13th week of 2011 patent applcation highlights part 56 |
Patent application number | Title | Published |
20110078423 | IMPLEMENTATION OF VARIABLE LENGTH INSTRUCTION ENCODING USING ALIAS ADDRESSING - A digital processor and method of operation utilize an alias address space to implement variable length instruction encoding on a legacy processor. The method includes storing instructions of a code sequence in memory; generating instruction addresses of the code sequence; automatically switching between a first operating mode and a second operating mode in response to a transition in instruction addresses between a first address space and a second address space, wherein addresses in the first and second address spaces access a common memory space; in the first operating mode, accessing instructions in the first address space; in the second operating mode, accessing instructions in the second address space; and executing the accessed instructions of the code sequence. Instructions of different instruction lengths may be utilized in the first and second operating modes. | 2011-03-31 |
20110078424 | OPTIMIZING PROGRAM CODE USING BRANCH ELIMINATION - A method for optimizing program code is provided. The method comprises detecting a branch instruction comprising a condition expression, wherein the branch instruction, when executed by a processor, causes the processor to execute either a first set of instructions or a second set of instructions according to a value of the condition expression; and replacing the branch instruction with a third set of instructions that are non-branching, wherein the third set of instructions, when executed by a processor, has a collective effect same as if either the first or second set of instructions were executed according to the value of the condition expression. The third set of instructions comprises a negation instruction to normalize the value of the condition expression. | 2011-03-31 |
20110078425 | BRANCH PREDICTION MECHANISM FOR PREDICTING INDIRECT BRANCH TARGETS - A multithreaded microprocessor includes an instruction fetch unit that may fetch and maintain a plurality of instructions belonging to one or more threads and one or more execution units that may concurrently execute the one or more threads. The instruction fetch unit includes a target branch prediction unit that may provide a predicted branch target address in response to receiving an instruction fetch address of a current indirect branch instruction. The branch prediction unit includes a primary storage and a control unit. The storage includes a plurality of entries, and each entry may store a predicted branch target address corresponding to a previous indirect branch instruction. The control unit may generate an index value for accessing the storage using a portion of the instruction fetch address of the current indirect branch instruction, and branch direction history information associated with a currently executing thread of the one or more threads. | 2011-03-31 |
20110078426 | SYSTEMS AND METHODS FOR SCENARIO-BASED PROCESS MODELING - Methods and systems for scenario-based process modeling are described. In one example embodiment, a system for scenario-based process modeling can include a scenario module, a deviations module, a parallel tasks module, and a workflow generation engine. The scenario module is to receive a series of tasks to define a standard process flow. The deviations module is to receive a deviation from the standard process flow. The parallel tasks module is to enable identification of one or more parallel tasks. The workflow generation engine is to generate a workflow model based on the standard process flow, deviation, and one or more parallel tasks. | 2011-03-31 |
20110078427 | TRAP HANDLER ARCHITECTURE FOR A PARALLEL PROCESSING UNIT - A trap handler architecture is incorporated into a parallel processing subsystem such as a GPU. The trap handler architecture minimizes design complexity and verification efforts for concurrently executing threads by imposing a property that all thread groups associated with a streaming multi-processor are either all executing within their respective code segments or are all executing within the trap handler code segment. | 2011-03-31 |
20110078428 | PORTABLE DESKTOP DEVICE AND METHOD OF HOST COMPUTER SYSTEM HARDWARE RECOGNITION AND CONFIGURATION - A portable desktop device and method for host computer system hardware recognition and configuration are provided. The portable desktop device causes on a first boot, the host computer system to recognize hardware devices connected thereto, and to configure hardware configuration files of the portable desktop O/S in accordance with the recognized hardware. Once the hardware configuration files have been configured, the system is rebooted. On the second boot, the host computer determines that the portable desktop has been configured for its hardware, and initiates start-up of the portable desktop. | 2011-03-31 |
20110078429 | ELECTRONIC DEVICE AND BOOTING METHOD THEREFOR - An electronic device with a plurality of operating systems includes a mode selecting module, a firmware module, an operating system selecting module and a boot loader module. The mode selecting module selects a desired booting mode from a plurality of booting modes. The booting modes includes a manufacture booting mode, a normal booting mode, a rescue booting mode, and a recover booting mode. The firmware module stores the manufacture booting mode, the normal booting mode, the rescue booting mode, and the recover booting mode. The operating system selecting module selects from a plurality of operating systems according to the selected booting mode. The boot loader module loads the selected operating system. A booting method for the electronic device is also disclosed. | 2011-03-31 |
20110078430 | GAMING MACHINE HAVING A SECURE BOOT CHAIN AND METHOD OF USE - An electronic gaming machine (EGM) comprises a memory storing boot program code comprising first code; a central processing unit (CPU) arranged to access the memory and initiate a boot process by reading the first code from the memory; and a monitoring device having or with access to validation code and arranged to take at least one protective action if the first code does not match the validation code. | 2011-03-31 |
20110078431 | Information processing apparatus, method of controlling information processing apparatus, and semiconductor device - In an information processing apparatus that includes a first and second semiconductor devices that are connected to each other and also includes a system control device that is connected to the first and second semiconductor devices, the timers that are mounted on the semiconductor devices are all synchronized by successively performing a timer correction process between a semiconductor device in which the timer is synchronized and a semiconductor device, adjacent to the semiconductor device, in which the timer is not synchronized, and, when an error occurs in the information processing device, the value in the synchronized timer and the error information are stored in a predetermined register. | 2011-03-31 |
20110078432 | RETRIEVING BOOT INSTRUCTIONS FROM NONVOLATILE MEMORY - Systems and processes for booting a device can be implemented by detecting a reset signal associated with the device and retrieving a predetermined page of data from a nonvolatile memory location into a register associated with the nonvolatile memory. The nonvolatile memory may be designed and implemented such that each page of data is retrieved from the nonvolatile memory as a unit, and the page of data includes instructions for use in booting the device. A command to read data stored in the register is received, and the command can include an address identifying a location of one or more instructions within the register. In response, the one or more instructions are retrieved from the register for execution by a processor. | 2011-03-31 |
20110078433 | SYSTEMS AND METHODS FOR INSTALLING A BOOTABLE VIRTUAL STORAGE APPLIANCE ON A VIRTUALIZED SERVER PLATFORM - One embodiment is a method for installing a virtual storage appliance on a host server platform. One such method comprises: providing an installation package to a host server platform, the installation package comprising an installation script for installing an I/O virtual machine (IOVM), an IOVM boot console, and an IOVM management module; running the installation script to create a hidden boot partition on a boot disk and copy the IOVM boot console and the IOVM management module to the hidden boot partition; rebooting the host server platform; loading the IOVM boot console and the IOVM management module from the hidden boot partition; configuring a disk array via the IOVM management module; for each disk in the array, creating a hidden boot partition and replicating the IOVM boot console and the IOVM management module; and installing a virtual storage environment using the IOVM boot console as a storage driver. | 2011-03-31 |
20110078434 | PROCESS MANAGEMENT PROVIDING OPERATING MODE SWITCHING WITHIN AN ELECTRONIC DEVICE - A method of process management for facilitating switching of operating modes within an electronic device is presented. In the method, the electronic device initiates a first process associated in a configuration file with a first operating mode of the device. The configuration file includes an indication as to whether the first process is authorized to request a switch to a second operating mode of the device. A request to switch to the second operating mode is received from the first process. The device determines by way of the indication whether the first process is authorized to issue the request. If the first process is authorized to issue the request, the device initiates a second process associated in the configuration file with the second operating mode in response to the request. | 2011-03-31 |
