46th week of 2012 patent applcation highlights part 60 |
Patent application number | Title | Published |
20120290819 | DSP BLOCK WITH EMBEDDED FLOATING POINT STRUCTURES - A specialized processing block includes a first floating-point arithmetic operator stage, a second floating-point arithmetic operator stage, and configurable interconnect within the specialized processing block for routing signals into and out of each of the first and second floating-point arithmetic operator stages. In some embodiments, the configurable interconnect may be configurable to route a plurality of block inputs to inputs of the first floating-point arithmetic operator stage, at least one of the block inputs to an input of the second floating-point arithmetic operator stage, output of the first floating-point arithmetic operator stage to an input of the second floating-point arithmetic operator stage, at least one of the block inputs to a direct-connect output to another such block, output of the first floating-point arithmetic operator stage to the direct-connect output, and a direct-connect input from another such block to an input of the second floating-point arithmetic operator stage. | 2012-11-15 |
20120290820 | SUPPRESSION OF CONTROL TRANSFER INSTRUCTIONS ON INCORRECT SPECULATIVE EXECUTION PATHS - Techniques are disclosed relating to a processor that is configured to execute control transfer instructions (CTIs). In some embodiments, the processor includes a mechanism that suppresses results of mispredicted younger CTIs on a speculative execution path. This mechanism permits the branch predictor to maintain its fidelity, and eliminates spurious flushes of the pipeline. In one embodiment, a misprediction bit is be used to indicate that a misprediction has occurred, and younger CTIs than the CTI that was mispredicted are suppressed. In some embodiments, the processor may be configured to execute instruction streams from multiple threads. Each thread may include a misprediction indication. CTIs in each thread may execute in program order with respect to other CTIs of the thread, while instructions other than CTIs may execute out of program order. | 2012-11-15 |
20120290821 | LOW-LATENCY BRANCH TARGET CACHE - Techniques and structures are disclosed relating to a branch target cache (BTC) in a processor. In one embodiment, the BTC is usable to predict whether a control transfer instruction is to be taken, and, if applicable, a target address for the instruction. The BTC may operate in conjunction with a delayed branch predictor (DBP) that is more accurate but slower than the BTC. If the BTC indicates that a control transfer instruction is predicted to be taken, the processor begins to fetch instructions at the target address indicated by the BTC, but may discard those instructions if the DBP subsequently determines that the control transfer instruction was predicted incorrectly. Branch prediction information output from the BTC and the DBP may be used to update the branch target cache for subsequent predictions. In various embodiments, the BTC may simultaneously store entries for multiple processor threads, and may be fully associative. | 2012-11-15 |
20120290822 | System and Method for Shared Data Storage - Systems and methods for sharing data storage on an electronic device are disclosed. A system may include a memory and a processor, an operating system executing on the electronic device, a preboot application executing on the electronic device, and a virtual drive. The operating system may be configured to mount the virtual drive and the preboot application may also be configured to mount the virtual drive. | 2012-11-15 |
20120290823 | CORE ABSTRACTION LAYER INTERFACE - A method of producing a modem hardware abstraction layer (MHAL) within a first processor associated with a modem of a given radio platform. A MHAL software (SW) device within the first processor is configured to process data and exchange messages among a waveform software application, and a field programmable gate array (FPGA) associated with the radio platform. A core module is defined within the SW device, and the core module operates using a common core set of software that is compatible with a number of different radio platforms including the given platform, for producing certain MHAL interfaces and services. A custom module is defined within the SW device, and the custom module operates using such software as required to be compatible with the FPGA of the given platform, and by invoking the MHAL interfaces or services produced by the core module. Priority thread banding and memory management are also provided. | 2012-11-15 |
20120290824 | POWERTAG: MANUFACTURING AND SUPPORT SYSTEM METHOD AND APPARATUS FOR MULTI-COMPUTER SOLUTIONS - A solutions-based computer system manufacturing process includes assembling computer and storage system components for creation of a given solution-based product as a function of a customer order or plan. The process further includes assigning a solution identifier to the solution-based product. The solution identifier includes a solution type and a unique identifier within the solution type. | 2012-11-15 |
20120290825 | ELECTRONIC DEVICE AND BOOTING METHOD - An electronic device includes a first processor, a second processor for detecting the working state of the electronic device in real time, a storage unit for storing preset information and a display unit. The second processor determines that the electronic device has entered the hardware initialization process and displays the preset information. The second processor stops displaying the preset information on the display unit when the hardware initialization process is determined to be finished. A booting method for starting an electronic device is also provided. | 2012-11-15 |
20120290826 | BOOTING IN SYSTEMS HAVING DEVICES COUPLED IN A CHAINED CONFIGURATION - The present disclosure includes methods, devices, and systems for booting in systems having devices coupled in a chained configuration. One or more embodiments include a host and a number of devices coupled to the host in a chained configuration, wherein at least one of the number of devices is a bootable device and the at least one bootable device is not directly coupled to the host. | 2012-11-15 |
20120290827 | METHOD AND APPARATUS FOR PROCESS ENFORCED CONFIGURATION MANAGEMENT - A system for and method of automatically enforcing a configuration change process for change requests of one or more configurable element within one or more configurable computation systems. The system comprises means for managing a configuration change process for one or more configurable elements within a corresponding configurable computation system, means for generation a configuration request, means for applying a set of authorization rules to the configuration change requests to generate selective authorization of the CEs, and means for selectively locking and unlocking changes to configurable elements within the configurable computational systems. | 2012-11-15 |
20120290828 | METHOD AND APPARATUS FOR PROCESS ENFORCED CONFIGURATION MANAGEMENT - A system for and method of automatically enforcing a configuration change process for change requests of one or more configurable element within one or more configurable computation systems. The system comprises means for managing a configuration change process for one or more configurable elements within a corresponding configurable computation system, means for generation a configuration request, means for applying a set of authorization rules to the configuration change requests to generate selective authorization of the CEs, and means for selectively locking and unlocking changes to configurable elements within the configurable computational systems. | 2012-11-15 |
20120290829 | SYSTEM AND METHOD FOR SELECTIVE INSPECTION OF ENCRYPTED TRAFFIC - Inspection of encrypted network traffic where multiple network connections are monitored that carry encrypted data, but only a subset of the network connections are decrypted and inspected. Typically, only network connections that are associated with designated target users whose encrypted data is to be inspected are decrypted. A Network Monitor Center (NMC) dynamically establishes a list of rules for selection of encrypted data connections. The rules are provided to a Secure data Inspection Appliance (SIA) that accepts some or all of the network user encrypted traffic and checks it against a rule table. When detecting an encrypted connection that matches the rule table, the SIA decrypts the connection and provides a copy of the connection plain data to the NMC. The NMC then inspects the plain data for security threats. Once a security threat is found in a connection, the NMC applies predefined consequent actions to this connection. | 2012-11-15 |
20120290830 | GENERATING AN ENCRYPTED MESSAGE FOR STORAGE - A method begins by a dispersed storage (DS) processing module generating a shared secret key from a public key of another entity and a private key using a first modulo prime polynomial function, wherein a public key is generated from the private key using a second modulo prime polynomial function and wherein the public key of the other entity is derived using the second modulo prime polynomial function on a private key of the other entity. The method continues with the DS module encrypting a message using the shared secret key to produce an encrypted message. The method continues with the DS module outputting the encrypted message to the other entity. | 2012-11-15 |
