48th week of 2011 patent applcation highlights part 68 |
Patent application number | Title | Published |
20110296345 | Technique For Determining And Indicating Strength Of An Item In A Weighted List Based On Tagging - A weighted list may be visually shown on a website, e.g., as a tag cloud, object cloud, etc. The font size of each item in the weighted list indicates its strength relative to the other items in the same. The strength of a weighted list item is determined based at least on individual weights associated with the users who applied a given tag to an object. For example, the item in the weighted list may represent the given tag in a tag cloud, or the object in an object cloud. The respective weights associated with the users when applying the given tag to the object may be different from one another because of different qualities of the users. For example, the weight associated with a user varies with the number of times the given tag was applied to that user. | 2011-12-01 |
20110296346 | ACTION TOOL BAR FOR MOBILE APPLICATIONS - According to one embodiment, a computer-implemented method for dynamically providing a tool bar in a user interface is provided. The method includes determining at least one action that is commonly performed based on data displayed on a current page of a graphical user interface of a communications device, creating a tool bar comprising at least one icon representing the at least one action, associating the tool bar with the current page of the graphical user interface, and providing the tool bar to the communications device for display on the current page of the graphical user interface. | 2011-12-01 |
20110296347 | TEXT ENTRY TECHNIQUES - Techniques for entering text are provided. In a particular implementation, a first input control is assigned to a particular group of text characters of a plurality of groups of text characters and a second input control is assigned to a particular text character based on user input. A user interface is displayed that includes the plurality of groups of text characters and indicates that the first input control corresponds to the particular group of text characters and that the second input control corresponds to the particular text character. | 2011-12-01 |
20110296348 | FAST GEOMETRY-BASED LIST-ENTRY SELECTION PROVIDING ASSOCIATED DATA RETRIEVAL FOR USE IN HAND-HELD AND OTHER DEVICES - A method for selecting an entry from a list of entries on an electronic device is described. The method includes a displaying at least a portion of a list of entries along with a plurality of distinct, non-overlapping groups of text characters, the groups displayed in a geometric pattern. Additional retrievable data can be associated with each entry and retrieved when that entry is selected. A group selection event selects a particular group of characters. A matching operation compares text characters of the selected group with those of each entry in the list. A smaller, modified list is created comprising entries comprising at least one text character of the selected group. At least a portion of the modified list is displayed, highlighting text characters matching text characters of the selected group. Group selection can result from user operation of geometrically associated keys, a touch sensitive display, or other directional input device. | 2011-12-01 |
20110296349 | RECENT CONTACTS AND ITEMS - The present invention provides a method and system of displaying items that gives the user the ability to easily access recently accessed items. The recent items list includes both incoming and outgoing correspondences that are attempted to be matched to the corresponding contact stored in the device. The user can access the recent contact list and reply using any communication method available. For instance, the user could reply by phone, email, send an instant messenger message, send an SMS message, and the like. The recent items list may also include items such as communications, contacts, folder, files, messages, applications, and the like. A coalesced list of the recently used items is shown so that an item is only shown once in the recent list. Any matched item in the recent list may also be shown in the alphabetical list that appears below the recent list. | 2011-12-01 |
20110296350 | APPARATUS AND METHOD OF DATA ORGANISATION - A method of organising data items in an n-dimensional space comprises, for each of a plurality of iterations, the step of generating a relative displacement of position for each data item within the n-dimensional space in accordance with a similarity value between each data item and respective other data items, the distance between each data item and respective other data items in the n-dimensional space, and the difference in position within the n-dimensional space between each data item and at least one reference point. | 2011-12-01 |
20110296351 | User Interface with Z-axis Interaction and Multiple Stacks - A user interface presents a plurality of items configured as a stack in a display of a device. The stack is scrollable in a direction oblique to a plane of the display for successively viewing the items in the stack. Some implementations provide multiple stacks of items laterally navigable into a viewable area of the display. | 2011-12-01 |
20110296352 | ACTIVE CALIBRATION OF A NATURAL USER INTERFACE - A system and method are disclosed for periodically calibrating a user interface in a NUI system by performing periodic active calibration events. The system includes a capture device for capturing position data relating to objects in a field of view of the capture device, a display and a computing environment for receiving image data from the capture device and for running applications. The system further includes a user interface controlled by the computing environment and operating in part by mapping a position of a pointing object to a position of an object displayed on the display. The computing environment periodically recalibrates the mapping of the user interface while the computing environment is running an application. | 2011-12-01 |
20110296353 | Method and system implementing user-centric gesture control - A user-centric method and system to identify user-made gestures to control a remote device images the user using a three-dimensional image system, and defines at least one user-centric three-dimensional detection zone dynamically sized appropriately for the user, who is free to move about. Images made within the detection zone are compared to a library of stored gestures, and the thus identified gesture is mapped to an appropriate control command signal coupleable to the remote device. The method and system also provides of a first user to hand off control of the remote device to a second user. | 2011-12-01 |
20110296354 | Content-Driven Navigation - Solutions for providing intuitive, content-driven navigation through communications and multimedia services offered through, e.g., a user supersystem as a communications hub. For example, in some implementations, various data flows are traversed to move between applications according to interactions with content on those screens, rather than by using icons. In some cases, a small, static set of icons is used to navigate between a set of landing screens representing broad categories of functionality. Within each landing screen environment, content is used to drive navigation to and through application functionality. | 2011-12-01 |
20110296355 | Techniques for self adjusting kiosk display information - Techniques for self adjusting kiosk display information are provided. Presentation information is centered within a display of the kiosk. A center location for the presentation information is custom recalibrated within the display based on direction of a user. | 2011-12-01 |
20110296356 | Unlocking a Device by Performing Gestures on an Unlock Image - A device with a touch-sensitive display may be unlocked via gestures performed on the touch-sensitive display. The device is unlocked if contact with the display corresponds to a predefined gesture for unlocking the device. The device displays one or more unlock images with respect to which the predefined gesture is to be performed in order to unlock the device. The performance of the predefined gesture with respect to the unlock image may include moving the unlock image to a predefined location and/or moving the unlock image along a predefined path. The device may also display visual cues of the predefined gesture on the touch screen to remind a user of the gesture. | 2011-12-01 |
20110296357 | Method For Providing A User Interface Using Three-Dimensional Gestures And An Apparatus Using The Same - Provided is a method capable of making various modifications to widgets, graphic objects, or images, which are displayed on a display device, according to motions of a plurality of input units such as finger or stylus pen, with the use of a three-dimensional multi-sensor configured to detect the motions of the input units in a space, without touching the display device. | 2011-12-01 |
20110296358 | Computing Resistance Sensitivities with Respect to Geometric Parameters of Conductors with Arbitrary Shapes - A computer system selects a shape included in an integrated circuit's layout file, and then selects a first contact and a second contact located on the shape. Next, the computer system computes a nominal resistance between the first contact and the second contact based upon a nominal boundary of the shape, and then computes an adjoint system vector based upon a perturbed boundary of the shape. Using the adjoint system vector, the computer system computes a resistance sensitivity between the first contact and the second contact. In turn, the computer system simulates the integrated circuit using the computed nominal resistance and the computed resistance sensitivity. | 2011-12-01 |
20110296359 | METHOD AND COMPUTER-READABLE MEDIUM OF OPTICAL PROXIMITY CORRECTION - A method optical proximity correction includes the following steps. First, a layout of an integrated circuit with an exposure intensity specification is provided. The integrated circuit includes a plurality of patterns and each pattern has an exposure intensity distribution. Second, a quadratic polynomial equation of each exposure intensity distribution is approximated. Third, a local extreme intensity of each exposure intensity distribution is computed by fitting the quadratic polynomial equation. Fourth, the local extreme intensity is determined whether violating the exposure intensity specification or not. Then, the layout is corrected when the local extreme intensity violates the exposure intensity specification. | 2011-12-01 |