20110078435 | Updating a Power Suppy Microcontroller - A system is described that includes a power conversion module, a data port, a controller to receive data from the data port, and a data store containing instructions that when executed by the controller perform operations to control the power conversion module. The operations include executing instructions in a first portion of the data store during booting of the controller, executing instructions in a second portion of the data store after the controller has booted, receiving a signal from the data port indicating the instructions in the second portion are to be modified, receiving from the data port modified instructions to be stored in the second portion, and executing, in response to the signal, the instructions in the first portion to store the modified instructions in the second portion. | 2011-03-31 |
20110078436 | COMMUNICATION APPARATUS, METHOD FOR CONTROLLING COMMUNICATION APPARATUS AND STORAGE MEDIUM - A control method for controlling an apparatus for performing IPsec communication, and performing negotiation for generating IPsec SA includes performing the negotiation by proposing all combinations of an encryption algorithm, a hash algorithm, and a DH group to a counter apparatus, extracting a combination, which is selected by the counter apparatus, out of all the combinations in a case where the IPsec SA has been successfully generated by the negotiation, storing and using the extracted one combination as an IKE determined value. | 2011-03-31 |
20110078437 | SIMPLIFYING ADDITION OF WEB SERVERS WHEN AUTHENTICATION SERVER REQUIRES REGISTRATION - An aspect of the present invention simplifies addition of new server systems which serve web pages to client systems, when an authentication server requires registration before providing authentication services. In an embodiment, a backend server is provided, which is registered with an authentication server. The server systems are implemented to redirect unauthorized access requests to the backend server, and the configurations performed during registration of the backend server system are used for authenticating a user and receiving an authentication result. The backend server communicates the authentication result and other information received from the authentication server to the server system. According to another aspect, such simplification is performed in a single sign-on (SSO) environment. | 2011-03-31 |
20110078438 | ENTITY BIDIRECTIONAL-IDENTIFICATION METHOD FOR SUPPORTING FAST HANDOFF - An entity bidirectional-identification method for supporting fast handoff involves three security elements, which includes two identification elements A and B and a trusted third party (TP). All identification entities of a same element share a public key certification or own a same public key. When any identification entity in identification element A and any identification entity in identification element B need to identify each other, if identification protocol has never been operated between the two identification elements that they belong to respectively, the whole identification protocol process will be operated; otherwise, interaction of identification protocol will be acted only between the two identification entities. Application of the present invention not only centralizes management of public key and simplifies protocol operation condition, but also utilizes the concept of security domain so as to reduce management complexity of public key, shorten identification time and satisfy fast handoff requirements on the premises of guaranteeing security characteristics such as one key for every pair of identification entities, one secret key for every identification and forward secrecy. | 2011-03-31 |
20110078439 | APPARATUS AND METHOD FOR USER IDENTITY AUTHENTICATION IN PEER-TO-PEER OVERLAY NETWORKS - Disclosed is a method for user identity authentication for a peer device joining a peer-to-peer overlay network. In the method, a credential server of the overlay network receives a registered user identity from a joining peer device. The credential server verifies the registered user identity with an identity provider. Upon receiving, at the credential server, successful verification of the registered user identity from the identity provider, the credential server issues to the joining peer device a signed certificate for use by an authenticated peer device in the overlay network to authenticate the registered user identity of the joining peer device, wherein the signed certificate is signed by a private key of the credential server. | 2011-03-31 |
20110078440 | METHOD AND APPARATUS TO IMPLEMENT VALID MOBILE TICKET TRANSFER - Computer-implemented methods and apparatus to perform a valid transfer of an electronic mobile ticket on a mobile device by a ticketing application system of a ticket processing center. One method includes: receiving a first electronic message from a first user, where the first message includes an encrypted electronic mobile ticket and a mobile device number of a second user, and where the electronic mobile ticket is encrypted with a key shared between the first user and the ticketing application system; decrypting the encrypted electronic mobile ticket; generating an electronic mobile ticket encrypted with a key shared by the ticketing application system and the second user; and transmitting a second electronic message that includes the electronic mobile ticket encrypted with the key shared between the ticketing application system and the second user to a mobile device of the second user. | 2011-03-31 |
20110078441 | SYSTEMS AND METHODS FOR WIRELESS PROCESSING AND MEDICAL DEVICE MONITORING VIA REMOTE COMMAND EXECUTION - A method according to the present invention includes receiving data wirelessly from a medical device, transmitting the data to an intermediary device, formatting a message including the received data for transmission to a medical data server, and receiving a command from the medical data server. Commands from the medical data server can be used for the authentication, configuration, and control of the medical device, intermediary device or another device operating in conjunction with the present invention, as well as to achieve other purposes. This method can be practiced automatically to allow a medical device for a patient or other subject to be monitored without requiring the patient to manually enter information. | 2011-03-31 |
20110078442 | METHOD, DEVICE, SYSTEM AND SERVER FOR NETWORK AUTHENTICATION - A method, a device, a system and a server for network authentication are provided. The method includes: receiving a user authentication request forwarded by a second Access Management Functional Entity (AM-FE) when a user is attached to the second AM-FE from a first AM-FE; obtaining an authentication key of a security domain of the second AM-FE according to the user authentication request; and authenticating the user by using the authentication key. The following problems are solved: packets of user services are lost and even services are temporarily interrupted because of long time consumption and poor security during intra-domain or inter-domain handover of the user. Therefore, the safe authentication of the user's intra-domain or inter-domain roaming is achieved, and thus the security and reliability of user authentication are improved. | 2011-03-31 |
20110078443 | METHOD AND SYSTEM FOR SECURE COMMUNICATIONS ON A MANAGED NETWORK - A system and method for discovery and/or authentication of clients to a network, particularly a managed network, substantially without requiring the client and/or access device to transmit an unencrypted address or identification. | 2011-03-31 |
20110078444 | RE-AUTHENTICATION APPARATUS AND METHOD IN DOWNLOADABLE CONDITIONAL ACCESS SYSTEM - Provided is a re-authentication apparatus in a Downloadable Conditional Access System (DCAS), the re-authentication apparatus includes: a receiving unit to receive a key request message from a Secure Micro (SM); a determination unit to determine whether to perform re-authentication depending on downloading of SM client image; an identification unit to identify an SM identifier using the key request message, when the re-authentication is performed as a result of the determination; an extraction unit to retrieve previous session information corresponding to the SM identifier and to extract keying information about the previous session information; and an encryption unit to control an encryption key about the SM client image to be reused, the SM client image being encrypted in a previous session based on the previous session information using the keying information. | 2011-03-31 |
20110078445 | Method For Establishing A Wireless Link Key Between A Remote Device And A Group Device - Disclosed is a method for establishing a wireless link key between a remote device and a group device. In the method, the remote device obtains a group identifier from the group device, and determines whether the group device is associated with a group having a trust association with the remote device. When the group device is determined to be associated with a group having an established trust association with the remote device, the remote device forwards a link setup request to the group device for virtually pairing with the group device using the trust association to establish the wireless link key. When the group device is determined not to be associated with a group having an established trust association with the remote device, the remote device forwards a pairing request to the group device for pairing with the group device to establish the wireless link key. | 2011-03-31 |