20120290831 | METHODS FOR DECRYPTING, TRANSMITTING AND RECEIVING CONTROL WORDS, STORAGE MEDIUM AND SERVER FOR SAID METHODS - A method for deciphering control words for mechanically and electronically independent terminals includes causing first and second terminals to transmit a first and second cryptograms to a control-word server, causing that server to decipher them to obtain first and second control words for enabling descrambling of first and second multimedia content broadcast simultaneously on respective first and second channels, causing the server to transmit the control word to the respective terminals, the second control word obtained by deciphering the second cryptogram before the first terminal executes a channel change, and in response to the channel change, causing the first terminal to search to determine whether the second control word has already been transmitted in advance by the server before the channel change, and if the control word has been transmitted in advance, causing the first terminal to immediately start descrambling the second multimedia content with the second control word. | 2012-11-15 |
20120290832 | SYSTEM FOR CONDUCTING REMOTE BIOMETRIC OPERATIONS - System for conducting remote biometric operations that includes a biometric data reading device connected to a personal computer and configured to send said encrypted data to a remote data authentication centre for establishing a secure communications channel once the user identity has been verified by means of said biometric data. This invention refers to a remote biometric operations system that can be connected to a computer to carry out electronic banking and other similar operations with a certain degree of safety. | 2012-11-15 |
20120290833 | Certificate Blobs for Single Sign On - A system, method and a computer-readable medium for generating an authentication password for authenticating a client to a server. A digital certificate that includes private key, and a public key is provided. A hash of a content of a digital certificate is generated. The hash is also encrypted with a private key. The encrypted hash and the content of the digital certificate are encoded into a certificate blob, which is utilized as an authorization password. | 2012-11-15 |
20120290834 | KEY DISTRIBUTION DEVICE, TERMINAL DEVICE, AND CONTENT DISTRIBUTION SYSTEM - A terminal device used in a content distribution system including a key distribution device, the terminal device, and a recording medium device, the key distribution device distributing a title key for protecting a content to the recording medium device, the terminal device for controlling writing of the title key on the recording medium device, and the recording medium device recording the content, wherein the key distribution device and the recording medium device comprise a communication unit configured to transfer the title key safely between the key distribution device and the recording medium device without direct involvement by the terminal device, and the terminal device confirms a supported function of the key distribution device and determines whether to permit operations pertaining to the key distribution device in accordance with the supported function. | 2012-11-15 |
20120290835 | SYSTEM AND METHOD FOR VALIDATING CERTIFICATE ISSUANCE NOTIFICATION MESSAGES - To validate a received certificate issuance notification message, a device may verify that the certificate issuance notification message conforms to expected norms or authenticate a signature associate with the certificate issuance notification message. Upon validating, the device may then transmit a uniform resource locator, extracted from the certificate issuance notification message, to a network entity configured for processing certificate issuance. | 2012-11-15 |
20120290836 | ACCELERATED SIGNATURE VERIFICATION ON AN ELLIPTIC CURVE - A public key encryption system exchanges information between a pair of correspondents. The recipient performs computations on the received data to recover the transmitted data or verify the identity of the sender. The data transferred includes supplementary information that relates to intermediate steps in the computations performed by the recipient. | 2012-11-15 |
20120290837 | Method and system for secured management of online XML document services through structure-preserving asymmetric encryption - A system and method for encrypting/decrypting a document is provided. The encryption method includes encrypting portions within the document containing structural information with an asymmetric public key, encrypting portions within the document containing content information with a symmetric private key, and outputting the document, whereby a service provider provided with a public key is able to access and process only the structural information. | 2012-11-15 |
20120290838 | System and Method for Web-Based Security Authentication - A security authentication method comprises establishing a user account associated with a login credential, generating an encryption salt, generating graphical key images of a plurality of sequences of values each beginning at a random point, generating encrypted key values by encrypting each value in the plurality of sequences using the generated encryption salt, incorporating the graphical key images and encrypted key values into a displayable input form, receiving user input including a plurality of encrypted key values, generating decrypted key values by decrypting the encrypted key values of the user input using the encryption salt, and verifying that the decrypted key values match the login credential. | 2012-11-15 |
20120290839 | METHOD AND SYSTEM OF COMMUNICATING INFORMATION DISPLAYED AT A PUBLISHER DEVICE WITH A RECEIVER DEVICE - The invention provides a method of communicating a display of information at a publisher device with a receiver device for display at the receiver device, the method including receiving a push-through packet from the publisher device at a connect server, including data entered at the publisher device and a key, receiving a key from the receiver device, comparing the keys received from the publisher and receiver devices to determine if a match exists and transmitting a push-through packet, including the data, from the connect server to the receiver device if a match exists between the keys received from the publisher and receiver devices. | 2012-11-15 |
20120290840 | PIER-TO-PIER EVENT-TIME SECURED LINK ESTABLISHMENT - A method establishes a secure authenticated connection between two devices. The method includes (A) obtaining data related to a tapping event between a first device and a second device, the data including time data of the tapping event; (B) selecting, by the first device, a target device; (C) establishing a non-authenticated secure communication link between the first device and the target device; (D) sending, by the first device, a challenge communication to the target device, the challenge communication including a request for a further data related to the tapping event; (E) receiving, by the first device, a response communication in response to the challenge communication, the response including the further data; (F) determining if the target device is the second device by matching the data with the further data; (G) if the target device is the second device, establishing a secure authenticated communication link between the first and second devices. | 2012-11-15 |
20120290841 | Unique identifier, method for providing the unique identifier and use of the unique identifier - A unique identifier which substantially prevents product counterfeiting, wherein the unique identifier can be produced in a very cost-effective manner. The unique identifier is suitable not only for use as a product identifier but also for authorization, for example for securing physical or electronic accesses, such as doors, computer programs or the like. | 2012-11-15 |
20120290842 | METHOD FOR SECURELY DOWNLOADING FROM DISTRIBUTED DOWNLOAD SOURCES - The present invention deals with a method for securely downloading from distributed download sources. The greatest possible download security with a simultaneously minimized server load is achieved in this case. The object of the present invention was to provide an improved download method which also allows simple servers, without the possibility of setting up a secure connection, to be used as download servers and allows the total CPU load on the servers involved to be minimized, wherein the data transmission security can he kept the same, in comparison with a download from a single server, via a secure connection. This object is achieved by the method according to the invention for securely downloading from distributed download sources according to the main claim with the aid of a secure database server, a secure main server and 1 to n non-secure download servers, wherein the non-secure download servers newly encrypt the symmetrically encrypted download packets at predefined intervals of time independently of the secure main server. | 2012-11-15 |
20120290843 | Privacy-Aware Content Protection System - A method and system are disclosed for preventing rendering of content at overlapping time periods on more rendering devices than permitted by a license associated with the content. | 2012-11-15 |