20110296360 | METHOD FOR CHECKING AND FIXING DOUBLE-PATTERNING LAYOUT - A method and system checks a double patterning layout and outputs a representation of G0-rule violations and critical G0-spaces. The method includes receiving layout data having patterns, determining whether each distance between adjacent pattern elements is a G0-space, find all G0-space forming a G0-rule violation, finding all G0-space that are critical G0-spaces, and outputting a representation of G0-rule violations and critical G0-spaces to an output device. By resolving G0-rule violations and critical G0-spaces, a design checker can effectively generate a double patterning technology (DPT) compliant layout. | 2011-12-01 |
20110296361 | CIRCUIT ANALYSIS METHOD - A maximum delay of a combinational circuit is accurately reduced in consideration of a correlation between variations in delays of devices (transistors etc.) and interconnects. Circuit modification candidate information about a circuit modification candidate for improving a delay of a circuit to be designed is generated based on circuit information about the circuit to be designed, technology information about a distribution of a characteristic of a device and/or an interconnect based on a process to be designed, delay distribution information about a distribution of the delay in the circuit to be designed, and delay correlation information about a correlation between variations in the delay in the circuit to be designed. | 2011-12-01 |
20110296362 | SEMICONDUCTOR DEFECT INTEGRATED PROJECTION METHOD AND DEFECT INSPECTION SUPPORT APPARATUS EQUIPPED WITH SEMICONDUCTOR DEFECT INTEGRATED PROJECTION FUNCTION - The present invention comprises: a design layout data read part that acquires design layout data including location information of design circuit patterns used in steps of semiconductor fabrication; a wafer-chip information read part that acquires, from among data concerning a wafer on which a plurality of the design circuit patterns are formed per chip, wafer-chip information including at least design cell location information; a defect data read part that acquires defect data including location information of defects that occurred in the steps; a design layout data tracing processing part that creates a design layout data defect integrated projection display view by performing, based on the design layout data and the wafer-chip information, an integrated projection process on, among the design layout data, design layout data for a step in which a defect occurred and the defect data; and a defect integrated projection display apparatus that displays the design layout data defect integrated projection display view. | 2011-12-01 |
20110296363 | HIERACHICALLY-MODULAR NANOELECTRONIC DIFFERENTIAL AMPLIFIERS, OP AMPS, AND ASSOCIATED CURRENT SOURCES UTILIZING CARBON NANOTUBES, GRAPHENE NANORIBBONS, PRINTED ELECTRONICS, POLYMER SEMICONDUCTORS, OR OTHER RELATED MATERIALS - A method for implementing electronic circuit modules on elongated structures of semiconducting materials such as carbon nanotubes, graphene nanoribbons, elongated structures of semiconducting polymers or organic semiconductors, other related materials, and printed electronics strip structures is disclosed. The method provides that a plurality of modules can be implemented on distinct adjacent portions of the same elongated structure of semiconducting materials. In powering the modules, each circuit comprises a chain of electronic components arranged so that each end of the chain can function as a power supply terminal. Larger electronic circuit modules can be created from smaller module, and. such a modular hierarchy may be extended to an arbitrary number of levels. In a Computer Aided Design (CAD) applications for nanoelectronics and printed electronics, designs for hierarchies electronic circuit modules can be stored and retrieved from one or more a libraries of circuit designs. | 2011-12-01 |
20110296364 | METHOD AND APPARATUS FOR CUSTOM MODULE GENERATION - Some embodiments of the present invention create a layout for a circuit design which includes one or more circuit modules. The system can receive a nominal implementation of a circuit module, and a user-defined module generator capable of generating one or more custom implementations of the circuit module from an existing implementation of the circuit module. Next, the system can create the layout for the circuit design by executing the user-defined module generator on at least one processor to generate one or more custom implementations of the circuit module from the nominal implementation. The system can then use the one or more custom implementations of the circuit module in the layout. | 2011-12-01 |
20110296365 | EXTRACTING METHODS FOR CIRCUIT MODELS - The present invention relates to an extracting method for a circuit model, configured to represent output driving capability and an input capacitor of an interface pin of an application circuit. The extracting method comprises: receiving a netlist describing a circuit structure of the application circuit, which comprises a plurality of transistors; selecting an interface pin of the application circuit in the netlist; selecting a bias pin of the application circuit in the netlist; selecting at least one path between the interface pin and the bias pin in the netlist; and obtaining sum of equivalent width/length ratios according to the width/length ratios of all first transistors coupled to the at least one path. | 2011-12-01 |
20110296366 | METHOD OF MAKING ROUTABLE LAYOUT PATTERN USING CONGESTION TABLE - A method for generating a standard cell layout pattern for standard cell placement in an integrated circuit uses a congestion map. First, congestion zones are identified in a congestion map generated by an Electronic Design Automation (EDA) application. Next, routing tracks data corresponding to bounding boxes belonging to the congestion zones are used to calculate values of average vertical and horizontal congestion. Subsequently, a value of modified standard cell density is calculated based on the values of average vertical and horizontal congestion, and an unmodified standard cell density. The dimensions of a layout pattern unit are calculated using the value of the modified standard cell density and the width of standard cells. Various layout pattern units then are placed adjacent to one another to form a standard cell layout pattern. | 2011-12-01 |
20110296367 | Optimizing Cell Libraries for Integrated Circuit Design - A method co-optimizes a design and a library in such a way to choose the best set of cells to implement the design. The method takes into account the idea of limiting the number of new cells while reducing target costs and respecting design constraints. The method chooses a minimum nearly optimum set of cells to optimize a design. This involves the simultaneous optimization of a cell-based design and a cell library used to implement it. The invention can produce only an optimized library for a specific application, when the circuit is disregarded. The method takes into account a set of new cells described as finalized cells or as virtual cells, possibly having different transistor topologies, different sizes, different logic functions, and/or different cell template than the original library. | 2011-12-01 |
20110296368 | Optimizing Integrated Circuit Design Based on Cell Library - A method co-optimizes a design and a library in such a way to choose the best set of cells to implement the design. The method takes into account the idea of limiting the number of new cells while reducing target costs and respecting design constraints. The method chooses a minimum nearly optimum set of cells to optimize a design. This involves the simultaneous optimization of a cell-based design and a cell library used to implement it. The invention can produce only an optimized library for a specific application, when the circuit is disregarded. The method takes into account a set of new cells described as finalized cells or as virtual cells, possibly having different transistor topologies, different sizes, different logic functions, and/or different cell template than the original library. | 2011-12-01 |
20110296369 | OPERATION ANALYZING METHOD, OPERATION ANALYZING APPARATUS, OPERATION ANALYZING PROGRAM, AND OPERATION ANALYZING SYSTEM FOR SEMICONDUCTOR INTEGRATED CIRCUITS - An operation analyzing apparatus ( | 2011-12-01 |
20110296370 | METHODS AND SYSTEMS FOR GENERATING CROSS-MAPPING OF VENDOR SOFTWARE IN A CLOUD COMPUTING ENVIRONMENT - A compatibility service can determine the compatibility of different software programs provide by different vendors in a cloud. The compatibility service can identify the software programs provided by different vendors in the cloud and which of the identified software programs are compatible. The compatibility service can generate and store a record of the compatible software programs and provide identification, tracking, and mapping services based on the record. | 2011-12-01 |
20110296371 | Creating A Test Progression Plan - Automatically creating a progression plan for a software test, by computing for each test period unit x the effort for attempting to perform test units, ATTx, and the effort for completing test unit execution, CCx. Three variables characterizing the test strategy are introduced in the computation: the Effectiveness, which represents the efficiency of the test team, the Defect Density rate, and the Verify rate value. By choosing the test strategy, the test manager defines the three variables' values which influence the progression plan. During test execution, a cumulative ‘attempted’ curve of the ATTx values and a cumulative ‘complete’ curve of the CCx values allow the test manager to compare the effort already made to the effort expected to be made for the Test Units which have been attempted and for the Test Units which have been completed, i.e. when the defects found in the code have been corrected. | 2011-12-01 |
