Patent application number | Description | Published |
20110138101 | MAINTAINING DATA COHERENCE BY USING DATA DOMAINS - A method, system and computer program product are disclosed for maintaining data coherence, for use in a multi-node processing system where each of the nodes includes one or more components. In one embodiment, the method comprises establishing a data domain, assigning a group of the components to the data domain, sending a coherence message from a first component of the processing system to a second component of the processing system, and determining if that second component is assigned to the data domain. In this embodiment, if that second component is assigned to the data domain, the coherence message is transferred to all of the components assigned to the data domain to maintain data coherency among those components. In an embodiment, if that second component is assigned to the data domain, the first component is assigned to the data domain. | 06-09-2011 |
20130297914 | MAINTAINING DATA COHERENCE BY USING DATA DOMAINS - A method, system and computer program product are disclosed for maintaining data coherence, for use in a multi-node processing system where each of the nodes includes one or more components. In one embodiment, the method comprises establishing a data domain, assigning a group of the components to the data domain, sending a coherence message from a first component of the processing system to a second component of the processing system, and determining if that second component is assigned to the data domain. In this embodiment, if that second component is assigned to the data domain, the coherence message is transferred to all of the components assigned to the data domain to maintain data coherency among those components. In an embodiment, if that second component is assigned to the data domain, the first component is assigned to the data domain. | 11-07-2013 |
Patent application number | Description | Published |
20080288760 | BRANCH TARGET PREDICTION FOR MULTI-TARGET BRANCHES BY IDENTIFYING A REPEATED PATTERN - An information processing system for branch target prediction includes: a first memory for storing entries for multi-target branch, wherein each entry includes a plurality of target addresses representing a history of target addresses for each single branch in the multi-target branch, and wherein said first memory stores an entry for the branch only if the branch is a multi-target branch; hardware logic for reading the memory and identifying a repeated pattern in each of the plurality of target addresses for the multi-target branch; logic for predicting a next target address for the multi-target branch based on the repeated pattern that was identified, using a pattern matching algorithm; and a second memory for storing information regarding whether a branch is a multi-target branch; wherein the logic for reading and the logic for predicting are executed only if the branch is the multi-target branch. | 11-20-2008 |
20110191754 | SYSTEM USING A UNIQUE MARKER WITH EACH SOFTWARE CODE-BLOCK - A system and method for improving software maintainability, performance, and/or security by associating a unique marker to each software code-block; the system comprising of a plurality of processors, a plurality of code-blocks, and a marker associated with each code-block. The system may also include a special hardware register (code-block marker hardware register) in each processor for identifying the markers of the code-blocks executed by the processor, without changing any of the plurality of code-blocks. | 08-04-2011 |
20120239904 | SEAMLESS INTERFACE FOR MULTI-THREADED CORE ACCELERATORS - A method, system and computer program product are disclosed for interfacing between a multi-threaded processing core and an accelerator. In one embodiment, the method comprises copying from the processing core to the hardware accelerator memory address translations for each of multiple threads operating on the processing core, and simultaneously storing on the hardware accelerator one or more of the memory address translations for each of the threads. Whenever any one of the multiple threads operating on the processing core instructs the hardware accelerator to perform a specified operation, the hardware accelerator has stored thereon one or more of the memory address translations for the any one of the threads. This facilitates starting that specified operation without memory translation faults. In an embodiment, the copying includes, each time one of the memory address translations is updated on the processing core, copying the updated one of the memory address translations to the hardware accelerator. | 09-20-2012 |
Patent application number | Description | Published |
20080263301 | KEY-CONTROLLED OBJECT-BASED MEMORY PROTECTION - A method, system, and program key-controlled object-based memory protection are provided. A processing unit includes an authority check for controlling access by the processing unit to pages of memory according to whether a hardware protection key set currently loaded in an authority mask register allows access to the pages. In particular, each page of memory is assigned a page key number that indexes into the hardware protection key set. The currently loaded hardware protection key set specifies those page key numbers that are currently accessible to the processing unit for the execution context. Each hardware key within the hardware protection key set may be associated with a particular data object or group of data objects. Thus, effectively, the currently loaded hardware protection key set identifies which data objects or groups of data objects are currently accessible. Software keys are assigned to data objects and dynamically mapped to hardware protection key sets, such that when a module is called, the software keys assigned to that module are mapped to the hardware protection key set to be loaded for controlling current access to memory. | 10-23-2008 |
