Patent application number | Description | Published |
20090327396 | Tiny File Transfer Protocol (TFTP) Relay Agent - One embodiment for dynamically loading a service onto a node includes requesting, by a service requester, of a service from a service broker. Further, the method includes selecting, by the service broker, of the node among the nodes. Further still, the method includes re-booting, by the service broker, of the node based on the selecting, and then requesting, by the node, of an image from a TFTP relay agent for the service for the node. Yet further, the method includes querying, by the TFTP relay agent, for a type of the service from the service broker for the node, and then downloading of the image for the type of the service from a software repository accessed by the TFTP relay agent to the node. Finally, the method includes booting, by the node, to the image, informing the service requester that the service is ready for use, and using the service. | 12-31-2009 |
20100180021 | METHOD AND SYSTEM FOR REMOTE NODE DEBUGGING USING AN EMBEDDED NODE CONTROLLER - A method, system and computer program product for remotely debugging a malfunctioning node controller of a node in a distributed node network through a functioning node controller of the same node. The method comprises establishing a serial link between the malfunctioning node controller and a functioning node controller and configuring the functioning node controller as a virtual console by the remotely-located central data processing system (DPS). The method further includes receiving, via an internal Fru Support Interface (FSI) link, serial data from the malfunctioning node controller through the virtual console, and debugging, by the DPS, a failure condition of the malfunctioning node controller, in response to receipt of the serial data through the virtual console. | 07-15-2010 |
20100241894 | DYNAMIC ADDITION OF REDUNDANT NETWORK IN DISTRIBUTED SYSTEM COMMUNICATIONS - Disclosed is a computer implemented method and apparatus for establishing a redundant channel from an application to a peer data processing system. The interrupt-driven hot standby program receives, through the operation of a data processing system, a communication channel status corresponding to an application. The application has a first channel using local access across a first physical conduit to a first switch. In addition the communication channel status is, in part, an interrupt. The interrupt-driven hot standby program determines whether the redundant channel is present. The redundant channel is configured to use a second physical conduit distinct from the first physical conduit for traffic of the application. Responding to a determination that the redundant channel is present, the interrupt-driven hot standby program determines whether the redundant channel is configured to use the second physical conduit as local access to a redundant switch, wherein the redundant switch is not the first switch. The interrupt-driven hot standby program responds to a determination that the redundant channel is configured to use the second physical conduit by updating a communication channel list to include at least one attribute of the redundant channel, wherein the communication channel list is resident in the data processing system. | 09-23-2010 |
20110276822 | NODE CONTROLLER FIRST FAILURE ERROR MANAGEMENT FOR A DISTRIBUTED SYSTEM - A distributed system provides error handling wherein the system includes multiple nodes, each node being coupled to multiple node controllers for control redundancy. Multiple system controllers couple to the node controllers via a network bus. A particular node controller may detect an error of that particular node controller. The particular node controller may store error information relating to the detected error in respective nonvolatile memory stores in the system controllers and node controllers according to a particular priority order. In accordance with the particular priority order, for example, the particular node controller may first attempt to store the error information to a primary system controller memory store, then to a secondary system controller memory store, and then to sibling and non-sibling node controller memory stores. The primary system controller organizes available error information for use by system administrators and other resources of the distributed system. | 11-10-2011 |
20120110665 | Intrusion Detection Within a Distributed Processing System - A computer implemented method monitors activity within a device driver layer of a computer. An arrival rate is identified within a device driver for the node. The arrival rate is a rate at which packets arrive at a network adapter of the node from all other nodes within a network. If the arrival rate exceeds at least one threshold, the node undergoes a state change. The at least one threshold delineates between a plurality of states for the node. | 05-03-2012 |
