40th week of 2016 patent applcation highlights part 54 |
Patent application number | Title | Published |
20160292022 | CONSULTATION AMONG FEEDBACK INSTANCES - Concepts and technologies disclosed herein are directed to consultation among feedback instances. According to one aspect, a system can receive a feedback instance consultation request for a consultation among an original feedback instance and a target feedback instance. The target feedback instance can be consulted with by the original feedback instance to enable the original feedback instance to cure a deficiency. The system can examine the feedback instance consultation request to determine if a match exists with an application programming interface associated with a target feedback instance model upon which the target feedback instance is based. If examination of the feedback instance consultation request determines that a match exists, the system can update the target feedback instance model with an intercommunication plan by which the consultation can occur. The system also can update an original feedback instance model upon which the original feedback instance is based. | 2016-10-06 |
20160292023 | TOUCH APPLICATION PROGRAMMING INTERFACES - Systems, methods, apparatuses, and software for touch input systems in computing environments are provided herein. In one example, an interaction service positioned logically between an operating system and an application is provided. The interaction service directs a processing system to receive a call from the application referencing an interaction class to attach to a layer in a user interface used for the application, attach the interaction class to the layer in the user interface, listen to the operating system for user input occurring with respect to the layer, and determine per the interaction class what actions to perform in response to the user input. | 2016-10-06 |
20160292024 | CLASSIFICATION AND MODELLING OF EXCEPTION TYPES FOR INTEGRATION MIDDLEWARE SYSTEMS - The present disclosure describes methods, systems, and computer program products for modeling exception flows in an integration system. One computer-implemented method includes identifying, by operation of an application integration system, an exception corresponding to an integration operation of an integration process, determining, by operation of the application integration system, a type of the exception, determining, by operation of the application integration system, one or more exception handling patterns for the type of the exception, and configuring, by operation of the application integration system, an exception flow of the integration process based on the one or more exception handling patterns. | 2016-10-06 |
20160292025 | METHODS TO IDENTIFY, HANDLE AND RECOVER FROM SUSPECT SSDS IN A CLUSTERED FLASH ARRAY - A technique predicts failure of one or more storage devices of a storage array serviced by a storage system and for establishes one or more threshold conditions for replacing the storage devices. The predictive technique periodically monitors soft and hard failures of the storage devices (e.g., from Self-Monitoring, Analysis and Reporting Technology), as well as various usage counters pertaining to input/output (I/O) workloads and response times of the storage devices. A heuristic procedure may be performed that combines the monitored results to calculate the predicted failure and recommend replacement of the storage devices, using one or more thresholds based on current usage and failure patterns of the storage devices. In addition, one or more policies may be provided for replacing the storage devices in a cost-effective manner that ensures non-disruptive operation and/or replacement of the SSDs, while obviating a potential catastrophic scenario based on the usage and failure patterns of the storage devices. | 2016-10-06 |
20160292026 | PRESENTING DIAGNOSTIC HEADLINES USING SIMPLE LINGUISTIC TERMS - A method for a diagnostic headline system using simple linguistic terms is described. The method comprises receiving historical and current performance data for a component of a system. An anomaly is determined in the current performance data by comparing the current performance data and the historical performance data for the component. The anomaly is determined whether or not it indicates an error in the system. The cause of the anomaly is determined. Steps for addressing the cause of the anomaly are recommended. A display is formatted of the current performance data, the error, and the recommended steps for addressing the cause of the anomaly. | 2016-10-06 |
20160292027 | SYSTEMS AND METHODS FOR MANAGING TASK WATCHDOG STATUS REGISTER ENTRIES - The present disclosure provides system and method embodiments for a status register comprising a plurality of bits, where each of the plurality of bits of the status register is associated with one of a plurality of entities. A trigger mechanism is configured to write a trigger data pattern to the status register, where the trigger data pattern comprises a first state value for each of the plurality of bits of the status register. A capture mechanism is configured to write a second state value to each bit of the status register that is associated with an entity that is presently associated with a first type of entity status information, in response to a detection that the trigger data pattern is written to the status register. | 2016-10-06 |
20160292028 | PREVENTING AND SERVICING SYSTEM ERRORS WITH EVENT PATTERN CORRELATION - A method includes receiving historical monitoring data for components of a system, the historical monitoring data comprising a plurality of events, each triggered by an associated component, and a plurality of alarms, each triggered by detection of a particular type of condition in the components. The method also includes determining common event sequences in the plurality of events, each event sequence culminating in one of the plurality of alarms. The method further includes correlating the common event sequences into an event pattern. The method also includes receiving a plurality of real-time events triggered by the components. The method additionally includes detecting the event pattern in the plurality of real-time events to predict a potential future instance of the particular type of condition in the components of the system. | 2016-10-06 |
20160292029 | APPARATUS, SYSTEM AND METHOD FOR DATA COLLECTION, IMPORT AND MODELING - A computer program product for data analysis of a backup system, including interrogating a plurality of computer systems to generate for each computer system at least one dump file, each dump file including configuration and state information; extracting predetermined configuration and state information from the respective dump files; and storing the extracted configuration and state information in a database in a normalized format. | 2016-10-06 |
20160292030 | SECURING CRASH DUMP FILES - In a computer storage system, crash dump files are secured without power fencing in a cluster of a plurality of nodes connected to a storage system. Upon an occurrence of a panic of a crashing node and prior to receiving a panic message of the crashing node by a surviving node loading, in the cluster, a capturing node to become active, prior to a totem token being declared lost by the surviving node, for capturing the crash dump files of the crashing node. | 2016-10-06 |
20160292031 | MEMORY DEVICE AND ERASING METHOD THEREOF - An erasing method of a memory device is provided. The memory device includes a memory controller and a memory array having a first memory region and a second memory region. The first memory region and the second memory region share the same well. The erasing method comprising steps of: erasing the first memory region; and selectively programming the second memory region according to an error correction code algorithm. | 2016-10-06 |
20160292032 | DETECTING A READ ACCESS TO UNALLOCATED OR UNINITIALIZED MEMORY - Embodiments relates to a data processing device ( | 2016-10-06 |
20160292033 | ERROR PROTECTION OF DATA STORED USING VARIABLE-LENGTH HEADERS - In one embodiment, a system includes a controller and logic integrated with and/or executable by the controller. The logic is configured to cause data to be written to a first write section of a magnetic medium as a plurality of first codeword sets, and cause at least some of the data to be written to a rewrite section of the magnetic medium as one or more rewritten codeword sets. A length of at least one rewritten row stored to the rewrite section of the magnetic medium is greater than either a length of another rewritten row in the same rewritten codeword set and/or a length of at least one row in a codeword set stored to the first write section of the magnetic medium. | 2016-10-06 |
20160292034 | ERROR PROTECTION OF DATA STORED USING VARIABLE-LENGTH HEADERS - In one embodiment, a system includes a controller and logic integrated with and/or executable by the controller. The logic is configured to read data stored as a plurality of first codeword sets on a first write section of a magnetic medium. The logic is also configured to read at least some of the data stored as one or more rewritten codeword sets on a rewrite section of the magnetic medium. A length of at least one rewritten row stored to the rewrite section of the magnetic medium is greater than: a length of another rewritten row in the same rewritten codeword set, and/or a length of at least one row in a codeword set stored to the first write section of the magnetic medium. | 2016-10-06 |
