ORACLE AMERICA, INC. Patent applications |
Patent application number | Title | Published |
20140282504 | METHOD AND SYSTEM FOR SPECIFYING THE LAYOUT OF COMPUTER SYSTEM RESOURCES - A method for specifying the layout of computing system resources includes receiving a request for a virtual machine, the request comprising a processor requirement and a memory requirement, gathering resource groupings, each resource grouping comprising a latency penalty between a processor and at least a memory. The method further includes calculating a proportionality for each resource grouping, wherein the proportionality comprises a minimum of: an amount of the processor requirement the resource grouping can satisfy and an amount of the memory requirement the resource grouping can satisfy, sorting the resource groupings based on at least the proportionality for each resource grouping to create an ordered list and binding, based on the ordered list, at least one resource group to the virtual machine, wherein the at least one resource group satisfies the processor requirement and the memory requirement. | 09-18-2014 |
20140089903 | Sampling Based Runtime Optimizer for Efficient Debugging of Applications - A method of reproducing runtime environment for debugging an application is disclosed. The method includes accessing an optimizer file from a non-volatile storage medium. The optimizer file includes a runtime environment, application definition information, and a log. The log includes summaries of a plurality of events, the plurality of actions, and a time mark of occurrence for each of the plurality of actions. A runtime environment for debugging the application is then defined and the application runtime is set up using the application definition information in the optimizer file. Further, the method includes running the application and attaching an optimizer, then triggering each of the plurality of actions to occur at each time mark of occurrence associated with the each of the plurality of actions, and analyzing each of the plurality of actions and the plurality of events associated with the each of the plurality of actions, the analyzing includes comparing the events produced by running the application with the plurality of events in the optimizer file. If a fault is produced by the triggering, a debugger is invoked to analyze the fault. | 03-27-2014 |
20120331314 | LOGICAL POWER THROTTLING - A processor includes a device providing a throttling power output signal. The throttling power output signal is used to determine when to logically throttle the power consumed by the processor. At least one core in the processor includes a pipeline having a decode pipe; and a logical power throttling unit coupled to the device to receive the output signal, and coupled to the decode pipe. Following the logical power throttling unit receiving the power throttling output signal satisfying a predetermined criterion, the logical power throttling unit causes the decode pipe to reduce an average number of instructions decoded per processor cycle without physically changing the processor cycle or any processor supply voltages. | 12-27-2012 |
20120317588 | METHOD AND MESSAGE HANDLING HARDWARE STRUCTURE FOR VIRTUALIZATION AND ISOLATION OF PARTITIONS - A computer-based method configures a hardware circuit to transfer a message to a message queue in an operating system. The hardware circuit is used to transfer a message to the message queue in the operating system without requiring use of either the operating system or a hypervisor associated with the operating system. The using the hardware circuit uses a logical identifier associated with the message to select an entry in a mapping table of the hardware circuit. A value in the entry in the mapping table is used to select an entry in an action table. The entry in the action table is used to determine a tail pointer for the message queue. The hardware circuit appends the message to a location indicted by the tail pointer without requiring cycles of a hypervisor associated with the strand. | 12-13-2012 |
20120284806 | EMBEDDED CONTENT REQUESTS IN A RIGHTS LOCKER SYSTEM FOR DIGITAL CONTENT ACCESS CONTROL - Access to digital content may be controlled by determining a digital content specification and associated authenticated rights locker access request, sending the authenticated rights locker access request and the digital content specification, and receiving a new authenticated rights locker access request and a Web page with clickable links in response to the sending, where at least one of the clickable links is associated with an authenticated digital content request. When an indication of a user selection of one of the clickable links is received, an authenticated digital content request associated with the user-selected clickable link is sent to a digital content repository. The digital content is received in response to the sending of the authenticated digital content request. | 11-08-2012 |
20120275341 | SYSTEM AND METHOD FOR IMPLEMENTING A MULTISTAGE NETWORK USING A TWO-DIMENSIONAL ARRAY OF TILES - A network, including: a first tile having a processor, a first top brick connected to the processor, a first bottom brick, and a first intermediate brick; a second tile having a second intermediate brick and a second bottom brick; multiple connections connecting the first top brick with the second intermediate brick and the first intermediate brick with the second bottom brick using a passthrough on an intermediate tile between the first and second tiles, where the first, the intermediate, and the second tiles are positioned in a row; and a third tile having a plurality of caches connected to a third bottom brick, where the second and third tiles are positioned in a column, and the first bottom brick, the second bottom brick, and the third bottom brick belong to a bottom layer of the network, and where the first and second intermediate bricks belong to an intermediate layer of the network. | 11-01-2012 |
20120269191 | SYSTEM AND METHOD FOR IMPLEMENTING A MULTISTAGE NETWORK USING A TWO-DIMENSIONAL ARRAY OF TILES - A network, including: a first tile having a processor, a first top brick connected to the processor, a first bottom brick, and a first intermediate brick; a second tile having a second intermediate brick and a second bottom brick; multiple connections connecting the first top brick with the second intermediate brick and the first intermediate brick with the second bottom brick using a passthrough on an intermediate tile between the first and second tiles, where the first, the intermediate, and the second tiles are positioned in a row; and a third tile having a plurality of caches connected to a third bottom brick, where the second and third tiles are positioned in a column, and the first bottom brick, the second bottom brick, and the third bottom brick belong to a bottom layer of the network, and where the first and second intermediate bricks belong to an intermediate layer of the network. | 10-25-2012 |