20120284484 | Logical Partition Defragmentation with a Data Processing System - A mechanism, in a data processing system, is provided for logical partition defragmentation. The mechanism gathers resource requirements for a plurality of logical partitions running in a plurality of power domains within one or more servers. The mechanism determines optimal hardware utilization for the plurality of logical partitions. The mechanism migrates one or more of the plurality of logical partitions to run in a subset of the plurality of power domains such that at least one power domain within the plurality of power domains is unused. The mechanism puts the at least one unused power domain in a low power state. | 11-08-2012 |
20120284549 | Logical Partition Defragmentation Within a Data Processing System - A mechanism, in a data processing system, is provided for logical partition defragmentation. The mechanism gathers resource requirements for a plurality of logical partitions running in a plurality of power domains within one or more servers. The mechanism determines optimal hardware utilization for the plurality of logical partitions. The mechanism migrates one or more of the plurality of logical partitions to run in a subset of the plurality of power domains such that at least one power domain within the plurality of power domains is unused. The mechanism puts the at least one unused power domain in a low power state. | 11-08-2012 |
20120311391 | FAILURE DATA MANAGEMENT FOR A DISTRIBUTED COMPUTER SYSTEM - Various systems, processes, products, and techniques may be used to manage failure data for a distributed computer system. In particular implementations, a system and process for managing distributed data for a distributed computer system may include the ability to determine at a service processor of a first node in a distributed computer system that comprises a plurality of nodes whether a failure has occurred in the first node and identify a service processor of a second node in the distributed computer system in which to store failure data if a failure has occurred. The system and process may also include the ability to store at least part of the failure data in the identified service processor and determine whether there is more failure data to store than the identified service processor can store. | 12-06-2012 |
Patent application number | Description | Published |
20090037639 | JTAGCHAIN Bus Switching and Configuring Device - A JTAG bus cross point switching device that is commanded by the same bus which it configures. In a preferred embodiment a JTAG chain includes a cross point switching device that is capable of adding, omitting, or rearranging devices on a JTAG bus. The switching device itself is controlled by commands on the JTAG bus which it configures. | 02-05-2009 |
20090248856 | Staged Integration Of Distributed System And Publishing Of Remote Services - A method, computer program product, and system for the staged integration of a remote entity and the simultaneous publishing of services is provided. The integration of the distributed remote entities is broken into five stages, with appropriate events published after each stage. Each of the five stages is initiated only if the previous stage completed successfully. The first stage is the initiate discovery phase. The first event is the discovery start event. The second stage is the discovery completed phase. The second event is the discovery completed event. The third stage is the basic software services verified phase. The third event is the basic software verification completed event. The fourth stage is the basic hardware services verified phase. The fourth event is the basic hardware verification completed event. The fifth stage is the extended hardware services verified phase. The fifth event is the full integration of disturbed entity event. | 10-01-2009 |
20090313257 | MANAGING MULTI-NODE MULTI-VERSION SYSTEMS - A method, system, and computer usable program product for managing multi-node multi-version systems are provided in the illustrative embodiments. A process associates a version identifier with a first version of data available at a first node in the multi-node multi-version system. The version identifier corresponds to the first version of the data. The data includes an update. The process sends the data and the associated version identifier to a second node without learning a second version of data available at the second node. In one embodiment, the first version of data may be a subset of the second version of data. In another embodiment the second version of data may be a subset of the first version of data. The process repeats the sending for each update at the first node. | 12-17-2009 |