20110078446 | SYSTEM AND METHOD FOR DEPLOYING A MASTER KEY BETWEEN TWO COMMUNICATION DEVICES - A system and method of deploying a master key for a first communication device and second communication device. The first communication device receives a request message from the second communication device through a wireless communication network, and creates a master key algorithm based on configuration parameters of the request message. The first communication device further generates a master key according to the master key algorithm, verifies whether the master key created by the first communication device is correct, and installs the master key in the first and second communication devices when the master key is correct. | 2011-03-31 |
20110078447 | SECURE INTER-PROCESS COMMUNICATIONS - Securing inter-process communications includes receiving, from a device that supports a first process that is an instantiation of a first application being executed, a request to initiate inter-process communications. Securing inter-process communications also includes replying to the device with a request for information of a first digital certificate that uniquely authenticates an identity of the first process. An identity of a second process that is a distinct instantiation of the first application is authenticated using a second digital certificate distinct from the first digital certificate. | 2011-03-31 |
20110078448 | Short-Lived Certificate Authority Service - An integrated authentication service is described which may receive a bundled request from one or more clients. One or more of the described techniques may be utilized to provide, in response to a single bundled request, a token for proof of identity and a certificate for establishing secure communications. | 2011-03-31 |
20110078449 | Encrypted Communication System with Limited Number of Stored Encryption Key Retrievals - A system for encrypted communication with external entities is configured to frustrate side channel attacks attempting to determine an encryption key. The system has a device with an encryption key stored in memory, an external entity with identity data for transmission to the device to initiate communication such that in response the device applies a one way function to the encryption key and the identity data to generate a variant key used to authenticate communications between the device and the external entity. The device is configured to limit the number of times the encryption key is allowed to be retrieved from the first memory to a pre-determined threshold. | 2011-03-31 |
20110078450 | Method of Encrypted Communication with Limited Number of Stored Encryption Key Retrievals - A method of encrypted communication between entities in a manner that frustrates side channel attacks attempting to determine an encryption key. The method involves providing a device with an encryption key stored in memory, providing an external entity with identity data for transmission to the device, applying a one way function to the encryption key and the identity data to generate a variant key, authenticating communications between the device and the external entity with the variant key and limiting the number of times the encryption key is retrieved from the first memory to a pre-determined threshold. | 2011-03-31 |
20110078451 | Encrypted Communication System with Restricted Rate of Stored Encryption Key Retrievals - A system for encrypted communication with external entities is configured to frustrate side channel attacks attempting to determine an encryption key. The system has a device with an encryption key stored in memory, an external entity with identity data for transmission to the device to initiate communication such that in response the device applies a one way function to the encryption key and the identity data to generate a variant key used to authenticate communications between the device and the external entity. The device is configured to limit the number of times the encryption key is retrieved from the first memory in a given period of time. | 2011-03-31 |
20110078452 | METHOD TO CONTROL ACCESS BETWEEN NETWORK ENDPOINTS BASED ON TRUST SCORES CALCULATED FROM INFORMATION SYSTEM COMPONENT ANALYSIS - Signatures are generated for modules in a computer system. The signatures can be assembled into an integrity log. The signatures are compared with signatures in a database in an integrity validator. Once signatures are either validated or invalidated, a trust score can be generated. The trust score can then be used to determine whether the computer system should be granted access to a resource using a policy. | 2011-03-31 |
20110078453 | METHODS AND APPARATUS FOR COMPENSATION FOR CORRUPTED USER IDENTIFICATION DATA IN WIRELESS NETWORKS - Methods and apparatus that correct for corrupted user identification or other data based on reciprocal transmission channel characteristic. In one embodiment, a level of tolerance is disclosed which provides a degree of leniency in user identification. In alternate embodiments, a level of tolerance is disclosed which provides a narrow window for “guessing” of user identification. Various methods for quantization and specification of tolerances are also disclosed. Methods and apparatus useful for implementing variation-tolerant encryption schemes are also provided. | 2011-03-31 |
20110078454 | ENCRYPTED COMMUNICATION DEVICE WITH RESTRICTED RATE OF ENCRYPTION KEY RETRIEVALS FROM MEMORY - A device for encrypted communication with external entities is configured to frustrate side channel attacks attempting to determine an encryption key. The device has a first memory, an encryption key stored in the first memory and a one-way function for application to the encryption key. During use the encryption key is retrieved from the first memory prior to application to the one-way function and the device is configured to limit the number of times the encryption key is allowed to be retrieved from the first memory in a given period of time. | 2011-03-31 |
20110078455 | COMMUNICATION DEVICE, COMMUNICATION METHOD, INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, PROGRAM, AND COMMUNICATION SYSTEM - In one example embodiment, an information processing apparatus determines whether a target ID is a unique ID or a partial randomization ID that includes a first part being replaced by a different number and a second part being generated based on the unique ID. In response to the target ID being the partial randomization ID, the information processing apparatus generates an access key based on the second part of the partial randomization ID and a key. The information processing apparatus executes a mutual authentication process using the generated access key. | 2011-03-31 |
20110078456 | Encrypted Communication Device with Limited Number of Encryption Key Retrievals from Memory - A device for encrypted communication with external entities is configured to frustrate side channel attacks attempting to determine an encryption key. The device has a first memory, an encryption key stored in the first memory and a one-way function for application to the encryption key. During use, the encryption key is retrieved from the first memory prior to application to the one-way function and the device is configured to limit the number of times the encryption key is allowed to be retrieved from the non-volatile memory to a pre-determined threshold. | 2011-03-31 |
20110078457 | Method of Encrypted Communication with Restricted Rate of Stored Encryption Key Retrievals - A method of encrypted communication between entities in a manner that frustrates side channel attacks attempting to determine an encryption key. The method involves providing a device with an encryption key stored in memory, providing an external entity with identity data for transmission to the device, applying a one way function to the encryption key and the identity data to generate a variant key, authenticating communications between the device and the external entity with the variant key and limiting the number of times the encryption key is retrieved from the first memory in a given period of time. | 2011-03-31 |
20110078458 | CONTENTS PROCESSING DEVICE AND CONTENTS PARTIAL INTEGRITY ASSURANCE METHOD - A contents processing device includes a management data storage unit to store an updater identifier and a private key, an accepting unit to accept a content which is divided into a plurality of blocks, an updating type indicating a type of an updating as to the content, an updated block to be updated of the content, and an updated position, an inserting unit to generate an updated content by inserting the updating block into the updated position of the content, a first hash value calculating unit to calculate a hash value as to the updated block, a signature unit to read out the updater identifier and the private key from the management data storage unit to generate a digital signature using the private key as to updating record information including the updater identifier, the updated position, the hash value as to the updated block, and the updating type. | 2011-03-31 |
20110078459 | SIGNATURE GENERATING DEVICE AND METHOD, SIGNATURE VERIFYING DEVICE AND METHOD, AND COMPUTER PRODUCT - A signature generating device includes a receiving unit that receives a sequence of data; a summary data generating unit that generates summary data of the data upon reception of each of the data by the receiving unit; an obtaining unit that obtains, when the number of data included in a sequence of the generated summary data reaches a given number, the sequence of the summary data as a block; a setting unit that sets, as a signature subject, a current block constituted by the sequence of the summary data, and the summary data selected from at least one block contiguous to the current block; a digital signature generating unit that generates a digital signature concerning data summarized for the current block; and a sending unit that sends the generated digital signature, the signature subject associated with the digital signature, and the data summarized for the current block. | 2011-03-31 |