20110296372 | DEPLOYMENT ENVIRONMENT SYSTEMS, METHODS, AND APPARATUSES FOR DEVELOPING APPLICATIONS AND DIAGNOSTIC PRICE AND/OR TIME QUOTE DETERMINATION SYSTEMS, METHODS, AND APPARATUSES FOR APPLICATION DEVELOPMENT SERVICES - A server receives a request from a client to provide a price and/or time quote and transmits initial diagnostic questions. The server receives a response to the initial questions and generates a initial cost range and/or time range estimate quote based on weighting pre-assigned in a knowledge base to information included in the response. The weightings assigned to possible responses are based on analysis of historical data. The server transmits the initial cost and/or time estimate quote to the client. Further, the server may refine the initial cost range and/or time range estimate quote in response to a request. Refining may includes generating additional diagnostic questions, receiving a responses, generating a refined quote based on a weighting pre-associated in the knowledge base with information included in the responses, and transmitting the refined quote to the client. Refining the quote may be an iterative process. | 2011-12-01 |
20110296373 | COMMAND LINE SHELL COMMAND GENERATION BASED ON SCHEMA - A code generator tool capable of creating command shell commands at compile time or runtime from a schema such as an XSD schema is provided. The code generator generates classes to represent data defined by a schema and the command shell generation code may use knowledge of the classes to generate appropriate command shell classes to manipulate the data. Plug-ins may be inserted following optimization of a model of classes generated by the code generation tool. The plug-ins can modify the model, insert their own code, or disable code generation and generate their own code from the model. | 2011-12-01 |
20110296374 | CUSTOM LANGUAGE MODELS - Systems, methods, and apparatuses including computer program products for generating a custom language model. In one implementation, a method is provided. The method includes receiving a collection of documents; clustering the documents into one or more clusters; generating a cluster vector for each cluster of the one or more clusters; generating a target vector associcated with a target profile; comparing the target vector with each of the cluster vectors; selecting one or more of the one or more clusters based on the comparison; and generating a language model using documents from the one or more selected clusters. | 2011-12-01 |
20110296375 | ADDING DIRECTIVES FOR JAVASCRIPT FILES DIRECTLY INTO SOURCE CODE IN A MULTI-TENANT DATABASE ENVIRONMENT - In a method, system, and computer-readable medium having instructions for adding directives for JavaScript files directly into source code, a source file for preprocessing is received and the source file is written in a client-side scripting language, the source file is parsed, directive information is identified within the source file, metadata is associated with the directive during preprocessing, metadata associated is retrieved with a preprocessed directive, a request to access metadata associated with a preprocessed directive in the source file is received and the preprocessed directive is the directive from the source file, and at least a portion of markup language is generated for a web page in accordance with metadata associated with the preprocessed directive in response to the request. | 2011-12-01 |
20110296376 | Dynamically Injecting Behaviors Into Flex View Components - Systems, methods and articles of manufacture for dynamically injecting behaviors into view components are described herein. In an embodiment, a view component resides in an MXML file, while its behavior code (e.g., ACTIONSCRIPT) is stored in a separate file (e.g., .as file). In this way, the view component can be reused in separate applications where different behaviors may be applied to the same view component. In addition, because the behavior code is stored in a separate file, the behavior code is easier to read and maintain. Furthermore, behaviors can be dynamically (i.e., at runtime) injected into and un-injected from the view component. Embodiments of the invention also allow multiple behaviors to be injected into the same view component. | 2011-12-01 |
20110296377 | DEPLOYMENT SCRIPT GENERATION AND EXECUTION - Aspects of the subject matter described herein relate to deployment scripts. In aspects, in conjunction with creating a package for deploying software to a target, an installation script is also created. The installation script includes instructions for deploying the software in the package to one or more targets. The installation script is human-readable and readily modifiable. A software development tool may provide a seamless interface that allows a software developer to view, edit, execute, and debug the installation script on a local or remote target. | 2011-12-01 |
20110296378 | METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR HIERARCHICAL PROGRAM SOURCE MANAGEMENT - A method, a system and a computer program product for hierarchical program source management retrieve a main program from a memory and initiate a layer representing a portion of the main program for editing on the display. Program code is edited within the layer in response to detected user programming inputs. A layer abstract syntax tree corresponding to the edited program code is generated. The layer abstract syntax tree is compared with a main program abstract syntax tree and a layer file is generated including the differences between the layer abstract syntax tree and the main program abstract syntax tree. | 2011-12-01 |
20110296379 | AUTOMATED METHOD FOR DECOUPLING AVIONICS APPLICATION SOFTWARE IN AN IMA SYSTEM - A method to decouple software in an integrated modular system that employs message-based data exchange is provided. The method includes generating at least one configuration table for use by core software in at least one module in the integrated modular system. The at least one module hosts at least one of a consuming application. The method also includes gathering parameter data from producer messages at the core software in the at least one module based on the generated configuration table, and creating target messages at the core software based on the gathered parameter data. The target messages have a format specific to the consuming application. | 2011-12-01 |
20110296380 | METHODS AND SYSTEMS FOR PRESENTING DIFFERENT VERSIONS OF AN APPLICATION - Methods and systems for presenting different versions of an application are described. In one example, a selection of a version of application code is received. Such a selection may include a simultaneous selection of all versions. Information about the selected version is retrieved. A description of features contained within the selected version is presented and then a version summary for each listed feature is displayed, together with the description of features, to indicate the versions of the application code that contain the respective feature. | 2011-12-01 |
20110296381 | ADDING DIRECTIVES FOR VERSIONS OF JAVASCRIPT FILES DIRECTLY INTO SOURCE CODE IN A MULTI-TENANT DATABASE ENVIRONMENT - In a method, system, and computer-readable medium having instructions for adding directives for versions of JavaScript files directly into source code, a source file for preprocessing is received and the source file is written in a client-side scripting language, the source file is parsed, directive information is identified for a directive within the source file and the directive information comprises data on at least a portion of a client-side scripting language file and a mode, a version of the source file for the mode is created and the version of the source file comprises source code from the source file and the at least a portion of the client-side scripting language file, and metadata is associated with the directive and the version of the source file. | 2011-12-01 |
20110296382 | Mechanism for Dynamic Software Testing Using Test Entity - A mechanism for performing dynamic software testing on a computer system using a test entity. A method of embodiments of the invention includes causing a test execution script to run a test based on a first configuration setting as defined in the test execution script. The test execution script is executed in a script execution environment utilizing a software framework of a computer system. The method further includes modifying, in runtime, the first configuration setting into a second configuration setting, and causing, in runtime, the test execution script to rerun the test based on the second configuration setting. | 2011-12-01 |
20110296383 | Mechanism for Performing Dynamic Software Testing Based on Test Result Information Retrieved in Runtime Using Test Result Entity - A mechanism for performing dynamic software testing on a computer system based on test result information retrieved in runtime using test result entity. A method of embodiments of the invention includes causing a test execution script to run a first test to test a first component, and the test execution script is supported by a script execution platform on a computer system, and the first component depends on a second component. The method further includes retrieving, in runtime, testing information relating to the second component from a database, if the first test produces unsatisfactory results relating to performance of the first component, and causing, in runtime, the test execution script to run a second test to test the second component. | 2011-12-01 |
20110296384 | Mechanism for Performing Dynamic Software Testing Based on Grouping of Tests Using Test List Entity - A mechanism for performing dynamic software testing on a computer system based on grouping of tests using a test list entity. A method of embodiments of the invention includes causing execution a first group of first tests based on a first set of configuration settings, and executing the first group includes enabling a test execution script to run the first tests according to the first set of configuration settings, and the test execution script is hosted at a test execution platform of a computer system. The method further includes facilitating creation, in runtime, a second group of second tests based on a second set of configuration settings that is different from the first set of configuration settings, and causing execution, in runtime, the second group of second tests, and executing the second group includes enabling the test execution script to run the second tests according to the second set of configuration settings. | 2011-12-01 |
