obtained from any one of a memory location or an immediate field and the other comparand is obtained from a register field. | 2009-07-16 |
20090182984 | Execute Relative Long Facility and Instructions Therefore - A method, system and program product for an execute relative instruction, which when executed fetches and executes a target instruction at a relative address and then returns processing to the next instruction following the execute relative instruction. The relative address is formed by adding the value of the program counter to a sign extended immediate field. The fetched target instruction is optionally modified before execution by OR'ing bits into predetermined bits of the target instruction. | 2009-07-16 |
20090182985 | Move Facility and Instructions Therefore - A move instruction, having a signed immediate field, copies a sign extended signed immediate field value to an operand location in memory. The size of the operand is determined by the opcode of the instruction. Preferably, the address of the operand is determined by adding a displacement field of the instruction to a value associated with a register field of the instruction. | 2009-07-16 |
20090182986 | Processing Unit Incorporating Issue Rate-Based Predictive Thermal Management - A circuit arrangement and method utilize an issue rate-based predictive thermal management technique in a microprocessor or other integrated circuit that tracks the rate in which instructions are issued to one or more execution units in the processing unit, and selectively delays the issuance of subsequent instructions to the execution unit(s) based upon the tracked issue rate to predictively control the thermal output of the integrated circuit. | 2009-07-16 |
20090182987 | Processing Unit Incorporating Multirate Execution Unit - A multirate execution unit is capable of being operated in a plurality of modes, with the execution unit being capable of clocked at multiple different rates relative to a multithreaded issue unit such that, in applications where maximum performance is desired, the execution unit can be clocked at a rate that is faster than the clock rate for the multithreaded issue unit, and in applications where a lower power profile is desired, the execution unit can be throttled back to a slower rate to reduce the power consumption of the execution unit. When the execution unit is clocked at a faster rate than the multithreaded issue unit, the issue unit is permitted to issue more instructions per cycle than when the execution unit is throttled to the slower rate to increase overall instruction throughput. | 2009-07-16 |
20090182988 | Compare Relative Long Facility and Instructions Therefore - A method, system and program product for comparing two operands wherein one operand is obtained from memory wherein the address of the memory operand is based an offset of the program counter rather than an explicitly defined address location. The offset is defined by an immediate field of the instruction which is sign extended and is aligned as a halfword address when added to the value of the program counter. | 2009-07-16 |
20090182989 | MULTITHREADED MICROPROCESSOR WITH REGISTER ALLOCATION BASED ON NUMBER OF ACTIVE THREADS - A mechanism in a multithreaded processor to allocate resources based on configuration information indicating how many threads are in use. | 2009-07-16 |
20090182990 | Method and Apparatus for a Pipelined Multiple Operand Minimum and Maximum Function - Embodiments of the invention provide methods and apparatus for executing a multiple operand minimum or maximum instructions. Executing the multiple operand minimum or maximum instruction comprises transferring more than two operands to one or more processing lanes of a vector unit. A first compare operation may be performed in at least one processing lane of the vector unit to determine a greater or smaller of a first operand and a second operand. The greater (or smaller) operand may be transferred to a dot product unit, wherein, in a second compare operation, the transferred operand is compared to at least a third operand to determine one of the greater and smaller of the more than two operands. | 2009-07-16 |
20090182991 | PROCESSOR INCLUDING EFFICIENT SIGNATURE GENERATION FOR LOGIC ERROR PROTECTION - A processor core includes an instruction decode unit that may dispatch a same integer instruction stream to a plurality of integer execution units operating in lock-step. The processor core also includes signature generation logic that may generate, concurrently with execution of the integer instructions, a respective signature from result signals conveyed on respective result buses in one or more pipeline stages within each of the integer execution units in response to the result signals becoming available. The processor core also includes compare logic that may detect a mismatch between signatures from each of the integer execution units. Further, in response to the compare logic detecting any mismatch, the compare logic may cause instructions causing the mismatch to be re-executed. | 2009-07-16 |
20090182992 | Load Relative and Store Relative Facility and Instructions Therefore - A method, system and program product for loading or storing memory data wherein the address of the memory operand is based an offset of the program counter rather than an explicitly defined address location. The offset is defined by an immediate field of the instruction which is sign extended and is aligned as a halfword address when added to the value of the program counter. | 2009-07-16 |
20090183003 | Authentication in data communication - Method of authenticating a client comprising the steps of sending a subscriber identity to an authentication server; obtaining at least one challenge and at least one first secret to the authentication server based on a client's secret specific to the client; forming first credentials; forming a first authentication key using the at least one first secret; encrypting the first credentials using the first authentication key; sending the at least one challenge and the encrypted first credentials to the client; forming an own version of the first authentication key at the client; decrypting the encrypted first credentials using the own version of the first authentication key. In the method, the encrypted credentials are sent together with the at least one challenge to the client so that the client can proceed authentication only if it can derive the first secret from the at least one challenge. | 2009-07-16 |
20090183004 | CONDITIONAL ACCESS SYSTEM - The invention provides an improved conditional access system with efficient bandwidth usage on the interface between a receiver and a conditional access module. The conditional access system has a receiver, a selection module, a conditional access module and possibly a terminal. The conditional access module has a first memory for storing service identifiers of services and transmits one or more service identifiers to the selection module. The selection module receives an input signal from the receiver and selects from the input signal those sub-signals as identified by the service identifiers and transmits the sub-signals to the conditional access module. | 2009-07-16 |