20120290844 | SYSTEM AND METHOD FOR CONTROLLING MESSAGE ATTACHMENT HANDLING FUNCTIONS ON A MOBILE DEVICE - A system and method for controlling message attachment handling functions on a mobile device is described herein. An attachment handling control can be set to identify one of a number of selected attachment handling control modes. Depending on the attachment handling control mode identified, a request for the attachment structure that includes a decrypted session key for an encrypted message received at the mobile device may or may not be automatically sent to a remote server. This may provide the user with increased control over the content of an encrypted message that the remote server may access when determining the attachment structure for a message. | 2012-11-15 |
20120290845 | SOFT MESSAGE SIGNING - A message is signed using a PUF without having to exactly regenerate a cryptographic key. Another party that shares information about the PUF is able to verify the signature to a high degree of accuracy (i.e., high probability of rejection of a forged signature and a low probably of false rejection of a true signature). In some examples, the information shared by a recipient of a message signature includes a parametric model of operational characteristics of the PUF used to form the signature. | 2012-11-15 |
20120290846 | UNAUTHORIZED CONTENTS DETECTION SYSTEM - A data processing device for playing back a digital work reduces the processing load involved in verification by using only a predetermined number of encrypted units selected randomly from multiple encrypted units constituting encrypted contents recorded on a DVD. In addition, the data processing device improves the accuracy of detecting unauthorized contents by randomly selecting a predetermined number of encrypted units every time the verification is performed. | 2012-11-15 |
20120290847 | SYSTEM AND METHOD FOR RELIABLY PRESERVING WEB-BASED EVIDENCE - An evidence collection system for reliably collecting and preserving web-based evidence. An end-user's computing device browser accesses an evidence collection web site and identifies a web resource to be collected. An evidence collection station communicates with the target web server(s) and collects the body of evidence requested. Multiple representations of the information are collected to support the defensibility of the capture. Digital signature and digital time stamp methodologies are used to enhance the forensic soundness of the captured evidence. Capture results are conveyed to the end-user along with a report that describes the evidence captured in a manner which may be utilized as evidence comprehensible to a lay judge and jury. | 2012-11-15 |
20120290848 | Emulating Mixed-Code Programs Using a Virtual Machine Instance - The subject disclosure is directed towards a technology for efficiently emulating program code that is protected by one or more various code virtualization techniques to detect the presence of malware. An emulation engine emulates a program containing a mix of native code, custom (e.g., virtualized obfuscated) code, and at least one emulator and/or interpreter that understands the custom code, by building a custom emulation component that is built by detecting and analyzing the internal emulator or interpreter. The custom emulation component may access a translation table built from the analysis, and also may simplify a plurality of instructions in the program into a lesser number of instructions in an intermediate language used for emulation. | 2012-11-15 |
20120290849 | MANAGING SEQUENTIAL ACCESS TO SECURE CONTENT USING AN ENCRYPTED WRAP - In a method for managing sequential access to secure content by a plurality of workflow participants, a key-map file for each of the participants is created. Each of the key-map files contains a subset of encryption and signature keys for the content. The key-map files are sorted in an order that is the reverse of a workflow order in which the workflow participants for which the key-map files were created are to access the secure content. An encrypted later wrap including a later key-map file for a later workflow participant along the workflow order and an encrypted first wrap including a prior key-map file for a prior workflow participant and the encrypted later wrap are created. In addition, the first wrap is incorporated into a document serialization for the content. | 2012-11-15 |
20120290850 | DATA MANAGEMENT - In one implementation, encrypted data and a virtual machine are stored together as a virtual machine-data image, wherein the virtual machine is configured to EXERT management control over the data based on policies set by an owner of the data. In another implementation, metadata defining or tagging policies for usage of data is associated with the data. Control capabilities of service providers are mapped to the policies, wherein those service provider environments that best satisfy the controls mapped to the policies are identified. | 2012-11-15 |
20120290851 | METHOD AND COMPUTER PROGRAM FOR SECURELY STORING DATA - A method of securely storing data comprising the steps of: dividing the data into a plurality of secure components; encrypting the secure components; moving each secure component to a different location which is substantially inaccessible to an unauthorized request; storing the secure components at the different locations for a period of time; repeating the moving and storing steps; moving all of the secure components to a single location in response to an authorized request; decrypting each of the secure components; and assembling the plurality of secure components to reconstruct the original data. | 2012-11-15 |
20120290852 | SYSTEM AND METHOD FOR VOLTAGE REGULATOR OPTIMIZATION THROUGH PREDICTIVE TRANSIENT WARNING - In accordance with the present disclosure, a system and method for voltage regulator optimization though predictive transient warning is described. The system may include a transient load, a controller and a voltage regulator. The controller may manage a control state of the transient load and generate a transient notification signal in response to an upcoming transient event at the transient load. The voltage regulator may provide power to the transient load and may change its mode of operation to prepare for the upcoming transient event in response to the transient notification signal. | 2012-11-15 |
20120290853 | INDICATOR LIGHT CONTROL CIRCUUIT - An indicator light control circuit includes a basic input output system (BIOS) integrated circuit (IC), a microcontroller, a signal control unit, an electronic switch, and an indicator light. The microcontroller includes a general purpose input output (GPIO) pin. When different operating options of the indicator light are set into and by the BIOS IC, the BIOS IC controls the GPIO pin of the microcontroller to output command signals, such as a low voltage signal, a high voltage signal and pulse signals, then the signal control unit generates and outputs signals according to the command signals. Thus, the electronic switch is operated to turn on or turn off or to pulse when controlling the operation of the indicator light(s). | 2012-11-15 |
20120290854 | CIRCUIT PROTECTION SYSTEM AND METHOD - The present disclosure provides a circuit protection system and a circuit protection method for an electronic system. The circuit protection system includes a main chip, a power chip powering the main chip, a basic input/output system (BIOS) and a control unit. The control unit detects the potential of a PW_OK signal output from the power chip to the main chip, and gets the current state of the electronic system through the BIOS, thereby determining whether the current state of the main chip corresponds to a predetermined state for the main chip which defined in the current state of the electronic system. If not, the control unit outputs a signal to disable the main chip. The present disclosure disables the main chip instantly when the voltage provided thereto is excessive or insufficient, thereby avoiding the damage caused by excessive or insufficient voltage. | 2012-11-15 |
20120290855 | INFORMATION PROCESSING APPARATUS, METHOD FOR CONTROLLING THE SAME, AND STORAGE MEDIUM - An information processing apparatus includes a processing unit, a power supply control unit configured to control powering on and off of the processing unit, and a controller unit configured to access the processing unit irrespective of a power supply state of the processing unit. The power supply control unit powers off a processing unit that is not in use, powers on a processing unit that is accessed by the controller unit, and outputs a predetermined control signal to the controller unit. The controller unit recognizes that an error occurs in a case where, after accessing a processing unit, the controller unit does not receive a response from the accessed processing unit until a time-out time elapses, and delays recognizing the error when the control signal is received. | 2012-11-15 |
20120290856 | POWER CONTROL APPARATUS, METHOD FOR CONTROLLING THE SAME AND STORAGE MEDIUM - A power control apparatus uses a job history stored in a second storage unit to update, at a predetermined time interval, a power-off sequence table defining a sequence in which power supply is to be stopped for devices when a smart power meter has requested power supply reduction, inquires the smart power meter regarding the amount of power to be reduced when a power reduction request has been received therefrom, and stops power supply to devices in accordance with the reduction power amount, the device power consumption amounts, and the power-off sequence table. | 2012-11-15 |
