Patent application number | Description | Published |
20090067448 | Contention-Based Communication - For an example embodiment, a method for a communication device operating in a synchronous communication system is described. The method includes performing a listen-before-talk (LBT) procedure prior to the start of a downlink subframe of a synchronous frame and determining if a transmission from another communication device of another communication system is detected during the LBT procedure. In the case that a transmission is detected during the LBT procedure, the communication device refrains from transmitting during the downlink subframe. In the case that a transmission is not detected during the LBT procedure, the communication device transmits during the downlink subframe. | 03-12-2009 |
20090252070 | AIRLINK MANAGEMENT IN A WIRELESS BROADCAST SYSTEM - A wireless broadcast system that collects content for distribution over a wireless communication network. Multiple independent content streams can be coarsely interleaved by collecting multiple small segments of content of each stream and rearranging them into larger segments, that are interleaved into an aggregate content stream that is broadcast as an identical signal from multiple transmitters. The broadcast signal can also include information about the interleaved content, such as information identifying the occurrence of a later interleaved instance of the same independent content stream in the aggregate content stream, that can be used by a receiver to activate and deactivate portions of a receiver to conserve power. | 10-08-2009 |
20110096664 | SYSTEM AND METHOD FOR FLOW CONTROL WITHIN A STATEFUL PROTOCOL PROCESSING SYSTEM - A method of flow control implemented by a system disposed to execute a protocol stack and an application is disclosed herein. The method includes configuring the system to operate in a push mode pursuant to which the protocol stack initiates the forwarding, to the application, of a first sequence of data packets received by the protocol stack. The system may also be configured to operate in a pull mode pursuant to which the application initiates the forwarding, to the application, of a second sequence of data packets received by the protocol stack. In a particular implementation the system may be configured to transition from the push mode to the pull mode, or vice-versa, in response to receipt at the protocol stack of a data packet bearing a specified sequence number. | 04-28-2011 |
20110176446 | SYSTEM AND PROCESS FOR PACKET DELINEATION - An error management system and process can be used to identify an erroneous data packet in a data stream. In response to identifying the erroneous data packet, a subsequent valid data packet is located in the data stream. In one embodiment, a plurality of candidate locations of header checksum windows are searched and checked for a valid checksum. Multiple integrity checks of multiple header checksums can be used to reduce the probability of a false positive integrity check. In another embodiment, one or more information data fields can used for determining packet integrity by determining if the fields contain valid information bits. | 07-21-2011 |
20110249627 | CONTENTION-BASED COMMUNICATION - For an example embodiment, a method for a communication device operating in a synchronous communication system is described. The method includes performing a listen-before-talk (LBT) procedure prior to the start of a downlink subframe of a synchronous frame and determining if a transmission from another communication device of another communication system is detected during the LBT procedure. In the case that a transmission is detected during the LBT procedure, the communication device refrains from transmitting during the downlink subframe. In the case that a transmission is not detected during the LBT procedure, the communication device transmits during the downlink subframe. | 10-13-2011 |
Patent application number | Description | Published |
20100058078 | Protocol for Power State Determination and Demotion - A system may comprise a plurality of processing units, and a control unit and monitoring unit interfacing with the processing units. The control unit may receive requests for transitioning the processing units to respective target power-states, and specify respective target HW power-states corresponding to the respective target power-states. The monitoring unit may monitor operating characteristics of the system, and determine based on operating characteristics whether to allow the processing units to transition to the respective target hardware (HW) power-states. The control unit may be configured to change the respective target HW power-state to a respective updated HW power-state for each processing units for which it is determined that transition to its respective target HW power-state should not be allowed. The control unit may also be configured to infer a common target HW power-state based on the respective target HW power-states of processing units of a subset of the plurality of processing units, when the processing units of the subset of the plurality of processing units share at least one resource domain. | 03-04-2010 |
