Patents by Inventor David Sawin
David Sawin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9772948Abstract: A new segment of data is copied to a volatile, primary cache based on a host data read access request. The primary cache mirrors a first portion of a non-volatile main storage criterion is determined for movement of data from the primary cache to a non-volatile, secondary cache that mirrors a second portion of the main storage. The criterion gives higher priority to segments having addresses not yet selected for reading by the host. In response to the new segment of data being copied to the primary cache, a selected segment of data is copied from the primary cache to the secondary cache in response to the selected segment satisfying the criterion.Type: GrantFiled: July 6, 2012Date of Patent: September 26, 2017Assignee: SEAGATE TECHNOLOGY LLCInventors: James David Sawin, Luke W. Friendshuh, Sumanth Jannyavula Venkata, Ryan James Goss, Mark Allen Gaertner
-
Patent number: 9594685Abstract: Host read operations affecting a first logical block address of a data storage device are tracked. The data storage device includes a main storage and a non-volatile cache that mirrors a portion of data of the main storage. One or more criteria associated with the host read operations are determined. The criteria are indicative of future read requests of second logical block address associated with the first logical block address. Data of the at least the second logical block address is copied from the main storage to the non-volatile cache if the criteria meets a threshold.Type: GrantFiled: July 6, 2012Date of Patent: March 14, 2017Assignee: SEAGATE TECHNOLOGY LLCInventors: James David Sawin, Luke W. Friendshuh, Sumanth Jannyavula Venkata, Ryan James Goss, Mark Allen Gaertner
-
Patent number: 9529724Abstract: Approaches for implementing a controller for a hybrid memory that includes a main memory and a cache for the main memory are discussed. The controller comprises a hierarchy of abstraction layers, wherein each abstraction layer is configured to provide at least one component of a cache management structure. Each pair of abstraction layers utilizes processors communicating through an application programming interface (API). The controller is configured to receive incoming memory access requests from a host processor and to manage outgoing memory access requests routed to the cache using the plurality of abstraction layers.Type: GrantFiled: July 6, 2012Date of Patent: December 27, 2016Assignee: SEAGATE TECHNOLOGY LLCInventors: Sumanth Jannyavula Venkata, James David Sawin, Yunaldi Yulizar, Ryan James Goss
-
Patent number: 9477591Abstract: Incoming memory access requests are routed in a set of incoming queues, the incoming memory access requests comprise a range of host logical block addresses (LBAs) that correspond to a memory space of a primary memory. The host LBA range is mapped to clusters of secondary memory LBAs, the secondary memory LBAs corresponding to a memory space of a secondary memory. Each incoming memory access request queued in the set of incoming queues is transformed into one or more outgoing memory access requests that include a range of secondary memory LBAs or one or more clusters of secondary memory LBAs. The outgoing memory access requests are routed in a set of outgoing queues. The secondary memory is accessed using the outgoing memory access requests.Type: GrantFiled: July 6, 2012Date of Patent: October 25, 2016Assignee: SEAGATE TECHNOLOGY LLCInventors: Sumanth Jannyavula Venkata, James David Sawin
-
Patent number: 9104578Abstract: A host read request affects a request address range of a main storage. A speculative address range proximate to the request address range is defined. Speculative data stored in the speculative address range is not requested via the host read request. A criterion is determined that is indicative of future read requests of associated with the speculative data. The speculative data is copied from the main storage to at least one of a non-volatile cache and a volatile cache together with data of the host read request in response to the criterion meeting a threshold. The non-volatile cache and the volatile cache mirror respective portions of the main storage.Type: GrantFiled: July 6, 2012Date of Patent: August 11, 2015Assignee: SEAGATE TECHNOLOGY LLCInventors: James David Sawin, Luke William Friendshuh, Sumanth Jannyavula Venkata, Ryan James Goss, Mark Allen Gaertner
-
Publication number: 20140013053Abstract: A new segment of data is copied to a volatile, primary cache based on a host data read access request. The primary cache mirrors a first portion of a non-volatile main storage criterion is determined for movement of data from the primary cache to a non-volatile, secondary cache that mirrors a second portion of the main storage. The criterion gives higher priority to segments having addresses not yet selected for reading by the host. In response to the new segment of data being copied to the primary cache, a selected segment of data is copied from the primary cache to the secondary cache in response to the selected segment satisfying the criterion.Type: ApplicationFiled: July 6, 2012Publication date: January 9, 2014Applicant: SEAGATE TECHNOLOGY LLCInventors: James David Sawin, Luke W. Friendshuh, Sumanth Jannyavula Venkata, Ryan James Goss, Mark Allen Gaertner
-