20120198289 | SYSTEM AND METHOD FOR WRITE PROTECTING PORTIONS OF MAGNETIC TAPE STORAGE MEDIA - Systems and methods for writing data on a magnetic tape having a plurality of partitions and accessed by a tape drive having an associated tape drive processor in communication with a host computer having an associated host processor include storing a read-only partition identifier associated with each of the plurality of partitions, comparing a requested write partition identifier with the stored read-only partition identifiers, and writing data to the requested write partition only if the associated read-only identifier indicates that the requested write partition is not a read-only partition. | 08-02-2012 |
20120180050 | METHOD AND SYSTEM FOR COORDINATING HYPERVISOR SCHEDULING - A method for executing an application on multiple nodes includes synchronizing a first clock of a first node and a second clock of a second node, configuring a first hypervisor on the first node to execute a first application domain and a first privileged domain, and configuring a second hypervisor on the second node to execute a second application domain and a second privileged domain. Configuring the hypervisor includes allocating a first number of cycles of the first clock to the first privileged domain. Configuring the second hypervisor includes allocating the first number of cycles of the first clock to the second privileged domain. The method further includes executing the application in the first application domain and the second application domain. The first application domain and the second application domain execute semi-synchronously and the first privileged domain and the second privileged domain execute semi-synchronously. | 07-12-2012 |
20120177036 | SIMPLE FAIRNESS PROTOCOLS FOR DAISY CHAIN INTERCONNECTS - A method for transmitting packets, including forwarding a first set of upstream packets and a first set of local packets by inserting at least one of the first set of local packets between subsets of the first set of upstream packets according to a first insertion rate; calculating a second insertion rate after forwarding a predetermined number of upstream packets generated by a single upstream source, by dividing a cardinality of the first set of upstream packets by a greatest common divisor of the predetermined number and the cardinality of the first set of upstream packets; and forwarding a second set of upstream packets and a second set of local packets from the local switch to the downstream switch by inserting at least one of the second set of local packets between subsets of the second set of upstream packets according to the second insertion rate. | 07-12-2012 |
20120170577 | SIMPLE FAIRNESS PROTOCOLS FOR DAISY CHAIN INTERCONNECTS - A method for transmitting packets, including forwarding a first set of upstream packets and a first set of local packets by inserting at least one of the first set of local packets between subsets of the first set of upstream packets according to a first insertion rate; calculating a second insertion rate after forwarding a predetermined number of upstream packets generated by a single upstream source, by dividing a cardinality of the first set of upstream packets by a greatest common divisor of the predetermined number and the cardinality of the first set of upstream packets; and forwarding a second set of upstream packets and a second set of local packets from the local switch to the downstream switch by inserting at least one of the second set of local packets between subsets of the second set of upstream packets according to the second insertion rate. | 07-05-2012 |
20120170459 | SIMPLE LOW-JITTER SCHEDULER - A method for managing packets, including identifying a first packet source having a first weight and second packet source having a second weight, where the first weight exceeds the second weight; assembling a first regular subsequence of packets using a first packet from the second packet source and a first set of packets from the first packet source having a cardinality equal to a first weight ratio; assembling a first augmented subsequence of packets using a second packet from the second packet source and a second set of packets from the first packet source having a cardinality equal to the first weight ratio plus one; and forwarding a first sequence of packets including a first set of regular subsequences, which includes the first regular subsequence, and a first set of augmented subsequences, which includes the first augmented subsequence and has a cardinality based on the first augmented subsequence factor. | 07-05-2012 |
20120153453 | METALLIC THERMAL JOINT FOR HIGH POWER DENSITY CHIPS - A method for the assembly of a semiconductor package that includes cleaning a surface of a chip and a surface of a heat removal device by reverse sputtering is given. The method includes sequentially coating the surface of the chip and the surface of the heat removal device with an adhesive layer, a barrier layer, and a protective layer over a target joining area. The chip and the heat removal device are placed into carrier fixtures and preheated to a target temperature. Then a metallic thermal interface material (TIM) preform is mechanically rolled onto the surface of the chip and the first and the second carrier fixtures are attached together such that the metallic TIM layer on the surface of the chip is joined to the coated surface of the heat removal device through a fluxless process. The method includes heating the joined carrier fixtures in a reflow oven. | 06-21-2012 |
20120151469 | APPARATUS AND METHOD FOR VALIDATING AND REPAIRING A SOFTWARE INSTALLATION - A virtual installation map, and method involving installing a software functionality using the same, the virtual installation map including a first software installation map including a plurality of software elements representative of a related software file, the software elements also including at least one dependency to another software element. The virtual installation map further including a second software installation map also including a second plurality of software elements representative of related software file along with related dependencies. The first and second software installation maps may be hosted in separate databases and may relate to software products provided by different vendors. One or both software installation maps may include a pointer or other reference to the other installation map thereby providing a virtual installation map, in one example. | 06-14-2012 |