20090183005 | Distributing Access to a Data Item - A method is provided for use in distributing access to a data item. The method includes allowing multiple transfers between computers of a single instance of permission to gain access to the data item, the transfers occurring across data connections and including a first transfer between a first computer and a second computer and a subsequent transfer between the second computer and a third computer, wherein at any one time only one computer retains the instance of permission and is able to use the instance of permission to gain access to the data item. | 2009-07-16 |
20090183006 | METHOD AND APPARATUS FOR APPLYING DIGITAL SIGNATURES TO TRANSLATED CONTENT | 2009-07-16 |
20090183007 | Method, Computer Program Product and Apparatus for Authenticating Electronic Documents - An apparatus for enabling secure control over electronic seals and signatures may include a processing element. The processing element may be configured to select a design drawing file for generation of a corresponding design drawing document, apply a digitized signature and seal and a uniform resource locator (URL) to the design drawing file to generate the design drawing document including the digitized signature and seal and the URL, and store the generated design drawing document at an access-restricted location accessible via the URL, the location being associated with a signer of the digitized signature. | 2009-07-16 |
20090183008 | IDENTITY AUTHENTICATION AND SECURED ACCESS SYSTEMS, COMPONENTS, AND METHODS - Security tokens contain data that is each uniquely encrypted based on a unique biometric identifier of an authorized user of that token. Decoders receive the token and the user's biometric identifier, convert the biometric identifier to a biometric key, and apply the biometric key to decrypt the token. In this way, the decoders authenticate the users without performing a biometric identifier comparison. In some embodiments pieces or sets of the data are stored in designated data compartments, which are individually encrypted based on authority keys, and all of the encrypted data compartments are collectively encrypted based on the biometric key to create the token. The decoders store only the authority keys corresponding to the data compartments which they have authorization to open. In addition, in some embodiments the token and the biometric identifier are encrypted and sent to a remote authentication server for decryption of the token. | 2009-07-16 |
20090183009 | DATA PROCESSING SYSTEM, METHOD FOR EXECUTING A CRYPTOGRAPHIC ALGORITHM AND METHOD FOR PREPARING EXECUTION OF A CRYPTOGRAPHIC ALGORITHM - A data processing system including a memory configured to store confidential data and non-confidential data; a cache memory which is configured to cache data stored in the memory and which comprises a first cache memory region and a second cache memory region; a processing circuit configured to carry out, in a first state of the data processing system, a cryptographic algorithm which operates on the confidential data and on the non-confidential data, wherein the confidential data are cached using the first cache memory region and the non-confidential data are cached using the second cache memory region; and an invalidating circuit configured to invalidate the first cache memory region when the data processing system switches from the first state into a second state. | 2009-07-16 |
20090183010 | Cloud-Based Movable-Component Binding - This document describes tools capable of enabling cloud-based movable-component binding. The tools, in some embodiments, bind protected media content to a movable component in a mobile computing device in a cryptographically secure manner without requiring the movable component to perform a complex cryptographic function. By so doing the mobile computing device may request access to content and receive permission to use the content quickly and in a cryptographically robust way. | 2009-07-16 |
20090183011 | MODULAR TAMPER RESISTANT ENCLOSURE FOR SECURE SYSTEMS - An active membrane creates a secure area around one or more devices. The active membrane forms a physical barrier between the encased secure area and an external environment. Linked to the membrane and acting as the sole interface between the secure area and the outside environment is a boundary interface. The boundary interface tunnels data to the secure area in a secure fashion. According to one embodiment of the present invention, the boundary interface utilizes symmetric and/or asymmetric cryptographic techniques to secure the data path. The boundary interface is also coupled to the active membrane, and upon the membrane sensing a breach of the membrane (thus signifying an intrusion of the secure area), the boundary interface can be configured to sever the data paths linking the secure area with the unsecured area as well as take other active steps to ensure that data within the secure area is not compromised. | 2009-07-16 |
20090183012 | KEYBOARD - A keyboard includes a keyboard processor configured for outputting a control signal for turning a computer on/off; a switch circuit connected to a turn-on port of a south bridge chipset on a mainboard of the computer; and a processor connected to the keyboard processor and the switch circuit. When the processor receives the control signal output from the keyboard processor, the processor outputs a high pulse signal to the switch circuit to make the turn-on port grounded to turn on or turn off the computer. | 2009-07-16 |
20090183023 | METHOD AND APPARATUS FOR TIME-BASED EVENT CORRELATION - A method and apparatus for fault analysis and fault isolation in a system of networked processors by using a central event correlation function and logical fault signature to provide for fault isolation of failed processing elements is presented. This central event correlation method uses asynchronous events from multiple input sources of same and different technologies and time-based fault correlation and ageing to match unique fault signatures and determine levels of fault recovery escalation over time. This mechanism uses an event driven recovery table to recognize a unique fault signature, count and age faults, provide fault threshold based recovery and generate events as needed to drive recovery escalation. | 2009-07-16 |
20090183024 | System Management Infrastructure for Corrective Actions to Servers with Shared Resources - A corrective action method or subsystem for providing corrective actions in a for a computing domain shared among multiple customers wherein different domain resources are shared by different customers, and each customer's corrective action preferences are accommodated differently according a repository of customer preferences. A database may be queried when a fault event or out-of-limits condition is detected for a given shared resource to determine which customers share the resource, determine each affected customer's response preferences, and to perform corrective actions according to those response preferences. For example, three customers may share a particular hard drive in a shared computing system. One customer may prefer to receive an email notice when the drive is nearly full, another may prefer to receive additional allocation of disk space elsewhere, and the third may prefer to receive a written report of space utilization. | 2009-07-16 |
