Patent application number | Description | Published |
20120072786 | USE OF HASHING FUNCTION TO DISTINGUISH RANDOM AND REPEAT ERRORS IN A MEMORY SYSTEM - One embodiment provides an error detection method wherein single-bit errors in a memory module are detected and identified as being a random error or a repeat error. Each identified random error and each identified repeat error occurring in a time interval is counted. An alert is generated in response to a number of identified random errors reaching a random-error threshold or a number of identified repeat errors reaching a repeat-error threshold during the predefined interval. The repeat-error threshold is set lower than the random-error threshold. A hashing process may be applied to the memory address of each detected error to map the location of the error in the memory system to a corresponding location in an electronic table. | 03-22-2012 |
20120102367 | Scalable Prediction Failure Analysis For Memory Used In Modern Computers - One embodiment provides a method for scalable predictive failure analysis. Embodiments of the method may include gathering memory information for memory on a user computer system having at least one processor. Further, the method includes selecting one or more memory-related parameters. Further still, the method includes calculating based on the gathering and the selecting, a single bit error value for the scalable predictive failure analysis through calculations for each of the one or more memory-related parameters that utilize the memory information. Yet further, the method includes setting, based on the calculating, the single bit error value for the user computer system. | 04-26-2012 |
20120143571 | REMOVABLE AND REPLACEABLE DUAL-SIDED CONNECTOR PIN INTERPOSER - A computer specifies a substrate comprising a first side opposite a second side. The computer specifies a first plurality of flexible pins protruding from the first side of the substrate, the first plurality of pins for installing in a first plurality of pad connectors of a pinless socket. The computer specifies a second plurality of flexible pins protruding from the second side of the substrate, the second plurality of pins for installing in a second plurality of pad connectors of a pinless integrated circuit component, wherein the first selection of flexible pins are for electrical connection to the second plurality of flexible pins through the substrate to provide electrical contact points between the pinless socket and the pinless integrated circuit component. | 06-07-2012 |
20120185624 | Automated Cabling Process for a Complex Environment - A method is provided for cabling a plurality of hardware components. A chassis controller establishes a wireless connection to a wireless device. The chassis controller, via a wireless interface, transmits a chassis map to the wireless device over the wireless connection. The chassis controller, via the wireless interface, transmits to the wireless device, an indication of a first port to be cabled over the wireless connection, the first port. The first port is of a first hardware component of the plurality of hardware components. The chassis controller tests the first port to determine whether cabling of the first port has been performed correctly. | 07-19-2012 |
20120239981 | Method To Detect Firmware / Software Errors For Hardware Monitoring - Error reporting software-based method where an error list for a currently-running version of some target software (or firmware) is compared to an error list for a previous versions. Helpful information can be gleaned from the comparison of error lists. For example, if it is known that the hardware configuration has not changed, as between the two lists, and there is an error on the current list that does not appear on the previous list, then this indicates that the error is in the software update and is not a hardware problem. | 09-20-2012 |
20120283971 | BUILT-IN AUTOMATED ELECTROSTATIC DISCHARGE MONITOR FOR COMPUTING UNITS - A method, computer program product, and computer system for monitoring for electrostatic discharge (ESD) events. An ESD monitor for potential of electrostatic discharge events in a sensed area through a plurality of ESD sensors coupled to the ESD monitor. The monitor senses for a charge level which could cause ESD event and entry of an operator into a sensed area. If an ESD event is detected, issue an ESD event alert to the operator and recording data to a tangible storage device; determine environmental factors at time and date of the ESD event; compare the ESD event and associated environmental factors to other ESD events with associated environmental factors; and determine if a correlation exists between the ESD event and associated environmental factors and the other ESD events with associated environmental factors. | 11-08-2012 |
20130097694 | PROTECTING AN ELECTRONIC DEVICE AGAINST UNATHORIZED HARDWARE USE - Embodiments of the present invention provide an approach for protecting electronic devices against the use of unqualified and/or unauthorized (e.g., “grey market”) hardware components. Specifically, in a typical embodiment, a hardware component that a user is attempting to use with an electronic device will be detected. Then, the device information associated with the hardware component (e.g., serial number, vital product data (VPD), etc.) will be identified from the hardware component (e.g., as stored therein). | 04-18-2013 |
20140013170 | SCALABLE PREDICTION FAILURE ANALYSIS FOR MEMORY USED IN MODERN COMPUTERS - One embodiment provides a method for scalable predictive failure analysis. Embodiments of the method may include gathering memory information for memory on a user computer system having at least one processor. Further, the method includes selecting one or more memory-related parameters. Further still, the method includes calculating based on the gathering and the selecting, a single bit error value for the scalable predictive failure analysis through calculations for each of the one or more memory-related parameters that utilize the memory information. Yet further, the method includes setting, based on the calculating, the single bit error value for the user computer system. | 01-09-2014 |
20140325663 | AUTOMATIC RECOVERY OF LICENSE KEY INFORMATION - A method, system, and computer program product to manage license key information in a system including a feature requiring the license key information are described. The method includes storing, automatically, a backup copy of the license key information from a primary copy of the license key information after installation of a feature requiring the license key information on the system. The method also includes recovering, automatically, the license key information whenever the license key information is required to be installed. | 10-30-2014 |
20150074302 | Automated Cabling Process for a Complex Environment - A method is provided for cabling a plurality of hardware components. A chassis controller establishes a wireless connection to a wireless device. The chassis controller, via a wireless interface, transmits a chassis map to the wireless device over the wireless connection. The chassis controller, via the wireless interface, transmits to the wireless device, an indication of a first port to be cabled over the wireless connection, the first port. The first port is of a first hardware component of the plurality of hardware components. The chassis controller tests the first port to determine whether cabling of the first port has been performed correctly. | 03-12-2015 |