20160292035 | INDICATING REBUILD STATE OF STORAGE DEVICES - Example implementations relate to obtaining information about and indicating a state of a storage device. In example implementations, an indication that a storage device is rebuilding address mappings may be received, and how much progress has been made in the rebuilding may be determined. A representation of the progress made in the rebuilding may be displayed. | 2016-10-06 |
20160292036 | Raid 10 Reads Optimized for Solid State Drives - A mechanism is provided in a data processing system. The mechanism determines a maximum queue depth of a queue for each solid state drive in a plurality of solid state drives. A given data block is mirrored between a group of solid state drives within the plurality of solid state drives. The mechanism tracks outstanding input/output operations in a queue for each of the plurality of solid state drives. For a given read operation to read the given data block, the mechanism identifies a solid state drive within the group of solid state drives based on a number of empty slots in the queue of each solid state drive within the group of solid state drives. | 2016-10-06 |
20160292037 | DATA RECOVERY FOR A COMPUTE NODE IN A HETEROGENEOUS DATABASE SYSTEM - Data recovery for a compute node in a heterogeneous database system is provided. A failure is detected of a particular compute node of a compute cluster comprising a plurality of compute nodes. The compute cluster is configured to store, in memory, data stored by a RDBMS. Particular data of the data stored by the RDBMS is identified that is assigned to the particular compute node. The particular compute node is restored. After restoring the particular compute node, the particular data assigned to the particular compute node is reloaded without taking the particular data offline. During reloading, the particular compute node receives pending modified data comprising data of the particular data that was modified during said reloading. | 2016-10-06 |
20160292038 | MANAGEABILITY REDUNDANCY FOR MICRO SERVER AND CLUSTERED SYSTEM-ON-A-CHIP DEPLOYMENTS - Technologies for providing manageability redundancy for micro server and clustered System-on-a-Chip (SoC) deployments are presented. A configurable multi-processor apparatus may include multiple integrated circuit (IC) blocks where each IC block includes a task block to perform one or more assignable task functions and a management block to perform management functions with respect to the corresponding IC block. Each task block and each management block may include one or more instruction processors and corresponding memory. Each IC block may be controllable to perform a function of one or more other IC blocks. The IC blocks may communicate with each other via a management communication infrastructure that may include a communication path from each of the management blocks to each of the other management blocks. Via the management communication infrastructure, the management blocks may bridge communication paths between pairs of management blocks. | 2016-10-06 |
20160292039 | SYSTEM RESET - Some embodiments of the invention provide techniques whereby a user may perform a system reset (e.g., to address system performance and/or reliability degradation, such as which may be caused by unused applications that unnecessarily consume system resources, an attempted un-install of an application that left remnants of the application behind, and/or other causes). In some embodiments, performing a system reset replaces a first instance of an operating system on the system with a new instance of the operating system, and removes any applications installed on the system, without disturbing the user's data. | 2016-10-06 |
20160292040 | STORAGE MANAGEMENT OF DATA USING AN OPEN-ARCHIVE ARCHITECTURE, INCLUDING STREAMLINED ACCESS TO PRIMARY DATA ORIGINALLY STORED ON NETWORK-ATTACHED STORAGE AND ARCHIVED TO SECONDARY STORAGE - An illustrative “open archive” architecture relieves the immediate need to add network-attached storage (NAS) devices to a storage management system. The open archive architecture provides streamlined access to live production data, which originally was stored on a NAS device but which is archived to secondary storage to free up NAS space. An open-archive server coordinates with an open-archive layer that operates on the NAS device. The open-archive server identifies data sets on the NAS that meet archiving criteria, which are then automatically moved to an open archive in secondary storage. The open archive layer intercepts data-access calls coming into the NAS device, e.g., open calls, read calls, write calls. The intercepted calls are reported to the open-archive server for analysis. If the open-archive server determines that the data referenced in an intercepted call is stored in the open archive, the open-archive server initiates a restore job that recovers the data from secondary storage and stores it back on the NAS device. The intercepted call may now be served from the NAS. These operations occur automatically and do not involve users or their computing devices, and the computing devices operate without data agents for the NAS-based data. | 2016-10-06 |
20160292041 | CLONE FILE BACKUP AND RESTORE - In an approach to backup and restore one or more clone file trees, one or more processors generate a clone management table. One or more processors record a clone management information in the clone management table about each clone file. To backup a clone file, one or more processors update the clone management information, and store one or more data blocks that are in the clone file trees. To restore a clone file, one or more processors analyze a clone management information and restore one or more data blocks in the clone file. To restore a clone file parent, one or more processors analyze a clone management information and restore one or more data blocks in the clone file parent. To restore a clone file tree, one or more processors analyze a clone management information and restore one or more data blocks in the clone file tree. | 2016-10-06 |
20160292042 | Method and Apparatus of Automatically Backing up Application Data and Performing Restoration as Required - A method and apparatus for automatically backing up application data and performing restoration as required are disclosed in the embodiments of the present document, which relates to application data backup and restoration technology of a terminal system. The method includes: an application layer setting an application data directory of an application into a system constant according to a backup instruction; a bottom layer acquiring a directory permission of the application data directory through the application data directory in the system constant; the bottom layer setting a permission of the application data directory to read-write; and the application layer backing up the application data under the application data directory of which the permission has been set to read-write, to perform restoration as required by using a backed-up application data hereafter. | 2016-10-06 |
20160292043 | EFFICIENT BACKUP, SEARCH AND RESTORE - A backup, search, and restore service is provided. The service can be achieved through a backup system, and a search and restore server. A user can be enabled to initiate a search request for one or more data items. A search can be performed by the search and restore server using metadata for the data items backed up by the backup system to return the one or more data items. The metadata for the data items can be generated by the backup system when data items are backed up by the backup system. The backup system may back up the data items on an incremental basis. The user can be enabled to select a data item in the one or more data items for restoration on the data system. Header information of the selected data item can be obtained from the data system to determine whether the restoration is necessary. | 2016-10-06 |
20160292044 | METHODS AND APPARATUS FOR PROVIDING HYPERVISOR LEVEL DATA SERVICES FOR SERVER VIRTUALIZATION - A data center for data backup and replication, including a pool of multiple storage units for storing a journal of I/O write commands issued at respective times, wherein the journal spans a history window of a pre-specified time length, and a journal manager for dynamically allocating more storage units for storing the journal as the journal size increases, and for dynamically releasing storage units as the journal size decreases. | 2016-10-06 |
20160292045 | DISASTER RECOVERY AS A SERVICE - Providing disaster recovery of a distribute file system metadata server as a service is disclosed. In various embodiments, an indication is received to provide alternative access to a file system metadata server. A copy of a self-describing backup of the file system metadata server is obtained, e.g., from cloud-based storage. The backup is used to provide access to a read only instance of the file system metadata server. | 2016-10-06 |