20090183025 | AUTONOMOUS DIAGNOSIS AND REPAIR OF STORAGE COMPONENTS - A method for the autonomous diagnosis and repair of user-configured storage subsystem components in a storage environment is provided. The method includes monitoring the user-configured storage subsystem components to identify an error associated with a first component of the user-configured storage subsystem components, the error corresponding to an error code, cross referencing the error code against a severity matrix, querying a depot for a fix code, and downloading and applying the fix code if the first component is configured, according to the severity matrix, to be autonomously repaired. | 2009-07-16 |
20090183026 | Thresholding Hardware Errors - A system is provided to protect against ill-behaved microcode by balancing between an actual occurrence of a hardware problem and a microcode bug setting a flag appearing as a hardware problem. In this method, the error recovery is performed only on a single piece of hardware and no further error recovery action is taken on other pieces of similar hardware. The approach addresses the problem by treating a hit on one card as a hardware problem, but as a bug on subsequent cards. The invention keeps track of whether or not the same event has occurred on the same type of hardware so not to take action on more than one instance of the hardware. Subsequent hits on another instance of the hardware will not trigger the hardware related recovery on additional hardware. | 2009-07-16 |
20090183027 | CHECKPOINTING AND RESTORING USER SPACE DATA STRUCTURES USED BY AN APPLICATION - Provided are a method, system, and article of manufacture for checkpointing and restoring user space data structures used by an application accessing a data structure maintained by an operating system for an executing application. Information in the accessed data structure is saved with checkpoint information for the application. An operation to restore the application from the checkpoint information is initialized. A restored data structure is generated to include the saved information in the accessed data structure saved in the checkpoint information in response to restoring the application. An initialization routine of the application is modified to bypass initializing the data structure as part of the application initialization routine to restore the application. | 2009-07-16 |
20090183028 | METHOD AND SYSTEM FOR MODELING, VALIDATING AND AUTOMATICALLY RESOLVING GOALS AND DEPENDENCIES BETWEEN ELEMENTS WITHIN A TOPOLOGY - Computer implemented method, system and computer usable program code for configuring a computing system. A determination is made whether there are any errors in the model, and responsive to determining that there is at least one error in the model, a determination is made whether there is at least one resolution for correcting the at least one error. Responsive to determining that there is at least one resolution for correcting the at least one error, at least one resolution among the at least one resolution for correcting the at least one error is selected to form at least one selected resolution to correct the at least one error. The at least one selected resolution is applied to the model to form a transformed model, and the transformed model is output to a user. | 2009-07-16 |
20090183029 | Root Cause Analysis In A System Having A Plurality Of Inter-Related Elements - A method of performing root cause analysis for use in a system comprising a plurality of inter-related elements, wherein at least some of the elements experience one or more abnormal conditions, comprising defining one or more conditions for more than one element symptomatic of abnormal operation of the element; defining one or more causal relationships between the conditions and results on one or more related elements; compiling the conditions and causal relationships of each element for which conditions and relationships have been defined, as at least one continuation in a continuation passing style (CPS); receiving one or more observed events symptomatic of abnormal operation of at least one element of the system; processing the received events using the conditions and the continuations; concluding at least one root cause of the received events consistent with the received events; and outputting the root cause. | 2009-07-16 |
20090183030 | EPISODIC CAUSE ANALYSIS - Managing a root cause analysis and outputting an identified root cause, for use in a system comprising a plurality of inter-related elements wherein at least some of the elements experience one or more anomalous states, comprising receiving initial indicators of system element states symptomatic of anomalous element operation, selecting an episode expiration time based on the received initial indicators, receiving additional such indicators, correlating the indicators received prior to the episode expiration time based on pre-defined relationships between the system elements, generating possible causes of the anomalous element states consistent with the received indicators and the pre-defined relationships, asserting possible causes as actual causes, identifying an actual cause as a root cause, and outputting the root cause. | 2009-07-16 |
20090183031 | Engine For Performing Root Cause And Effect Analysis - An engine for performing root cause analysis on a system comprising a plurality of elements in a modeled domain, the engine comprising a module loader and parser for loading modules of computer code containing computer language statements modeling elements of the system, including one or more of model type definitions, conditions, causal rules, and continuations; and for parsing the computer language statements; a storage for storing the parsed computer language statements; a receiver for receiving conditions representing state changes of system elements, accessing the storage, and determining one or more parsed computer language statements to apply to the received conditions; a hypothesis generator for instantiating one or more hypotheses of potential causes of each received condition consistent with the received conditions and the parsed computer language statements; a blackboard for receiving the instantiated hypotheses, and determining a root cause of the received conditions based on the hypotheses consistent with the received conditions and the parsed computer language statements; and an output for outputting the determined root cause. | 2009-07-16 |