20120290857 | ADAPTIVE NETWORK AND METHOD - A plurality of modules interact to form an adaptive network in which each module transmits and receives data signals indicative of proximity of objects. A central computer accumulates the data produced or received and relayed by each module for analyzing proximity responses to transmit through the adaptive network control signals to a selectively-addressed module to respond to computer analyses of the data accumulated from modules forming the adaptive network. Interactions of local processors in modules that sense an intrusion determine the location and path of movements of the intruding object and control cameras in the modules to retrieve video images of the intruding object. Multiple operational frequencies in adaptive networks permit expansions by additional networks that each operate at separate radio frequencies to avoid overlapping interaction. Additional modules may be introduced into operating networks without knowing the operating frequency at the time of introduction. Remote modules operating as leaf nodes of the adaptive network actively adapt to changed network conditions upon awaking from power-conserving sleep mode. New programs are distributed to all or selected modules under control of the base station. | 2012-11-15 |
20120290858 | Power Control for PXI Express Controller - A PXI Express controller may be configured to support at least three different conditions under which the controller may be turned on. If a chassis (e.g. a PXI Express chassis) interfacing with the controller has a power button, the first condition (which may be considered normal operation) may be met when the power button is being pressed at a time auxiliary power is present. When the chassis does not have a power button, the second condition may be met when the power is switched on at a time auxiliary power is present, and the third condition may be met when the power is switched on at a time auxiliary power is not present. A state-machine comprised in the PXI Express controller may be configured to interface with a chipset equally comprised in the PXI Express controller, to perform the control functions required to provide the support for the three different conditions. | 2012-11-15 |
20120290859 | USB HOST WAKE UP VIA A USB DEVICE WHEN IN SHUT DOWN MODE - A system and method for communicating between a controller and a device is provided: The controller communicates with the device over a communication link. The controller shutting off a power supply that is connected to the communication link, for example, due to inactivity parameters. The device generating a wake up signal and transmitting the wake up signal from the device to the controller while the power supply is shut off. | 2012-11-15 |
20120290860 | COMPUTER POWER SUPPLIER WITH A STANDBY POWER SAVING CONTROLLER - A computer power supplier with a built-in power saving controller has a power input socket connected to external AC power supply. A DC switch circuit is connected to AC power and converts AC into DC. A control switch is connected to the AC power. A computer power supply circuit is connected to the AC power of the control switch and converts the AC into DC. A power output socket is connected to the AC power of the control switch and supplies power to peripheral equipment. A power start-up circuit is connected to the DC power of the DC switch circuit and the control switch, and operates the control switch to transmit AC power. A cluster cable transmits the DC power to the mainframe. A boot button is connected both to the start-up circuit and mainboard, so as to convert the AC into DC for the mainframe and start-up circuit. | 2012-11-15 |
20120290861 | Power Saving Method and Apparatus thereof - At startup of an apparatus including a memory and an operating device, an operating system is loaded to the memory as an operating system. While an idle time of the operating device exceeds a predetermined time, the loaded operating system cuts power to the operating device so that the operating device can be completely shut down. As a result, power consumption of the operating device is significantly reduced. | 2012-11-15 |
20120290862 | OPTIMIZING ENERGY CONSUMPTION UTILIZED FOR WORKLOAD PROCESSING IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for optimizing energy consumption utilized for workload processing in a networked computing environment (e.g., a cloud computing environment). Specifically, when a workload is received, an energy profile (e.g., contained in a computerized data structure) associated with the workload is identified. Typically, the energy profile identifies a set of computing resources needed to process the workload (e.g., storage requirements, server requirements, processing requirements, network bandwidth requirements, etc.), energy consumption attributes of the set of computing resources, and a proposed duration of the workload. Based on the information contained in the energy profile (and resource availability) a schedule (e.g., time, location, etc.) for processing the workload will be determined so as to optimize energy consumption associated with the processing of the workload. In a typical embodiment, the schedule will be determined such that a total cost for processing the workload can be minimized and/or to any budgeted amount/costs can be met. | 2012-11-15 |
20120290863 | Budget-Based Power Consumption For Application Execution On A Plurality Of Compute Nodes - Methods, apparatus, and products are disclosed for budget-based power consumption for application execution on a plurality of compute nodes that include: assigning an execution priority to each of one or more applications; executing, on the plurality of compute nodes, the applications according to the execution priorities assigned to the applications at an initial power level provided to the compute nodes until a predetermined power consumption threshold is reached; and applying, upon reaching the predetermined power consumption threshold, one or more power conservation actions to reduce power consumption of the plurality of compute nodes during execution of the applications. | 2012-11-15 |
20120290864 | ASYNCHRONOUS MANAGEMENT OF ACCESS REQUESTS TO CONTROL POWER CONSUMPTION - Systems and methods are disclosed for asynchronous management of access requests to control power consumption. In some cases, by asynchronously managing power within a system, multiple dies of a NVM can simultaneously draw current in order to match the power demand. In particular, an arbiter of the system can receive multiple requests to draw current, where each request may be associated with a different die of the NVM. In some embodiments, the arbiter can determine the servicing order using the time of arrival of the request (e.g., a first-in, first-out scheme). In other embodiments, the arbiter can simultaneously service multiple requests so long as the servicing of the multiple requests does not exceed a power budget. | 2012-11-15 |
20120290865 | Virtualized Application Power Budgeting - Virtualized application power budgeting can manage power budgeting for multiple applications in data centers. This power budgeting may be done in intelligent and/or dynamic ways and may be useful for updating power budgets, resolving conflicts in requests for power, and may improve the efficiency of the distribution of power to multiple applications. | 2012-11-15 |
20120290866 | METHOD AND SYSTEM FOR CORRECTING TIMING ERRORS DUE TO THERMAL CHANGES WITHIN A PORTABLE COMPUTING DEVICE - A method and system for correcting timing errors due to thermal changes within a portable computing device are disclosed. The system and method may include calculating an estimate of frequency for a first clock compared to a second clock. The first clock may comprise a crystal oscillator while the second clock comprises a system clock. Next, a sleep state may be calculated for a hardware device, such as radio access technology (“RAT”) module, based on the estimate of frequency for the first clock. An error in the frequency of the first clock that may occur during the sleep state of the hardware device may be calculated. Subsequently, a magnitude of time that corresponds to an actual length of the sleep state relative to the second clock may be calculated so that an internal clock of the hardware devices may be synchronized with the second clock. | 2012-11-15 |
20120290867 | MATRIX COMPUTATION FRAMEWORK - Described herein are technologies pertaining to matrix computation. A computer-executable algorithm that is configured to execute perform a sequence of computations over a matrix tile is received and translated into a global directed acyclic graph that includes vertices that perform a sequence of matrix computations and edges that represent data dependencies amongst vertices. A vertex in the global directed acyclic graph is represented by a local directed acyclic graph that includes vertices that perform a sequence of matrix computations at the block level, thereby facilitating pipelined, data-driven matrix computation. | 2012-11-15 |
20120290868 | ASSIGNING A DISPERSED STORAGE NETWORK ADDRESS RANGE IN A MAINTENANCE FREE STORAGE CONTAINER - A method begins by a dispersed storage (DS) processing module determining storage device failure information for a plurality of storage devices within a maintenance free storage container, wherein the maintenance free storage container allows for multiple storage devices of the plurality of storage devices to be in a failure mode without replacement and wherein the storage device failure information indicates storage devices of the plurality of storage devices that are in the failure mode. The method continues with the DS processing module maintaining a dynamic container address space of the maintenance free storage container based on the storage device failure information. The method continues with the DS processing module managing mapping of container addresses of the dynamic container address space to dispersed storage network (DSN) addresses of an assigned DSN address range. | 2012-11-15 |