20160292046 | METHOD AND SYSTEM FOR COHERENT AGGREGATION AND SYNCHRONIZATION OF GATHERED DATA FROM SPREAD DEVICES - In a method for gathering time-variable data from electronic slave devices in data communication through a data transmission channel with an electronic master device, the slave devices periodically measure and store a current value of at least one respective time-variable parameter (P | 2016-10-06 |
20160292047 | CLONE FILE BACKUP AND RESTORE - In an approach to backup and restore one or more clone file trees, one or more processors generate a clone management table. One or more processors record a clone management information in the clone management table about each clone file. To backup a clone file, one or more processors update the clone management information, and store one or more data blocks that are in the clone file trees. To restore a clone file, one or more processors analyze a clone management information and restore one or more data blocks in the clone file. To restore a clone file parent, one or more processors analyze a clone management information and restore one or more data blocks in the clone file parent. To restore a clone file tree, one or more processors analyze a clone management information and restore one or more data blocks in the clone file tree. | 2016-10-06 |
20160292048 | DATA DEDUPLICATION USING CHUNK FILES - Systems and methods are disclosed for performing file backup and restore in a computing system. Certain embodiments provide a communication interface for communicating with a non-volatile memory and a controller configured to determine that a file stored in the non-volatile memory has been modified, identify a chunk of the file that has been modified, determine a new chunk associated with the modified chunk, the new chunk reflecting the modification, generate a separate chunk file including the new chunk and a filename, and storing the chunk file in the non-volatile memory using the communication interface. | 2016-10-06 |
20160292049 | DATA RECOVERY FOR A RELATIONAL DATABASE MANAGEMENT SYSTEM INSTANCE IN A HETEROGENEOUS DATABASE SYSTEM - A method and apparatus for data recovery for a RDBMS instance in a heterogeneous database system is provided. A failure of a first RDBMS instance is detected in a plurality of RDBMS instances of a shared-disk database system. A compute cluster is configured to store, in memory, one or more tables stored by the shared-disk database system. The first RDBMS instance is configured to modify the one or more tables stored by the shared-disk database system and transfer modified data to the compute cluster to update the one or more tables at the compute cluster. After detecting the failure of the first RDBMS instance, redo records generated by the first RDBMS instance are scanned, pending modified data that was not transferred to the compute cluster before the failure is identified, and the pending modified data is transferred to the compute cluster. | 2016-10-06 |
20160292050 | ELASTIC VIRTUAL MULTIPATH RESOURCE ACCESS USING SEQUESTERED PARTITIONS - Technologies for virtual multipath access include a computing device configured to sequester a recovery partition from a host partition while allowing the recovery partition to access one or more resources of the host partition such as host memory or data storage. A remote computing device determines whether the host partition is responsive. The recovery partition receives a request for host state data of the host partition from the remote computing device in response to a determination that the host partition is not responsive. The recovery partition retrieves the requested host state data using a host state index maintained by the host partition and transmits the requested host state data to the remote computing device. The host state index may identify the location of the requested host state data. The remote computing device may perform a recovery operation based on the received host state data. Other embodiments are described and claimed. | 2016-10-06 |
20160292051 | COMMUNICATION APPARATUS AND WIRELESS COMMUNICATION SYSTEM - A communication apparatus of an embodiment of the present invention includes a storage temporarily storing data received via a wireless network from another communication apparatus that sends the data regarding feedback control at a fixed time interval and an arranger configured to read out and output at the fixed time interval the data stored in the storage and to arrange the data with the fixed time interval. | 2016-10-06 |
20160292052 | RECOVERY OF A TRANSACTION AFTER XA END - Embodiments of the present invention disclose a method for recovery of a two-phase commit transaction. A computer receives an end command prior to completing execution of a prepare command for a transaction identifier. The computer determines if a failure and restart occurred within a distributed data processing environment after a resource manager receives an end command. The computer responds to a determination that the failure and restart did occur within the distributed data processing environment by retrieving the first transaction identifier from a data store. The computer transmits a rollback command for the retrieved first transaction identifier to the resource manager. | 2016-10-06 |
20160292053 | FAULT TOLERANCE FOR HYBRID CLOUD DEPLOYMENTS - A technique for providing fault tolerance for virtual machines in a hybrid cloud computing system is discussed. When a primary virtual machine (VM) in a private data center is configured for fault tolerance, a secondary VM is instantiated in a public cloud computing system. Changes to the execution state of the primary VM are recorded and relayed to the secondary VM by way of caching modules, which provide acknowledgements messages back to the primary VM. A technique for failback from the public cloud computing system to the private data center is also discussed. | 2016-10-06 |
20160292054 | Failover Method, Apparatus and System - A failover method, apparatus and system to implement fast failover between a primary processor and a secondary processor, where the method includes receiving, by a second device, a transaction processing packet, where the transaction processing packet includes processing information about access of a host to a peripheral component interconnect express (PCIe) device, the processing information is used to describe information required for resuming a transaction when the transaction is interrupted, the second device further stores topology information of the PCIe device, and a driver for the PCIe device is loaded to the second device, and when detecting that the first device fails, continuing to process, by the second device according to the topology information, the driver, and the processing information, the transaction that is about the access of the host to the PCIe device and is being processed when a first device fails. | 2016-10-06 |
20160292055 | FAILURE RECOVERY IN AN ASYNCHRONOUS REMOTE MIRRORING PROCESS - A method for generating a remote replicate of a logical entity, the method may include: calculating, by a local site, a replication cycle content that is associated with a replication cycle; wherein the replication cycle content represents differences in contents of logical entity portions between a point in time associated with the replication cycle and a point in time associated with an adjacent replication cycle that preceded the replication cycle; attempting to transmit messages that include the replication cycle content to a remote site and according to a predefined order that is responsive to addresses of the logical entity portions; monitoring a successful reception of the messages that include the replication cycle content by the remote site; wherein when finding that a first part of the replication cycle content was successfully received by the remote site and a second part of the replication cycle content was not successfully received by the remote site due to the failure then transmitting, after recovering from the failure, messages that include the second part; wherein the second part is detected using (a) at least one replication cycle identifier that identifies the replication cycle, and (b) at least one address of at least one logical entity portion. | 2016-10-06 |
20160292056 | FAILOVER IN A SAN ENVIRONMENT - A method, system, and computer program product for managing performance of an application I/O comprising determining paths from a first host to a node in a cluster that are flaky; and initiating a failover mechanism for the application I/O from the node in the cluster to a second node in the cluster ensuring seamless execution of the application I/O in the cluster. | 2016-10-06 |
20160292057 | REAL TIME TERMINAL FOR DEBUGGING EMBEDDED COMPUTING SYSTEMS - One or more circular debug buffers can allow terminal output data to be provided from the target system to a host without halting the target system or causing significant delays. One or more circular debug buffers may also allow input (such as keyboard input) to be provided from the host to the target without halting the target system or causing significant delays. Accordingly, communications between the target and host may be performed in real time or near real time. These communications may be used for debugging purposes or more generally, for any purpose, including purposes unrelated to debugging. | 2016-10-06 |