20120151468 | APPARATUS AND METHOD FOR SIMULATING SOFTWARE INSTALLATION USING SOFTWARE DEPENDENCY MAP - A virtual installation map, and method involving installing a software functionality using the same, the virtual installation map including a first software installation map including a plurality of software elements representative of a related software file, the software elements also including at least one dependency to another software element. The virtual installation map further including a second software installation map also including a second plurality of software elements representative of related software file along with related dependencies. The first and second software installation maps may be hosted in separate databases and may relate to software products provided by different vendors. One or both software installation maps may include a pointer or other reference to the other installation map thereby providing a virtual installation map, in one example. | 06-14-2012 |
20120144386 | APPARATUS AND METHOD FOR MONITORING SOFTWARE INSTALLATION PERFORMANCE - A virtual installation map, and method involving installing a software functionality using the same, the virtual installation map including a first software installation map including a plurality of software elements representative of a related software file, the software elements also including at least one dependency to another software element. The virtual installation map further including a second software installation map also including a second plurality of software elements representative of related software file along with related dependencies. The first and second software installation maps may be hosted in separate databases and may relate to software products provided by different vendors. One or both software installation maps may include a pointer or other reference to the other installation map thereby providing a virtual installation map, in one example. | 06-07-2012 |
20120110251 | PROCESSOR-BUS-CONNECTED FLASH STORAGE MODULE - A system includes multiple nodes coupled using a network of processor buses. The multiple nodes include a first processor node, including one or more processing cores and main memory, and a flash memory node coupled to the first processor node via a first processor bus of the network of processor buses. The flash memory node includes a flash memory including flash pages, a first memory including a cache partition for storing cached flash pages for the flash pages in the flash memory and a control partition for storing cache control data and contexts of requests to access the flash pages, and a logic module including a direct memory access (DMA) register and configured to receive a first request from the first processor node via the first processor bus to access the flash pages. | 05-03-2012 |
20120102567 | Hybrid System Implementing Distinct and Co-existing Application Execution Environments and Methods for Implementing the Same - A hybrid system is provided. The system includes a computing device implementing a first application execution environment (AEE) and a second AEE. The first AEE is configured to be isolated from the second AEE. The first software application associated with the first AEE is configured to be processed on the first AEE such that the first software application is denied direct access to the second AEE. A second software application associated with the second AEE is configured to be processed on the second AEE such that the second software application is denied direct access to the first AEE. | 04-26-2012 |
20120096264 | JAVA STORE TELEVISION - A non-transitory computer readable storage medium including computer readable code that, when executed by a processor, is configured to receive, from a user network device, a first request to execute an application on the user network device. The first request includes a user identification, routing information, and requested application information, encrypted using a public key. The user network device is configured to display the application on a television display device. The code is further configured to decrypt the routing information and requested application information using a private key, send a second request for subscription information to a service provider, receive the subscription information from the service provider, and determine that a license corresponding to the application is associated with the user. The code is further configured to generate and send an application package configured to deploy the application using a Java Runtime Environment on the user network device. | 04-19-2012 |
20120089981 | METHOD AND SYSTEM FOR POWER MANAGEMENT IN A VIRTUAL MACHINE ENVIRONMENT WITHOUT DISRUPTING NETWORK CONNECTIVITY - A method for power management. The method includes gathering resource usage data for a first blade and a second blade on a blade chassis, migrating each virtual machine (VM) executing on the first blade to the second blade based on the resource usage data and a first migration policy, wherein the first migration policy defines when to condense the number of blades operating on the blade chassis, and powering down the first blade after each VM executing on the first blade is migrated from the first blade. | 04-12-2012 |
20120072905 | JAVA STORE - A computer readable medium including computer readable code for causing a computer system to perform a method. The method includes receiving an application, receiving application information for the application, and determining an access privilege for the application based, in part, on the application information. The method also includes generating a deployment package for the application using the application and the access privilege, and publishing the application. | 03-22-2012 |