20120290869 | HITLESS SWITCHOVER FROM ACTIVE TCP APPLICATION TO STANDBY TCP APPLICATION - Embodiments of the invention include a method for maintaining an active-standby relationship between an active control card and a standby control card in a network element. The network element receives a data from a remote peer at the active control card. The network element communicates data from the active TCP module to an active application module in the active control card. The network element communicates synchronization data from the active application module to a standby application module on the standby control card. The network element communicates an application synchronization acknowledgement from the standby application module to the active APP module. The network element communicates an application acknowledgment packet from the active application module to the active TCP module responsive to receiving the application synchronization acknowledgment. The network element then communicates an acknowledgement to the remote peer responsive to the application acknowledgement. | 2012-11-15 |
20120290870 | DEVICE VALIDATION, DISTRESS INDICATION, AND REMEDIATION - A wireless communications device may be configured to perform integrity checking and interrogation with a network entity to isolate a portion of a failed component on the wireless network device for remediation. Once an integrity failure is determined on a component of the device, the device may identify a functionality associated with the component and indicate the failed functionality to the network entity. Both the wireless network device and the network entity may identify the failed functionality and/or failed component using a component-to-functionality map. After receiving an indication of an integrity failure at the device, the network entity may determine that one or more additional iterations of integrity checking may be performed at the device to narrow the scope of the integrity failure on the failed component. Once the integrity failure is isolated, the network entity may remediate a portion of the failed component on the wireless communications device. | 2012-11-15 |
20120290871 | METHOD OF CHANGING OVER FROM A PRIMARY HSS TO A BACKUP HSS IN AN IP NETWORK - A method is provided for changing over from a primary home subscriber server (HSS) to a backup HSS in an IP network, said network having a plurality of call server control function (CSCF) (or application) servers, in which, after detection of a loss of connection between one of said CSCF (or application) servers and a primary HSS to which it is normally connected, the CSCF (or application) server connects itself to a backup HSS. The method also comprises the following steps: a) a predetermined broadcast device is informed of said loss of connection with said HSS; b) said broadcast device sends a predetermined fault message at least to the other CSCF (or application) servers that are normally connected to said primary HSS, said message containing the reference of said primary HSS; and c) said other CSCF (or application) servers connect themselves to said backup HSS. | 2012-11-15 |
20120290872 | MACHINE-TO-MACHINE PLATFORM SERVICE PROCESSING METHOD AND MACHINE-TO-MACHINE PLATFORM - A method for processing Machine-to-Machine (M2M) platform services and a M2M platform are disclosed. The method comprises: receiving a service request sent by a terminal; selecting a corresponding application according to capacity required by the service request; and forwarding the service request to the corresponding application, and feeding back a response result of the application to the terminal. The method for processing M2M platform services and the M2M platform in accordance with the present implement a platform for providing a variety applications for users. | 2012-11-15 |
20120290873 | METHOD AND APPARATUS FOR REBUILDING DATA IN A DISPERSED DATA STORAGE NETWORK - A method begins by identifying a data slice requiring rebuilding to produce an identified data slice, wherein the identified data slice is one of a plurality of data slices that constitute a data segment. The method continues by retrieving at least m number of data slices, wherein m data slices of the plurality of data slices enable reconstruction of the data segment, and wherein the at least m number of data slices does not include the identified data slice. The method continues by reconstructing the identified data slice from the at least m number of data slices to produce a rebuilt data slice. The method continues by writing the rebuilt data slice to one of a plurality of data slice servers. | 2012-11-15 |
20120290874 | JOB MIGRATION IN RESPONSE TO LOSS OR DEGRADATION OF A SEMI-REDUNDANT COMPONENT - A method of managing the workload in a computer system having one or more semi-redundant hardware components is provided. The method comprises detecting loss or degradation of the level of performance of one or more of the semi-redundant hardware components, identifying hardware components affected by the loss or degradation, migrating a critical job from an affected hardware component to an unaffected hardware component, and performing less-critical jobs on an affected hardware component. Loss or degradation of the semi-redundant component reduces the capacity of affected hardware components in the computer system without entirely disabling the computer system. Jobs identified as critical run on hardware components having the most capacity and reliability, while less-critical jobs use the remaining capacity of affected hardware components. Examples of semi-redundant hardware components include a memory module, CPU core, Ethernet port, power supply, fan, disk drive, and an input output port. | 2012-11-15 |
20120290875 | METHODS AND STRUCTURE FOR STORING ERRORS FOR ERROR RECOVERY IN A HARDWARE CONTROLLER - Methods and structure for providing methods and structure for recovering errors in a hardware controller after an overwrite event, such as the detection of another error. In this regard, a link layer of the hardware controller is configured with a register that persistently stores errors until a processor can address them. The link layer is adapted to establish a connection between an initiator and a target and detect errors associated with the connection. As each detected error is overwritten by a subsequently detected error, the link layer register persistently stores the detected errors associated with the connection for recovery after the detected error has been overwritten in the link layer at least until the error can be handled. | 2012-11-15 |
20120290876 | System and Method for Delivering Content Over a Multicast Network - A system for delivering content over a network includes a server. The server is configured to divide the content into multiple segments, to create multiple data streams using the segments of the content, and to transmit each of the data streams via a respective multicast session, wherein a copy of each of the multiple segments is transmitted during a single time slot of the multicast session. | 2012-11-15 |
20120290877 | ADJUSTING A DATA STORAGE ADDRESS MAPPING IN A MAINTENANCE FREE STORAGE CONTAINER - A maintenance free storage container includes a plurality of storage servers, wherein the maintenance free storage container allows for multiple storage servers of the plurality of storage servers to be in a failure mode without replacement. The maintenance free storage container further includes a container controller operable to establish a first mapping of a plurality of virtual storage servers to at least some of the plurality of storage servers and facilitate storage of encoded data slices in the at least some of the plurality of storage servers. The container controller is further operable to when evaluation of storage server utilization information triggers an adjustment, adjust the first mapping to produce a second mapping, facilitate storage of new encoded data based on the second mapping, and facilitate modification of storage of the encoded data slices stored in accordance with the first mapping based on the data storage adjustment criteria. | 2012-11-15 |
20120290878 | ESTABLISHING TRUST IN A MAINTENANCE FREE STORAGE CONTAINER - A maintenance free storage container includes a plurality of storage servers, wherein the maintenance free storage container allows for multiple storage servers of the plurality of storage servers to be in a failure mode without replacement. The maintenance free storage container further includes a container controller operable to manage failure mode information of the plurality of storage servers, manage mapping of a plurality of virtual storage servers to at least some of the plurality of storage servers based on the failure mode information, communicate storage server access requests with a device external to the maintenance free storage container using addressing of the plurality of virtual storage servers, and communicate the storage server access requests within the maintenance free storage container using addressing of the plurality of storage servers. | 2012-11-15 |