20160292058 | STREAM PUBLISHING AND DISTRIBUTION CAPACITY TESTING - Some embodiments dynamically test capacity of a streaming server under test (SUT). The dynamic testing involves a test server generating different test scenarios. Each test scenario specifies a mix of different streaming protocols, content streams, and content stream upload to download ratio. The test server tests the SUT with a gradually increasing traffic load from each test scenario while monitoring SUT performance under each load. The test server records each load from each test scenario under which the SUT becomes saturated. The test server produces a grid mapping the observed SUT saturation points to the test loads that caused them. The grid is used when the SUT is deployed to a production environment to determine if SUT saturation is imminent based on current traffic patterns being serviced by the SUT in the production environment. If so, a remedial action is dynamically performed to prevent the saturation from occurring. | 2016-10-06 |
20160292059 | Run Time ECC Error Injection Scheme for Hardware Validation - Systems and methods for a run-time error correction code (“ECC”) error injection scheme for hardware validation are disclosed. The systems and methods include configuring a read path to internally forward read data, and injecting at least one faulty bit into the forwarded read data via a read fault injection logic. The systems and methods may also include configuring a write path to internally forward write data, and injecting at least one faulty bit into the forwarded write data via a write fault injection logic. | 2016-10-06 |
20160292060 | SYSTEMS AND METHODS FOR REGULATING DEVICE USAGE - A device is provided, comprising at least one processor and at least one computer-readable storage medium having encoded thereon executable instructions that, when executed, cause the at least one processor to: monitor a user's usage of the device; in response to determining that an amount of time the user has been using the device has reached a selected limit for usage time, activate a home screen application to restrict the user's access to the device, wherein the home screen application is programmed to prompt the user to demonstrate at least one achievement; and in response to determining that the user successfully demonstrated at least one achievement, allow the user to regain access to the device. | 2016-10-06 |
20160292061 | TIME TRAVEL DEBUGGING FOR BROWSER COMPONENTS - Various technologies described herein pertain to performing time travel debugging. A computer-executable program can be executed. The computer-executable program can be executable under control of a virtual machine. The virtual machine can interact with a browser system during execution of the computer-executable program. Moreover, nondeterministic events can be logged via an interrogative virtual machine interface (VMI) during the execution of the computer-executable program. The nondeterministic events can be logged as part of event logs. Moreover, the interrogative VMI is between the virtual machine and the browser system. Further, snapshots of the virtual machine can be captured during the execution of the computer-executable program. The snapshots can be captured via the interrogative VMI. At least a portion of the execution of the computer-executable program can be replayed based at least in part on a snapshot and at least a portion of the event logs. | 2016-10-06 |
20160292062 | SYSTEM AND METHOD FOR DETECTION OF DUPLICATE BUG REPORTS - A system and method for detection of duplicate bug reports. A receiver is configured to receive a first bug report and a word matrix. An extractor extracts keywords from the first bug report for creating a first search string. A comparator compares each of the keywords from the first search string with the word matrix for identifying dissimilar duplicate words. The duplicate bug detector further includes an expander to expand the first search string by including the dissimilar duplicate words for creating the second search string and a searcher to search a bug repository with the first search string and the second search string for identifying similar duplicate bug reports and dissimilar duplicate bug reports. | 2016-10-06 |
20160292063 | DYNAMIC TRACING FRAMEWORK FOR DEBUGGING IN VIRTUALIZED ENVIRONMENTS - Embodiments of the present invention provide a system and method for a dynamic tracing framework for debugging in a virtualized environment. Embodiment of the present invention can include selecting a home node and a set of remote nodes to which apply a set of probes. Data collection is performed by a tracing agent of each node and the collection of data is shared across multiple software systems. | 2016-10-06 |
20160292064 | ITERATIVE TEST GENERATION BASED ON DATA SOURCE ANALYSIS - A method of testing a software program may include generating a test driver by assigning concrete values to input variables of a software program. The method may also include assigning symbolic source set elements to the input variables of the software program to generate a data structure based on the symbolic source set elements. The method may also include symbolically executing a current instruction of the software program based on the concrete values and symbolic source set elements assigned to the input variables of the software program and performing data source analysis on the current instruction of the software program based on symbolic execution of the current instruction. | 2016-10-06 |
20160292065 | Anomaly Analysis For Software Distribution - A population of devices provides telemetry data and receives software changes or updates. Event buckets for respective events are found. Event buckets have counts of event instances, where each event instance is an occurrence of a corresponding event reported as telemetry by a device. Records of the software changes are provided, each change record representing a software change on a corresponding device. The event buckets are analyzed to identify which indicate an anomaly. Based on the change records and the identified event buckets, correlations between the software changes and the identified event buckets are found. | 2016-10-06 |
20160292066 | Source Code Inspection and Verification - A source code module inspection method comprising generating a build list, wherein the build list comprises a list of one or more source code modules, obtaining, from a remote server, the one or more source code modules and metadata associated with the one or more source code modules, accessing at least a portion of the metadata for each of the one or more source code modules, identifying licenses associated with the one or more source code modules based on the build list, and generating a source code module summary for the one or more source code modules, wherein the source code module summary identifies the one or more source code modules, licenses associated with the one or more source code modules, and comprises the portion of the metadata for each of the one or more source code modules. | 2016-10-06 |
20160292067 | SYSTEM AND METHOD FOR KEYWORD BASED TESTING OF CUSTOM COMPONENTS - Systems and methods for testing a custom component associated with a software application. A set of custom components and a set of metadata associated with the set of components are received from a third party developer in an XML file. The metadata includes a plurality of attributes categorized into a plurality of categories. The set of custom components and the set of metadata are stored in an object repository. A custom component from the software application is selected for testing over a test grid. Metadata associated with the custom component is identified from the object repository. An attribute of each category from the metadata corresponding to the custom component is selected in order to generate an event set corresponding to the custom component wherein the event set comprises the attribute selected for testing the custom component. | 2016-10-06 |
20160292068 | CODE COVERAGE RATE DETERMINATION METHOD AND SYSTEM - Embodiments of the present application relate to a code coverage rate determination method, a code coverage rate determination system, and a computer program product for determining code coverage rate. A code coverage rate determination method is provided. The method includes retrieving source code of a program, determining theoretical number of log file output points included in the source code and location information of the log file output points, retrieving log files actually outputted during the execution of the program, determining an actual number of log file output points of the actual outputted log files based on the location information of the corresponding log file output points recorded in each log file, and determining a code coverage rate of the program based on the theoretical number of log file output points and the actual number of the log file output points of the actual outputted log files. | 2016-10-06 |