20110078460 | Apparatus for Logging a Configuration of a Microprocessor System and Method for Logging a Configuration of a Microprocessor System - An apparatus includes a logging apparatus and a configuration apparatus. The logging apparatus has a security module operable to create a manipulation-proof log. The configuration apparatus is operable to configure a configurable microprocessor system. The configuration apparatus is further operable to be coupled to the logging apparatus in order to log a configuration of the microprocessor system using the logging apparatus. | 2011-03-31 |
20110078461 | SYSTEM AND METHOD FOR COMMUNICATION IN A WIRELESS MOBILE AD-HOC NETWORK - A system and method for improving digital communication in a wireless mobile ad-hoc network. More specifically, the system includes one or more portable network devices operable to support the seamless operation of a self-initializing, self-healing, adaptive portable network. The portable network devices implement protocols that provide bandwidth management capabilities for use with radios, routers and other wireless network devices. Each portable network device includes at least one wireless transceiver, a processor and control software. The processor and control software are logically coupled to the wireless transceiver to facilitate digital communication via a plurality of communication channels with other network devices. | 2011-03-31 |
20110078462 | METHOD FOR MANAGING EXTERNAL STORAGE DEVICES - An apparatus, system, and method enable a new platform storage system to have access to an external storage system having data encrypted thereon by an existing platform storage system. Encryption information corresponding to the encrypted data in the external storage system is stored in a memory in the existing platform storage system. The encryption information stored in the memory of the existing platform storage system is transferred to an encryption table stored in the new platform storage system, so that the new platform storage system can read the encrypted data stored in the external storage system. | 2011-03-31 |
20110078463 | METHOD, SYSTEM AND APPARATUS FOR LOW-POWER STORAGE OF PROCESSOR CONTEXT INFORMATION - A method and system for saving and/or retrieving context information of a processor core for a power state transition. The processor core resides in a complex power domain variously transitioning between a plurality of power states. The processor core includes a local context storage area for storage and retrieval of processor core context information. A low power context storage resides in a nominal power domain external to the complex power domain. Context information of the processor core is stored to the low power context storage based on whether a power state transition of the complex power domain includes a transition to power down the processor core. | 2011-03-31 |
20110078464 | INFORMATION PROCESSING APPARATUS, METHOD FOR CONTROLLING THE SAME, AND STORAGE MEDIUM - An information processing apparatus includes an input unit configured to input data, and a control unit configured to control a power mode of the information processing apparatus. When the input unit inputs data while the information processing apparatus is operated in the second power mode and when the data input by the input unit is data to be immediately processed by the first processing unit, the power mode of the information processing apparatus is shifted from the second power mode to the first power mode. When the data input by the input unit is data not to be immediately processed by the first processing unit, the power mode of the information processing apparatus remains in the second power mode. | 2011-03-31 |
20110078465 | INFORMATION PROCESSING APPARATUS, METHOD OF CONTROLLING INFORMATION PROCESSING APPARATUS, AND STORAGE MEDIUM - When a control unit is in a power saving mode, if a job is received from a host apparatus, a NIC unit responds by proxy to the job by using only some of devices in the control unit. In a case where it is determined that the NIC unit cannot respond by proxy to the job, it is determined based on a packet pattern of the job whether the job can be dealt with using only some of devices disposed in the control unit. If it is determined that the job can be dealt with using only some of devices, the NIC unit deals with the job using some of devices. | 2011-03-31 |
20110078466 | SYSTEMS AND METHODS OF COMPONENT VOLTAGE ADJUSTMENT - Systems and methods for adjusting component voltage are disclosed. One example method includes: reading, over a control bus, a present value of voltage supplied to a component; comparing the present value of the voltage component to a predetermined minimum voltage associated with the component; and writing, over the control bus, a current setting that affects voltage provided to the component, wherein the writing is responsive to the comparison. | 2011-03-31 |
20110078467 | REDUCING ENERGY CONSUMPTION IN A COMPUTING CLUSTER - Embodiments of the invention relate to reducing energy consumption in a computing cluster. An aspect of the invention includes a method for reducing energy consumption in a computing cluster. The method includes monitoring requests to server. The method further includes activating a server, if at least one request is to be routed to the server in a reduced power consumption state. The method further includes routing the requests to at least one server. The method further includes reducing power consumption on the server, if the server does not have at least one active request. | 2011-03-31 |
20110078468 | POWER CONTROLLER, ELECTRONIC APPARATUS AND POWER CONTROL METHOD - According to one embodiment, a power controller for controlling a power supply, includes: a receiver configured to receive a signal for switching an ON/OFF state of the power supply, a controller configured to control the ON/OFF state of the power supply, and an determining module configured to determine whether the signal is a signal for switching the power supply from the OFF state to the ON state or from the ON state to the OFF state. The controller controls to turn off the power supply, when the determining module determines that the signal is the signal for switching the power supply from the ON state to the OFF state. Further, the receiver, the controller and the determining module operate by a rechargeable battery, while the power supply is in an ON state, when the power supply is in an OFF state. | 2011-03-31 |
20110078469 | METHOD AND APPARATUS FOR LOW POWER OPERATION OF MULTI-CORE PROCESSORS - Embodiments of an apparatus, system and method are described for low power operation of a multi-core processing system. An apparatus may comprise, for example, a power management module operative to initialize a low power mode, detect one or more un-affinitized software threads, and affinitize the one or more un-affinitized software threads to run on a set of processor cores of a multi-core processor, wherein the set of processor cores comprises less than a total number of processor cores of the multi-core processor. Other embodiments are described and claimed. | 2011-03-31 |
20110078470 | Flexible cell battery systems and methods for powering information handling systems - The number of battery cells connected together in a main battery conductor path of a multiple cell battery system of an information handling system may be varied in real time based on one or more operating conditions (e.g., system load power consumption, battery cell failure, etc.) of the information handling system. Defective battery cells may be bypassed such that the defective battery system may continue to operate and power an information handling system at a lower voltage, e.g., either temporarily, permanently or temporarily until the user procures a suitable replacement battery system. Interconnection of cells of a non-defective multiple cell battery system may also be selectively re-arranged to vary battery system voltage at particular times or during particular information handling system operation modes. | 2011-03-31 |
20110078471 | ACCESS CONTROL APPARATUS OF DATA STORAGE DEVICE - An access control apparatus of a data storage device includes a first connecting unit configured to be removably connected with a power supply device, perform data transmission through a first data-transmission line, and be supplied with power through a first power-transmission line, a second connecting unit configured to be removably connected with the data storage device, perform data transmission through a second data-transmission line, and supply power through a second power-transmission line, a data transfer processing unit configured to perform data transfer between the power supply device and the data storage device, a power consumption measuring unit configured to measure power supplied from the power supply device through the first power-transmission line, and a power-transmission capability monitoring unit configured to control the data transfer processing unit in accordance with power consumption measured by the power consumption measuring unit. | 2011-03-31 |