20120072624 | NUMA I/O FRAMEWORK - A method for binding input/output (I/O) objects to nodes includes an subsystem receiving a request to use an I/O device from a process, determining a first resource to service the request, generating a first I/O object corresponding to the first resource, wherein the first I/O object is unbound, and sending the first I/O object to a Non-Uniform Memory Access (NUMA) I/O Framework. The method further includes the NUMA I/O Framework selecting a first NUMA node of a plurality of NUMA nodes, to which to bind the first I/O object and binding the first I/O object to the first NUMA node. The method further includes servicing the request by processing, on the first NUMA node, the first resource corresponding to the first I/O object. | 03-22-2012 |
20120072621 | DYNAMIC BALANCING OF IO RESOURCES ON NUMA PLATFORMS - A method for binding input/output (I/O) objects to nodes. The method includes receiving, by an I/O Subsystem, a request to use an I/O device from a process, determining a first resource to service the request, and generating a first I/O object corresponding to the first resource. The method includes sending the first I/O object to a NUMA I/O Framework, obtaining a first I/O object effective load from the first I/O object, and obtaining a first I/O load capacity of a first NUMA node of a plurality of NUMA nodes. The method includes comparing the first I/O load capacity and the first I/O object effective load, selecting the first NUMA node based on a determination that the first I/O load capacity is greater than the first I/O object effective load, binding the first I/O object to the first NUMA node, and processing the first resource corresponding to the first I/O object. | 03-22-2012 |
20120069037 | RESOLUTION INDEPENDENT RENDERING OF QUADRATIC BEZIER CURVES USING PROGRAMMABLE GRAPHICS HARDWARE - A computer system, program, and method for resolution-independent rendering of an image defined at least in part by a Bezier curve function includes subdividing the image into a plurality of polygons based on Bezier control points of the Bezier curve function, each of the polygons being defined around a Bezier curve, assigning texture coordinates to the Bezier control points, projecting the plurality of polygons and the Bezier curves into texture space, constructing an implicit signed distance function based on the assigned texture coordinates and the Bezier curve function, determining for each pixel within each of the plurality of polygons, based on the implicit signed distance function, whether the pixel is located inside or outside the respective Bezier curve, and shading the pixels determined to be inside the Bezier curve. | 03-22-2012 |
20120047170 | TECHNIQUES FOR ACCESSING REMOTE FILES - Techniques for accessing remote files are presented. A local user, via a local client, requests access to a file. A local file system determines that the file is associated with a junction. The junction is resolved and an associated remote file system is contacted by the local file system to acquire results for the request. The local file system then delivers the results to the local user via the local client. | 02-23-2012 |
20120041997 | FUSED MULTIPLY-ADD ROUNDING AND UNFUSED MULTIPLY-ADD ROUNDING IN A SINGLE MULTIPLY-ADD MODULE - A computer processor including a single fused-unfused floating point multiply-add (FMA) module computes the result of the operation A*B+C for floating point numbers for fused multiply-add rounding operations and unfused multiply-add rounding operations. In one embodiment, a fused multiply-add rounding implementation is augmented with additional hardware which calculates an unfused multiply-add rounding result without adding additional pipeline stages. In one embodiment, a computation by the fused-unfused floating point multiply-add (FMA) module is initiated using a single opcode which determines whether a fused multiply-add rounding result or unfused multiply-add rounding result is generated. | 02-16-2012 |
20120026885 | NOTIFYING NETWORK APPLICATIONS OF RECEIVE OVERFLOW CONDITIONS - A method for notifying a packet destination that includes receiving a packet by a network interface card (NIC), where the packet destination is a destination of the packet, classifying the packet, forwarding the packet to one of a plurality of receive rings on the NIC, determining whether the one of the plurality of receive rings comprises space to store the packet, dropping the packet if the receive ring does not comprise the space to store the packet, and sending a notification message to the packet destination, where the notification message indicates that the packet was dropped by the receive ring. | 02-02-2012 |
20120005521 | METHOD AND SYSTEM FOR MAINTAINING DIRECT HARDWARE ACCESS IN THE EVENT OF NETWORK INTERFACE CARD FAILURE - A system for maintaining direct hardware access in the event of PNIC failure. A host for the system includes: a processor; a first and a second PNIC, where the first PNIC is activated and all other PNICs are deactivated; a host operating system; a virtual machine; and a hypervisor for transferring packets between the host operating system and the virtual machine. The host operating system includes a link aggregator, multiple host VNICs, and a virtual switch associated with the VNICs. The first virtual machine includes a virtual network protocol stack and a guest VNIC. The link aggregator is configured to determine whether the first PNIC has failed. Based on a determination that the first PNIC has failed, the link aggregator is further configured to: remove a virtual function mapping between the first PNIC and the virtual machine; determine the second PNIC; deactivate the first PNIC; and activate the second PNIC. | 01-05-2012 |
20120005163 | BLOCK-BASED INCREMENTAL BACKUP - A method for backing up a file system, including obtaining a first indirect block comprising a first block pointer, obtaining a first birth time from the first block pointer, determining whether the first birth time is subsequent to a time of a last backup, and backing up a first block referenced by the first block pointer, if the first birth time is subsequent to the time of the last backup. | 01-05-2012 |
20120002535 | METHOD AND SYSTEM FOR DISTRIBUTING NETWORK TRAFFIC AMONG MULTIPLE DIRECT HARDWARE ACCESS DATAPATHS - A system for distributing network traffic among direct hardware access datapaths, comprising: a processor; one or more activated PNICs; a host operating system; and a virtual machine (VM). Each activated PNIC sends and receives data packets over a network. Each activated PNIC is configured with a virtual function. The VM includes a VNIC and a virtual link aggregator configured to maintain a list identifying each activated PNIC. Virtual function mappings for the VM associate the VM with virtual functions for the activated PNICs. The virtual link aggregator selects the first activated PNIC for servicing a network connection and determines a virtual function for the first activated PNIC. The VNIC for the first activated PNIC uses the virtual function to directly transfer network traffic for the network connection between the VM and the first activated PNIC. | 01-05-2012 |