20160292069 | Utilizing semantic clusters to Predict Software defects - A method, apparatus and product for utilizing semantic clusters to predict software defects. The method comprising: obtaining a plurality of software elements that are associated with a version of a System Under Test (SUT), wherein the plurality of software elements comprise defective software elements which are associated with a defect in the version of the SUT; defining, by a processor, a plurality of clusters, wherein each cluster of the plurality of clusters comprises software elements having an attribute, wherein the attribute is associated with a functionality of the SUT; and determining a score of each cluster of the plurality of clusters, wherein the score of a cluster is based on a relation between a number of defect software elements in the cluster and a number of software elements in the cluster. | 2016-10-06 |
20160292070 | CONTROL PATH SUBSYSTEM, METHOD AND DEVICE UTILIZING MEMORY SHARING - A packet processing system having a control path memory of a control path subsystem and a datapath memory of a datapath subsystem. The datapath subsystem stores packet data of incoming packets and the control path subsystem performs matches of a subset of packet data, or a hash of the packet data, against the contents of a the control path memory in order to process the packets. The packet processing system enabling a portion of the datapath memory to be used by the control subsystem if needed or a portion of the control path memory to be used by the datapath subsystem if needed. | 2016-10-06 |
20160292071 | CONSERVATIVE GARBAGE COLLECTION AND ACCESS PROTECTION - A method of memory management can include creating an initial root set of pointers for a program during execution of the program and performing a marking process by iteratively marking referred objects of each pointer of the root set and expanding the root set with filtered, encoded pointers. The method also can include identifying each non-live object for any marked object as red-marked and performing, using a processor, a re-marking process on the root set in which red-marked objects are excluded. Each object of the root set not marked can be designated as including a memory leak. | 2016-10-06 |
20160292072 | REFERENCE COUNTING FOR MEMORY AREAS - Technique for analyzing memory areas based on local copies of a global counter by: (i) determining a plurality of currently-executing fast threads and a plurality of currently executed slow threads; (ii) intermittently incrementing a global counter variable to have a current global counter value; (iii) intermittently setting the local counter of the data set for each fast thread of the plurality of fast threads to be equal to the current global counter value; (iv) determining that no slow threads of the plurality of slow threads reference the first memory region; (v) assigning a free-after value to the first memory region; (vi) determining whether the free-after value of the first memory region is less than or equal to all of the local counters of the fast thread data sets of the plurality of fast threads; and (vii) de-allocating the first memory region. | 2016-10-06 |
20160292073 | TIME DE-INTERLEAVING CIRCUIT AND TIME DE-INTERLEAVING METHOD - A time de-interleaving circuit applied to a communication system to de-interleave an interleaved signal is provided. The interleaved signal includes a plurality of cells. The time de-interleaving circuit includes a memory module and a buffering memory module. The memory module stores the cells, which are in a unit of a plurality of cells to form a plurality of cell groups. The memory module is accessed in a unit of one cell group. The buffering memory module buffers a part of the cells from the memory module to arrange an output sequence of the cells. | 2016-10-06 |
20160292074 | SYSTEM AND METHOD FOR CREATING SNAPSHOTS IN OPENFLAME ENVIRONMENT - A method for creating snapshots and backups in a virtual computing environment is provided. The method includes writing application output of an application spanning one or more virtual machines as an application consistency group to a writeback cache, wherein the one or more virtual machines are implemented using one or more compute nodes and wherein the writeback cache is implemented in direct attached storage in the one or more compute nodes. The method includes pausing I/O (input/output) operations of the application and marking the pausing, in the writeback cache. The method includes resuming the I/O operations of the application, after the marking and dumping data, according to the marking, from the writeback cache to a data node, as a snapshot. | 2016-10-06 |
20160292075 | SYSTEM AND METHOD OF DISTINGUISHING SYSTEM MANAGEMENT MODE ENTRIES IN A TRANSLATION ADDRESS CACHE OF A PROCESSOR - A processor including a memory that stores a system management mode (SMM) value indicative of whether the processor is in SMM, a translation address cache (TAC) that includes multiple entries for storing address translations, in which each entry includes an SMM identifier, hit logic that compares a lookup address with address translations stored in the TAC for determining a hit, in which the hit logic determines a hit only when a corresponding SMM identifier of an entry matches the SMM value, and entry logic that selects an entry of the TAC for storing a determined address translation and that programs an SMM identifier of the selected entry of the TAC to match the SMM value. The processor may include flush logic that distinguishes SMM entries, and processing logic that commands flushing upon entering and/or exiting SMM. Non-SMM entries may remain in the TAC when entering and exiting SMM. | 2016-10-06 |
20160292076 | APPARATUS, PROGRAM, AND METHOD FOR UPDATING CACHE MEMORY - A dataflow controller to store dataflow specifications and to control execution of the dataflow specified the specification specifying a series of linked data processing steps, each step specifying a processing operation to generate output data, and each link defining a consecutive pair relationship between two steps within the series, the link instructing the dataflow controller to trigger execution of the preceding member of the pair by, providing the output data of the member as the input data of the member; and a cache memory and memory controller, the memory controller to maintain an accumulation of the output data generated by the most recent execution of the operation of each member of a set of the steps specified by the dataflow controller; the dataflow controller upon execution of the operation of the step, to provide the output data to the memory controller; the memory controller, to update the maintained accumulation. | 2016-10-06 |
20160292077 | LOW-LATENCY LOSSY PROCESSING OF MACHINE DATA - A method includes monitoring, using a system resource monitor in a system, a plurality of system resource metrics. The system includes a ring buffer with consecutive slots, each slot corresponding to a different location in the memory. The method further includes receiving a system resource metric from the system resource monitor. The method also includes determining a first slot that is flagged as acceptable to be overwritten. If no slot is flagged as acceptable to be overwritten, the method further includes dropping the system resource metric, and the method ends. Otherwise, the method further includes storing the system resource metric in the slot and flagging that the slot is not acceptable to be overwritten. The method further includes detecting that the system resource metric was stored in the first slot, reading the system resource metric from the first slot, and flagging that the first slot is acceptable to be overwritten. | 2016-10-06 |
20160292078 | System and Method for Preventing Solid State Drive Corruption After Dirty Shutdown Power Loss - An information handling system a first controller and a solid state drive. The first controller receives an indication that a forced shutdown of the information handling system has been initiated, and triggers a cache flush command in response to receiving the indication that the forced shutdown has been initiated. The solid state drive includes a memory to store data, a cache to buffer data prior to writing the data in the memory, and a second controller. The second controller receives the cache flush command, and flushes the cache by writing the data in the cache to the memory in response to the cache flush command being received. | 2016-10-06 |
20160292079 | PACKET PROCESSING SYSTEM, METHOD AND DEVICE HAVING REDUCED STATIC POWER CONSUMPTION - A buffer logic unit of a packet processing device including a power gate controller. The buffer logic unit for organizing and/or allocating available pages to packets for storing the packet data based on which of a plurality of separately accessible physical memories that pages are associated with. As a result, the power gate controller is able to more efficiently cut off power from one or more of the physical memories. | 2016-10-06 |
20160292080 | VIRTUAL REGISTER FILE - The present disclosure is related to a virtual register file. Source code can be compiled to include references to a virtual register file for data subject to a logical operation. The references can be dereferenced at runtime to obtain physical addresses of memory device elements according to the virtual register file. The logical operation can be performed in the memory device on data stored in the memory device elements. | 2016-10-06 |