20090183032 | Data processing apparatus and method for testing stability of memory cells in a memory device - A data processing apparatus and method are provided for testing stability of memory cells in a memory device. A data processing apparatus comprises a memory device having an array of memory cells for storing data values. Test circuitry is employed in a test mode of operation to execute one or more test patterns in order to detect any memory cells which may malfunction in a normal mode of operation due to cell instability following a write operation, as for example may be caused by body region history effect in embodiments where each memory cell comprises at least one transistor having a body region insulated from a substrate. Each test pattern causes a sequence of access requests to be issued to the memory device whose timing is controlled by a test mode clock signal. Dummy read control circuitry is employed in the test mode of operation, and is responsive at least to each write access request to generate an internal clock signal which has an increased frequency with respect to the test mode clock signal. Further, the dummy read control circuitry is responsive to each write access request to perform using the internal clock signal a write operation to at least one memory cell based on a memory address specified by the write access request, followed by a dummy read operation to the same at least one memory cell, the dummy read operation serving to stress the at least one memory cell with respect to cell stability. This approach provides a very reliable, effective and realistic (in terms of test time) mechanism for detecting memory cells which may malfunction in normal use due to cell instability following a write operation. | 2009-07-16 |
20090183043 | SEMICONDUCTOR INTEGRATED CIRCUIT - A semiconductor integrated circuit includes a digital circuit and a first-stage register circuit provided in a stage followed by the digital circuit. The digital circuit includes a logic circuit and a register circuit configured to temporarily retain a logic output from the logic circuit. The first-stage register circuit has a function as an alternative configured to test at least one register circuit and a function as an interface which supplies input data from an external input terminal to the digital circuit. The first-stage register circuit retains the input data from the external input terminal in synchronization with a clock signal, supplies the retained data to the digital circuit at the time of system operation, and outputs the retained data from an external output terminal connected to a dedicated output terminal or the digital circuit at the time of testing. | 2009-07-16 |
20090183044 | Method and circuit for implementing enhanced LBIST testing of paths including arrays - A method and circuit implement testing of a circuit path including a memory array and logic including Logic Built in Self Test (LBIST) diagnostics, and a design structure on which the subject circuit resides are provided. Testing of the circuit path includes initializing the memory array in the circuit path with an initialization pattern, switching to Logic Built in Self Test (LBIST) mode and providing a read only mode for the memory array, and running Logic Built in Self Test (LBIST) testing of the circuit path. | 2009-07-16 |
20090183045 | TESTING SYSTEM FOR A DEVICE UNDER TEST - A testing system for a device under test (DUT) includes a test parameter-generating device and a platform module. The test parameter-generating device stores test information, and is operable so as to execute a test algorithm, so as to generate a transmission signal upon execution of the test algorithm, and so as to generate a test environment with reference to the transmission signal. The platform module is operable so as to conduct testing of the DUT using the test information stored in the test parameter-generating device under the test environment generated by the test parameter-generating device. | 2009-07-16 |
20090183046 | Programmable Test Clock Generation Responsive to Clock Signal Characterization - Disclosed are, inter alia, methods, apparatus, mechanisms, and means for characterizing a clock signal within an application-specific integrated circuit (ASIC), and then, also on the ASIC, generating a testing clock signal based on the characterization of the operative clock signal for testing purposes. An ASIC includes a clock signal characterization circuit configured to characterize a clock signal within the ASIC; and a programmable testing clock signal generator configured for being programmed based on said characterization of the clock signal, and for generating a test clock signal based on its said programming. | 2009-07-16 |
20090183047 | Method for Generating Ldpc Codes and Apparatus Using Ldpc Codes - A method for generating an LDPC (low density parity check) code, comprising steps of: determining the number of rows and the number of columns in a matrix for forming the LDPC code according to predetermined code rate and constraint length; dividing the matrix into a plurality of layers according to a predetermined column weight; selecting a parallelization factor; dividing at least one of said layers in the matrix into a plurality of sub-layers and dividing each said sub-layer into a plurality of modular data blocks, according to the parallelization factor; determining the position of each weighted element in each modular data block according to said column weight and a predetermined row weight, so as to form said LDPC code. | 2009-07-16 |
20090183048 | Systems and methods for LDPC coded modulation - Typical forward error correction methods employ Trellis Code Modulation. By substituting low density parity check coding in place of the convolution code as part of a combined modulation and encoding procedure, low density parity check coding and modulation can be performed. The low density parity check codes have no error floor, no cycles, an equal bit error rate for the information bits and the parity bits, and timely construction of both a parity check matrix with variable codeword size and a generator matrix is possible. | 2009-07-16 |
20090183049 | PROBABILISTIC ERROR CORRECTION IN MULTI-BIT-PER-CELL FLASH MEMORY - Data that are stored in cells of a multi-bit-per cell memory, according to a systematic or non-systematic ECC, are read and corrected (systematic ECC) or recovered (non-systematic ECC) in accordance with estimated probabilities that one or more of the read bits are erroneous. In one method of the present invention, the estimates are a priori. In another method of the present invention, the estimates are based only on aspects of the read bits that include significances or bit pages of the read bits. In a third method of the present invention, the estimates are based only on values of the read bits. Not all the estimates are equal. | 2009-07-16 |
20090183050 | FORWARD ERROR CORRECTION SCHEME FOR DATA CHANNELS USING UNIVERSAL TURBO CODES - A method of providing forward error correction for data services uses a parallel concatenated convolutional code which is a Turbo Code comprising a plurality of eight-state constituent encoders wherein a plurality of data block sizes are used in conjunction with said Turbo Code. A variation uses the method in a cellular radio system. Another variation uses the method in both forward and reverse likes of a cellular radio system. | 2009-07-16 |