20110289192 | CONTROLLING A RUNNING APPLICATION FOR LIVE SCENE GRAPH EDITING - In general, in one aspect, the invention relates to a computer readable medium including software instructions for performing a method, the method including receiving, by a content server, a first request from a client for an application content file, wherein the application content file is associated with a first Java network launch protocol (JNLP) file, providing, in response to the first request, the application content file; receiving, from the client, a second request to edit the application content file, providing, in response to the second request, an application designer tool to the client; receiving, from the client, an altered application content file generated using the application designer tool, generating a second JNLP file associated with the altered application content file, and providing, to a webserver, the second JNLP file. | 11-24-2011 |
20110270919 | METHOD AND SYSTEM FOR PROCESSING A REQUEST SENT OVER A NETWORK - A method for processing a request sent over a network. The method includes receiving a first request sent by a client over the network at a physical server hosting a first application. The method further involves processing the first request using the first application to generate a second request. The method further involves the addressing and sending of the second request to a software-implemented distributed service delivery controller (SDC) on the physical server, where a loopback interface Internet Protocol (IP) address and a port associated with the distributed service delivery controller (SDC) are used to address the second request. The method further involves determining, using the distributed SDC, an IP address for a destination server hosting the second application. The method further involves processing the second request on a network layer of a network protocol stack of the physical server and sending the second request to the destination server. | 11-03-2011 |
20110261900 | MECHANISM FOR CONSTRUCTING AN OVERSAMPLED WAVEFORM FOR A SET OF SIGNALS RECEIVED BY A RECEIVER - A mechanism is provided for constructing an oversampled waveform for a set of incoming signals received by a receiver. In one implementation, the oversampled waveform is constructed by way of cooperation between the receiver and a waveform construction mechanism (WCM). The receiver receives the incoming signals, samples a subset of the incoming signals at a time, stores the subsets of sample values into a set of registers, and subsequently provides the subsets of sample values to the WCM. The WCM in turn sorts through the subsets of sample values, organizes them into proper orders, and “stitches” them together to construct the oversampled waveform for the set of incoming signals. With proper cooperation between the receiver and the WCM, and with proper processing logic on the WCM, it is possible to construct the oversampled waveform for the incoming signals without requiring large amounts of resources on the receiver. | 10-27-2011 |
20110258619 | APPARATUS AND METHOD FOR GENERATING A SOFTWARE DEPENDENCY MAP - A virtual installation map, and method involving installing a software functionality using the same, the virtual installation map including a first software installation map including a plurality of software elements representative of a related software file, the software elements also including at least one dependency to another software element. The virtual installation map further including a second software installation map also including a second plurality of software elements representative of related software file along with related dependencies. The first and second software installation maps may be hosted in separate databases and may relate to software products provided by different vendors. One or both software installation maps may include a pointer or other reference to the other installation map thereby providing a virtual installation map, in one example. | 10-20-2011 |
20110258333 | CLOUD CONNECTOR KEY - A cloud connector key includes a network interface configured to connect to a network, a mass storage interface configured to connect to a network isolated device, and a computation module operatively connected to the network interface and the mass storage interface. The computational module is configured to connect to a cloud repository using the network interface by obtaining, from storage on the cloud connector key, a network address of the cloud repository, requesting connection to the cloud repository using the network address, and authenticating, using credentials in the storage on the cloud connector key, to an account in the cloud repository. The computational module is further configured to transfer a file between the account in the cloud repository and a network isolated device via the mass storage interface. | 10-20-2011 |
20110252276 | LOW-OVERHEAD RUN-TIME MEMORY LEAK DETECTION AND RECOVERY - Leaked memory in a computer system is detected and recovered by first detecting memory leakage within the computer system based on nonlinear and non-parametric time-series regression analysis of software telemetry data generated by one or more software process running on the computer system. If existence of memory leakage is detected, then memory that has leaked is specifically identified and recovered. This is done by halting one or more of the software processes, generating a core image file or files of the halted software process(es), and re-starting the halted process or processes without waiting for analysis of the core image file(s). Then, the core image file is evaluated to specifically identify leaked memory in the computer system based on the core image file. Finally, the identified leaked memory is recovered. | 10-13-2011 |