20160292081 | Instruction and Logic for Support of Code Modification In Translation Lookaside Buffers - A processor includes a core with logic to execute a translated instruction. The translated instruction is translated from an instruction stored in a memory location. The processor further includes a translation lookaside buffer including logic to store translation indicators from a physical map. Each translation indicator indicates whether a corresponding memory location includes translated code to be protected. The processor further includes a translation indicator agent including logic to determine whether the buffer indicates whether the memory location has been modified subsequent to translation of the instruction. | 2016-10-06 |
20160292082 | SELECTIVE PURGING OF PCI I/O ADDRESS TRANSLATION BUFFER - A method of enhancing a refresh PCI translation (RPCIT) operation to refresh a translation lookaside buffer (TLB) includes determining, by a computer processor, a request to perform at least one RPCIT instruction for purging at least one translation from the TLB. The method further includes purging, by the computer processor, the at least one translation from the TLB in response to executing the at least one RPCIT instruction. The computer processor selectively performs a synchronization operation prior to completing the at least one RPCIT instruction. | 2016-10-06 |
20160292083 | SELECTIVE SPACE RECLAMATION OF DATA STORAGE MEMORY EMPLOYING HEAT AND RELOCATION METRICS - Space of a data storage memory of a data storage memory system is reclaimed by determining heat metrics of data stored in the data storage memory; determining relocation metrics related to relocation of the data within the data storage memory; determining utility metrics of the data relating the heat metrics to the relocation metrics for the data; and making the data whose utility metric fails a utility metric threshold, available for space reclamation. | 2016-10-06 |
20160292084 | CACHING SCHEME SYNERGY FOR EXTENT MIGRATION BETWEEN TIERS OF A STORAGE SYSTEM - A method according to one embodiment includes determining to move an extent from a source-tier in a storage system to a destination-tier in the storage system, wherein a set of tracks of the extent is presently being accessed. In response to determining that a parameter of the extent exceeds a migration threshold, a destination-tier cache is populated with tracks as they are removed from a read-stack associated with the source-tier and/or a write-stack associated with the source-tier using a predetermined read-to-write ratio. Corresponding systems and computer program products are also disclosed. | 2016-10-06 |
20160292085 | PROTECTING STORAGE FROM UNAUTHORIZED ACCESS - Protecting contents of storage in a computer system from unauthorized access. The computer system includes one or more processing units sharing the storage. Each of the processing units has at least one processor cache. Each processing unit respectively encrypts or decrypts, with a protected section key, data transferred between its processor cache and the storage, when data relates to the protected section used by the hypervisor; and each processing unit respectively encrypts or decrypts, with a virtual machine key, data transferred between its processor cache and the storage, when data relates to storage areas used by a virtual machine. | 2016-10-06 |
20160292086 | PROTECTING CONTENTS OF STORAGE - Protecting contents of storage in a computer system from unauthorized access. The computer system comprises one or more processing units sharing the storage, the processing units each having at least one processor cache. Each processing unit respectively encrypts or decrypts, with a protected section key in the chip cache, data transferred between its processor cache and the protected section, and each processing unit respectively encrypts or decrypts, with a segment key, data transferred between the chip cache and the storage, when data relates to a specific segment of the storage. | 2016-10-06 |
20160292087 | PROTECTING CONTENTS OF STORAGE - Protecting contents of storage in a computer system from unauthorized access. The computer system comprises one or more processing units sharing the storage, the processing units each having at least one processor cache. Each processing unit respectively encrypts or decrypts, with a protected section key in the chip cache, data transferred between its processor cache and the protected section, and each processing unit respectively encrypts or decrypts, with a segment key, data transferred between the chip cache and the storage, when data relates to a specific segment of the storage. | 2016-10-06 |
20160292088 | DYNAMIC STORAGE KEY ASSIGNMENT - A dynamic storage key assignment is provided. An aspect includes receiving, by a host bridge, a request. An aspect includes determining, by the host bridge, that a dynamic storage key assignment is supported and enabled in association with a memory address space referenced by the request based on a requester identifier or a portion of a peripheral component interconnect address associated with the request. An aspect includes, based on determining that the dynamic storage key assignment is supported and enabled, accessing, by the host bridge, a page included in the memory address space based on a storage key included in the request matching a storage key associated with the page being accessed or an entry in a listing of permitted storage keys for the memory address space. | 2016-10-06 |
20160292089 | Configurable Multiport Medical Interface Device - A multiport interface device and method of use in a patient data routing system for connecting peripheral devices to one or more patient monitors is provided. The multiport interface device is configurable to directly route data signals received in one or more of the input ports of the interface device to one or more specified output ports of the interface device. The routing of the data can be accomplished by port slicing of the interface device and/or by utilizing coded adapters engaged at the input and output ports of the interface to route signals from multiple peripheral devices to a patient monitor, as necessary. | 2016-10-06 |
20160292090 | DATA PROCESSING SYSTEM CAPABLE OF CONTROLLING PERIPHERAL DEVICES USING GROUP IDENTIFICATION INFORMATION AND CONTROL METHOD THEREOF - A data processing system includes a plurality of peripheral devices in which device identification information and group identification information are stored, and a controller. The peripheral devices of the same species device group have the same group identification information, and peripheral devices from different peripheral device groups have different group identification information. The controller controls peripheral devices of the same species device group to perform the same operation. | 2016-10-06 |
20160292091 | PACKET PROCESSING SYSTEM, METHOD AND DEVICE UTILIZING A PORT CLIENT CHAIN - A packet processing system having each of a plurality of hierarchical clients and a packet memory arbiter serially communicatively coupled together via a plurality of primary interfaces thereby forming a unidirectional client chain. This chain is then able to be utilized by all of the hierarchical clients to write the packet data to or read the packet data from the packet memory. | 2016-10-06 |
20160292092 | Memory Bus Management - A method of managing a memory bus includes identifying sub-operations required for execution of commands, maintaining a list of released sub-operations containing only released unexecuted sub-operations directed to individual dies that are identified as available, accessing the dies until the list is empty, subsequently, polling to identify dies that are available, and subsequently resuming accessing the dies by executing only sub-operations from the list until the list is empty. | 2016-10-06 |
20160292093 | BUS SYSTEM INCLUDING BRIDGE CIRCUIT FOR CONNECTING INTERLOCK BUS AND SPLIT BUS - A bus system is configured by connecting an unretriable interlock bus and a split bus through first and second bridge circuits and respectively connecting first and second channels of the split bus and the interlock bus through the first and second bridge circuits. An access from the split bus side to the interlock bus side is processed by the first bridge circuit and an access from the interlock bus side to the split bus side is processed by the second bridge circuit, whereby a deadlock during a bus conflict is avoided. | 2016-10-06 |
20160292094 | REFERENCE VOLTAGE CALIBRATION USING A QUALIFIED WEIGHTED AVERAGE - An apparatus and method for encoding data are disclosed that may allow for performing periodic calibration operations on a communication link. A controller may determine multiple possible values for a reference voltage used with the communication link based on an initial value. Calibration operations may be performed using each possible value, and the results of the operations scored based on the width of data eyes measured during the calibration operations. The controller may then select a new value for the reference voltage from the multiple possible values dependent upon the scores of each of the multiple possible values. | 2016-10-06 |