20100180195 | METHOD AND APPARATUS FOR HARDWARE XML ACCELERATION - A method and apparatus for accelerating processing of a structured document. A hardware XML accelerator includes one or more processors (e.g., CMT processors), one or more hardware XML parser units, one or more cryptographic units and various interfaces (e.g., to memory, a network, a communication bus). An XML document may be processed in its entirety or may be parsed in segments (e.g., as it is received). A parser unit parses a document or segment character by character, validates characters, assembles tokens from the document, extracts data, generates token headers (to describe tokens and data) and forwards the token headers and data for consumption by an application. A cryptographic unit may enforce web security, XML security or some other security scheme, by providing encryption/decryption functionality, computing digital signatures, etc. Software processing, bus utilization and latencies (e.g., memory, bus) are greatly reduced, thereby providing significantly improved XML processing and security processing throughput. | 07-15-2010 |
20110301889 | FLEXIBLE POWER REPORTING IN A COMPUTING SYSTEM - A system and method for efficient reporting of power usage. A power reporting unit within a processor receives a power consumption number once every sample interval from a power monitor. The power monitor determines a power consumption number based on data corresponding to activity levels of one or more functional blocks within the processor. This data corresponds to each of a number of sampled signals within the one or more functional blocks rather than temperature. Thus, the data is independent of environment temperature variations. An average power consumption number is computed based on received power consumption numbers for a running time interval, wherein the running time interval is larger than the sample interval. This value is conveyed to an external agent, such as a controller for a data center rack system. Responsive to receiving and processing the average power consumption number, the external agent may perform one or more actions. For example, the external agent may cause changes in a cooling system. | 12-08-2011 |
20120144215 | MAXIMUM CURRENT LIMITING METHOD AND APPARATUS - The maximum current is limited in a multi-processor core system by monitoring the latest power consumption in the processor cores, in order to prevent a system shutdown as a result of an over-current event. If the sum of the latest power of the processor cores exceeds a threshold limit, a performance state (P-state) limit is enforced in the processor cores. The P-state limit causes a P-state change to a lower frequency, voltage and thus a lower current. | 06-07-2012 |
20120144221 | LOAD STEP MITIGATION METHOD AND APPARATUS - A method and apparatus for load step, or instantaneous current spike, mitigation are provided. In the method and apparatus, load steps are mitigated if a computer system a whole is lightly load, which may be determined by the power consumption of the computer system. Further, load steps are mitigated if a number of processor cores capable of inducing a load step is higher than a threshold. The Advanced Configuration and Power Interface (ACPI) performance state of the cores is used to determine a core's potential for generating a load step. A processor core is instructed to mitigate load steps if conditions are met for the mitigation. | 06-07-2012 |
20120146708 | METHOD AND APPARATUS FOR APPLICATION OF POWER DENSITY MULTIPLIERS OPTIMALLY IN A MULTICORE SYSTEM - A method and an apparatus are described that delay application of a higher order Power Density Multiplier (PDM) using a time based moving average of a number of active cores in a multicore system. A PDM is applied to a thermal design power budget of a thermal entity and performance of the thermal entity is increased by transferring available power from a thermal entity not in an active state to a thermal entity in an active state. Sufficient time is allowed for the cooling effect of reduced active cores, to influence the active core that receives the extra power (a higher PDM). Similarly delaying application of a lower PDM with the same moving average, but a different threshold, allows a core to retain a higher power allocation until the more active neighbor core(s) cause it to heat up, thereby boosting core performance. | 06-14-2012 |
20120159123 | CSTATE BOOST METHOD AND APPARATUS - A central processing unit (processor) having multiple cores and a method for controlling the performance of the processor. The processor includes a first storage location configured to store a first threshold associated with a first boost performance state (P-State). The processor also includes logic circuitry configured to increase performance of active processor cores when an inactive processor core count meets or exceeds the first threshold. The processor may also include a second storage location configured to store a second threshold associated with a second boost P-State. The logic circuitry may be configured to compare the inactive processor core count to the first and second thresholds, select one of the first and second boost P-States and increase performance of active processor cores based on the selected boost P-State. | 06-21-2012 |