20110246982 | APPARATUS AND METHOD FOR MAINTAINING A SOFTWARE REPOSITORY - A virtual installation map, and method involving installing a software functionality using the same, the virtual installation map including a first software installation map including a plurality of software elements representative of a related software file, the software elements also including at least one dependency to another software element. The virtual installation map further including a second software installation map also including a second plurality of software elements representative of related software file along with related dependencies. The first and second software installation maps may be hosted in separate databases and may relate to software products provided by different vendors. One or both software installation maps may include a pointer or other reference to the other installation map thereby providing a virtual installation map, in one example. | 10-06-2011 |
20110239212 | APPARATUS AND METHOD FOR AUTOMATED SOFTWARE INSTALLATION - A virtual installation map, and method involving installing a software functionality using the same, the virtual installation map including a first software installation map including a plurality of software elements representative of a related software file, the software elements also including at least one dependency to another software element. The virtual installation map further including a second software installation map also including a second plurality of software elements representative of related software file along with related dependencies. The first and second software installation maps may be hosted in separate databases and may relate to software products provided by different vendors. One or both software installation maps may include a pointer or other reference to the other installation map thereby providing a virtual installation map, in one example. | 09-29-2011 |
20110231838 | APPARATUS AND METHOD FOR INSTALLING SOFTWARE USING A SOFTWARE DEPENDENCY MAP - A virtual installation map, and method involving installing a software functionality using the same, the virtual installation map including a first software installation map including a plurality of software elements representative of a related software file, the software elements also including at least one dependency to another software element. The virtual installation map further including a second software installation map also including a second plurality of software elements representative of related software file along with related dependencies. The first and second software installation maps may be hosted in separate databases and may relate to software products provided by different vendors. One or both software installation maps may include a pointer or other reference to the other installation map thereby providing a virtual installation map, in one example. | 09-22-2011 |
20110231836 | APPARATUS AND METHOD FOR ESTABLISHING DEPENDENCIES IN A SOFTWARE DEPENDENCY MAP - A virtual installation map, and method involving installing a software functionality using the same, the virtual installation map including a first software installation map including a plurality of software elements representative of a related software file, the software elements also including at least one dependency to another software element. The virtual installation map further including a second software installation map also including a second plurality of software elements representative of related software file along with related dependencies. The first and second software installation maps may be hosted in separate databases and may relate to software products provided by different vendors. One or both software installation maps may include a pointer or other reference to the other installation map thereby providing a virtual installation map, in one example. | 09-22-2011 |
20110231707 | METHOD AND SYSTEM FOR PLATFORM INDEPENDENT FAULT MANAGEMENT - A method for fault management. The method includes generating, in firmware of a computer system, a physical resource inventory (PRI) of a plurality of hardware components of the computer system, wherein the PRI defines a hierarchy of the hardware components. The method further includes traversing, by an enumerator executing in a fault manager, the PRI to generate a topology of the plurality of hardware components. The topology is used for fault management of the computer system. | 09-22-2011 |
20110225577 | APPARATUS AND METHOD FOR ROLLBACK OF SOFTWARE UPDATES - A virtual installation map, and method involving installing a software functionality using the same, the virtual installation map including a first software installation map including a plurality of software elements representative of a related software file, the software elements also including at least one dependency to another software element. The virtual installation map further including a second software installation map also including a second plurality of software elements representative of related software file along with related dependencies. The first and second software installation maps may be hosted in separate databases and may relate to software products provided by different vendors. One or both software installation maps may include a pointer or other reference to the other installation map thereby providing a virtual installation map, in one example. | 09-15-2011 |
20110225461 | APPARATUS AND METHOD TO DETECT AND TRACK SOFTWARE INSTALLATION ERRORS - A virtual installation map, and method involving installing a software functionality using the same, the virtual installation map including a first software installation map including a plurality of software elements representative of a related software file, the software elements also including at least one dependency to another software element. The virtual installation map further including a second software installation map also including a second plurality of software elements representative of related software file along with related dependencies. The first and second software installation maps may be hosted in separate databases and may relate to software products provided by different vendors. One or both software installation maps may include a pointer or other reference to the other installation map thereby providing a virtual installation map, in one example. | 09-15-2011 |