20160292095 | MEMORY SYSTEM FACILITATING HIGH BANDWIDTH AND HIGH CAPACITY MEMORY - A memory device and memory system using the memory device. The memory system includes a memory controller having a memory bus with a plurality of lanes, and a plurality of memory devices. Each memory device has a plurality of data pins and a plurality of detection circuits, wherein each detection circuit is coupled to one of the data pins to detect whether the data pin is coupled to one of the lanes of the memory bus. Each lane of the memory bus provides a point-to-point connection between the memory controller and exactly one of the device data lanes, wherein a subset of the data lanes of each memory device are coupled to one of the lanes of the memory bus. The memory capacity of a memory system may be increased by using more of the memory devices limited only by the width of the memory bus. | 2016-10-06 |
20160292096 | PACKET PROCESSING SYSTEM, METHOD AND DEVICE TO OPTIMIZE PACKET BUFFER SPACE - A buffer logic unit of a packet processing device that is configured to allocate single pages to two or more packets if the current packets stored on the page do not fully fill the single page and to store and maintain page slot specific page state data for each of the packet data stored on the pages. | 2016-10-06 |
20160292097 | PROCESSING SYSTEM WITH STACK MANAGEMENT AND METHOD FOR STACK MANAGEMENT - The invention provides a processing system, comprising a memory comprising a processor call stack; a stack space usage register configured to determine the stack space usage of the processor call stack and to store a usage parameter indicative of the determined stack space usage; a first threshold register configured to store a pre-determinable first stack level threshold; and a first comparator configured to compare the usage parameter with the first stack level threshold and to output a first interrupt blocking signal, if the usage parameter exceeds the first stack level threshold, the first interrupt blocking signal being configured to block the decoding of interrupt signals input to the processing system and having interrupt priorities lower than or equal to or just lower than a first interrupt priority threshold. The invention further provides a method for stack management, especially in a processing system. | 2016-10-06 |
20160292098 | WRITING DATA TO STORAGE VIA A PCI EXPRESS FABRIC HAVING A FULLY-CONNECTED MESH TOPOLOGY - A method for writing data to a persistent storage module (“PSM”) in a communication fabric is discussed. A write request is received from a processor at a PSM. The processor identifies a write location and transmits it to the client. The client writes the data to the PSM via an IO tier switch, and receives a write complete indication from the processor through the same IO tier switch. | 2016-10-06 |
20160292099 | READING DATA FROM STORAGE VIA A PCI EXPRESS FABRIC HAVING A FULLY-CONNECTED MESH TOPOLOGY - A method for reading data from a persistent storage module (“PSM”) in a communication fabric is discussed. A read request may be submitted to a PSM via a processor. In response, the requested data may be written to the client. A read complete may follow the same path as the data through the communication fabric. | 2016-10-06 |
20160292100 | METHOD FOR ON-DEMAND FETCHING OF SGL POINTERS BASED BUFFER, TRAFFIC AND COMMAND REQUIREMENTS - In an example, a method of fetching direct memory access (DMA) descriptors for commands to a non-volatile semiconductor storage device includes storing the commands among a plurality of queues in a command random access memory (RAM). The method further includes processing one or more of the commands from the plurality of queues and issuing requests to read from or write into the non-volatile semiconductor storage device according to the processing. The method further includes fetching DMA descriptors from the host system for the processed commands according to a real-time fetch quota. The method further includes pre-fetching DMA descriptors from the host system for queued commands that are not being processed according to a pre-fetch quota. The method further includes storing fetched and pre-fetched DMA descriptors in a descriptor RAM. | 2016-10-06 |
20160292101 | ACCELERATION FRAMEWORK WITH DIRECT DATA TRANSFER MECHANISM - Systems and methods for offloading computations from a CPU directly to an accelerator engine are disclosed. One embodiment includes determining a function of an application to be offloaded from a CPU to an accelerator engine, locating data within a file necessary to perform the functions, programming a logic of the accelerator engine based on the function to be offloaded, programming a DMA engine to move a copy the data from a secondary storage device to the accelerator engine, and processing the data at the accelerator engine using the programmed logic. | 2016-10-06 |
20160292102 | COMMUNICATION DEVICE AND LINK ESTABLISHMENT METHOD - A slave device is realized that establishes a link with a master device or another slave device such that a large link delay hardly occurs. The slave device includes a PHY unit, a COM unit, and a MPU unit. The PHY unit starts an operation according to the specification of the AutoMDI/MDI-X function when the slave device is turned on or the PHY unit itself is reset. After a predetermined time period has elapsed, the MPU unit resets the COM unit, and the PHY unit is reset in response to the reset of the COM unit. | 2016-10-06 |
20160292103 | MULTI-OPERATING STATE SERIAL ATA DEVICES AND METHODS OF OPERATION THEREFOR - Methods and SATA devices having more than one operating state suitable for providing efficient command and data transfers over a SATA bus. A SATA device is provided for communicating with a host. The host sends commands to the SATA device and the SATA device sends data to the host in response to the commands being received by the SATA device. The SATA device has a queue of commands received from the host. The SATA device is configured to operate in a first operating state wherein the commands are received by the SATA device and the data are not sent to the host, and a second operating state wherein the commands are received by the SATA device and the data are sent to the host wherein data being sent to the host has priority over receiving commands by the SATA device. | 2016-10-06 |
20160292104 | SETTING METHOD, COMMUNICATION DEVICE, AND MASTER DEVICE - Delay in establishing communication is suppressed in a network system including a master device and a slave device. Provided is a setting method for performing communication setting for at least one of a master device and a slave device serving as a target device, the method including a storage step of storing a value of a communication parameter in a state in which the target device has established communication, and a setting step of, in communication setting in a preparatory stage for the target device to start communication, setting the value of the communication parameter that was stored in the storage step. | 2016-10-06 |
20160292105 | DEVICE CONTROL SYSTEM AND REFRIGERATOR USING SAME - The present invention continuously operates remaining slave devices except for abnormal slave devices and easily detects the abnormal slave devices, and comprises: a plurality of slave devices; a master device for controlling the plurality of slave devices; a transmission line including a main transmission line connected to the master device, and a plurality of sub-transmission lines branched from the main transmission line and connecting the plurality of slave devices in series, so as to enable data communication between the plurality of slave devices and the master device and to enable mutual data communication between the plurality of slave devices; and a blocking unit interposed between the main transmission line and each of the plurality of sub-transmission lines so as to enable the separation of the sub-transmission lines from the main transmission line. | 2016-10-06 |
20160292106 | Bus Participant Device and Method for Operating a Bus Subscriber Device - The invention relates to a bus participant device ( | 2016-10-06 |
20160292107 | MASTER CAPABLE OF COMMUNICATING WITH SLAVE AND SYSTEM INCLUDING THE MASTER - A master for transmitting data to a slave via a bus segment by segment is provided. The master includes a finite state machine (FSM) configured to receive and analyze dirty bits for first data segments to be included in a current segment among the data and to output a first selection signal and location information related to the current segment according to an analysis result and a first multiplexer configured to determine whether to output the current segment as a dirty data segment to the bus based on the first selection signal. | 2016-10-06 |
20160292108 | INFORMATION PROCESSING DEVICE, CONTROL PROGRAM FOR INFORMATION PROCESSING DEVICE, AND CONTROL METHOD FOR INFORMATION PROCESSING DEVICE - An information processing device includes an input and output unit to which an input/output device is able to be connected, an information holding unit that registers identification information of a monitoring target input/output device which is not compatible with an error suppression function of suppressing propagation of errors occurring when the input/output device is disconnected from the input and output unit, an execution unit that executes an individual program using infrastructure software, and a determining unit that, by executing the infrastructure software and the individual program, when an access to a first area of the monitoring target input/output device is detected, detects that a value read from a second area of the monitoring target input/output device is an abnormal value as a result of determining whether the value read from the second area is a predetermined value. | 2016-10-06 |