20090183051 | Memory System with Cyclic Redundancy Check - A memory system, with a memory controller and a memory module, is configured to transfer error securing data and address signals within signal frames between the memory controller and the memory module. The memory system includes: an address register configured to pre-store an address signal associated with at least one block of data signals to be transferred, and at least one cyclic redundancy checksum calculator included in one of the memory controller and the memory module, the calculators being configured to calculate a cyclic redundancy checksum for the at least one data signal block, wherein the pre-stored address signal is used as an initial value for the calculation of the cyclic redundancy checksum and the at least one block of data and address signals are transferred together with the calculated cyclic redundancy checksum. | 2009-07-16 |
20090183052 | SEMICONDUCTOR MEMORY DEVICE AND METHOD OF CONTROLLING THE SAME - A semiconductor memory device includes a plurality of detecting code generators configured to generate a plurality of detecting codes to detect errors in a plurality of data items, respectively, a plurality of first correcting code generators configured to generate a plurality of first correcting codes to correct errors in a plurality of first data blocks, respectively, each of the first data blocks containing one of the data items and a corresponding detecting code, a second correcting code generators configured to generate a second correcting code to correct errors in a second data block, the second data block containing the first data blocks, and a semiconductor memory configured to nonvolatilely store the second data block, the first correcting codes, and the second correcting code. | 2009-07-16 |
20090183063 | SYSTEM AND METHOD OF INTEGRATING A PLURALITY OF FORM RELATED WORKFLOW TOOLS - A method is provided that includes receiving a request at a server from a client device to configure a form associated with a workflow step. The form is of a form type that supports a set of features. The method also includes identifying a form tool of a plurality of form tools that is compatible with the form type. In addition, the method includes generating form feature discovery instructions via a form integration framework application programming interface (API). The form integration framework API utilizes a common set of instructions adapted to direct the plurality of form tools. Further, the method includes providing a set of user interfaces via the form integration framework to the client device based at least in part on form feature data provided via the form tool. The set of user interfaces is adapted to configure the form to generate a configured form. | 2009-07-16 |
20090183064 | Data Entry Apparatus And Method - Apparatus such as a PDA with screen can be used to enter data in cooperation with a physical form. The method may include identifying a part of a form on which the apparatus is placed as part of a form stored in the apparatus and displaying a corresponding image. Data may be entered, for example using a touch screen, and both displayed on the screen in the corresponding form and stored in a corresponding data record. | 2009-07-16 |
20090183065 | BROWSER PROGRAM FOR PERFORMING TABLE-LAYOUT - There is provided a method of laying out contents targeted for a first device having a first screen size on a screen of a second device having a second screen size smaller than the first screen size. The method includes analyzing a table width of the table in accordance with a predetermined criterion; and performing in response to a result of the analyzing step one of layout operations of: (p1) laying out the table using a typical technique in accordance with the second screen size, and (p2) laying out a row of cells in the table so that at least two cells arranged adjacently in a horizontal direction in the row of the table are aligned horizontally on the screen of the second device based on a predetermined algorithm. | 2009-07-16 |
20090183066 | AUTOMATICALLY GENERATING DYNAMIC DOCUMENTATION FROM PRODUCT CONFIGURATION - A method and apparatus for automatically generating dynamic documentation from a product's configuration related data in a product configuration. A transformation engine incorporates a dynamic documentation mechanism that uses the product configuration file and other information to automatically generate dynamic documentation. In order to automate the creation of dynamic documentation, a new type of annotation element called a “tutorial annotation” is inserted into the product configuration file. The dynamic documentation mechanism provides dynamic documentation such as walk-through tutorials, configuration help, and animations based on the product configuration file and information stored in the tutorial annotations. The dynamic documentation mechanism ascertains a dynamic flow by reading the tutorial annotations and stepping through all of the relationships or dependencies of the product configuration file associated with the software product. The transformation engine then presents the dynamic documentation information in a tutorial fashion (e.g. step by step tutorial using animation). | 2009-07-16 |
20090183067 | PROCESSING METHOD AND DEVICE FOR THE CODING OF A DOCUMENT OF HIERARCHIZED DATA - The present invention concerns a document coding method and device and more particularly a method of processing a document ( | 2009-07-16 |
20090183068 | ADAPTIVE COLUMN RENDERING - A system and method for rendering web page column widths in an adaptive manner for display on an electronic device. The system and method can display individual columns of a web page in a zoom-in view and can display web pages with multiple columns in a zoom-out view. Columns are adaptively rendered such that text in the columns is readable after zooming-in on the column. The system and method avoids the need for side-to-side scrolling of a column displayed in a zoom-in view and minimizes column narrowing. | 2009-07-16 |
20090183069 | Font/Script Association - Font/script association techniques are described. In an implementation, a client includes one or more modules to determine which of a plurality of scripts are to be used to display characters and one or more fonts are located that correspond to the determined script. Representations are output of the located one or more fonts in a user interface that are selectable to cause the characters to be displayed using a selected one of the fonts. | 2009-07-16 |
20090183070 | MULTIMODAL COMMUNICATION AND COMMAND CONTROL SYSTEMS AND RELATED METHODS - Systems and methods are provided that enable multimodal communication command and control of various systems, such as the Internet, cable or satellite television, and other systems, with utilization of a device configured to accept user command and control inputs and an interface to the system or systems being controlled. | 2009-07-16 |
20090183071 | PERSPECTIVE BASED TAGGING AND VISUALIZATION OF AVATARS IN A VIRTUAL WORLD - A method for perspective based tagging and visualization of avatars in a virtual world may include determining if another avatar has moved within a predetermined proximity range of a user's avatar in a virtual world. The method may also include allowing the user to tag the other avatar with information in response to the other avatar being within the predetermined proximity range of the user's avatar. | 2009-07-16 |