20110078472 | COMMUNICATION DEVICE AND METHOD FOR DECREASING POWER CONSUMPTION - A first communication device determines whether a communication device that is not included in a routing path exists through an exchange of routing information with a plurality of adjacent communication devices. In this case, if a communication device that is not included in a routing path exists, the first communication device notifies a corresponding communication device to operate in a power saving mode, operates to decrease power use that is related to the corresponding communication device, and the communication device, having received the notification operates in a power saving mode. | 2011-03-31 |
20110078473 | LATENCY BASED PLATFORM COORDINATION - In some embodiments, an electronic apparatus comprises at least one processor, a plurality of components, and a policy engine comprising logic to receive latency data from one or more components in the electronic device, compute a minimum latency tolerance value from the latency data, and determine a power management policy from the minimum latency tolerance value. | 2011-03-31 |
20110078474 | METHOD OF CONTROLLING POWER CONSUMPTION OF A MEMORY ACCORDING TO MAPPING - There is provided a method of controlling power consumption of a memory, which is executed in a computer system including operation server and a management server. The operation server includes one or more memory chips which are units to control the power consumption of the memory, a power control module for controlling power consumption of the memory chips, and a virtualization module for operating one or more virtual servers. The management server manages the mapping between the one or more virtual servers and the one or more memory chips. The method comprises the steps of instructing the operation server to change the power consumption of the one or more memory chips based on whether the obtained access information is capable of achieving predetermined target performance and the mapping information, and changing the power consumption of the one or more memory chips based on the instruction from the management server. | 2011-03-31 |
20110078475 | Transitioning a Computing Platform to a Low Power System State - A method which includes initiating a power management policy based on a processing element for a computing platform entering a given power state. The power management policy includes a determination as to whether an input/output (I/O) controller and a memory controller for the computing platform are substantially quiescent. The computing platform may then be transitioned to a low power system state from a run power system state based on a determination that both the I/O controller and the memory controller are substantially quiescent and an indication that the computing platform is capable of entering the low power system state. According to this method, the low power system state includes entering one or more devices responsive to the computing platform in a power level adequate to retain a configuration state that enables the one or more devices to transition back to the run power system state in a manner that is substantially transparent to an operating system for the computing platform. Other implementations and examples are also described in this disclosure. | 2011-03-31 |
20110078476 | KEY INPUT APPARATUS USING A SWITCHING MATRIX - The present invention relates to a key input apparatus for a switching matrix. The present invention includes a column scan control device including switching units connected to the lines in the column scan direction in one-to-one correspondence in response to a column scan signal and an enable signal (EN) from the main controller, and performing a column scan operation for each of the modes according to a switching operation of the switching units of selectively receiving two input voltages (Vup and VA) for each column in normal scan mode and receiving a standby voltage (Vh) in power saving mode; and a row scan control device for performing a row scan in response to a row scan signal from the main controller in synchronization with a column scan signal from the column scan control device in normal scan mode, and operating in power saving mode in response to the enable signal (EN). Accordingly, the key input apparatus of the present invention controls a switch matrix using a switch having a simple construction, thereby providing the advantages of removing the ghost key phenomenon, operating in power saving mode and reducing manufacturing cost. | 2011-03-31 |
20110078477 | POWER MANAGEMENT METHOD FOR ELECTRONIC DEVICE - An electronic device performs power management by switching between an active mode and an idle mode. The active mode is launched by applying a main clock signal to a processor within the electronic device. The idle mode is launched in parallel with a scaling down of a power level of processor. | 2011-03-31 |
20110078478 | METHOD AND APPARATUS FOR TRANSITIONING DEVICES BETWEEN POWER STATES BASED ON ACTIVITY REQUEST FREQUENCY - A method for transitioning power states in a device includes designating a first reduced power state as a target power state. A first expected residency for the target power state is determined based on a counting of activity requests associated with the device. The device is transitioned to the target power state responsive to the expected residency satisfying a first predetermined threshold. | 2011-03-31 |
20110078479 | METHOD AND APPARATUS FOR REDUCING SERVER POWER SUPPLY SIZE AND COST - Computing and server power supplies are typically sized larger to deliver the maximum power the system may need. However since systems are not often used to capacity a smaller power supply may be used in conjunction with a thermal sensor to monitor a critical component of the power supply defined as the particular component within the power supply whose temperature reaches its maximum allowed limit sooner than any other power supply component when the average (continuous) power may exceed the power supply's max rating. When a critical temperature has been reached, an interrupt signal is generated by the power supply to signal the host to throttle back until the temperature comes back into an acceptable range. | 2011-03-31 |
20110078480 | ENERGY-EFFICIENT SERVER LOCATION DETERMINATION - A heat potential value for each of a set of available server locations is calculated via a data center controller based upon at least one active server in a data center. A minimal calculated heat potential value for the set of available server locations is identified. An available server location associated with the identified minimal calculated heat potential value is selected from the set of available server locations. | 2011-03-31 |
20110078481 | Programmable controller - A programmable controller includes one or more extension units; a CPU unit for controlling the extension units; and a charging element. The CPU unit includes a voltage detection circuit for detecting an output voltage of the charging element and outputting a voltage reduction signal when the detected output voltage is lowered to a level equal to or lower than a reference value and a signal output circuit for outputting a power supply stop signal in response to the voltage reduction signal. Each extension unit includes a voltage detection circuit for detecting an output voltage of an power circuit and outputting a power supply stop signal when the detected output voltage is lowered to a level equal to or lower than a reference value and a power supply stop circuit for stopping the power circuit in response to the power supply stop signal. | 2011-03-31 |
20110078482 | Method and Apparatus for Audio Receiver Clock Synchronization - An audio receiver's output clock is synchronized based on a number of input and output audio samples measured over a predetermined sample period. In one embodiment, a sample difference may be determined by subtracting the measured number of input audio samples from the measured number of output audio samples. This sample difference may then be compared to a predetermined threshold. In one embodiment, if the absolute value of the sample difference is less than the predetermined threshold, no adjustment to the output clock may be needed. When the absolute value of the sample difference is greater than the predetermined threshold, the output clock rate may be adjusted either upwards or downwards. | 2011-03-31 |
20110078483 | OBSERVING AN INTERNAL LINK VIA AN EXISTING PORT FOR SYSTEM ON CHIP DEVICES - Methods and apparatus relating to observing an internal link via an existing port for System On Chip (SOC) devices are described. In one embodiment, a logic within an SOC device may allow an external logic analyzer to observe communication between a first and second component of the SOC through an existing (e.g., shared and/or non-dedicated) interface. Other embodiments are also disclosed. | 2011-03-31 |
20110078484 | MOTHERBOARD WITH OVERCLOCKING AND OVERVOLTING FUNCTIONS - A motherboard with overclocking and overvolting functions is provided. The motherboard with an overvolting function includes a specified component, a voltage regulator and a micro-controller. The specified component receives an operating voltage. The voltage regulator generates the operating voltage according to a reference voltage. The micro-controller is electrically connected to an external input device for receiving a control signal issued by the external input device and adjusting the reference voltage according to the control signal. | 2011-03-31 |
20110078485 | Increasing Memory Bandwidth in Processor-Based Systems - The amount of data that may be transferred between a processing unit and a memory may be increased by transferring information during both the high and low phases of a clock. As one example, in a graphics processor using a general purpose register file as a memory and a mathematical box as a processing unit, the amount of data that can be transferred can be increased by transferring data during both the high and low phases of a clock. | 2011-03-31 |