20160292109 | PERIPHERAL INTERFACE CIRCUIT FOR SERIAL MEMORY - A peripheral interface circuit and method is disclosed for dealing with round trip delay with serial memory. In some implementations, a finite state machine is configured to introduce a delay state prior to a read data state to absorb round trip delay associated with a memory read operation. A clock module is coupled to the finite state machine and configured to delay start of a pad return clock for the read operation until completion of the delay state. A first synchronous logic is coupled to receive the pad return clock and is configured to sample and hold data from a data bus during the read data state of the memory read operation based on the pad return clock. A second synchronous logic is coupled to receive a system clock and is configured to sample the held data based on the system clock. | 2016-10-06 |
20160292110 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING PROGRAM, AND INFORMATION PROCESSING METHOD - A control system synchronizes input timing and output timing between functional units, while achieving the contradictory aspect of shortening the communication cycle of data frames transferred on a network. An information processing apparatus calculates parameters for the functional units included in a slave device in accordance with a mode selected from a plurality of available modes. The modes include a first mode in which timing to obtain a status value from the control target and timing to update an output value for the control target are synchronized between all the functional units included in the slave device, and a second mode in which the timing to obtain a status value from the control target and the timing to update an output value for the control target are synchronized between specific functional units included in the slave device. | 2016-10-06 |
20160292111 | SEMICONDUCTOR MEMORY DEVICE FOR SHARING INTER-MEMORY COMMAND AND INFORMATION, MEMORY SYSTEM INCLUDING THE SAME AND METHOD OF OPERATING THE MEMORY SYSTEM - A method of operating a memory controller, memory devices including a master memory device and slave memory devices, a back channel bus coupling the master memory device to the slave memory devices and a channel coupling the memory controller to the memory devices is provided as follows. A memory command is received by the memory devices from the memory controller. An internal command is generated and outputted by the master memory device. The internal command is received by the slave memory devices. The internal command is transmitted to the slave memory devices through the back channel bus. | 2016-10-06 |
20160292112 | SHARED CONTROL OF A PHASE LOCKED LOOP (PLL) FOR A MULTI-PORT PHYSICAL LAYER (PHY) - Methods and systems for shared control of a phase locked loop (PLL) for a multi-port physical layer (PHY) are disclosed. In one aspect, an arbitration logic circuit is coupled to ports of a multi-port PHY sharing a phase locked loop (PLL). Upon receiving an indication that the shared PLL is to be reset, the arbitration logic circuit commands the ports sharing the PLL to enter a state in which any reset of the shared PLL would have minimal or no effect in their operations. In this manner, an integrated circuit (IC) including a multi-port PHY may be configured with only one PLL and associated clock generating logic to provide a clock signal for some or all of its ports, thus reducing its semiconductor area and power consumption. Furthermore, the ports of the multi-port PHY may operate independently from each other obviating any configuration and/or interoperability problems associated with having a shared PLL. | 2016-10-06 |
20160292113 | METHOD AND SYSTEM FOR ADDRESS DECODING IN A DATA COMMUNICATIONS SYSTEM USING A SERIAL DATA TRANSFER BUS - Embodiments of a method and system are disclosed. One embodiment of a method for address decoding in a data communications system using a serial data transfer bus is disclosed. The method involves, detecting a start command from a master device of the data communications system at the serial data transfer bus, and disabling an address decoder of a slave device of the data communications system in response to the detecting the start command. | 2016-10-06 |
20160292114 | COMPUTER MOUNTING MULTIPLE MODULES FACILITATING OPENING/EXPANSION CONTROL PROCESS WITH CONNECTORS - A computer includes a first module, a second module controlled by the first module, a first connector connectable to the first module, a second connector connectable to either the first module or the second module, and a data transmission line configured to connect the first connector to the second connector. The first module includes a switch configured to electrically connect the data transmission line to the first module attached to the first connector. The switch breaks an electrical connection between the data transmission line and the first module attached to the second connector. Thus, it is possible to improve expandability in the computer acting as a server. Additionally, it is possible to prevent complexity of design and increased cost in manufacturing servers. | 2016-10-06 |
20160292115 | Methods and Apparatus for IO, Processing and Memory Bandwidth Optimization for Analytics Systems - Methods and Apparatus for IO, Processing and Memory Bandwidth Optimization for Analytics Systems has been disclosed. In one implementation a plurality of cards each having one or more GPU+CPU are interconnected via RapidIO. | 2016-10-06 |
20160292116 | QUALITY OF SERVICE FOR INTERNAL I/OS USING INTERNAL FLOW MECHANISM - A method for Quality of Service (QoS) for internal input/output (I/O) using an internal flow mechanism in a storage system is provided. The method includes establishing internal I/O flows corresponding to external I/O flows for one or more computing machines or virtual machines implemented with physical computing resources requesting I/Os. The method includes inheriting service-level agreement (SLA) values from the external I/O flows to the internal I/O flows and determining demands for the external I/O flows and the internal I/O flows. The method includes distributing credits to the internal I/O flows and the external I/O flows according to minimum I/O operations per unit time values, based on the service-level agreement values, and distributing remaining credits to the external I/O flows and the internal I/O flows according to priority and demand of each of the external I/O flows and the internal I/O flows. | 2016-10-06 |
20160292117 | Methods and Apparatus for Efficient Network Analytics and Computing Card - Methods and Apparatus for Efficient Network Analytics and Computing Card have been disclosed. In one implementation a plurality of cards each having one or more GPU+CPU are interconnected via RapidIO. | 2016-10-06 |
20160292118 | CARD CONNECTOR SUITABLE FOR INSERTION OF CARD, BASE SUITABLE FOR INSERTION OF DEVICE, AND TERMINAL - The present invention discloses to a card connector, a base, and a terminal. The card connector suitable for insertion of a card includes a bottom board, where the bottom board is provided with a first-size area that is formed by side walls; the bottom board is further provided with a second-size area that is formed by locking units; when a first card is inserted into the card connector, the locking units are pressed down by the first card, and the first card is locked within the first-size area; and when the second card is inserted into the card connector, the second card is locked within the second-size area. Abase is disposed with side walls and locking units to form areas of different sizes, so that the card connector can be equipped with devices of different sizes, and can be highly versatile, widely applicable, and convenient to use. | 2016-10-06 |
20160292119 | METHOD, APPARATUS AND SYSTEM FOR CONFIGURING AN INTEGRATED CIRCUIT - Techniques and mechanisms for configuring an integrated circuit to couple to, and exchange data with, a hardware interface. In an embodiment, the integrated circuit comprises a data channel including a plurality of bits, configuration logic, and a plurality of contacts including a first contact group and a second contact group. In response to a signal indicating connectivity of the integrated circuit to the interface, a mode of the configuration logic is selected to couple the plurality of bits to one of the first contact group and the second contact group. | 2016-10-06 |
20160292120 | SEMICONDUCTOR DEVICE AND CONTROL METHOD THEREOF - A migration of a program executing entity between a plurality of processors can be efficiently performed. A semiconductor device | 2016-10-06 |
20160292121 | APPARATUS AND METHOD FOR PROCESSING SIGNAL - A method for use in an electronic device having an interface unit, comprising: selecting a first pin set from a plurality of pin sets that are part of the interface unit, wherein the first pin set is associated with a first communication channel; grounding a second pin set in the plurality of pin sets, wherein the second pin set is associated with a second communication channel; and processing a signal for the first pin set. | 2016-10-06 |