20080282059 | METHOD AND APPARATUS FOR DETERMINING MEMBERSHIP IN A SET OF ITEMS IN A COMPUTER SYSTEM - A method and apparatus for maintaining membership in a set of items to be used in a predetermined manner in a computer system. A representation of each member of the set is mapped into a number of components of a primary and secondary vector when a member is added to the set. Periodically, the primary vector is changed to the secondary vector and the secondary vector to the primary vector. When members of the set are deleted, the components of the secondary vector are changed to indicate deletion of these members after the primary vector is changed to the secondary vector. Finally, membership in the set is determined by examining the components in the primary vector, and the members in the set of items are then used in a predetermined manner in the computer system. More specifically, in a sample embodiment of the present invention, membership in the set would determine if data is to be stored or removed from cache memory in a computer system. This invention, for example, provides a low cost and high performance mechanism to phase out aging membership information in a prefeteching mechanism for caching data or instructions in a computer system. | 11-13-2008 |
20080294592 | FRAMEWORK FOR MANAGING ATTRIBUTES OF OBJECTS - A computer implemented method, computer program product, and system for managing objects. Responsive to receiving a find-rule method, and a path-rule table, wherein the path-rule table contains a set of paths, wherein each path references an object, wherein a file system locates the object using the path, and wherein the object has at least one attribute not known to the file system, a path-rule table identifier is created. The path-rule table is associated with the path-rule table identifier to form an associated path-rule table. The find-rule method is associated with the path-rule table identifier to form an associated find-rule method. The path-rule table identifier, the associated path-rule table, and the associated find-rule method are stored. The path-rule table identifier is returned. | 11-27-2008 |
20090094676 | METHOD FOR REDUCING THE TIME TO DIAGNOSE THE CAUSE OF UNEXPECTED CHANGES TO SYSTEM FILES - A method for monitoring access to a file within a file system includes steps or acts of: monitoring a plurality of requests for access to files; intercepting the requests; and analyzing metadata located in the file. If the metadata includes a directive entry, the method includes these additional steps: identifying information about any application requesting access to the file, including a sequence of function calls that preceded the file access request; and logging the information to generate an action trail of the application. A mechanism for monitoring file access includes the following: a file system configured for monitoring accesses to any file residing within it; an access control mechanism which can execute pre-defined actions when an unauthorized file access occurs; and a tool to specify the list of files to be monitored. | 04-09-2009 |
20130198840 | SYSTEMS, METHODS AND COMPUTER PROGRAMS PROVIDING IMPACT MITIGATION OF CYBER-SECURITY FAILURES - Disclosed is a method and system to operate a governed data processing system in concert with a governing data processing system. The method includes operating a secure governing data processing system to monitor operation of at least one governed data processing system to detect a deviation from modeled user and governed data processing system behavior. The method further includes, upon detecting a deviation from the modeled behavior, taking proactive action to mitigate an occurrence of a potential adverse result of an occurrence of a cyber-security threat. | 08-01-2013 |
Patent application number | Description | Published |
20140069902 | WELDING SYSTEM WITH LIFTING MECHANISM AND ENCLOSURE - A welding system includes a housing having a front panel assembly. The welding system also includes first and second handles. The first handle is coupled to a first side of the front panel assembly and the second handle is coupled to a second side of the front panel assembly that is opposite from the first side. Each handle includes a recessed handle portion having an inner wall that forms an angle of between approximately 60 degrees and approximately 80 degrees with respect to an outer wall of the respective handle. The first and second handles are symmetrical about a central axis such that the first and second handles are interchangeable with each other. In addition, the first and second handles each include a plurality of internal tabs on both top and bottom sides of the first and second handles. The internal tabs facilitate coupling and alignment of the first and second handles with the front panel assembly. | 03-13-2014 |
20140069903 | WELDING SYSTEM PANELS - A welding system includes an enclosure frame. The welding system also includes a side panel having a tab extending along a bottom edge of the side panel. The tab is configured to mate with a complementary slot in the enclosure frame. | 03-13-2014 |
20140069905 | WELDING SYSTEM WITH TERMINAL COVER PIECE - A welding system includes a frame having a first sliding track and a second sliding track. The welding system also includes a cover piece having a first set of tabs configured to slide within the first sliding track, and a second set of tabs configured to slide within the second sliding track. The first and second sets of tabs are disposed on opposite sides of the cover piece. The cover piece includes an indention configured to mate with a detent protruding from a fan louver of the frame when the cover piece is slid into an open position. In addition, the welding system includes a plurality of electrical connections. The cover piece substantially covers the plurality of electrical connections when the cover piece is slid into a closed position within the sliding tracks, and the plurality of electrical connections are entirely exposed when the cover piece is slid into the open position within the sliding tracks. | 03-13-2014 |
20140070683 | WELDING SYSTEM WITH MULTI-POINT CONTACT LIFT EYE - A welding system includes a lift eye having a plurality of slotted paths that are both vertically and horizontally offset from each other. Each of the plurality of slotted paths are configured to receive a cylindrical bearing, and enable two resting positions and a lifting position of the lift eye via interaction with the respective cylindrical bearing. In addition, each slotted path of the plurality of slotted paths includes a first substantially vertical slot portion, a smaller second substantially vertical slot portion that is horizontally offset from the first substantially vertical slot portion, and an angled portion connecting bottom ends of the vertical slot portions. | 03-13-2014 |