20110078486 | DYNAMIC SELECTION OF EXECUTION STAGE - Methods and apparatus relating to dynamic selection of execution stage are described. In some embodiments, logic may determine whether to execute an instruction at one of a plurality of stages in a processor. In some embodiments, the plurality of stages are to at least correspond to an address generation stage or an execution stage of the instruction. Other embodiments are also described and claimed. | 2011-03-31 |
20110078487 | SERVICE PLAN WEB CRAWLER - A web crawler for downloading and analyzing the contents of a merchant's website. The web crawler may analyze the products advertised and determine whether a service plan is properly associated. The crawler may also analyze the placement of the service plans on the website, and store the information in a database. A dynamic mapper is also provided which can determine what service plan should be associated with a particular product. The dynamic mapper may also suggest what type of control to use for a particular customer. A webserver containing software for updating a webpage is also disclosed. A process for updating a webpage is also disclosed. | 2011-03-31 |
20110078488 | HARDWARE RESOURCE ARBITER FOR LOGICAL PARTITIONS - A computer implemented method, data processing system, and apparatus for hardware resource arbitration in a data processing environment having a plurality of logical partitions. A hypervisor receives a request for a hardware resource from a first logical partition, wherein the request corresponds to an operation. The hypervisor determines the hardware resource is free from contention by a second logical partition. The hypervisor writes the hardware resource to a hardware resource pool data structure, as associated with the first logical partition, in response to a determination the hardware resource is free. The hypervisor presents the hardware resource to the first logical partition. The hypervisor determines that the operation is complete. The hypervisor release the hardware resource from a hardware resource pool, responsive to the determination that the operation is complete. | 2011-03-31 |
20110078489 | METHOD, APPARATUS, AND SYSTEM FOR MAINTAINING STATUS OF BOOTSTRAP PEER - A method for maintaining the status of a bootstrap peer includes: selecting a bootstrap peer; obtaining the status information of the bootstrap peer; updating a local bootstrap peer list according to the status information of the bootstrap peer. An apparatus and system for maintaining the status of a bootstrap peer are also disclosed. The bootstrap peer list is updated according to the status information of the selected bootstrap peer, which ensures the validity of the bootstrap peer list on the bootstrap server so that the information in the bootstrap peer list obtained by a joining peer is valid. This improves the success rate of joining the overlay network by the joining peer, shortens the joining process time of the joining peer, and implements load balancing between the bootstrap peers. | 2011-03-31 |
20110078490 | SVC CLUSTER CONFIGURATION NODE FAILOVER SYSTEM AND METHOD - Methods, systems, and computer programs are provided for failover responses to configuration node failures in SVC clusters. An SVC cluster manages a plurality of storage devices and includes a plurality of SVCs interconnected via a network, each SVC acting as a separate node. A new configuration node is activated in response to configuration node failures. The new configuration node retrieves client subscription information about events occurring in storage devices managed by the SVC cluster from the storage devices. In response to events occurring in the storage device managed by the SVC cluster, the new configuration node obtains storage device event information from a storage device event monitoring unit. The new configuration node sends storage device events to clients who have subscribed to this information according to subscription information obtained. The storage device is not installed in the original configuration node. This method allows complete transparency of the configuration node failover process to clients. | 2011-03-31 |
20110078491 | CONTROL SYSTEM, CONTROL COMPUTER AND METHOD FOR OPERATING A CONTROL SYSTEM - A particularly simple and simultaneously fail-safe control system has a control computer for interchanging data with at least one peripheral, and at least one further control computer connected to the first-mentioned control computer via a communication channel. The further control computer is configured to assume at least part of the functionality of the control computer. The control computer is designed, in the event of partial failure thereof, to forward data received by the further control computer via the communication channel to the peripheral and/or to forward data received by the peripheral to the further control computer via the communication channel. There is also provided such a control computer and a method for operating a control system. | 2011-03-31 |
20110078492 | HOME AGENT DATA AND MEMORY MANAGEMENT - Methods and apparatus relating to home agent data and memory management are described. In one embodiment, a scrubber logic corrects an error at a location in a memory corresponding to a target address by writing back the corrected version of data to the target location. In an embodiment, a map out logic maps out an index or way of a directory cache in response to a number of errors, corresponding to the directory cache, exceeding a threshold value. Other embodiments are also disclosed. | 2011-03-31 |
20110078493 | METHOD AND APPARATUS FOR DISPERSED STORAGE DATA TRANSFER - The method begins with a processing module determining whether to reconstruct data corresponding to a plurality of data slices when the plurality of data slices is to be transferred from a first type of memory device to a second type of memory device. The method continues with the processing module retrieving the plurality of data slices from a first set of memory devices that are of the first type of memory, reconstructing at least a portion of the data from the plurality of data slice in accordance with a first error coding dispersal function to produce reconstructed data, encoding the reconstructed data in accordance with a second error coding dispersal function to produce a second plurality of data slices, and storing the second plurality of data slices in a second set of memory devices that are of the second type of memory when the data is to be reconstructed. | 2011-03-31 |
20110078494 | MANAGEMENT METHOD AND SYSTEM FOR MANAGING REPLICATION BY TAKING INTO ACCOUNT CLUSTER - A management system, which manages a host computer and a storage system, holds cluster information, specifies an active-state host computer and an inactive-state host computer based on a backup instruction specifying a virtual host identifier, determines the need for executing a replication for disaster recovery use, and when necessary, executes this replication for disaster recovery use in combination with a replication for backup use. | 2011-03-31 |
20110078495 | STORAGE CONTROL APPARATUS AND FAILURE RECOVERY METHOD FOR STORAGE CONTROL APPARATUS - A storage control apparatus of the present invention reduces the frequency of disk drive failures. An error management part manages the number of times errors occur in respective disk drives. A disk drive in which the number of errors meets or exceeds a threshold value is selected as a disk drive to be restarted. A restart control part commences difference management prior to restarting the disk drive targeted for restart. A difference management part manages parity group-related update locations using a difference bitmap. After commencing difference management, the restart control part restarts the disk drive in which the error was detected. This makes it possible to resolve an error caused by a firmware hangup or the like. | 2011-03-31 |
20110078496 | STRIPE BASED MEMORY OPERATION - The present disclosure includes methods and devices for stripe-based memory operation. One method embodiment includes writing data in a first stripe across a storage volume of a plurality of memory devices. A portion of the first stripe is updated by writing updated data in a portion of a second stripe across the storage volume of the plurality of memory devices. The portion of the first stripe is invalidated. The invalid portion of the first stripe and a remainder of the first stripe are maintained until the first stripe is reclaimed. Other methods and devices are also disclosed. | 2011-03-31 |
20110078497 | AUTOMATED RECOVERY FROM A SECURITY EVENT - In embodiments of the present invention improved capabilities are described for automated recovery from a security event. Automated recovery includes detecting a security event, using metadata to select a target backup for recovery, bringing the recovered environment online in a quarantine mode, initiating automated recovery of the environment, and running at least one of a generic remediation process and a specific remediation process in the quarantine mode prior to releasing the environment from quarantine mode. Related user interfaces, applications, and computer program products are disclosed. | 2011-03-31 |