20090183072 | EMBEDDED USER ASSISTANCE FOR SOFTWARE APPLICATIONS - A system for providing user assistance receives a request for user assistance from a component on a user interface. The component includes a help identifier, and the request is generated by a type of user selection, such as the clicking of an icon. The system determines a level of user assistance based on the type of selection and retrieves user assistance content based on the help identifier and the determined level of user assistance. In one embodiment, the user interface includes three levels of user assistance. | 2009-07-16 |
20090183083 | METHOD AND SYSTEM FOR DISPLAYING INFORMATION ON A MAP - A method and system for providing a map of geographical data, comprising: connecting a client to a server utilizing a Web browser; accepting a request from the client of a geographical viewing area of a desired basemap; searching a server directory for a list of tiles corresponding to the geographical viewing area of the desired basemap; returning to the client the list of tiles enabling the client to determine if any of the tiles are in a local cache; generating any tiles in the local cache from the local cache; and generating any tiles not in the local cache from the server; wherein the tiles generate a map of at least two dimensions; and wherein all communication between the server and the client is done utilizing STML. | 2009-07-16 |
20090183084 | SYSTEM AND METHOD FOR ASSIGNING COMPUTER USERS TO TEST GROUPS - A system and method to efficiently and randomly place users into a test group associated with a test running on a website being hosted on a server is disclosed. When a user first accesses the website, a random value is transmitted to the user in such a manner that the random value is stored in a computer-readable memory local to the user. Each subsequent time the user accesses the website, the random value is returned to the server from the user. The server may then place the user into a test group for a test to which the user will be exposed on the website based upon the result of an operation that includes the random value received from the user and a unique test value previously associated with the test. | 2009-07-16 |
20090183085 | METHOD AND SYSTEM FOR OPTIMIZING BANDWIDTH USAGE IN REMOTE VISUALIZATION - A method and system for optimizing bandwidth usage in remote visualization are provided. The method may comprise determining a region of interest and a region of non-interest of the image; sending data relating to the region of interest via a reliable priority data stream; and sending data relating to the region of non-interest via a less reliable non-priority data stream. The priority data stream may be a high quality and/or high speed data stream, while the non-priority data stream may be a lower quality and/or lower speed data stream. The region of interest and the region of non-interest may be determined in various ways, including via automatic selection (e.g., through the use of image-based algorithms), via an application programming interface of one of a plurality of graphics applications that generate the image, or via manual selection by a user. | 2009-07-16 |
20090183086 | Componentized Remote User Interface - Systems and methods for providing a componentized remote user interface are disclosed. Such user interfaces are particularly suitable for use in remote configuration of a device, such as a headless device, that is in network communication with a computer. The user interface may be a web page rendered from an HTML file that defines the web page and a separate file that includes script for associating a value with a variable parameter. The HTML file may include a reference to the variable parameter and incorporate the other file therein by reference. When the web page is rendered, the device parses the HTML file to identify the file incorporated therein by reference and substitutes the parameter value provided in the file for the variable included in the HTML file. Thus, the rendered web page may include the actual value of the parameter, and the HTML file need not have the actual value hard-coded therein. | 2009-07-16 |
20090183087 | Method and Apparatus for Real Time Image Transfer Between Two or More Computers - This invention involves a method and computer memory apparatus for transmitting a portion of one computer screen to another remote computer screen in real time. The user of a transmitting computer might initiate a computer program that allows the user of the transmitting computer to select a portion of the screen to transmit to a user of a receiving computer. The user of the receiving computer then receives a window on the receiving computer's screen, wherein a possibly resized copy of the image on the transmitting computer's screen is displayed. The image might be displayed in real time, and the users of both or one of the transmitting and the receiving computers might be able to modify the content of the image. | 2009-07-16 |
20090183088 | Apparatus and Method for Transferring Files from One Machine to Another Using Adjacent Desktop Displays in a Virtual Network - An apparatus and method for transferring files between a plurality of computers in a virtual network is disclosed. The present invention allows the selective transference of files between designated computers in a virtual network. The computers contain a VNRS program that allows a computer to display another computer's desktop next to its own. Although the two computers are not physically connected, the present invention allows files to be transferred from the first computer to the second computer and vice versa by merely dragging and dropping icons from one desktop to another. | 2009-07-16 |
20090183089 | SYSTEM AND METHOD FOR ENABLING USERS TO INTERACT IN A VIRTUAL SPACE - The present invention provides a highly scalable architecture for a three-dimensional graphical, multi-user, interactive virtual world system. In a preferred embodiment a plurality of users interact in the three-dimensional, computer-generated graphical space where each user executes a client process to view a virtual world from the perspective of that user. The virtual world shows avatars representing the other users who are neighbors of the user viewing the virtual word. In order that the view can be updated to reflect the motion of the remote user's avatars, motion information is transmitted to a central server process which provides positions updates to client processes for neighbors of the user at that client process. The client process also uses an environment database to determine which background objects to render as well as to limit the movement of the user's avatar. | 2009-07-16 |
20090183090 | TECHNIQUE FOR SUPPORTING USER DATA INPUT - Methods for supporting user data input are presented including receiving a page for display on a display unit, wherein the page includes a number of input fields; receiving a number of input support functions, where each of the number of input support functions is associated with each of the number of input fields; generating an alternative field for receiving the user data input; detecting an input field in accordance with a user selection; setting one of the input support functions associated with the input field to the alternative field; entering user data input into the alternative field; and copying the user data input entered into the alternative field to the input fields. In some embodiments, methods further include generating a tab index, where the tab index is configured to move the alternative field to a next input field in response to a tab key stroke. | 2009-07-16 |