20110296385 | Mechanism for Generating Backtracing Information for Software Debugging of Software Programs Running on Virtual Machines - A mechanism for generating backtracing information for software debugging of software programs running on virtual machines. A method of embodiments of the invention includes probing a virtual machine of a computer system, the virtual machine to run a software program, accessing compiler-generated output at a storage medium of the computer system, the compiler-generated output having debug information relating to the virtual machine, and obtaining the debug information from the compiler-generated output. The method further includes generating backtracing information of the software program using the debug information, and providing the backtracing information for debugging of the software program. | 2011-12-01 |
20110296386 | Methods and Systems for Validating Changes Submitted to a Source Control System - In accordance with embodiments, there are provided mechanisms and methods for validating changes before submission to a source control system, which can provide developers with a remote server where changelists may be uploaded, specified tests may be run, and results may be returned to the developer. The ability to provide a remote server for changelist uploads, automated source code compilations, automated test executions, and the automatic return of results, tends to enable developers to quickly and efficiently make source code design changes and avoid to build breakages. | 2011-12-01 |
20110296387 | SEMAPHORE-BASED MANAGEMENT OF USER-SPACE MARKERS - A probe management system identifies a probe module for an application, which includes a semaphore table that has entries for a plurality of probe points in the application. An entry includes a semaphore variable value for a probe point. The probe management system identifies one or more probe points that are to be activated from an introspection user script. The user script is for examining the execution of the application at one or more of the probe points in the application. The probe management system adjusts the semaphore variable values for the identified probe points in the semaphore table in the probe module to represent to the application that a probe point is to be activated and causes the application to activate the identified probe points based on the adjusted semaphore variable values in the semaphore table. | 2011-12-01 |
20110296388 | STATIC ANALYSIS USING INTERACTIVE AND INTEGRATION TOOLS - Systems, methods, and computer storage media having computer-executable instructions embodied thereon that facilitate static software program analysis using an interactive tool and/or a disassembly integration tool are provided. An interactive tool enables a user to view alternative error paths in association with an error such that the user can identify any valid errors within program code. A disassembly integration tool provides source code that is interleaved with an intermediate representation of such source code. | 2011-12-01 |
20110296389 | Mechanism for Allocating Statement Frontier Annotations to Source Code Statements - A mechanism for allocating statement frontier annotations to source code statements of a software program is disclosed. A method of embodiments of the invention includes generating statement frontier annotations during translation of source code statements of a software program on a computer system. The method further includes allocating the statement frontier annotations to the source code statements, wherein a statement frontier annotation indicates a frontier of a source code statement to which the statement frontier annotation is allocated. | 2011-12-01 |
20110296390 | SYSTEMS AND METHODS FOR GENERATING MACHINE STATE VERIFICATION USING NUMBER OF INSTALLED PACKAGE OBJECTS - Embodiments relate to systems and methods for generating a machine state verification using a number of installed package objects. A physical or virtual client machine can host a set of installed software packages, including operating system, application, and/or other software. A package manager installed on the client machine can track the installed package complement, and updates available for those packages. To verify that a target of a package update is prepared and in the correct state to receive the update, the package manager inventory the set of package objects installed on the client machine. The resulting sum can be reported to a remote management platform, such as a package server. The counted package objects can be the packages themselves, and/or their set of component files. Machines having a package sum that does not match an expected target number can have a package re-installation performed, and/or other diagnostics carried out. | 2011-12-01 |
20110296391 | Systems and Methods for Dynamically Replacing Code Objects Via Conditional Pattern Templates - The present application is directed towards systems and methods for dynamically creating a substitution template from a conditional pattern template to transform code objects from a source installation to a target installation. Variable tokens in a pattern template may be dynamically replaced with corresponding values from a source object, and conditional statements of the pattern template analyzed and dynamically applied to build a substitution template for creating a replacement object for the source object. | 2011-12-01 |
20110296392 | NAVIGATION SYSTEM WITH DYNAMIC APPLICATION EXECUTION MECHANISM AND METHOD OF OPERATION THEREOF - A method of operation of a navigation system includes: detecting a source application for registering the source application to a target device; generating a first application portion for partitioning the source application for running the first application portion; and operating the first application portion for interacting with the source application for partially controlling an execution of the source application. | 2011-12-01 |
20110296393 | SYSTEMS AND METHODS FOR GENERATING AN ENCODED PACKAGE PROFILE BASED ON EXECUTING HOST PROCESSES - Embodiments relate to systems and methods for generating an encoded package profile based on executing host processes. A physical or virtual client machine can host a set of installed software packages, including operating system, application, and/or other software. A package manager tracks the set of installed packages and updates available for the installed set. The package manager and/or other logic can identify currently executing processes on the client, and determine which package(s) corresponding to that set of executing processes are hosted on the client. The package manager can generate a report to a package server and/or other remote management platform to perform management operations on the client, such as, for example, to terminate executing processes on a target client to permit package update processes to take place. Other network management actions, such as inventorying or grouping virtual machines in a cloud or other network, can likewise be performed. | 2011-12-01 |
20110296394 | SYSTEMS AND METHODS FOR GENERATING CACHED REPRESENTATIONS OF ENCODED PACKAGE PROFILE - Embodiments relate to systems and methods for generating cached representations of an encoded package profile. A physical or virtual client machine can host a set of installed software packages, including operating system, application, and/or other software. A package manager installed on the client machine can track the installed package complement, and updates available for those packages. The package manager can be configured to capture attributes of the set of installed packages, and generate an encoded identification of the installed packages using a hash or other algorithm. The encoded identification can be transmitted to one or more package servers or other management platform. The package server(s) can receive and decode the identifier, and insert that identifier and other package-related data into a local package cache. The package server(s) or other platform can configure package update or other activity using the cached representation of package profiles for one or more client machines. | 2011-12-01 |
20110296395 | SYSTEMS AND METHODS FOR GENERATING CLIENT QUALIFICATION TO EXECUTE PACKAGE UPDATE MANAGER - A compatibility tool can certify compliance between software packages managers, used by or known to a user, and software packages to be updated or installed on a computing system. Additionally, the compatibility tool can identify a software package manager that is compatible with the software packages to be updated or installed, if the user does not have or know of a compatible software package manager. To certify software package managers or identify compatible software package managers, the compatibility tool can maintain a database of software package managers associated with software packages that are compatible with the software package managers. | 2011-12-01 |
20110296396 | Mechanism for Dynamically Generating Spec Files for Software Package Managers - A mechanism for dynamically generating spec files for software package managers is disclosed. A method of embodiments of the invention includes extracting, via a file developer at an application server of a computer system, file information from project files of a software package tool associated with a software application, the file information relating to the software application, and generating, via the file developer, a package spec file using the extracted file information such that the package spec file is compatible with the software application. | 2011-12-01 |
20110296397 | SYSTEMS AND METHODS FOR GENERATING CACHED REPRESENTATIONS OF HOST PACKAGE INVENTORIES IN REMOTE PACKAGE REPOSITORIES - Embodiments relate to systems and methods for generating cached representations of host package inventories in remote package repositories. A physical or virtual client machine can host a set of installed software packages, including operating system, application, and/or other software. A package manager installed on the client reports an inventory of the installed packages to one or more package servers. The package server(s) can receive the inventory from machines populating the managed network, and generate an encoded identification for each constituent package, such as a hash-based output based on package attributes. The encoded identification and other data can be stored to an aggregate package cache in the one or more package servers, for more efficient management of the host machines in the managed network. In embodiments, the package update files for each identifier can also be stored in the cache for even more efficient inventorying and package update operations. | 2011-12-01 |