20120159198 | PROCESSOR POWER LIMIT MANAGEMENT - A processor power limiter and method is provided. The processor includes a first programmable location configured to store a processor power target. A power monitor is configured to estimate a measured power dissipation within the processor. A power controller is configured to adjust a processor power parameter based on the power target and the measured power dissipation. The processor may include an interface for an operating system. A second programmable location may be configured to store a software processor power target accessible by the operating system. The processor may also include a sideband interface for an external agent. A third programmable location may be configured to store an agent processor power target accessible by the external agent. The power controller may be configured to adjust a processor core voltage and/or frequency such that the measured dissipation stays below the processor power target, software processor power target and the agent processor power target. | 06-21-2012 |
20130007494 | MANAGING PROCESSOR-STATE TRANSITIONS - Techniques are disclosed relating to managing power consumption and latencies for entry and exit of idle power states. In one embodiment, a processor includes a processing core configured to operate in a plurality of power states (e.g., C-states) that includes an operating power state and at least one idle power state. The processing core is also configured to operate in a plurality of performance states. The processor further includes a power management unit configured to receive a request from the processing core to enter the at least one idle power state. The power management unit is configured to select a first of the plurality of performance states (e.g., P-states) based on the requested idle power state. In one embodiment, the power management unit is further configured to cause the processing core to transition into the selected first performance state prior to entering the requested idle power state. | 01-03-2013 |
20130297950 | VOLTAGE ADJUSTMENT BASED ON LOAD LINE AND POWER ESTIMATES - A method and system for determining voltage supplied to a processor from a voltage regulator when the voltage cannot be directly measured. | 11-07-2013 |
20130318372 | DYNAMIC LOAD STEP CALCULATION FOR LOAD LINE ADJUSTMENT - A method of controlling voltage in a circuit is provided. Within the circuit, a block of an electrical component provides an indication that it desires to switch states (such as from off to on, on to off, or from one speed to another). The change in states requires a different current draw by the electrical component block. The indication is received by an electrical component that controls the voltage of the circuit. The electrical component that controls the voltage then issues a signal granting permission for the electrical component block to switch states. This permission signal is received by the electrical component and the electrical component block changes state. | 11-28-2013 |
Patent application number | Description | Published |
20110088753 | Solar Energy Converter and Method for Converting Solar Energy - The solar energy converter for generating electric energy and heated fluid comprises a multi-layer assembly, a photovoltaic panel and a manifold assembly. The multi-layer assembly is a casing and comprises N layers separated by at least one separator floor, each layer has at least one channel adapted to contain a fluid stream, and each layer has a first opening and a second opening. The photovoltaic panel has a top surface and a bottom surface, the bottom surface of the photovoltaic panel contacts the multi-layer assembly. The manifold assembly comprises N passages for containing the fluid streams, the Kth passage is adapted to distribute the fluid stream to be heated into the channel of the Kth layer through the corresponding first opening and collect the heated fluid stream from the channel of the Kth layer through the corresponding second opening, wherein N is a positive integer, K is a positive integer less than or equal to N. | 04-21-2011 |
20120060898 | Self-contained, multi-fluid energy conversion and management system for converting solar energy to electric and thermal energy - The teachings generally relate to a system for converting solar energy into electrical energy and thermal energy using a self-contained system having a plurality of channels for the heat transfer using a respective plurality of fluids. | 03-15-2012 |
20130160814 | METHOD FOR CONVERTING SOLAR ENERGY - The present invention discloses a method for converting solar energy, comprises the following step of: providing a photovoltaic panel comprising a plurality of photovoltaic cells for gathering solar energy and converting the incident solar energy into electric energy; providing a multi-layer assembly comprising N layers, each layer adapted to contain a fluid stream; distributing the fluid streams to be heated into the N layers; rising temperature of the fluid streams within each layer of the multi-layer assembly by the heating of the multi-layer assembly and the photovoltaic panel; and collecting the heated fluid stream from the N layers; wherein N is a positive integer. | 06-27-2013 |