20120290879 | METHOD AND DEVICE FOR MONITORING THE STATE OF A FACILITY - This invention provides method for detecting advance signs of anomalies, event signals outputted from the facility are used to create a separate mode for each operating state, a normal model is created for each mode, the sufficiency of learning data for each mode is checked, a threshold is set according to the results of said check, and anomaly identification is performed using said threshold. Also, for diagnosis, a frequency matrix is created in advance, with result events on the horizontal axis and cause events on the vertical axis, and the frequency matrix is used to predict malfunctions. Malfunction events are inputted as result events, and quantized sensor signals having anomaly measures over the threshold are inputted as cause events. | 2012-11-15 |
20120290880 | Real-Time Diagnostics Pipeline for Large Scale Services - Real-time diagnostics may be provided. A plurality of data feeds may be aggregated from at least one of a plurality of nodes. Upon determining that at least one element of at least one of the data feeds meets a trigger condition, an action associated with the trigger condition may be executed. | 2012-11-15 |
20120290881 | Using Central Direct Memory Access (CDMA) Controller to Test Integrated Circuit - In an embodiment, an integrated circuit includes a direct memory access (DMA) controller configured to perform DMA operations between peripheral components of the integrated circuit and/or a memory to which the integrated circuit is configured to be coupled. Combinations of memory-to-memory, memory-to-peripheral, and peripheral-to-memory operations may be used. The DMA controller may be programmed to perform a number of DMA operations concurrently. The DMA operations may be programmed and performed as part of testing the integrated circuit during design and/or manufacture of the integrated circuit. The DMA operations may cause many of the components in the integrated circuit to be busy performing various operations. In some embodiments, programmed input/output (PIO) operations may also be performed while the DMA operations are in progress. In some embodiments, various parameters of the DMA operations and/or PIO operations may be randomized. | 2012-11-15 |
20120290882 | SIGNAL PROCESSING DURING FAULT CONDITIONS - A system is configured to monitor a received signal. In response to detecting a fault condition associated with the received signal, the system sets a fault status indicator to indicate occurrence of the detected fault condition. The system sets a state of the fault status indicator for at least a predetermined amount of time to indicate occurrence of the detected fault condition. Subsequent to setting the fault status indicator for at least the predetermined amount of time to indicate the occurrence of the detected fault condition, the system monitors integrity of the signal again. After the predetermined amount of time, in response to detecting that there is no longer a fault associated with the monitored signal, the system modifies the fault status indicator to indicate absence of the fault condition. | 2012-11-15 |
20120290883 | Computer Implemented Method for Precise May-Happen-in-Parallel Analysis with Applications to Dataflow Analysis of Concurrent Programs - A computer implemented method for automatically for determining errors in concurrent program using lock localization graphs for capturing few relevant lock/unlock statements and function calls required for reasoning about interference at a thread location at hand, responsive to first and second threads of a concurrent program, constructing generalized lock causality graphs and computing cycle signatures, and determining errors in the concurrent program responsive to computing an interference graph and data flow analysis. | 2012-11-15 |
20120290884 | INFORMATION PROCESSING APPARATUS THAT DETECTS STARTUP ERROR, METHOD OF CONTROLLING THE SAME, AND STORAGE MEDIUM - An information processing apparatus which includes at least two controllers and is capable of positively detecting a startup error. Memory devices are connected to the controllers, respectively. A CPU of each controller accesses the memory device connected to the other controller via a bus bridge, identifies a startup stage to which the startup process has proceeded during the start of the self-controller, writes the identified startup stage as startup information into the memory device connected to the other controller, and detects whether or not an abnormality occurs during the startup of the other controller with reference to the startup information written into the memory device connected to the self-controller. | 2012-11-15 |
20120290885 | OVERSAMPLED CLOCK AND DATA RECOVERY WITH EXTENDED RATE ACQUISITION - In described embodiments, a transceiver supports two or more rates using an oversampling clock and data recovery (CDR) circuit sampling high rate data with a predetermined CDR sampling clock. A timing recovery circuit detects and accounts for extra or missing samples when oversampling lower rate data. An edge detector detects each actual data symbol edge and provides for an edge decision offset in a current instant's block of samples. An edge error is generated from the previous instant's actual and calculated edges; and an edge distance between actual edges of the current and previous instants is generated. Filtered edge distance and error are combined to generate a calculated edge position for the data symbol edge for the current instant. The edge decision offset is applied to the current calculated edge position to identify a sample value to generate a decision for the data symbol to detect the current data value. | 2012-11-15 |
20120290886 | LIGHTPATH DIAGNOSTICS WITH VOICE ALERTS - This disclosure relates generally to identifying and locating a failed or failing system component within a computer system, and more specifically to providing indicator lights and/or associated voice alerts to indicate, identify, and locate failed or failing system components within a computer system. A method for indicating a fault in a computer system in accordance with an embodiment includes: detecting a fault in the computer system; obtaining a problem definition associated with the fault; and generating an audible voice fault alert corresponding to the problem definition. | 2012-11-15 |
20120290887 | APPARATUS AND METHOD FOR TRANSMITTING AND RECEIVING DATA IN COMMUNICATION SYSTEM - An apparatus and a method for transmitting and receiving a signal in a communication system are provided. The method includes checking a type of the signal to be transmitted; determining a number of puncture bits according to the type of the signal; and puncturing an encoded signal to be transmitted according to the number of puncture bits. | 2012-11-15 |
20120290888 | Enhancing a receiver for improved impairment/fault detection when handling the reception of intermittent signals - One embodiment of a Test Signal generated by Test Signal Synthesis | 2012-11-15 |
20120290889 | HIGH-SPEED SERIAL INTERFACE BRIDGE ADAPTER FOR SIGNAL INTEGRITY VERIFICATION - A loopback card includes a connector configured to connect to an IO interface and emulate a storage device interface. The connector includes a port configured to receive a set of signals from the IO interface and transmit them to a redriver. The connector is configured to receive the set of signals from the redriver and transmit them from the redriver to the IO interface. The connector includes control signal inputs configured to receive control signals from the IO interface. The connector further includes one or more logic gates configured to receive the control signals. The one or more logic gates apply a logic operation on the control signals to generate an output and route the output to the IO interface through the connector. The redriver is operably connected to the port and configured to receive the set of signals from the port and transmit them back to the port. | 2012-11-15 |
20120290890 | METHOD OF AND AN ARRANGEMENT FOR AUTOMATICALLY MEASURING ELECTRIC CONNECTIONS OF ELECTRONIC CIRCUIT ARRANGEMENTS MOUNTED ON PRINTED CIRCUIT BOARDS - A method of and an arrangement for determining electric connections at a printed circuit board between boundary-scan compliant circuit terminals of one or more boundary-scan compliant devices. An electronic processing unit retrieves properties of the or each boundary-scan compliant device and a list comprising boundary-scan cells operable as a driver and/or sensor. Based on this list, a boundary-scan cell connected to a circuit terminal is operated as a driver, and at least one other boundary-scan cell connected to another circuit terminal is operated as a sensor. Data from the boundary-scan register, comprising the driver and sensor data, is stored in a storage device. The steps of operating boundary-scan cells as driver and sensor are repeated for a plurality of cells. The data stored are analyzed for determining electric connections. A result of the analysis is presented. | 2012-11-15 |
20120290891 | METHOD AND APPARATUS FOR DECODING LOW DENSITY PARITY CHECK CODE - A low-density parity check (LDPC) code decoding method may be provided. The LDPC code decoding method may linearize or perform step-approximation on a natural logarithm hyperbolic cosine function included in a check node updating equation of a sum-product algorithm used for decoding an LDPC code, and may convert the linearized function to correspond to a check node updating equation of a min-sum algorithm. | 2012-11-15 |