20110296398 | SYSTEMS AND METHODS FOR DETERMINING WHEN TO UPDATE A PACKAGE MANAGER SOFTWARE - Embodiments relate to systems and methods for determining when to update a package manager software on a client. An update tool can interface with a package manager running a first version of the package manager software to inspect an available update to a package installed on the client. The update tool can determine that a second version of the package manager software is require to install the update to the package. The update tool can access the second version of the package manager software, remove the first version of the package manager software from the package manager, and unpack and install the second version of the package manager software on the package manager. Further, the update tool can install the update to the package installed on the client, and can update other resources associated with the client as appropriate. | 2011-12-01 |
20110296399 | METHOD AND SYSTEMS FOR THE MANAGEMENT OF NON VOLATILE ITEMS AND PROVISIONING FILES FOR A COMMUNICATION DEVICE WITH MULTIPLE SERVICE ACCOUNTS - Methods and systems enable communication devices equipped with software defined radio based chipset modules to seamlessly re-program the communication device to operate on any of a variety of service provider networks. By re-programming a communication device equipped with software defined radio based chipset module, the communication device can support communications over both UMTS and CDMA communication networks. An environment is provided which allows a user to quickly and efficiently switch between service provider accounts supporting communications. | 2011-12-01 |
20110296400 | INFORMATION PROCESSING APPARATUS AND METHOD FOR TRANSFERRING LICENSE - An information processing apparatus includes an install unit to receive install data for software to install the software for providing a function, an acquisition unit to acquire a license file for activating the function, a management unit to manage information indicative of presence or absence of a license to use the function, independently of presence or absence of the license file, and an update unit to update the information indicative of presence or absence of the license upon transferring the license between apparatuses. | 2011-12-01 |
20110296401 | ONLINE MARKETPLACE FOR PRE-INSTALLED SOFTWARE AND ONLINE SERVICES - The subject disclosure relates to pre-installed software and services, such as online services, and markets for pre-installed software and online services. In one aspect, the disclosed subject matter facilitates contracting between software vendors and device manufacturers or redistributors for placement and/or conversion of software applications or services in devices. As further advantages, embodiments of the disclosed subject matter can provide transparency into markets for device placement and can facilitate detailed contract performance tracking. Further non-limiting embodiments are provided that illustrate the advantages and flexibility of the disclosed subject matter. | 2011-12-01 |
20110296402 | SOFTWARE LICENSE SERVING IN A MASSIVELY PARALLEL PROCESSING ENVIRONMENT - Techniques for implementing software licensing in a massive parallel processing environment on the basis of the actual use of licensed software instances are disclosed. In one embodiment, rather than using a license server or a node-locked license strategy, each use of a licensed software instance is monitored and correlated with a token. A store of tokens is maintained within the licensing system and a token is consumed after each instance successfully executes. Further, a disclosed embodiment also allows jobs that execute multiple software instances to complete execution, even if an adequate number of tokens does not exist for each remaining software instance. Once the license tokens are repurchased and replenished, any overage consumed from previous job executions may be reconciled. In this way, token-based licensing can be adapted to large scale computing environments that execute jobs of large and unpredictable sizes, while the cancellation of executing jobs may be avoided. | 2011-12-01 |
20110296403 | SYSTEMS AND METHODS OF CREATING AND ACCESSING SOFTWARE SIMULATED COMPUTERS - The system and methods of the present application comprise one or more computers that generate and maintain a plurality of software-simulated computers. Each software-simulated computer is adapted to efficiently run an installed application program. Additional security layers provide access to the installed application through a remote user interface installed on a user's computing device. The system generates a new copy of the software-simulated computer for each user session, that prevents configuration problems from interfering with the proper operation of the application program, thereby consistently running the application in an optimized fashion, regardless of changes made to the software-simulated computer by the user or a virus. These software-simulated computers are unaffected by changes a user makes on their own client device. To this end, the system provides robust, web accessible capabilities to application software that may not have been adapted for use on the Internet. | 2011-12-01 |
20110296404 | SYSTEMS AND METHODS FOR HOST-LEVEL DISTRIBUTED SCHEDULING IN A DISTRIBUTED ENVIRONMENT - A system for host-level distributed scheduling of a software installation in a distributed computer environment is disclosed. An information handling system includes an out-of-band processor operable to communicatively connect to a second information handling system via a network. The information handling system is configured to: retrieve an identifier indicative of a software installation consequent to a software installation request being invoked; download a software installation package via the network, where the software installation package includes a payload; store the payload in an image repository; schedule the software installation to occur based, at least in part, on the identifier and a timing parameter; store software installation information in a nonvolatile memory medium; and perform the software installation according to the scheduling. The scheduling and the performing of the software installation is without dependency on communicative connection to the network. | 2011-12-01 |
20110296405 | INFORMATION PROCESSING DEVICE - An information processing device includes an installation unit which downloads installation data of an application program corresponding to a function from an external device and installs the application program. A license acquisition unit acquires a license file from an external device in order to activate the function. A license managing unit manages presence of a license of the function independently of presence of the license file. A license transfer managing unit transfers the license from a source device to a destination device and updates the presence of the license of the function. An automatic return unit automatically returns the transferred license to the source device according to automatic return conditions stored in the information processing device. | 2011-12-01 |
20110296406 | HYPERVISOR SCHEDULER - Techniques for configuring a hypervisor scheduler to make use of cache topology of processors and physical memory distances between NUMA nodes when making scheduling decisions. In the same or other embodiments the hypervisor scheduler can be configured to optimize the scheduling of latency sensitive workloads. In the same or other embodiments a hypervisor can be configured to expose a virtual cache topology to a guest operating system running in a virtual machine. | 2011-12-01 |
20110296407 | EXPOSURE OF VIRTUAL CACHE TOPOLOGY TO A GUEST OPERATING SYSTEM - In a virtual machine environment, a hypervisor is configured to expose a virtual cache topology to a guest operating system, such that the virtual cache topology may be provided by corresponding physical cache topology. The virtual cache topology may be determined by the hypervisor or, in the case of a datacenter environment, may be determined by the datacenter's management system. The virtual cache topology may be calculated from the physical cache topology of the system such that virtual machines may be instantiated with virtual processors and virtual cache that may be mapped to corresponding logical processors and physical cache. | 2011-12-01 |
20110296408 | System and Method for Implementing a Secure Client Hosted Virtualization Service Layer in an Information Handling System - A client hosted virtualization system (CHVS) has a non-volatile memory that includes BIOS code and virtualization manager code that operates to initialize the CHVS and to launch a virtual machine. The CHVS establishes a secure communication channel with a client update system via a network interface, receives an update to the virtualization manager code, authenticates the update and overwrites the non-volatile memory with the update. The CHVS is configurable to execute the BIOS and not virtualization manager, or to execute the virtualization manager and not the BIOS. | 2011-12-01 |
20110296409 | System and Method for Pre-Boot Authentication of a Secure Client Hosted Virtualization in an Information Handling System - A client hosted virtualization system (CHVS) includes a processor to execute code, a component, and a non-volatile memory. The non volatile memory includes BIOS code and code to implement a virtualization manager. The virtualization manager is operable to initialize the CHVS, launch a virtual machine on the CHVS, and assign the component to the virtual machine, such that the virtual machine has control of the component. The CHVS is configurable to execute the BIOS and not the virtualization manager, or to execute the virtualization manager and not the BIOS. | 2011-12-01 |
20110296410 | System and Method for Fuse Enablement of a Secure Client Hosted Virtualization in an Information Handling System - A client hosted virtualization system includes a processor to execute code, a non-volatile memory, and a switch. The memory includes code to implement a basic input/output system (BIOS) for the CHVS, and code to implement a virtualization manager. The virtualization manager is operable to initialize the CHVS, authenticate a virtual machine image associated with a virtual machine, and launch the virtual machine on the CHVS. The switch is operable to select one of a first state and a second state. The processor operates to execute the BIOS code when the switch is in the first state and to execute the virtualization manager code when the switch is in the second state. | 2011-12-01 |