20090183091 | METHOD AND SYSTEM FOR ARCHIVING AND RETRIEVING ITEMS BASED ON EPISODIC MEMORY OF GROUPS OF PEOPLE - A method and system are provided for archiving and retrieving digital media items based on episodic memory for predefined associated groups of one or more people. The method and system may comprise identifying one or more groups to which an archiving user belongs; receiving a user input identifying select groups to which a digital media item to be archived; receiving archiving input data identifying the digital media item to be archived for the group; generating index information using the received user archiving input; storing the index information in association with the identified digital media item; repeating the reception of archiving input data, the generation of the index information and the storing of the index information for the digital media item; receiving retrieval input data representing a selection of candidate values; and using the selections and the identified group to retrieve and output digital media items that match the selection. | 2009-07-16 |
20090183092 | CUSTOMIZABLE APPLICATION SYSTEM - A system comprises a data specifying builder to define a data model with specification stored in a repository usable for a customizable application, a process designing builder to define user interfaces and processes of the customizable application which include specified functions to access and manipulate data created by the data specifying builder, and an application deploying executor to generate application components using the data model designed by the process builder. | 2009-07-16 |
20090183103 | INTERACTIVE TICKER - Ticker functionality provides filtering and displaying information relevant to a user. The ticker can be employed to parse information from a broadcast stream and insert the information into a ticker display area. The information presented in the display area can be animated in order to maximize and control the amount of information available to the user. The information offered in the ticker is interactive so that it allows the user to customize this abbreviated data and how the data is presented. | 2009-07-16 |
20090183104 | Multi-mode viewer control for viewing and managing groups of statistics - Methods, systems, and techniques for presenting performance indicators using numeric data and interpretive information are provided. Example embodiments provide a stat-pac viewer control that allows a user to toggle seamlessly between a numeric view of performance data and an interpreted view, the interpreted view presenting value judgments associated with the data. In one embodiment, the interpreted view is based at least in part upon one or more rules for interpreting the numeric data as belonging to one or more zones, each zone corresponding to a ring of an archery target representation. This abstract is provided to comply with rules requiring an abstract, and it is submitted with the intention that it will not be used to interpret or limit the scope or meaning of the claims. | 2009-07-16 |
20090183105 | USER INTERFACE IMPROVEMENTS FOR MEDICAL DEVICES - A method and system is disclosed for operating a medical device with or without a cassette in place. A method is disclosed for adding additional VTBI to an ongoing infusion without stopping the infusion and with maintaining the infusion parameters. A method and system is disclosed for changing the CCA without having to interrupt or completely stop an ongoing infusion. Quick titration buttons are provided to allow improved navigation between various delivery display screens. | 2009-07-16 |
20090183106 | Multi-mode viewer control for viewing a series of statistical values - Methods, systems, and techniques for presenting a series of values of statistical data using numeric data and interpretive information are provided. Example embodiments provide a stat viewer control that allows a user to toggle seamlessly between a numeric view of the data and an interpreted view, the interpreted view presenting value judgments associated with the data. In one embodiment, the interpreted view is based at least in part upon one or more rules for interpreting the numeric data as belonging to one or more zones, each zone corresponding to a background emanating from a ring of an archery target representation. This abstract is provided to comply with rules requiring an abstract, and it is submitted with the intention that it will not be used to interpret or limit the scope or meaning of the claims. | 2009-07-16 |
20090183107 | WINDOW MINIMIZATION TRIGGER - A method and computer-storage media for minimizing application windows based on a triggering event are provided. Embodiments of the present invention include determining that a triggering event has occurred with respect to a target window, automatically minimizing all of the minimizable application windows except the target application window, and generating an undo record that may be used to restore the minimized windows upon the determination that a second triggering event has occurred with respect to the target window. In one embodiment, the triggering event is shaking the target application window. | 2009-07-16 |
20090183108 | METHODS AND SYSTEMS FOR MANAGING DATA - Systems and methods for managing data, such as metadata. In one exemplary method, metadata from files created by several different software applications are captured, and the captured metadata is searched. The type of information in metadata for one type of file differs from the type of information in metadata for another type of file. Other methods are described and data processing systems and machine readable media are also described. | 2009-07-16 |
20090183109 | DEVICE DRIVER AND A METHOD OF CUSTOMIZING LAYOUT OF A USER INTERFACE - A device driver or method that operate a periphery device. A display mode storage unit stores setting items, which are operable by a user using a user interface interfacing the device driver, into functionally mutually-related groups, as plates, the plates indicating display modes of the user interface for each group of the setting items. An alignment sequence setting unit sets an alignment sequence for the plates by allowing the user to set the alignment sequence. An arrangement unit arranges the plates in a plate display area on the user interface depending on the alignment sequence set by the alignment sequence setting. Each of the plates has a width that equals either a whole length or a half length of a width of the plate display area, and the arrangement unit arranges the plates in the plate display area depending on the alignment sequence set by the alignment sequence setting unit. | 2009-07-16 |