Patent application number | Description | Published |
20090064329 | Zero-hour quarantine of suspect electronic messages - The zero-hour quarantine comprises a tool for flagging potentially harmful messages/files prior to having an anti-virus signature published for a particular virus. The suspect file is sent to the zero-hour quarantine and periodically scanned, giving time for creation of a signature file that would then detect the virus. An example method may include receiving and examining a message for attributes indicative of its undesirability, and assigning a threat score to the message. The method may comprise disposing of the message by comparing the threat score to first and second thresholds, and the message sent to a permanent quarantine if the threat score passes the first threshold. The message is sent to the zero-hour quarantine if the assigned threat score does not pass the second threshold but passes the second threshold, or is delivered to the recipient if the assigned threat score does not pass the first or second threshold. | 03-05-2009 |
20100030864 | Zero-Minute Virus and Spam Detection - Disclosed are systems and methods for detecting unwanted electronic message transmissions on a communications network. These include establishing a database for storing metadata associated with message traffic according to at least the source addresses of the senders of electronic message transmissions. The disclosed principles also include monitoring electronic message transmissions at the certain location on the electronic communications network. Also, included is populating the database with metadata derived from analysis of the monitored electronic messages, where the metadata includes metadata derived by analyzing the contents of the monitored electronic messages. Based upon the populated database, it is determined whether certain received electronic messages are likely to be unwanted based on an examination of the metadata associated with the source addresses of the senders of the received electronic messages and based on the analysis of the content of monitored electronic messages at least in part without reference to a promulgated database of “signatures” of known unwanted electronic messages. | 02-04-2010 |
20100088765 | SYSTEM AND METHOD FOR FILTERING ELECTRONIC MESSAGES USING BUSINESS HEURISTICS - Disclosed are systems and methods for use in filtering electronic messages using business heuristics. In one aspect, a method includes determining whether the electronic message is associated with a desirable business, and adjusting the likelihood of delivering the electronic message to an intended recipient of the message if the electronic message is determined to be associated with the desirable business. In a more specific embodiment, the method further includes assigning a spam-score to the electronic message based on a likelihood that the electronic message is not unwanted by the intended recipient, blocking delivery of the electronic message to the intended recipient when the spam-score does not cross an overall threshold, and delivering the electronic message to the intended recipient based on the adjusted likelihood when the electronic message is determined to be associated with the desirable business. | 04-08-2010 |
20110138041 | ZERO-MINUTE VIRUS AND SPAM DETECTION - Disclosed are systems and methods for detecting unwanted electronic message transmissions on a communications network. These include establishing a database for storing metadata associated with message traffic according to at least the source addresses of the senders of electronic message transmissions. The disclosed principles also include monitoring electronic message transmissions at the certain location on the electronic communications network. Also, included is populating the database with metadata derived from analysis of the monitored electronic messages, where the metadata includes metadata derived by analyzing the contents of the monitored electronic messages. Based upon the populated database, it is determined whether certain received electronic messages are likely to be unwanted based on an examination of the metadata associated with the source addresses of the senders of the received electronic messages and based on the analysis of the content of monitored electronic messages at least in part without reference to a promulgated database of “signatures” of known unwanted electronic messages. | 06-09-2011 |
20120030302 | ELECTRONIC MESSAGE SOURCE REPUTATION INFORMATION SYSTEM - Disclosed herein are filtering systems and methods that employ an electronic message source reputation system. The source reputation system maintains a pool of source Internet Protocol (IP) address information, in the form of a Real-Time Threat Identification Network (“RTIN”) database, which can provide the reputation of source IP addresses, which can be used by customers for filtering network traffic. The source reputation system provides for multiple avenues of access to the source reputation information. Examples of such avenues can include Domain Name Server (DNS)-type queries, servicing routers with router-table data, or other avenues. | 02-02-2012 |