Dull, CA
Dan J. Dull, Escondido, CA US
Patent application number | Description | Published |
---|---|---|
20150203297 | AUTOMATED SMART STORAGE OF TEMPERATURE SENSITIVE PRODUCTS - Automated cold storage unit and systems for storing, monitoring, and maintaining a supply of temperature sensitive pharmaceutical and/or other products in compliance with regulatory requirements are provided. Such units contain an array of independently addressable holding locations for containers with product in one or more controlled temperature zones fitted with temperature sensors. The units include a reader to track product information and status. Product movement within the unit is performed by a computer-controlled robot. A user interface device, preferably in communication with an application service provider to provide remotely managed inventory management and other services, provides users with secure access to the contents of the unit and associated product data and information. | 07-23-2015 |
Jeff Dull, San Ramon, CA US
Patent application number | Description | Published |
---|---|---|
20110047439 | SOFT ERROR RATE PROTECTION FOR MEMORIES - Methods and apparatus for performing parity and/or ECC operations are disclosed. An example method includes determining that an opcode is being transmitted on a bus and determining if the transmitted opcode is a memory operation. In the event the transmitted opcode is a memory write operation, the example method includes calculating a parity bit for data associated with the opcode, writing the calculated parity bit to a parity table and writing the data to a memory. The example method also includes, in the event the transmitted opcode is the memory read operation, recovering data from a previously written memory, calculating a parity bit for the recovered data, recovering a previously stored parity bit for the recovered data, comparing the parity bit for the recovered data with the previously stored parity bit and, in the event the recovered data parity bit does not match the previously stored parity bit, providing an error notification. | 02-24-2011 |
Jeff Dull, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20080229056 | METHOD AND APPARATUS FOR DUAL-HASHING TABLES - Methods and apparatus for dual hash tables are disclosed. An example method includes logically dividing a hash table data structure into a first hash table and a second hash table, where the first hash table and the second hash table are substantially logically equivalent. The example method further includes receiving a key and a corresponding data value, applying a first hash function to the key to produce a first index to a first bucket in the first hash table, and applying a second hash function to the key to produce a second index to a second bucket in the second hash table. In the example method the key and the data value are inserted in one of the first hash table and the second hash table based on the first index and the second index. | 09-18-2008 |
20090285095 | TOKEN BUCKET WITH VARIABLE TOKEN VALUE - Various example embodiments are disclosed. According to an example embodiment, a method may include receiving a token count units instruction, periodically increasing or decreasing a token count based at least in part on a refresh rate, and in response to receiving a packet, decreasing or increasing the token count based at least in part on a size of the packet and the instruction. | 11-19-2009 |
20100290457 | HOT-SWAPPING NETWORK PORT FUNCTIONALITY - Methods and apparatus for swapping functionality modes of a network data link are disclosed. An example method includes, in a network device, supporting a plurality of active network data links that includes a given network data link, where the given network data link is operated in accordance with a first mode of functionality. The example method further includes, while the other network data links of the plurality remain active: (i) placing the given network data link in a quiescent state; (ii) allocating, in a data port of the given network data link, cell buffer space in accordance with a second mode of functionality; (iii) programming a memory management unit (MMU) of the network switch device in accordance with the second mode of functionality for the given network data link; (iv) allocating, in an egress port (EP) of the network switch device, cell buffer space in accordance with the second mode of functionality for the given network data link; (v) bringing the given network data link out of the quiescent state; and (vi) operating the given network data link in accordance with the second mode of functionality. | 11-18-2010 |
John J. Dull, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20130086074 | EXTENDED WIDTH ENTRIES FOR HASH TABLES - A hash table supports extended entries. The extended entries permit a base entry to extend its associated data into one or more neighboring entries. Extended entries thereby provide a mechanism through which a hash table entry may store additional data compared to a base entry. Extended entries may coexist with base entries in the hash table. The hash table thereby provides the flexibility to adapt dynamically to meet system requirements and to balance the needs of additional data storage by blending the number of extended entries (that each store more data than a base entry) and the number of base entries (each storing less data than an extended entry). | 04-04-2013 |
20140079073 | Dynamic Clock Gating in a Network Device - A switch device that includes a switch pipeline stage to process packet data may selectively clock multiple pipeline sub-stages within the switch pipeline stage. The switch device may provide a first clock to processing logic of a first sub-stage independently of providing a second clock to a processing logic of second sub-stage within the switch pipeline stage. Clocking logic associated with a current switch pipeline stage may receive an event indication, such as an event indication from a previous pipeline stage responsive to processing of packet data by the previous pipeline stage. In response, the clocking logic associated with the current switch pipeline stage may determine a clocking time to issue a clock to a selected pipeline sub-stage in the current switch pipeline stage. The clocking logic may also issue the clock to the selected pipeline sub-stage at the clocking time. | 03-20-2014 |
John Jeffrey Dull, Sunnyvale, CA US
Patent application number | Description | Published |
---|---|---|
20100142536 | UNICAST TRUNKING IN A NETWORK DEVICE - A network device for selecting a port from a trunk group to transmit a unicast packet on the selected port. The network device includes at least one trunk group including a plurality of physical ports. The network device also includes a table with a plurality of entries. Each entry is associated with one trunk group and includes a plurality of fields that are associated with ports in the trunk group. Each entry also includes a hash field that is used to select bits from predefined fields of an incoming unicast packet to obtain an index bit for accessing one of the plurality of fields. The network device further includes transmitting means for transmitting the unicast packet to a port associated with an accessed one of the plurality of fields. | 06-10-2010 |
20100195645 | SYSTEM AND METHOD FOR MAINTAINING A LAYER 2 MODIFICATION BUFFER - A network device for processing packets. The network devices includes a ingress module for performing lookups for layer 2 switching and performing operations for maintaining a layer 2 table. When the ingress module updates the layer 2 table, the ingress module records the operation performed on the layer 2 table in a modification buffer. Entries are added to the modification buffer when the layer 2 table is modified and in the order in which the layer 2 table was modified. The network device thus enables reconstruction of the layer 2 table by performing the operations in the modification buffer. | 08-05-2010 |
Thomas Dull, San Francisco, CA US
Patent application number | Description | Published |
---|---|---|
20080241929 | METHOD AND MEANS FOR PRODUCING HIGH TITER, SAFE, RECOMBINANT LENTIVIRUS VECTORS - Lentiviral vectors modified at the 5′ LTR or both the 5′ and 3′ LTR are useful in the production of recombinant lentivirus vectors (See the Figure). Such vectors can be produced in the absence of a functional tat gene. Multiple transformation of the host cell with the vector carrying the transgene enhances virus production. The vectors can contain inducible or conditional promoters. | 10-02-2008 |
20080286836 | METHOD AND MEANS FOR PRODUCING HIGH TITER, SAFE RECOMBINANT LENTIVIRUS VECTORS - Lentiviral vectors modified at the 5′ LTR or both the 5′ and 3′ LTR's are useful in the production of recombinant lentivirus vectors. Such vectors can be produced in the absence of a functional tat gene. Multiple transformation of the host cell with the vector carrying the transgene enhances virus production. | 11-20-2008 |