20110296411 | Kernel Bus System to Build Virtual Machine Monitor and the Performance Service Framework and Method Therefor - Some embodiments concern a kernel bus system for building at least one virtual machine monitor. The kernel bus system is based on kernel-based virtual machine. The kernel bus system is configured to run on a host computer. The host computer comprising one or more processors, one or more hardware devices, and memory. The kernel bus system can include: (a) a hyperbus; (b) one or more user space components; (c) one or more guest space components configured to interact with the one or more user space components via the hyperbus; (d) one or more VMM components having one or more frontend devices configure to perform I/O operations with the one or more hardware devices of the host computer using a zero-copy method or non-pass-thru method; (e) one or more para-virtualization components having (1) a virtual interrupt configured to use one or more processor instructions to swap the one or more processors of the host computer between a kernel space and a guest space; and (2) a virtual I/O driver configured to enable synchronous I/O signaling, asynchronous I/O signaling and payload delivery, and pass-through delivery independent an QEMU emulation; and (f) one or more KVM components. The hyperbus, the one or more user space components, the one or more guest space components, the one or more VMM components, the one or more para-virtualization components, and the one or more KVM components are configured to run on the one or more processors of the host computer. Other embodiments are disclosed. | 2011-12-01 |
20110296412 | APPROACHES FOR SECURING AN INTERNET ENDPOINT USING FINE-GRAINED OPERATING SYSTEM VIRTUALIZATION - Approaches for executing untrusted software on a client without compromising the client using micro-virtualization to execute untrusted software in isolated contexts. A template for instantiating a virtual machine on a client is identified in response to receiving a request to execute an application. After the template is identified, without human intervention, a virtual machine is instantiated, using the template, in which the application is to be executed. The template may be selected from a plurality of templates based on the nature of the request, as each template describe characteristics of a virtual machine suitable for a different type of activity. Selected resources such as files are displayed to the virtual machines according to user and organization policies and controls. When the client determines that the application has ceased to execute, the client ceases execution of the virtual machine without human intervention. | 2011-12-01 |
20110296413 | METHODS AND SYSTEMS FOR GENERATING A DYNAMIC WORKFLOW IN A MULTI-TENANT DATABASE ENVIRONMENT - Techniques and systems for modifying a virtual machine functionality. Archive files each including at least a class files are received. The archive files are stored within the virtual machine. The virtual machine runs on a host system and neither the virtual machine nor the host system are restarted in response to the receiving or storing of the archive files. Files of the host system are scanned to find class files that are not included in a class path for the virtual machine. The class files are copied to a class path for the virtual machine. Neither the virtual machine nor the host system are restarted in response to the copying of the class files. The classes corresponding to the class files are registered in the virtual machine in response to the copying of the class files to the class path. Neither the virtual machine nor the host system are restarted in response to the registration of the classes. | 2011-12-01 |
20110296414 | UPGRADING ROLES IN A ROLE-BASED ACCESS-BASED CONTROL MODEL - Management roles in a role-based framework may be upgraded by updating existing management roles, updating derived roles, and deprecating or reducing existing and derived roles in the role-based framework. The existing management roles may include a set of existing role entries for defining an action using parameters, scripts, application program interface calls, and a special permission for enabling performance of tasks defined by the management roles. The derived roles may include custom management roles derived from the existing management roles in the role-based framework. | 2011-12-01 |
20110296415 | TASKING SYSTEM INTERFACE METHODS AND APPARATUSES FOR USE IN WIRELESS DEVICES - Techniques are provided which may be implemented in various methods and/or apparatuses that to provide a tasking system buffer interface capability to interface with a plurality of shared processes/engines. | 2011-12-01 |
20110296416 | METHOD AND APPARATUS FOR MANAGING AN APPLICATION BEING EXECUTED IN A PORTABLE TERMINAL - A method and an apparatus are provided for preventing battery power consumption and degradation of system performance due to the system resources being utilized by applications being executed, while providing a multi-tasking function through a plurality of applications. In the method, when a plurality of applications are executed, such execution of the plurality of applications is reported to the user, so as to enable the user to terminate one or more applications, thereby preventing unnecessary consumption of battery power. | 2011-12-01 |
20110296417 | METHOD AND APPARATUS FOR MANAGING AN APPLICATION BEING EXECUTED IN A PORTABLE TERMINAL - A method and an apparatus are provided for preventing battery power consumption and degradation of system performance due to the system resources being utilized by applications being executed, while providing a multi-tasking function through a plurality of applications. In the method, when a plurality of applications are executed, such execution of the plurality of applications is reported to the user, so as to enable the user to terminate one or more applications, thereby preventing unnecessary consumption of battery power. | 2011-12-01 |
20110296418 | METHOD AND APPARATUS FOR MANAGING AN APPLICATION BEING EXECUTED IN A PORTABLE TERMINAL - A method and an apparatus are provided for preventing battery power consumption and degradation of system performance due to the system resources being utilized by applications being executed, while providing a multi-tasking function through a plurality of applications. In the method, when a plurality of applications are executed, such execution of the plurality of applications is reported to the user, so as to enable the user to terminate one or more applications, thereby preventing unnecessary consumption of battery power. | 2011-12-01 |
20110296419 | EVENT-BASED COORDINATION OF PROCESS-ORIENTED COMPOSITE APPLICATIONS - A process model specified using, for example, UML activity diagrams can be translated into an event-based model that can be executed on top of a coordination middleware. For example, a process model may be encoded as a collection of coordinating objects that interact with each other through a coordination middleware including a shared memory space. This approach is suitable for undertaking post-deployment adaptation of process-oriented composite applications. In particular, new control dependencies can be encoded by dropping new (or enabling existing) coordinating objects into the space and/or disabling existing ones. | 2011-12-01 |
20110296420 | METHOD AND SYSTEM FOR ANALYZING THE PERFORMANCE OF MULTI-THREADED APPLICATIONS - A method and system to provide an analysis model to determine the specific problem(s) of a multi-threaded application. In one embodiment of the invention, the multi-thread application uses a plurality of threads for execution and each thread is assigned to a respective one of a plurality of states based on a current state of each thread. By doing so, the specific problem(s) of the multi-threaded application is determined based on the number of transitions among the plurality of states for each thread. In one embodiment of the invention, the analysis model uses worker threads transition counters or events to determine for each parallel region or algorithm of the multi-threaded application which problem has happened and how much it has affected the scalability of the parallel region or algorithm. | 2011-12-01 |
20110296421 | METHOD AND APPARATUS FOR EFFICIENT INTER-THREAD SYNCHRONIZATION FOR HELPER THREADS - A monitor bit per hardware thread in a memory location may be allocated, in a multiprocessing computer system having a plurality of hardware threads, the plurality of hardware threads sharing the memory location, and each of the allocated monitor bit corresponding to one of the plurality of hardware threads. A condition bit may be allocated for each of the plurality of hardware threads, the condition bit being allocated in each context of the plurality of hardware threads. In response to detecting the memory location being accessed, it is determined whether a monitor bit corresponding to a hardware thread in the memory location is set. In response to determining that the monitor bit corresponding to a hardware thread is set in the memory location, a condition bit corresponding to a thread accessing the memory location is set in the hardware thread's context. | 2011-12-01 |
20110296422 | Switch-Aware Parallel File System - Embodiments of the invention related to a switch-aware parallel file system. A computing cluster is partitioned into a plurality of computing cluster building blocks comprising a parallel file system. Each computing cluster building block comprises a file system client, a storage module, a building block metadata module, and a building block network switch. The building block metadata module tracks a storage location of data allocated by the storage module within the computing cluster building block. The computing cluster further comprises a file system metadata module that tracks which of the plurality of computing cluster building blocks data is allocated among within the parallel file system. The computing cluster further comprises a file system network switch to provide the parallel file system with access to each of the plurality of computing cluster building blocks and the file system metadata module. At least one additional computing cluster building block is added to the computing cluster, if resource utilization of the computing cluster exceeds a pre-determined threshold. | 2011-12-01 |