20110214119 | APPARATUS AND METHOD FOR PROVIDING SOFTWARE CONFIGURATIONS ON A PLURALITY OF PLATFORMS - A virtual installation map, and method involving installing a software functionality using the same, the virtual installation map including a first software installation map including a plurality of software elements representative of a related software file, the software elements also including at least one dependency to another software element. The virtual installation map further including a second software installation map also including a second plurality of software elements representative of related software file along with related dependencies. The first and second software installation maps may be hosted in separate databases and may relate to software products provided by different vendors. One or both software installation maps may include a pointer or other reference to the other installation map thereby providing a virtual installation map, in one example. | 09-01-2011 |
20110209142 | APPARATUS AND METHOD FOR MANAGING A PLURALITY OF SOFTWARE DEPENDENCY MAPS AND SOFTWARE INSTALLATION USING THE SAME - A virtual installation map, and method involving installing a software functionality using the same, the virtual installation map including a first software installation map including a plurality of software elements representative of a related software file, the software elements also including at least one dependency to another software element. The virtual installation map further including a second software installation map also including a second plurality of software elements representative of related software file along with related dependencies. The first and second software installation maps may be hosted in separate databases and may relate to software products provided by different vendors. One or both software installation maps may include a pointer or other reference to the other installation map thereby providing a virtual installation map, in one example. | 08-25-2011 |
20110191766 | APPARATUS AND METHOD FOR GENERATING A SOFTWARE DEPENDENCY MAP - A virtual installation map, and method involving installing a software functionality using the same, the virtual installation map including a first software installation map including a plurality of software elements representative of a related software file, the software elements also including at least one dependency to another software element. The virtual installation map further including a second software installation map also including a second plurality of software elements representative of related software file along with related dependencies. The first and second software installation maps may be hosted in separate databases and may relate to software products provided by different vendors. One or both software installation maps may include a pointer or other reference to the other installation map thereby providing a virtual installation map, in one example. | 08-04-2011 |
20110188153 | Method of Retaining a Magnetically Preloaded Anti-Rotation Guide for a Transducer - A transducer positioning apparatus is provided that supports a read/write head on a data storage machine and biases the head against rotation. The transducer positioning apparatus may comprise a base that includes a linear drive motor and a support frame to which the read/write head is secured. The support frame is reciprocally driven by the linear drive motor relative to the base. A magnetic coupling is provided between the base and the support frame that resists movement of the frame other than the reciprocal movement of the support frame relative to the base. A method is also disclosed for magnetically biasing a movable head of a transducer against rotation. | 08-04-2011 |
20110173614 | METHOD AND SYSTEM FOR PROVISIONING A VIRTUAL COMPUTER AND SCHEDULING RESOURCES OF THE PROVISIONED VIRTUAL COMPUTER - A method for virtual computing that includes receiving a virtual computer specification, wherein the virtual computer specification defines a plurality of hardware and software configuration requirements for a virtual computer and a duration requirement for use of the virtual computer, requisitioning a plurality of computing resources based on the plurality of hardware and software configuration requirements, provisioning the plurality of computing resources from a pool of computing resources to obtain a provisioned virtual computer, and scheduling the plurality of computing resources of the provisioned virtual computer for use based on the duration requirement. | 07-14-2011 |
20110154659 | OPTIMIZING PCB POWER AND GROUND CONNECTIONS FOR LEAD FREE SOLDER PROCESSES - Apparatuses and methods that provide for enhanced connections between PTHs of multi-layer PCBs and electronic component leads, pins or the like. The apparatuses and methods improve the likelihood that the PTHs are completely filled with solder thereby advantageously allowing the PCBs to exhibit high mechanical and electrical reliability. Complete filling of PTHs is achieved by configuring the electrically conductive layers within the multi-layer PCB stack in a manner that reduces the heat sinking effects of the layers during the soldering process. In this regard, the PTHs may not directly contact all of the internal ground or power planes, so the heat sinking or heat transfer effects are reduced. This feature enables molten solder to substantially or completely fill an entire PTH before freezing. | 06-30-2011 |
20110145358 | SHARED JAVA JAR FILES - Techniques are disclosed for sharing programmatic modules among isolated virtual machines. A master JVM process loads data from a programmatic module, storing certain elements of that data into its private memory region, and storing other elements of that data into a “read-only” area of a shareable memory region. The master JVM process copies loaded data from its private memory region into a “read/write” area of the shareable memory region. Instead of re-loading the data from the programmatic module, other JVM processes map to the read-only area and also copy the loaded data from the read/write area into their own private memory regions. The private memory areas of all of the JVM processes begin at the same virtual memory address, so references between read-only data and copied data are preserved correctly. As a result, multiple JVM processes start up faster, and memory is conserved by avoiding the redundant storage of shareable data. | 06-16-2011 |
20110139917 | TAPE DRIVE - A tape drive, which is configured to receive a tape cartridge having a cartridge leader attached to magnetic tape, includes a take-up reel and a drive leader that is attachable to the cartridge leader. The drive leader has an attachment location attached to the take-up reel and a tapered portion proximate the attachment location. | 06-16-2011 |