20120290892 | HIGH THROUGHPUT LDPC DECODER - According to one embodiment, a wireless communications device includes a low-density parity check (LDPC) decoder configured to receive a codeword associated with a parity check H-matrix. The LDPC decoder includes multiple processing elements coupled to a memory for storing the parity check H-matrix comprising R rows and C columns. Each processing element is configured to perform LDPC decoding on different rows of the H-matrix during multiple sub-iterations. A first portion of the processing elements are configured to process certain rows in an upward direction in the H-matrix relative to other rows and a second portion of the processing elements are configured to process other certain rows in a downward direction in the H-matrix relative to the other rows. | 2012-11-15 |
20120290893 | METHOD AND APPARATUS FOR DETECTING A PARITY ERROR IN A SEQUENCE OF DQPSK SYMBOLS OF A DIGITAL TRANSMISSION SYSTEM - The present disclosure relates to a method for detecting a parity error in a sequence of DQPSK symbols of a digital transmission system, comprising determining a first demodulated symbol r | 2012-11-15 |
20120290894 | MEMORY READ-CHANNEL WITH SIGNAL PROCESSING ON GENERAL PURPOSE PROCESSOR - Methods and apparatus are provided for processing a data value in a read channel of a memory device. The data value provided to a general purpose processor for processing. The data value is not decoded data and may comprise one or more of a raw data value and an intermediate data value. The data value can be provided to the general purpose processor, for example, upon a detection of one or more predefined trigger conditions. A data value can be obtained from a memory device and then be redirected to a general purpose processor. The data value is not decoded data. The redirection can be conditionally performed if one or more predefined bypass conditions exist. The general purpose processor is optionally time-shared with one or more additional applications. | 2012-11-15 |
20120290895 | CONTROLLER FOR DETECTING AND CORRECTING AN ERROR WITHOUT A BUFFER, AND METHOD FOR OPERATING SAME - An operational method of a controller for a flash memory may include receiving target data read out from the flash memory, outputting the received target data to a main memory, and generating an error detection syndrome related to the received target data after or simultaneously with completion of the output of the target data. | 2012-11-15 |
20120290896 | MEMORY CONTROLLER AND OPERATING METHOD OF MEMORY CONTROLLER - A method of operating a memory controller to control a memory device includes reading a read vector from the memory device and correcting one or more errors in the read vector, where a power consumed at the correcting is varied according to the number of errors in the read vector. | 2012-11-15 |
20120290897 | DATA STORAGE SYSTEM HAVING MULTI-BIT MEMORY DEVICE AND ON-CHIP BUFFER PROGRAM METHOD THEREOF - A data storage device includes a multi-bit memory device including a memory cell array, the memory cell array including a first memory region and a second memory region, and a memory controller including a buffer memory and configured to control the multi-bit memory device. The memory controller is configured to control the multi-bit memory device to execute a buffer program operation in which data stored in the buffer memory is stored in the first memory region, and to control the multi-bit memory device to execute a main program operation in which the data stored in the first memory region is stored in the second memory region. The memory controller is further configured to generate parity data based upon the data stored to the first region, the parity data being copied from the first memory region to the second memory region via the main program operation. | 2012-11-15 |
20120290898 | ADAPTIVE ENDURANCE CODING OF NON-VOLATILE MEMORIES - Adaptive endurance coding including a method for accessing memory that includes retrieving a codeword from a memory address. The codeword is multiplied by a metadata matrix to recover metadata for the codeword. The metadata includes a data location specification. The data in the codeword is identified in response to the metadata and the data is output as read data. | 2012-11-15 |
20120290899 | METHOD, DEVICE AND COMPUTER PROGRAM PRODUCT FOR DECODING A CODEWORD - A method and apparatus for decoding a codeword received from a flash memory. The flash memory comprises multi-level flash memory cells, wherein each multi-level flash memory cell stores one symbol of the codeword. An ECC decoder is arranged for decoding the codeword into a decoded codeword and correcting a maximum number of errors. The method determines the number of errors in the codeword. If the number of errors is more than the maximum number of errors that the ECC decoder can correct, the method generates modified codewords, calculates a corrective effect of a modified codeword, and determines a decoded codeword based on the corrective effect. | 2012-11-15 |
20120290900 | METHOD AND APPARATUS FOR GENERATING PACKET MASK - A method and apparatus generates a forward error correcting code for use with a plurality of source packets to be transmitted over a network. In one exemplary embodiment, the method comprises identifying a plurality of candidate packet masks and selecting that one of the masks that has the lowest expected residual packet loss value (“RPL”). RPL is calculated using an effective recovery rate, which is in turn is a function of at least one network performance parameter (such as packet loss) and one or more channel code parameters such as the number of source packets and/or FEC packets. The error correcting code can be generated using the selected packet mask and at least one of the source packets. | 2012-11-15 |
20120290901 | MEMORY CONTROLLER AND OPERATING METHOD OF MEMORY CONTROLLER - A controller to control a memory system including a memory device. The controlling the memory system may include calculating an error location polynomial in a received read vector with a key equation solving unit of the memory system to read data from the memory device, estimating the number of errors in the received read vector with a control unit of the memory system according to at least one of the calculated error location polynomial and information on the error location polynomial, searching error locations of the received read vector according to the calculated error location polynomial with a chien search unit of the memory system with the control unit. A cycle-per power consumption of the chien search unit may be adjusted with the control unit. A maximum correction time may be adjusted according to the number of errors of the read vector. | 2012-11-15 |
20120290902 | FAULT-TOLERANT NON-VOLATILE INTEGRATED CIRCUIT MEMORY - Apparatus and methods are disclosed, such as those that store data in a plurality of non-volatile integrated circuit memory devices, such as NAND flash, with convolutional encoding. A relatively high code rate for the convolutional code consumes relatively little extra memory space. In one embodiment, the convolutional code is spread over portions of a plurality of memory devices, rather than being concentrated within a page of a particular memory device. In one embodiment, a code rate of m/n is used, and the convolutional code is stored across n memory devices. | 2012-11-15 |
20120290903 | SEMICONDUCTOR APPARATUS AND INFORMATION PROCESSING APPARATUS - A semiconductor apparatus includes a delay circuit to apply delay to an input signal, a phase detector to detect a phase of an output signal which is outputted from the delay circuit, a filter to set a range of the phase of the output signal for stable operation based on phase information outputted from the phase detector, a counter to count a number of detections of the output signal when the phase deviates from the range for stable operation, a discount controller to generate a discount signal indicating a discount number for the number counted by the counter, in accordance with an operating condition or an external factor outside the delay circuit and an error detector to determine whether or not an error of the phase of the output signal has occurred based on the number counted by the counter and a discount number indicated by the discount signal. | 2012-11-15 |
20120290904 | ERROR GENERATION DIRECTION CIRCUIT, STORAGE UNIT, INFORMATION PROCESSING APPARATUS AND CONTROL METHOD OF ERROR GENERATION DIRECTION CIRCUIT - Determining whether or not an instruction execution part that executes an instruction from a processor meets an error generation condition; when an error setting direction that directs to set an error has been input, outputting a determination direction to determine whether or not the instruction execution part meets the error generation condition, and, in a case where the error generation condition is not met when the error setting direction has been input, again outputting, after a predetermined time has elapsed from the output of the determination direction, the determination direction; and outputting an error generation direction to the instruction execution part in a case where the instruction execution part meets the error generation condition by the determination are carried out. | 2012-11-15 |
20120290905 | SYSTEM AND METHOD FOR OPTIMIZING READ-MODIFY-WRITE OPERATIONS IN A RAID 6 VOLUME - A method is disclosed for updating parity information in a RAID 6 system wherein only one parity block is read during each write operation. Both parity blocks may be updated from the new data, the data being overwritten and either of the old blocks of parity information. A method for load balancing in a RAID 6 system using this method is also disclosed. | 2012-11-15 |