20090327654 | Method of Handling Duplicate or Invalid Node Controller IDs in a Distributed Service Processor Environment - A method for enabling a Node Controller (NC), which claims a duplicate or invalid service processor Node Controller Identification (NCID) in a distributed service processor system, to be integrated into the system includes reading an NCID by the NC after the NC is booted, saving the NCID into a non-volatile storage and broadcasting an NC Present Message (NPM) to a Service Processor (SC) repeatedly until the SC initiates communication, updating the NCID for the NC in the non-volatile storage when the NC receives an NCID change message from the SC and rating any future NPM as a new NCID, and checking a record of an new NC in the non-volatile storage when the SC receives the NPM from the NC. If the SC has a record of a recorded NC with the same NCID as the new NC, then the SC checks its role as a primary SC. If the SC does not have the record of the recorded NC with the same NCID as the new NC, then the SC checks validity of the NCID. | 12-31-2009 |
20100199272 | UPDATING FIRMWARE WITHOUT DISRUPTING SERVICE - A method, system, and computer usable program product for updating firmware without disrupting service are provided in the illustrative embodiments. An updated firmware code is sent to a first firmware component and a second firmware component. The first firmware component is a primary firmware component and the second firmware component is a backup firmware component in a redundant firmware configuration. The updated firmware code is installed in second firmware component. The updated firmware code is activated in a third firmware component. The third firmware component is in communication with the first firmware component. A fail-over from the first firmware component to the second firmware component is performed such that a user communicating with the data processing system and receiving a service using the first firmware component continues to receive the service using the second firmware component without a disruption in the service. | 08-05-2010 |
20100250810 | INTERRUPT-DRIVEN LINK STATUS FEEDBACK MECHANISM FOR EMBEDDED SWITCHES - A computer implemented method, a tangible computer readable medium, and a data processing system intelligently propagate link status information received by a blade server to the various ports of an embedded multi-port switch. The link status of a switch port in an external switch module can be communicated to the operating systems of individual blade servers that are affected by that link status. When an external switch module is unplugged from a server blade chassis, the bus controller broadcasts a link down event, such as a link down interrupt, to the individual server blades where it is received by the embedded multi-port switch for those server blades. The embedded multi-port switch translates the link down interrupt into a hardware link down event, and forwards the hardware link down event to the other elements connected to the embedded multi-port switch. | 09-30-2010 |
20100250914 | WAKE ON LAN FOR BLADE SERVER - A computer implemented method, a tangible computer medium, and a data processing system are provided for waking a blade server from an operational state of reduced power. When server blade enters the state of reduced power, a service firmware configures a multi-port blade switch of the server blade to direct incoming packets to the service firmware. The service firmware then polls for receipt of a Wake-on-Lan magic packet. When the Wake-on-Lan magic packet is received by the service firmware, the service firmware reconfigures the multi-port blade switch to direct incoming packets to a network interface card of the server blade. The service firmware then initiates a reboot of the server blade. | 09-30-2010 |
20150074471 | Generation of Debugging Log List in a Blade Server Environment - Methods, non-transitory storage medium, and systems for generating an aggregated list of problem conditions associated with blade servers to facilitate efficient debugging thereof. In a blade server environment, each chassis is equipped with a chassis management module and each blade in each chassis is associated with a blade management controller. A data map representing the relationships between the blade servers and the shared resources is utilized by a chassis management module to aggregate and link problem conditions sensed by any of the blade management controllers. | 03-12-2015 |
Patent application number | Description | Published |
20120073879 | DOWNHOLE REAMER ASYMMETRIC CUTTING STRUCTURES - A cutting structure for use with a reamer in enlarging a borehole in a subterranean formation includes a plurality of cutter blocks, radially extendable from a reamer body away from a central axis of the reamer body, each of the plurality of cutter blocks comprising at least one cutter blade thereon, wherein an angular spacing about the central axis of the reamer body between the at least one cutter blade on each of the plurality of cutter blocks is unequal. | 03-29-2012 |