20110078498 | RADIATION-HARDENED HYBRID PROCESSOR - A method of providing radiation hardening for a modular computational component having a first memory and a second memory and being connectable to an external platform comprises providing a radiation tolerant field programmable gate array having a pair of processors, processing data from the external platform according to instructions stored in the first memory, and executing instructions stored in the second memory to provide radiation hardening by software. The instructions comprise instructions to execute identical processing operations for the data of the external platform in each of the pair of processors, instructions to identify a data corruption indicia for each of the identical processing operations, instructions to compare the identified data corruption indicia, and instructions to repeat the identical processing operations if the data corruption indicia show corrupted data. | 2011-03-31 |
20110078499 | BUSINESS PROCESS ERROR HANDLING THROUGH PROCESS INSTANCE BACKUP AND RECOVERY - According to one embodiment of the present invention, a method for business process error handling through process instance backup and recovery includes the step of creating a backup profile of selected one or more portions of a business process model at modeling stage. The method also includes the steps of deploying the backup profile into a runtime environment, and upon occurrence of an error in execution instances of the business process model, re-executing at least one of the one or more portions of the backup profile to recover from the error. | 2011-03-31 |
20110078500 | PROCESSING TRANSACTIONS IN GRAPH-BASED APPLICATIONS - A graph-based computation has a plurality of nodes representing graph components connected by one or more links representing data flows between the components. Preparing the computation includes: identifying at least a first set of components to process a plurality of transactions in the computation; and associating with a first transaction a first group of one or more data records and data operations corresponding to the data records, and associating with a second transaction a second group of one or more data records and data operations corresponding to the data records. Executing the computation to process at least the first and second transactions includes delaying execution by the first set of components of a data operation corresponding to an initial data record of the second group until after execution by the first set of components of a data operation corresponding to a final data record of the first group. | 2011-03-31 |
20110078501 | System and Methods for Remotely Recovering and Purging Data From a Wireless Device in a Communications Network - A system and methods are provided for remotely recovering and purging data from a wireless device in a communications network. The system includes a wireless device capable of executing a data recovery/purge application program for receiving a message from a communications device in the network. The application program retrieves the data in the wireless device, purges the data from the wireless device, and sends a return message, including the data retrieved from the wireless device, to the communications device. | 2011-03-31 |
20110078502 | Switching Between Connectivity Types To Maintain Connectivity - Techniques are provided for leveraging narrowband connectivity (such as dial-up communications or other types of low bandwidth communications) to provision or configure broadband connectivity between a broadband access provider and a broadband device, such as a DSL modem or a cable modem. Specifically, because narrowband connectivity does not require advance configuration or provisioning by the host system of connectivity parameters for an access-seeking device, a modem at an access-seeking device may be leveraged to establish a narrowband connection between that device and a host system and to enable an exchange or negotiation of connectivity parameters necessary to enable future broadband connectivity. Thus, once established, the narrowband connection may be used as a conduit for communicating required provisioning information between the broadband-enabling host and the access-seeking device to enable broadband connectivity by the device in the future. | 2011-03-31 |
20110078503 | METHOD AND APPARATUS FOR SELECTIVELY ACTIVE DISPERSED STORAGE MEMORY DEVICE UTILIZATION - The method begins with a processing unit receiving an encoded slice for storage. The method continues with the processing unit determining whether to store the encoded slice in one of a first set of memory devices or in one of a second set of memory devices based on metadata associated with the encoded slice, wherein the first set of memory devices are continually active and the second set of memory devices are selectively active. The method continues with the processing unit stores the encoded slice in the one of the second set of memory devices when the encoded slice is to be stored in the one of the second set of memory devices. The method continues with the processing unit de-activating the one of the second set of memory devices, in accordance with a deactivation protocol, after storing the encoded slice. | 2011-03-31 |
20110078504 | INFORMATION PROCESSING APPARATUS HAVING FILE SYSTEM CONSISTENCY RECOVERY FUNCTION, AND CONTROL METHOD AND STORAGE MEDIUM THEREFOR - An information processing apparatus able to recover consistency between file entity data and file management information when detecting an inconsistency therebetween at start-up of the apparatus, while reducing unavailable time of the apparatus as much as possible. A CPU of the information processing apparatus executes a base program stored in a storage unit to check for an abnormality in consistency between file entity data and file management information which are stored in another storage unit. If an abnormality is detected, the CPU executes a program for degeneracy operation stored in still another storage unit to perform a degeneracy operation, and recovers the consistency. | 2011-03-31 |
20110078505 | System and Method for Locating a Fault on a Device Under Test - System and method for analyzing operation of a device under test (DUT). In one embodiment, a reference component associated with a reference device may be received. The reference device may be in communication with the DUT and a component associated with the DUT can be exchanged with the reference component. A test may be performed on the DUT, wherein a result of the test may correspond to a source of a fault associated with the DUT. An indication of the source of the fault may be provided based on the test result. | 2011-03-31 |
20110078506 | INTEGRATING DESIGN FOR RELIABILITY TECHNOLOGY INTO INTEGRATED CIRCUITS - A method executes computerized instructions stored within a computer storage medium within an integrated and packaged semiconductor device using a centralized programming interface within the packaged semiconductor device to perform in-system preventive and recovery actions, configure and issue stimulus to chips, components and sensors within the semiconductor device. The method monitors chip, components and sensors within the packaged semiconductor device, using the centralized programming interface, to measure characteristics of the packaged semiconductor device in response to the stimulus. The structure including chips, components and sensors produce outputs representing the characteristics. The method performs an engineering evaluation to determine whether the chip, component and sensor outputs are within predetermined limits, using the centralized programming interface; and reports occurrences of instances of the chip, component and sensor outputs being outside the predetermined limits, using the centralized programming interface, to an on-chip storage medium, external test equipment or computerized device outside of the packaged semiconductor device. The instructions cause the centralized programming interface to alter actions, configurations, frequencies and types of the stimulus, engineering evaluations, and reports depending upon whether the characteristics are within the predetermined limits in order to recover from and prevent failure. | 2011-03-31 |
20110078507 | OPERATIONAL SYSTEM TEST METHOD - The present invention features an operational system test method, comprising defining a fault model, inserting a test agent, hooking a test location, collecting test information, and removing the test agent. The invention also features an operational system test method, comprising defining a fault model, inserting a test agent, identifying a memory area according to a test location, hooking the identified memory area, collecting test information, and removing the test agent. | 2011-03-31 |
20110078508 | CONTROL APPARATUS AND CONTROL METHOD OF ELASTIC BODY ACTUATOR AS WELL AS CONTROL PROGRAM THEREOF - An inner pressure of an actuator is measured by a pressure measuring unit, and an amount of displacement of a movable mechanism is measured so that a position error compensation unit to which a desired value for the displacement and the measured value are inputted is allowed to compensate for a position error, and a desired value for a pressure difference of actuators that are competitively driven from the desired value is calculated by a desired pressure difference calculation unit, and an adjusted correcting value of the desired value for the pressure difference, obtained from the desired value of displacement and the measured value, is adjustably outputted from an adjustable desired inner-state correction unit, and thus, the outputs of these unit are inputted to a pressure difference error compensation unit so that a pressure difference error is compensated therewith. | 2011-03-31 |