20090183110 | Systems and Methods for Efficient Processing of Data Displayed by a Window - A method for efficient processing of data displayed by a window includes identifying a window displayed to a user of a computing device. The method includes executing a window handler filter routine, responsive to the identification, and obtaining, by the window handler filter routine, window identification information associated with the displayed window. The method includes preventing, by the window handler filter routine, operation, by a window handler routine, on application output data displayed in the window when the window identification information associated with the window represents a type of window listed within a list of types of windows. | 2009-07-16 |
20090183111 | METHOD AND SYSTEM FOR RE-INVOKING DISPLAYS | 2009-07-16 |
20090183112 | SYSTEM AND METHOD FOR WORD-OF-MOUTH ADVERTISING - A system and method to facilitate word-of-mouth advertising and sales support associated with displayed media objects on distributed networks is described. The system provides one or more advocates to a network user accessing advertising of a brand, product, or service. One or more of the advocates may be socially related to the user. User interactions with the advocates are facilitated through a real-time communication network, follow-on commercial activity is tracked, and the value of word-of-mouth advocacy is captured and distributed. | 2009-07-16 |
20090183133 | TOOL AND METHOD TO GRAPHICALLY CORRELATE PROCESS AND TEST DATA WITH SPECIFIC CHIPS ON A WAFER - A tool and method is provided to graphically correlate process and test data with specific chips on a multi-project wafer. The tool and method is configured and implemented to select certain sites and export these sites to an industry standard map that can be used in a variety of chip picking or test tools. In one embodiment, the method includes importing a wafer floor plan with chips of different design parameters and importing manufacturing logistical information of the chips. The method further includes graphically rendering each chip on the wafer to scale within a unit cell using the imported wafer floor plan and the manufacturing logistical information. | 2009-07-16 |
20090183134 | DESIGN STRUCTURE FOR IDENTIFYING AND IMPLEMENTING FLEXIBLE LOGIC BLOCK LOGIC FOR EASY ENGINEERING CHANGES - A design structure for identifying engineering changeable logic, and replacing the identified engineering changeable logic with flexible logic blocks (FLB). The design structure is embodied in a machine readable medium for designing, manufacturing, or testing an integrated circuit. | 2009-07-16 |
20090183135 | Method and Device for Identifying and Implementing Flexible Logic Block Logic for Easy Engineering Changes - A chip design methodology. The methodology includes identifying engineering changeable logic, and replacing the identified engineering changeable logic with flexible logic blocks (FLB). | 2009-07-16 |
20090183136 | Structure for a Programmable Interpolative Voltage Controlled Oscillator with Adjustable Range - A design structure for a programmable interpolative voltage controlled oscillator (VCO) with adjustable frequency range output is provided. Programmable delay cells whose size is modifiable based on control inputs to the programmable delay cells are utilized. A different set of control inputs may be provided to programmable delay cells of an inner sub-ring from the set of control inputs provided to programmable delay cells of a main ring of the VCO. The minimum frequency output of the VCO is governed by the main ring programmable delay cell strength with the maximum frequency output of the VCO being governed by a ratio of strengths of the main ring programmable delay cells to the inner sub-ring programmable delay cell. By modifying the control inputs to the inner sub-ring and main ring programmable delay cells, the minimum and maximum frequency outputs, and thus the range between these two frequency outputs, are made programmable. | 2009-07-16 |
20090183137 | Method and framework for securing a source code base - A framework for securing a source code base during the development phase of a software development lifecycle is provided. The framework includes an aspect package module and a validator package module. The aspect package module integrates security routines into the source code base. The aspect package module includes a custom interface module and a validator aspect module. The custom interface module includes a function declaration, wherein the custom interface module is implemented by at least one class of the one or more classes. The validator aspect module includes a controller code for controlling the flow of the execution, based on the context for the security validation of the at least one class, wherein one or more security routine integration points are defined in the at least one class. The validator package module validates the at least one class, based on the defined context, by using one or more validation classes. | 2009-07-16 |
20090183138 | SYSTEM AND METHOD FOR MOBILE SOFTWARE APPLICATION DEVELOPMENT AND DEPLOYMENT - A technique is introduced for developing and deploying an application in a mobile domain. In operation, a mobile data model may be accessed, and a portion of the mobile data model may selected to be instantiated at a distributed device in order to create a mobile data store at the distributed device. The mobile data store may contain enterprise information. A mobile software application and at least a portion of the mobile data model may be made available to a consumer, and, in some embodiments, the application and the portion of the data model may be deployed to a consumer. In some embodiments, the consumer may be a hand-held computing device. | 2009-07-16 |
20090183139 | ENUMERATION CLASSES - In an embodiment, a technique for acquiring a class definition of a class, the class associated with an enumeration, the enumeration enumerating a partial list of instances of the class; generating a data structure based on the class definition, the data structure associating one or more identifiers with an instance enumerated in the enumeration; and storing the data structure in a computer storage | 2009-07-16 |
20090183140 | Automatic generation of application domain specific graphical programs - System and method for generating an application domain specific graphical program. A graphical user interface (GUI) for specifying functionality of a graphical program in an application domain is displayed, where the GUI corresponds specifically to the application domain. User input to the GUI specifying the functionality of the graphical program is received, and the graphical program generated in response, where the graphical program is executable to perform the specified functionality, and comprises multiple interconnected graphical program nodes that visually represent the graphical program functionality. The GUI includes graphical interface elements operable to indicate and/or specify, e.g., via user input, respective attributes of the graphical program such as timing, triggering, analog and/or digital input/output (I/O), resource allocation, processing option, inclusion of one or more external files, and one or more target devices, among others, and may determine the graphical interface elements based on the specified one or more target devices. | 2009-07-16 |