20120298423 | JET ARRANGEMENT ON AN EXPANDABLE DOWNHOLE TOOL - Various embodiments of an expandable downhole tool for use in drilling of a wellbore are disclosed. The expandable tools disclosed herein may be used as an underreamer to enlarge a borehole, or may be used to stabilize a drilling system in a previously underreamed borehole or in a borehole that is being underreamed while drilling progresses. The various embodiments of the expandable tools disclosed herein have a higher hydraulic capacity than prior art underreamers. An increase in hydraulic energy delivered to the cutting structures may advantageously improve the rate of removal of cuttings from the cutting structures (improved cuttings evacuation), may decrease cutter element wear, and may prevent damage or premature failure. Improved cuttings evacuation may also provide for improved cutting action and increased penetration rates. | 11-29-2012 |
20140034397 | DOWNHOLE REAMER ASYMMETRIC CUTTING STRUCTURES - A cutting structure for use with a reamer in enlarging a borehole in a subterranean formation includes a plurality of cutter blocks, radially extendable from a reamer body away from a central axis of the reamer body, each of the plurality of cutter blocks comprising at least one cutter blade thereon, wherein an angular spacing about the central axis of the reamer body between the at least one cutter blade on each of the plurality of cutter blocks is unequal. | 02-06-2014 |
Patent application number | Description | Published |
20090210541 | EFFICIENT CONFIGURATION OF LDAP USER PRIVILEGES TO REMOTELY ACCESS CLIENTS WITHIN GROUPS - A method and system for restricting remote access by users of directory access protocol client systems without using an directory access protocol “netgroup” option by defining a “remote_allowed” attribute for a entire user group, which, if enabled, allows granting of all remote access requests to all clients, but which, if disabled, allows granting of remote access requests to client systems specifically listed in a “hosts” attribute. In this manner, directory administrators may configure remote access rights for groups of users without having to perform cumbersome and tedious “netgroup”. Subsequent to granting access, the authentication, such as a log in, may be performed on the user. The invention is particularly useful for Lightweight Directory Access Protocol (LDAP) systems, where the “hosts” attribute can list client systems by Internet Protocol address, by hostname, or a by combination of address and hostname. | 08-20-2009 |
20110113474 | NETWORK SYSTEM SECURITY MANAGMENT - A network system loads operating system (OS) software that includes a switch role tool (SRT). The SRT provides the network system with security management capability that employs a hostname attribute within a user role definition. The user role definition provides for user restrictions to database information and other user actions within the network system. During a user login or switch role command, the security management method interrogates the login location or hostname of the login along with the user request. If that login meets the criteria that the network system stores as a user role attribute for that particular user, the network system allows the login request and action. If that login does not meet the criteria that the network system stores as a user role attribute for that user, the network system denies the login request. The network system grants the user an access privilege level that varies with the determined location or hostname from which the user attempts to login. | 05-12-2011 |
20110265101 | NET-TIMER DAEMON - User space applications can utilize custom network protocol timers. A registration request is received from an application to register a custom timer. Responsive to receiving the registration request, a handle is created. The handle is a pointer to be used by the application to reference the custom timer. The handle is forwarded to the application. When a custom timer is required, a request to use a custom timer is received from an application. The kernel is then requested to start the custom timer. A determination is then made as to whether a receipt confirmation is received from the kernel before expiration of the custom timer. | 10-27-2011 |
Patent application number | Description | Published |
20100046688 | MAGNETIC CONFINEMENT DEVICE - Disclosed is a device comprising a chamber enclosed by walls about a central axis. The chamber has an inner radius and an outer radius relative to the central axis and is configured to magnetically contain a core plasma. The device is further comprised of a divertor plate configured for receiving exhaust heat. The divertor plate has a divertor radius relative to the central axis. The divertor radius is greater than or equal to the sum of a plasma minor radius and a major radius of the peak point closest to the corresponding divertor plate. The device can be used for containing a fusion plasma, as a compact fusion neutron source, or as a compact fusion energy source. Methods of exhausting heat from such a device when plasma is present therein are also described. This abstract is intended for use as a scanning tool only and is not intended to be limiting. | 02-25-2010 |