20110078509 | INFERENCE OF CONTRACT USING DECLARATIVE PROGRAM DEFINITION - A declarative program definition. The definition is analyzed to produce an application contract that describes semantics for sending and receiving application messages during the successful execution of operations by the program. In addition, this analysis may also generate local behaviors associated with the local execution of the program. Alternatively or in addition, the analysis may infer secondary contracts regarding the sending and receiving of application messages, even though the full details of the secondary contracts are not present in the declarative program definition. For instance, the secondary contracts might include error contracts or consistency contracts. | 2011-03-31 |
20110078510 | Computer Software and Hardware Evaluation System and Device - The present disclosure generally relates to systems and devices that enable computer software or hardware systems to be evaluated. In an embodiment, an evaluation processing device can receive a set of needs or requirements for a computer software or hardware system from a user or organization. The evaluation processing device may determine software or hardware configurations that may be suitable for the user based on the set of needs, and configure one or more evaluation devices with software of hardware based on the determination. The evaluation processing device can allow the user to evaluate the software of hardware configurations by utilizing the one or more configured evaluation devices. Additionally, the integration device can receive information related to the evaluation from the one or more evaluation devices and generate a report based on the information. | 2011-03-31 |
20110078511 | PRECISE THREAD-MODULAR SUMMARIZATION OF CONCURRENT PROGRAMS - Methods and systems for concurrent program verification. A concurrent program is summarized into a symbolic interference skeleton (IS) using data flow analysis. Sequential consistency constraints are enforced on read and write events in the IS. Error conditions are checked together with the IS using a processor. | 2011-03-31 |
20110078512 | METHOD AND APPARATUS FOR DISPERSED STORAGE MEMORY DEVICE UTILIZATION - A method begins by a processing module receiving data for storage. The method continues with the processing module determining storage metadata regarding the data the method continues with the processing module. The method continues with the processing module determining memory device capabilities based on the storage metadata. The method continues with the processing module identifying memory devices based on the memory device capabilities to produce identified memory devices. The method continues with the processing module encoding the data into a plurality of data slices in accordance with an error coding dispersal function. The method continues with the processing module storing the plurality of data slices in the identified memory devices. | 2011-03-31 |
20110078513 | Methods, Systems & Products for Detecting Failing Power Supplies - Methods, systems, and products are disclosed for predicting failures in power supplies. A count of exception messages is set to zero. When a exception message is received, the count of exception messages is incremented and compared to a threshold value. When the count of exception messages equals the threshold value, a cooling fan is determined to be failed, and a prediction is made that a power supply is proceeding towards failure. | 2011-03-31 |
20110078514 | METHOD AND SYSTEM FOR MAINTENANCE OF NETWORK RENDERING DEVICES - A method and system for automatically generating a helpdesk ticket when a remote rendering device possesses a series of customer resolvable events within a time period. The helpdesk ticket can be moved into an active state when an alert associated with the customer resolvable events is triggered and the ticket can be moved into a passive state when the alert is no longer triggered for the predefined time period. The helpdesk ticket can be retained in the active state if the fault condition detected for a defined number of times without being out of that state for the predefined time period. A device management module sends a notification indicative on each change of the state associated with the rendering device to a helpdesk unit. The device management module can also reset the time period between alerts if the problem occurs infrequently and the ticket can be automatically closed. | 2011-03-31 |
20110078515 | INFORMATION PROCESSING APPARATUS THAT RECORDS LOGS, AND CONTROL METHOD AND STORAGE MEDIUM THEREFOR - An information processing apparatus capable of overwrite-recording time-series logs indicating an operation history and efficiently holding log information on operations relating to an occurring error. When an error is detected, a filtering object area is set that contains log information for a predetermined time period immediately before the error detection. Then, a type of the occurring error is identified, and log types to be protected are decided based on the identified error type. Among the filtering object area, log recording areas for the decided log types are decided as a to-be-protected log recording area. Subsequently, further log information is recorded so as to avoid the to-be-protected log recording area. | 2011-03-31 |
20110078516 | METHOD AND A SYSTEM FOR PERFORMING A TWO-PHASE COMMIT PROTOCOL - The invention provides an enhanced two phase commit process to perform a transaction started by an application program and involving access to one or more resources managed by respective resource managers. The method comprises the steps of: | 2011-03-31 |
20110078517 | NETWORK CONNECTION DEVICE AND METHOD FOR DETECTING NETWORK ERRORS - A network error detecting method checks if a network connection device has an Internet protocol (IP) address, if domain name mapping of web pages is correct, and if data communication between a web browser and a web server is correct. Accordingly, the network connection device informs the web browser of an IP address error, a domain name mapping error, or a data communication error. The web browser displays the network errors to users when the network errors are detected. | 2011-03-31 |
20110078518 | SYSTEMS AND METHODS FOR IMPROVING A FLOW OF DEFECT RESOLUTION - A user interface embodied on one or more computer storage media having computer executable instructions for instructing a processor to display a history of a plurality of defects in a defect resolution process that includes a plurality of phases is provided. The user interface includes a display portion for illustrating a current phase of a defect from the plurality of phases, and a display portion for illustrating an amount of elapsed time that the defect has been in the current phase. | 2011-03-31 |
20110078519 | Internal Server Error Analysis - The present disclosure involves systems, software, and computer implemented methods for internal server error analysis. One process includes operations for identifying an internal server error associated with a particular type of error and returned by a web container. A counter of the number of internal server errors returned by the web container is incremented. The internal server error is also associated with an internal categorization of the particular type of internal server error, and the occurrence of the internal server error is added to a categorization entry generated based on the internal categorization of the error. | 2011-03-31 |
20110078520 | INFORMATION PROCESSING APPARATUS, METHOD OF CONTROLLING INFORMATION PROCESSING APPARATUS, AND CONTROL PROGRAM - An information processing apparatus includes a processing device and a management device managing the processing device, wherein the processing device includes a first storage device for storing a first program, a first processor that executes the first program, detects an error occurring in the processing device, and extracts partial information which is part of information stored in the first storage device when the error is detected in the processing device through the execution of the first program, and a first control device that transmits the extracted partial information to the management device, and wherein the management device includes a second control device connected to the first control device and that receives the transmitted partial information from the processing device; and a second storage device that stores the received partial information. | 2011-03-31 |
20110078521 | TRANSITION FAULT TESTING FOR A VON-VOLATILE MEMORY - A method is for testing a non-volatile memory. A base data pattern is defined for a first pageset of the non-volatile memory. The non-volatile memory has a plurality of pages which comprise words. The base pattern is arranged so that each bitpair of a plurality of bitpairs that includes one of a group consisting of even bitpairs and odd bitpairs formed from all of the words exhibits all possible bitpair transitions during sequential accesses of the pages of the plurality of pages. The base pattern is stored in the first pageset. The pages of the plurality of pages of the first pageset are accessed sequentially. | 2011-03-31 |
20110078522 | SEMICONDUCTOR INTEGRATED CIRCUIT DEVICE - A self-test circuit includes a test circuit for processing input data and outputting output data having higher randomness than the input data; a storage unit for holding initial input data to be inputted to the test circuit when a self-test operation is performed on the test circuit; a feedback unit for feeding back, as input data to the test circuit, the output data which is obtained through processing of the input data by the test circuit and which is outputted from the test circuit; a control unit for controlling the number of times that the feedback unit feeds back the output data from the test circuit as input data to the test circuit; and a comparing unit for comparing the output data outputted from the test circuit and an expected value. | 2011-03-31 |