20120290906 | E Book Method - An electronic book dynamically created and updated with demographically targeted audio, video, images and text in response to customer query of interests, location, and other attributes. The present invention generally relates to the creation and publishing of electronic books and more specifically to a method and system for creating multimedia electronic books that have dynamically changeable video and audio content. The present invention also relates to a method and system for creating electronic books that contain demographically targeted dynamically changeable video, audio, image and text content | 2012-11-15 |
20120290907 | METHOD AND SYSTEM FOR ASSOCIATING SYNCHRONIZED MEDIA BY CREATING A DATAPOD - The present invention relates to a system and method for creating a Datapod™ that includes the synchronized association of media and data objects. One embodiment of the present invention involves creating a Datapod™ by acquiring a media object, annotating the media object with a data object, and associating the media object with the data object to form an ordered or synchronized relationship between the media object and data object which implicitly defines a visual/auditory or similar experiential connection. The present invention also provides its functionality with an easy to use user interface that enables the user to readily create the synchronous association and to share the resulting Datapod™ with the intended audience. | 2012-11-15 |
20120290908 | RETARGETING CONTEXTUALLY-RELEVANT USER-GENERATED DATA - Techniques for retargeting contextually-relevant user-generated data are described, including detecting an event associated with a widget embedded on a website, and configured to initiate a call to a service to retrieve content contextually relevant to the website, storing a file associated with a browser on a computing device, the file being configured to store the data, generating an identifier to send to the service when the file indicates the browser is configured to display other data associated with another website and being configured to provide a parameter to identify the content, retrieving the content using the identifier, the content being stored in a repository, rendering a display in an interface, and enabling a hyperlink associated with the content and configured to point to a website other than the website or another website, the content being retrieved from the website using a crawler. | 2012-11-15 |
20120290909 | METHODS AND APPARATUS OF ACCESSING RELATED CONTENT ON A WEB-PAGE - A computer implemented method is provided that includes accessing, with a web browser, a first web-page hosted on a first server, the webpage identified by a first Uniform Resource Identifier (“URI”), associating the first URI with one or more different URIs, and displaying indicia within the web browser of the one or more associated URIs, wherein the web browser renders the web-page content from the first server, and the indicia is rendered by a software module from a source separate from the host web-page, the indicia including a link to the associated URI. Numerous other aspects are provided. | 2012-11-15 |
20120290910 | RANKING SENTIMENT-RELATED CONTENT USING SENTIMENT AND FACTOR-BASED ANALYSIS OF CONTEXTUALLY-RELEVANT USER-GENERATED DATA - Techniques for ranking sentiment-related content using sentiment and factor-based analysis of contextually-relevant user-generated data is described, including generating a term, the term associated with a keyword and a factor, grouping user-generated content associated with the term, the user-generated content being retrieved by a crawler and stored in a database, assigning a rank to the term, the rank associated with one or more attributes of the user-generated content, and including a link associated with the term in a list, the list comprising a plurality of links associated with a plurality of terms, each of the plurality of terms having an assigned rank. | 2012-11-15 |
20120290911 | Method for Content Folding - The present invention relates to content folding of a web page to enable rendering of the web page on a resource-constrained device, and more particularly to interrelated methods, gateway and device for folding, unfolding and rendering of a web page with reduced layout attributes, thus being vertically elongated. Embodiments of the invention analyze the structure and content of the web page and subsequently fold content that carries less information and which would impair the user experience if left unfolded. Other embodiments of the invention unfold previously folded content at an end-users discretion. Embodiments of the invention further offer an integrated pagination solution for folded and unfolded web-pages, and overall customizes the web-page to maximize the user-experience on a device with constrained resources. | 2012-11-15 |
20120290912 | OBJECT CONTROL METHOD, OBJECT CONTROL PROGRAM, AND WeB SERVER - To direct the user's awareness towards a page linked from a specific element, a script (object control program) is embedded in a Web page to be transmitted from a Web server and then executed by a user terminal. It is assumed that a plurality of link elements (elements to which links to other Web pages are set up) are placed in the Web page. The computer terminal that executes the object control program places objects with a size covering the whole area of each link element in front of several link elements in a Web page containing a plurality of link elements and gradually scales down the displayed size of the objects. The link elements thereby gradually appear on the display. | 2012-11-15 |
20120290913 | COMPUTERIZED TOOL, SYSTEM AND METHOD FOR REMOTE ACCESS TO A COMPUTER PROGRAM - A computerized tool, system and method for virtual wrapping of a computer program, the computerized tool comprising: an event agent to identify a computer program running; and a form generator controlled by the event agent to automatically create a virtual wrap in web-page and/or win forms for the computer program, the virtual wrap comprising virtual objects which correspond to objects in the program, wherein the event agent controls the transmission of events from virtual objects in the virtual wrap to corresponding objects in the program and vice versa. | 2012-11-15 |
20120290914 | Hybrid Web Container for Cross-Platform Mobile Applications - The systems, methods and computer program products for designing cross-platform mobile applications that execute on multiple operating platforms. The mobile application is activated with a workflow that includes data from a data source. The mobile application includes a plurality of web files configured to cause the mobile application to manipulate data from the data source. At least one web file in the plurality of web files is configured to display one or more screens of the mobile application. At least one file in the plurality of web files is configured to implement business logic of the mobile application. The mobile application also includes a container service configured to communicate data between the mobile device and a data source. | 2012-11-15 |
20120290915 | ACCESSING A SECOND WEB PAGE FROM A DISPERSED STORAGE NETWORK MEMORY BASED ON A FIRST WEB PAGE SELECTION - A method begins, when a second web page is selected based on an element of a first web page, with a dispersed storage (DS) processing module determining dispersed storage network (DSN) location information for the second web page. The method continues with the DS processing module interpreting the DSN location information to request retrieval of a plurality of sets of at least a decode threshold number of encoded data slices from a DSN. The method continues with the DS processing module decoding, using a DS error coding function, a set of the plurality of sets of the least the decode threshold number of encoded data slices to reproduce an element of the second web page. | 2012-11-15 |
20120290916 | UNIFIED FILE ARRANGEMENTS - In general, a method includes receiving a request to present a file inventory on a display associated with the computing device, the file inventory graphically representing a plurality of files stored across two or more physical locations, accessing a first file stored on a local storage device of the computing device to record first information associated with the first file, accessing a second file stored on a remote storage device to record second information associated with the second file, generating the file inventory, the file inventory including the first information and the second information, and presenting the file inventory on the display. | 2012-11-15 |
20120290917 | Content Adaptation - A system includes a mobile device and an optimization server. The mobile device is capable of transmitting request data that includes a requested webpage and identification data. The optimization server is configured to receive response data that corresponds to the request data from a content server, to adapt the response data based on the identification data, and to transmit the adapted response data to the mobile device. | 2012-11-15 |
20120290918 | Content Adaptation - A system includes a mobile device and an optimization server. The mobile device is capable of transmitting request data that includes a requested webpage and identification data. The optimization server is configured to receive response data that corresponds to the request data from a content server, to adapt the response data based on the identification data, and to transmit the adapted response data to the mobile device. | 2012-11-15 |