20100063344 | FUSION NEUTRON SOURCE FOR FISSION APPLICATIONS - Disclosed are a hybrid reactor, method, and device for improved nuclear fusion reactors to provide sufficient flux of fast neutrons with sufficient energy to transmutate transuranic wastes from nuclear fission and to be used in improved nuclear fuel cycles so as to effectively reduce the amount radio-toxicity, and the risks and costs of the disposal of nuclear waste, thereby reducing the cost of nuclear energy and increasing its acceptability as an energy source. This abstract is intended for use as a scanning tool only and is not intended to be limiting. | 03-11-2010 |
20100119025 | REPLACEABLE FUSION NEUTRON SOURCE - Disclosed are a replaceable fusion core that can be inserted and removed from the core of a nuclear fission reactor, thereby enabling the replacement of materials exposed to neutron flux and reducing outage times and “hybrid reactor, method, and device for improved nuclear fusion reactors to provide sufficient flux of fast neutrons with sufficient energy to transmutate transuranic wastes from nuclear fission and to be used in improved nuclear fuel cycles so as to effectively reduce the amount radio-toxicity, and the risks and costs of the disposal of nuclear waste, thereby reducing the cost of nuclear energy and increasing its acceptability as an energy source. This abstract is intended for use as a scanning tool only and is not intended to be limiting. | 05-13-2010 |
20100246740 | Nuclear Material Tracers - Disclosed herein are embodiments of systems and methods for creating tracer nuclear materials. In one aspect, a Compact Fusion Neutron Source (CFNS) as described herein, can be used to create tracer isotopes to be added to fissile fuels to aid in anti-proliferation, though other methods of creating isotopes are contemplated. The generation of the isotopes require (n,2 | 09-30-2010 |
20100329407 | MAGNETIC CONFINEMENT DEVICE - Disclosed is a device comprising a chamber enclosed by walls about a central axis. The chamber has an inner radius and an outer radius relative to the central axis and is configured to magnetically contain a core plasma. The device is further comprised of a divertor plate configured for receiving exhaust heat. The divertor plate has a divertor radius relative to the central axis. The divertor radius is greater than or equal to the sum of a plasma minor radius and a major radius of the peak point closest to the corresponding divertor plate. The device can be used for containing a fusion plasma, as a compact fusion neutron source, or as a compact fusion energy source. Methods of exhausting heat from such a device when plasma is present therein are also described. This abstract is intended for use as a scanning tool only and is not intended to be limiting. | 12-30-2010 |
20110013738 | Neutron Source For Creation of Isotopes - Disclosed herein are embodiments of systems and methods for creating radioisotopes. In one aspect, a Compact Fusion Neutron Source (CFNS) as described herein, can be used to create radioisotopes. The generation of the radioisotopes can utilize (n,2n), (n,p), (n,d), or (n,α) reactions, which can be caused by the high energy neutrons created by fusion. This abstract is intended for use as a scanning tool only and is not intended to be limiting. | 01-20-2011 |
20110170648 | FUSION NEUTRON SOURCE FOR BREEDING APPLICATIONS - Disclosed are reactors, methods, and devices for improved nuclear fusion reactors that provide neutrons with a sufficient power density to efficiently breed fissile nuclear material, which can then optionally be used as an energy source. The reactors can also be used in improved nuclear fuel cycles wherein an adequate supply of fissile nuclear material is provided to nuclear power plants. This abstract is intended for use as a scanning tool only and is not intended to be limiting. | 07-14-2011 |
20110170649 | MAGNETIC CONFINEMENT DEVICE WITH ALUMINUM OR ALUMINUM-ALLOY MAGNETS - Disclosed is a device comprising a chamber enclosed by walls about a central axis. The chamber has an inner radius and an outer radius relative to the central axis and is configured to magnetically contain a core plasma. The device is further comprised of a divertor plate configured for receiving exhaust heat. The divertor plate has a divertor radius relative to the central axis. The divertor radius is greater than or equal to the sum of a plasma minor radius and a major radius of the peak point closest to the corresponding divertor plate. The device can be used for containing a fusion plasma, as a compact fusion neutron source, or as a compact fusion energy source. Methods of exhausting heat from such a device when plasma is present therein are also described. This abstract is intended for use as a scanning tool only and is not intended to be limiting. | 07-14-2011 |