Patent application number | Description | Published |
20090113139 | Avoiding snoop response dependency - In one embodiment, the present invention includes a method for receiving a request for data in a home agent of a system from a first agent, prefetching the data from a memory and accessing a directory entry to determine whether a copy of the data is cached in any system agent, and forwarding the data to the first agent without waiting for snoop responses from other system agents if the directory entry indicates that the data is not cached. Other embodiments are described and claimed. | 04-30-2009 |
20090158068 | REDUCING CORE WAKE-UP LATENCY IN A COMPUTER SYSTEM - A power control unit (PCU) may reduce the core wake-up latency in a computer system by concurrently waking-up the remaining cores after the first core is woken-up. The power control unit may detect arrival of a first, second, and a third interrupt directed at a first, second, and a third core. The power control unit may check whether the second interrupt occurs within a first period, wherein the first period is counted after waking-up of the first core is complete. The power control unit may then wake-up the second and the third core concurrently if the second interrupt occurs within the first period after the wake-up activity of the first core is complete. The first period may at least equal twice the time required for a first credit to be returned and next credit to be accepted. | 06-18-2009 |
20090319712 | REDUCING CORE WAKE-UP LATENCY IN A COMPUTER SYSTEM - A power control unit (PCU) may reduce the core wake-up latency in a computer system by concurrently waking-up the remaining cores after the first core is woken-up. The power control unit may detect arrival of a first, second, and a third interrupt directed at a first, second, and a third core. The power control unit may check whether the second interrupt occurs within a first period, wherein the first period is counted after waking-up of the first core is complete. The power control unit may then wake-up the second and the third core concurrently if the second interrupt occurs within the first period after the wake-up activity of the first core is complete. The first period may at least equal twice the time required for a first credit to be returned and next credit to be accepted. | 12-24-2009 |
Patent application number | Description | Published |
20100319050 | Controlling Access to Software Component State - A request is received from a software component of a software product to access a value of a public setting of the software component. A check is made as to whether the request conforms to an appropriate format for the public setting. If the request conforms to the appropriate format, then the requested access is performed. However, if the request does not conform to the appropriate format, then the requested access is denied. Multiple values for the public setting can be received and maintained concurrently. | 12-16-2010 |
20140019954 | CONTROLLING ACCESS TO SOFTWARE COMPONENT STATE - A request is received from a software component of a software product to access a value of a public setting of the software component. A check is made as to whether the request conforms to an appropriate format for the public setting. If the request conforms to the appropriate format, then the requested access is performed. However, if the request does not conform to the appropriate format, then the requested access is denied. Multiple values for the public setting can be received and maintained concurrently. | 01-16-2014 |
20150227753 | CONTENT ITEM ENCRYPTION ON MOBILE DEVICES - Applications are stored on removable storage of a mobile device in an encrypted form to provide isolation and piracy protection. In one implementation, each application is encrypted using its own associated encryption key that is generated based on an identifier of the application and a master key that is associated with a trusted platform module of the mobile device. In another implementation, each application is encrypted using two associated encryption keys. One key is used to encrypt binary data associated with the application such as source code, and the other key is used to encrypt application data such as graphics and configuration files. The encryption keys are each generated using the identifier of the application, the master key, and identifiers of the folders where the corresponding data types are stored on the mobile device. The removable storage includes SD cards formatted using the FAT or exFAT file systems. | 08-13-2015 |
Patent application number | Description | Published |
20090007701 | PIVOTING PIPETTE DEVICE - A pipette holder for retaining a pipette at a plurality of angles relative to the holder includes a first housing portion and a second housing portion wherein the second housing portion supports the pipette. The pipette device also includes a pivot mechanism pivotally coupling the first housing portion and the second housing portion. | 01-08-2009 |
20140125499 | Barrier Operator Feature Enhancement - A barrier operator feature enhancement device is designed to provide one or more features found in modern barrier operator devices and to incorporate those features into a previously installed barrier operator system. To facilitate ease of use, the barrier operator feature enhancement device can communicate with a large variety of barrier operators. Such communication may be wireless or wired, depending on the communication protocol implemented by a particular previously installed barrier operator. To facilitate the ease of installation, the device is designed to configure itself to operate with the communication protocol of the previously installed barrier operator. Once configured to be able to communicate with the previously installed barrier operator, the feature enhancement device works with the barrier operator to provide one or more additional features to enhance the capabilities of the previously installed barrier operator. | 05-08-2014 |
20140129606 | Barrier Operator Feature Enhancement - A barrier operator feature enhancement device is designed to provide one or more features found in modern barrier operator devices and to incorporate those features into a previously installed barrier operator system. To facilitate ease of use, the barrier operator feature enhancement device can communicate with a large variety of barrier operators. Such communication may be wireless or wired, depending on the communication protocol implemented by a particular previously installed barrier operator. To facilitate the ease of installation, the device is designed to configure itself to operate with the communication protocol of the previously installed barrier operator. Once configured to be able to communicate with the previously installed barrier operator, the feature enhancement device works with the barrier operator to provide one or more additional features to enhance the capabilities of the previously installed barrier operator. | 05-08-2014 |