20110296423 | FRAMEWORK FOR SCHEDULING MULTICORE PROCESSORS - A method, system, and computer usable program product for a framework for scheduling tasks in a multi-core processor or multiprocessor system are provided in the illustrative embodiments. A thread is selected according to an order in a scheduling discipline, the thread being a thread of an application executing in the data processing system, the thread forming the leader thread in a bundle of threads. A value of a core attribute in a set of core attributes is determined according to a corresponding thread attribute in a set of thread attributes associated with the leader thread. A determination is made whether a second thread can be added to the bundle such that the bundle including the second thread will satisfy a policy. If the determining is affirmative, the second thread is added to the bundle. The bundle is scheduled for execution using a core of the multi-core processor. | 2011-12-01 |
20110296424 | Synthesis of Memory Barriers - A framework is provided for automatic inference of memory fences in concurrent programs. A method is provided for generating a set of ordering constraints that prevent executions of a program violating a specification. One or more incoming avoidable transitions are identified for a state and one or more ordering constraints are refined for the state. The set of ordering constraints are generated by taking a conjunction of ordering constraints for all states that violate the specification. One or more fence locations can optionally be selected based on the generated set of ordering constraints. | 2011-12-01 |
20110296425 | Management apparatus, management system, and recording medium for recording management program - A management apparatus includes a job definition information storage section for storing, at each period, a job definition file including execution characteristics indicating the start condition of each job in the execution schedule, the estimated execution time of the job, the state of the job, and a restriction at the time of setting the start schedule of the job; an exclusion information storage section for storing exclusion definition information indicating the jobs to be executed exclusively from each other; a reset job specifying section for acquiring a first job definition file of a schedule to be executed and a second job definition file of an executed schedule, then extracting, as a reset job, an abnormally terminated job from the second job definition file, and extracting a job using the reset job and the issue message of the reset job as start conditions, to store the extracted jobs in a related job set table; an execution possible time zone calculating section for searching, as an execution possible time zone, a time zone enabling execution of the job stored in the related job set table, from the first job definition file based on the second job definition file and the exclusion definition information; a start schedule adjusting section for setting the start schedule of the job stored in the related job set table based on the execution possible time zone; and a start schedule time setting section for setting the start time of the job set in the first job definition file, based on the start schedule of the job stored in the related job set table. | 2011-12-01 |
20110296426 | METHOD AND APPARATUS HAVING RESISTANCE TO FORCED TERMINATION ATTACK ON MONITORING PROGRAM FOR MONITORING A PREDETERMINED RESOURCE - Exemplary embodiments include a method and system having resistance to a forced termination attack on a monitoring program for monitoring a predetermined resource. Aspects of the exemplary embodiment include a device that executes a predetermined process including a monitoring program that monitors a predetermined resource, wherein the predetermined process is a process for which the predetermined resource becomes unavailable in response to termination of the predetermined process; a program starting unit for starting the monitoring program in response to an execution of the predetermined process; and a terminator for terminating the predetermined process in the case where the monitoring program is forcibly terminated from the outside. | 2011-12-01 |
20110296427 | Resource Allocation During Workload Partition Relocation - A method of relocating a workload partition (WPAR) from a departure logical partition (LPAR) to an arrival LPAR determines an amount of a resource allocated to the relocating WPAR on the departure LPAR and allocates to the relocating WPAR on the arrival LPAR an amount of the resource substantially equal to the amount of the resource allocated to the relocating WPAR on the departure LPAR. | 2011-12-01 |
20110296428 | REGISTER ALLOCATION TO THREADS - A method, system, and computer usable program product for improved register allocation in a simultaneous multithreaded processor. A determination is made that a thread of an application in the data processing environment needs more physical registers than are available to allocate to the thread. The thread is configured to utilize a logical register that is mapped to a memory register. The thread is executed utilizing the physical registers and the memory registers. | 2011-12-01 |
20110296429 | SYSTEM AND METHOD FOR MANAGEMENT OF LICENSE ENTITLEMENTS IN A VIRTUALIZED ENVIRONMENT - A management system and method for a virtualized environment includes a computer entity having a usage limitation based on an entitlement. A resource manager, using a processor and programmed on and executed from a memory storage device, is configured to manage resources in a virtualized environment. An entitlement-usage module is coupled to the resource manager and is configured to track entitlement-related constraints in accordance with changes in the virtualized environment to permit the resource manager to make allocation decisions which include the entitlement-related constraints to ensure that the usage limitation is met for the computer entity. | 2011-12-01 |
20110296430 | CONTEXT AWARE DATA PROTECTION - A method, system, and computer usable program product for context aware data protection. Information about an access context is received in a data processing system. A resource affected by the access context is identified. The identification of the resource may include deriving knowledge about resource by making an inference from a portion of contents of the resource that the access context affects the resource, making an inference that the access context affects a second resource thereby inferring that the resource has to be modified, determining that the access context is relevant to the resource, or a combination thereof. The resource is received. A policy that is applicable to the access context is identified. A part of the resource to modify according to the policy is determined. The part is modified according to the policy and the access context to form a modified resource. The modified resource is transmitted. | 2011-12-01 |
20110296431 | METHOD AND APPARATUS FOR EFFICIENT HELPER THREAD STATE INITIALIZATION USING INTER-THREAD REGISTER COPY - This disclosure describes a method and system that may enable fast, hardware-assisted, producer-consumer style communication of values between threads. The method, in one aspect, uses a dedicated hardware buffer as an intermediary storage for transferring values from registers in one thread to registers in another thread. The method may provide a generic, programmable solution that can transfer any subset of register values between threads in any given order, where the source and target registers may or may not be correlated. The method also may allow for determinate access times, since it completely bypasses the memory hierarchy. Also, the method is designed to be lightweight, focusing on communication, and keeping synchronization facilities orthogonal to the communication mechanism. It may be used by a helper thread that performs data prefetching for an application thread, for example, to initialize the upward-exposed reads in the address computation slice of the helper thread code. | 2011-12-01 |
20110296432 | PROGRAMMING MODEL FOR COLLABORATIVE DISTRIBUTED SYSTEMS - Described are methods of providing data sharing between applications. The applications run on different computers, communicate via a network, and share a same distributed object. Each application maintains on its computer an invariant copy of the distributed object and a variant copy of the distributed object. Each application performs update operations to the distributed object, where such an update operation issued by a given one of the applications is performed by: executing the update operation on the variant copy maintained by the given application (i) without the given application waiting for the other applications to perform the operation (each invariant copy is guaranteed to converge to a same state) and (ii) at each of the applications, including the given application, executing the update operation on the corresponding invariant copies. | 2011-12-01 |
20110296433 | FUNCTION SECURING UNIT FOR COMMUNICATION SYSTEMS - Disclosed herein is a communication system having at least one first and a second communication unit, wherein the first communication unit has a counter memory unit which stores a counter value (MSG_CNT), wherein the first communication unit is designed such that at least the occurrence of a first defined communication event prompts the counter value in the counter memory unit to be changed in at least one defined first manner, wherein at least the occurrence of a defined reference event is followed by the counter value in the counter memory unit being changed in at least one defined second manner, wherein at least in the course of a second defined communication event the first communication unit transmits the current counter value in the counter memory unit directly or indirectly to the second communication unit. | 2011-12-01 |