20110125883 | Runtime Versioning of Information Processing Systems - An information processing system includes a runtime versioning facility which allows for managing its configuration so that modifications made during runtime are propagated and take affect without restarting the system or a portion thereof. This allows the potential for 100% uptime while upgrading such systems. This also provides a system capability to process multiple configuration versions, and to be able to process such versions even while such versions are changing during operation of the information processing systems. For example, a system such as a registry server capable of transactional configuration changes is provided which manages its configuration so that modifications made during runtime are propagated and take affect without restarting the server. | 05-26-2011 |
20110113042 | METHOD AND SYSTEM FOR ACCESSING A FILE SYSTEM - A method for accessing a file system including computing a first numerical similarity score for a first stored document and a second numerical similarity score for a second stored document by comparing a plurality of weighted active terms with a plurality of weighted indexed terms, determining a document order of the first stored document followed by the second stored document based on the first numerical similarity score exceeding the second numerical similarity score, generating a list of similar documents including the first stored document followed by the second stored document based on the document order, and displaying, in a file system interface and on the computer display, the list of similar documents while an active document is open in an active document interface. | 05-12-2011 |
20110019553 | METHOD AND SYSTEM FOR LOAD BALANCING USING QUEUED PACKET INFORMATION - A computer readable medium including instructions executable by a processor to perform a method, the method including obtaining a packet by a load balancer, obtaining queued packet information for a plurality of target hosts operatively connected to the load balancer, selecting the one of the plurality of target hosts using the queued packet information, and sending the packet to the selected target host using a first communication channel between the load balancer and the selected target host. | 01-27-2011 |
20100299459 | REFLECTING BANDWIDTH AND PRIORITY IN NETWORK ATTACHED STORAGE I/O - A method for processing a first input/output (I/O) request on a network attached storage (NAS) device that includes receiving the first I/O request from a source by the NAS device, placing the first I/O request in an I/O queue associated with the NAS device, wherein the first I/O request is placed in the I/O queue based on a priority of the first I/O request using a remote storage access protocol, and when the first I/O request is associated with the highest priority in the I/O queue, determining whether a bandwidth associated with the source of the first I/O request is exceeded, processing the first I/O request if the bandwidth associated with the source of the first I/O request is not exceeded, and placing the first I/O request in sleep mode if the bandwidth associated with the source of the first I/O request is exceeded. | 11-25-2010 |
20100275217 | GLOBAL ATTRIBUTE UNIQUENESS (GAU) USING AN ORDERED MESSAGE SERVICE (OMS) - A method and computer program product for providing Global Attribute Uniqueness (GAU) using an Ordered Message Service (OMS) is presented. A database operation is received from a client. A determination is made regarding whether the operation changes a value to a current value and when the operation would change a value to a current value then operation is ended. When the operation would not change a value to a current value the operation is decomposed into ADD messages and DELETE messages. The ADD messages are sent to a GAU manager and GAU state is checked and updated. The updates are committed to GAU state and the Directory Server (DS) is updated. Operation is then returned to the client. DELETE messages are sent to the GAU manager and GAU state is updated. The updates are then committed. | 10-28-2010 |
20100275171 | PACKAGE DESIGNS FOR FULLY FUNCTIONAL AND PARTIALLY FUNCTIONAL CHIPS - A method including obtaining an operational status of a first processor core, where the first processor core is associated with a plurality of processor cores located on a chip; configuring a first IO block of a package design based on the operational status of the first processor core, where the package design is based on a fully functional chip; and configuring a stackup of the package design after configuring the first IO block for use with the chip. | 10-28-2010 |
20100268811 | METHOD AND SYSTEM FOR DISCOVERING MANAGED SYSTEMS IN A NETWORK - A method for discovering managed systems in a network including classifying a first managed system associated with a first active Internet Protocol (IP) address in the network using a plurality of network protocols, identifying a set of drivers using the classification, where the set of drivers are configured to obtain first management information about the managed system, obtaining a first set of drivers, populating a data model with the first management information obtain using at least one of the first set of drivers, and managing the first managed system using the data model. | 10-21-2010 |
20100235606 | COMPOSITE HASH AND LIST PARTITIONING OF DATABASE TABLES - A method for partitioning during an online node add. The method includes providing a data storage cluster with first and second nodes, and storing a table of data in the data storage cluster with a first partition storing a set of rows or data elements in the first node and a second partition storing a set of rows or data elements in the second node. The method includes adding a third node to the cluster and adding a third partition to the table using a partitioning mechanism to create a distribution mapping for data elements in the first, second, and third partitions. The distribution mapping provides substantially uniform distribution of the data elements over the first, second, and third partitions by the partitioning mechanism using modulo hash partitioning as a function of data elements or by combining hash and list partitioning such that data is retained on the original partitions. | 09-16-2010 |
20100223390 | METHOD AND SYSTEM FOR OFFLOADED TRANSPORT LAYER PROTOCOL SWITCHING - A method for using offloaded transport layer protocols involves signaling a network interface controller (NIC) with a signal to use one of multiple transport layer protocols embedded in the NIC, and transmitting a data packet via the NIC using the transport layer protocol. | 09-02-2010 |