20110296434 | Techniques for Dynamically Sharing a Fabric to Facilitate Off-Chip Communication for Multiple On-Chip Units - A technique for sharing a fabric to facilitate off-chip communication for on-chip units includes dynamically assigning a first unit that implements a first communication protocol to a first portion of the fabric when private fabrics are indicated for the on-chip units. The technique also includes dynamically assigning a second unit that implements a second communication protocol to a second portion of the fabric when the private fabrics are indicated for the on-chip units. In this case, the first and second units are integrated in a same chip and the first and second protocols are different. The technique further includes dynamically assigning, based on off-chip traffic requirements of the first and second units, the first unit or the second unit to the first and second portions of the fabric when the private fabrics are not indicated for the on-chip units. | 2011-12-01 |
20110296435 | MESSAGE-BASED MODELING - A system and method may generate executable block diagrams in which at least some of the blocks run in accordance with message-based execution semantics. A message may include an input data payload that does not change over time, and the message may persist for only a determined time interval during execution of block diagram. A message-based execution engine may control execution of message-based blocks in which a source block may generate a message at a particular point in time, the message may be sent to one or more destination blocks triggering execution of those blocks, and the message may be destroyed on or after a determined time interval. Other execution domains, such as a time-based or state-based execution domain, may be provided, and the system may implement a hybrid execution model. A verification engine may provide one or more tools for evaluating and verifying operation of message-based blocks. The verification engine may support one or more verification blocks that may be added to the block diagram and associated with the diagram's message-based blocks. The verification blocks may capture and present messages exchanged among the message-based blocks. The verification blocks may also specify an expected interaction of messages, and determine whether the actual messages are equivalent to the expected interaction. If not, the verification block may perform one or more predefined actions, such as suspending further execution of the block diagram. | 2011-12-01 |
20110296436 | MESSAGE-BASED MODEL VERIFICATION - A system and method may generate executable block diagrams in which at least some of the blocks run in accordance with message-based execution semantics. A message may include an input data payload that does not change over time, and the message may persist for only a determined time interval during execution of block diagram. A message-based execution engine may control execution of message-based blocks in which a source block may generate a message at a particular point in time, the message may be sent to one or more destination blocks triggering execution of those blocks, and the message may be destroyed on or after a determined time interval. Other execution domains, such as a time-based or state-based execution domain, may be provided, and the system may implement a hybrid execution model. A verification engine may provide one or more tools for evaluating and verifying operation of message-based blocks. The verification engine may support one or more verification blocks that may be added to the block diagram and associated with the diagram's message-based blocks. The verification blocks may capture and present messages exchanged among the is message-based blocks. The verification blocks may also specify an expected interaction of messages, and determine whether the actual messages are equivalent to the expected interaction. If not, the verification block may perform one or more predefined actions, such as suspending further execution of the block diagram. | 2011-12-01 |
20110296437 | METHOD AND APPARATUS FOR LOCKLESS COMMUNICATION BETWEEN CORES IN A MULTI-CORE PROCESSOR - A lockless processor core communication capability is provided herein. The lockless communication capability enables lockless communication between cores of a multi-core processor. Lockless communication between a first core and a second core of a multi-core processor is provided using a message queuing mechanism. The message queuing mechanism includes a message queue, a first bitmap, and a second bitmap. The message queue includes a plurality of messages configured for storing data queued by the first core for processing by the second core. The first bitmap includes a plurality of bit positions associated with respective messages of the message queue, and is configured for use by the first core to indicate availability of respective queued message data. The second bitmap includes a plurality of bit positions associated with the respective messages of the message queue, and is configured for use by the second core to acknowledge availability of the respective queued message data and to indicate reception of the respective queued message data. | 2011-12-01 |
20110296438 | CREATING AN OBJECT IN AN OBJECT-ORIENTED PROGRAMMING PLATFORM - An application programming interface is provided in an object-oriented programming platform for developing applications. A method comprises, in response to a first message received at a first object that contains one or more properties, creating a second object that responds to a second message sent thereto responsive to sending of the first message to the first object and returning the second object. By returning, for example, key-value collection proxies by specific key-value coding methods a read-only or a read-write access may be allowed to a collection of a container object's related objects. A specific implementation of one object's class may change over time without requiring changes in another object's implementation. | 2011-12-01 |
20110296439 | INFORMATION PROCESSING DEVICE, APPLICATION EXECUTION METHOD, AND COMPUTER READABLE MEDIUM - An information processing device, comprises: a storage part for storing a plurality of application programs allowing a specified function to operate under operating conditions differ among the plurality of application programs; a configuration part for configuring a setting to reflect the operating conditions corresponding to one application program selected from the plurality of application programs; an application management part for managing the respective operating conditions of the plurality of application programs, for obtaining a current setting configured by the configuration part when allowing the specified function to operate and for selecting, based on the respective operating conditions of the plurality of application programs, the one application program takes the shortest amount of processing time required for an operating conditions reflection executed by the configuration part; and an application execution part for allowing the specified function to operate with execution of the one application program selected by the application management part. | 2011-12-01 |
20110296440 | ACCELERATOR SYSTEM FOR USE WITH SECURE DATA STORAGE - Data processing and an accelerator system therefore are described. An embodiment relates generally to a data processing system. In such an embodiment, a bus and an accelerator are coupled to one another. The accelerator has an application function block. The application function block is to process data to provide processed data to storage. A network interface is coupled to obtain the processed data from the storage for transmission. | 2011-12-01 |
20110296441 | System And Method For Supporting A Remote Isochronous Device - A system and method are provided for supporting remote isochronous devices effectively. In one embodiment, first and second computer hosts include first and second virtual interposer logic, first and second send/receive logic and first and second at least partial device driver stacks therein. The first and second send/receive logics are configured to communicate packets between one another, representing commands and data passing between a user-level application at the first host and a peripheral device at the second host. The first and second virtual interposer logics are configured to interface the first and second send/receive logics to the first and second at least partial device driver-stacks within their respective hosts. To achieve low-latency transactions, the system includes speculative write completion functionality and/or speculative read functionality. | 2011-12-01 |
20110296442 | GENERATING A WEB SERVICE - Web services are automatically generated from corresponding Web applications under service-oriented architecture. A Web service is generated based on a Web application, comprising: obtaining user input information of the Web application, obtaining call stack information that is generated by the Web application at runtime based on the user input information, performing parameter matching between the user input information and the call stack information, selecting a method from the call stack information as an application programming interface based on a result of the parameter matching and the call stack information, and generating the Web service using the application programming interface. | 2011-12-01 |
20110296443 | METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT FOR A LIGHTWEIGHT DIRECTORY ACCESS PROTOCOL CLIENT APPLICATION PROGRAM INTERFACE - A device, including a computer readable medium storing executable computer instructions for implementing an application program interface (API). The API including a function call for enabling communications between a calling application and a client on the device, the client communicating with a directory server. In another aspect, there is provided a computer-readable medium, including executable computer instructions for implementing an application program interface (API) on a device. The API, including a function call for enabling communications between a calling application and a client on the device, the client communicating with a directory server. | 2011-12-01 |
20110296444 | CUSTOMER PREMISES EQUIPMENT AND METHOD FOR PROCESSING COMMANDS - A customer premises equipment (CPE) receives a remote procedure call (RPC) command with at least one search condition from an auto-configuration server (ACS). The at least one search condition includes at least one parameter with at least one parameter value. The CPE searches a data model to find at least one instance ID corresponding to the at least one search condition, and replaces the at least one search condition of the RPC command with the at least one found instance ID. The CPE executes the RPC command with the at least one found instance ID. | 2011-12-01 |