Publication number: 20140013026Abstract: Incoming memory access requests are routed in a set of incoming queues, the incoming memory access requests comprise a range of host logical block addresses (LBAs) that correspond to a memory space of a primary memory. The host LBA range is mapped to clusters of secondary memory LBAs, the secondary memory LBAs corresponding to a memory space of a secondary memory. Each incoming memory access request queued in the set of incoming queues is transformed into one or more outgoing memory access requests that include a range of secondary memory LBAs or one or more clusters of secondary memory LBAs. The outgoing memory access requests are routed in a set of outgoing queues. The secondary memory is accessed using the outgoing memory access requests.Type: ApplicationFiled: July 6, 2012Publication date: January 9, 2014Applicant: SEAGATE TECHNOLOGY LLCInventors: Sumanth Jannyavula Venkata, James David Sawin
-
Publication number: 20140013052Abstract: Host read operations affecting a first logical block address of a data storage device are tracked. The data storage device includes a main storage and a non-volatile cache that mirrors a portion of data of the main storage. One or more criteria associated with the host read operations are determined. The criteria are indicative of future read requests of second logical block address associated with the first logical block address. Data of the at least the second logical block address is copied from the main storage to the non-volatile cache if the criteria meets a threshold.Type: ApplicationFiled: July 6, 2012Publication date: January 9, 2014Applicant: SEAGATE TECHNOLOGY LLCInventors: James David Sawin, Luke W. Friendshuh, Sumanth Jannyavula Venkata, Ryan James Goss, Mark Allen Gaertner
-
Publication number: 20140013027Abstract: Approaches for implementing a controller for a hybrid memory that includes a main memory and a cache for the main memory are discussed. The controller comprises a hierarchy of abstraction layers, wherein each abstraction layer is configured to provide at least one component of a cache management structure. Each pair of abstraction layers utilizes processors communicating through an application programming interface (API). The controller is configured to receive incoming memory access requests from a host processor and to manage outgoing memory access requests routed to the cache using the plurality of abstraction layers.Type: ApplicationFiled: July 6, 2012Publication date: January 9, 2014Applicant: SEAGATE TECHNOLOGY LLCInventors: Sumanth Jannyavula Venkata, James David Sawin, Yunaldi Yulizar
-
Publication number: 20140013047Abstract: A host read request affects a request address range of a main storage. A speculative address range proximate to the request address range is defined. Speculative data stored in the speculative address range is not requested via the host read request. A criterion is determined that is indicative of future read requests of associated with the speculative data. The speculative data is copied from the main storage to at least one of a non-volatile cache and a volatile cache together with data of the host read request in response to the criterion meeting a threshold. The non-volatile cache and the volatile cache mirror respective portions of the main storage.Type: ApplicationFiled: July 6, 2012Publication date: January 9, 2014Applicant: SEAGATE TECHNOLOGY LLCInventors: James David Sawin, Luke W. Friendshuh, Samanth Jannyavula Venkata, Ryan James Goss, Mark Allen Gaertner
-
Patent number: 7600154Abstract: A method, apparatus, and computer-usable medium for computing a serviceability assessment, calculating a preventative maintenance assessment, and in response to computing the serviceability and preventative maintenance assessments, computing a projected service cost assessment. A preferred embodiment of the present invention includes a processor, a data bus, and a computer-readable medium including a serviceability assessment tool. The serviceability assessment tool further includes a serviceability assessment module, a hardware installation assessment module, a preventative maintenance assessment module, and a projected service cost assessment module.Type: GrantFiled: March 14, 2006Date of Patent: October 6, 2009Assignee: International Business Machines CorporationInventors: Robert L. Appleman, David F. Champion, Cary Frederick De Van, Walter C. Metz, Jr., David A. Sawin, Hoyt C. Simmons
-
Publication number: 20070234348Abstract: Computer implemented method, system and computer program product for controlling software entitlement. A computer implemented method for controlling software entitlement includes receiving a request to install a software item on a designated machine. A determination is made if the designated machine is of a machine type authorized for installation of the software item. If the designated machine is of a machine type authorized for installation of the software item, a determination is made, using stored configuration data, if at least one additional criterion specified for entitlement to install the software item on the designated machine is satisfied using stored configuration data. If the at least one additional criterion specified for entitlement to install the software item on the designated machine is satisfied, installation of the software item on the designated machine is enabled in accordance with the at least one additional criterion.Type: ApplicationFiled: March 31, 2006Publication date: October 4, 2007Applicant: Lenovo (Singapore) Pte. Ltd.Inventors: Scott Kelso, Masahiko Nomura, David Sawin, Randall Springfield, Rod Waltermann
-
Publication number: 20070219838Abstract: A method, apparatus, and computer-usable medium for computing a serviceability assessment, calculating a preventative maintenance assessment, and in response to computing the serviceability and preventative maintenance assessments, computing a projected service cost assessment. A preferred embodiment of the present invention includes a processor, a data bus, and a computer-readable medium including a serviceability assessment tool. The serviceability assessment tool further includes a serviceability assessment module, a hardware installation assessment module, a preventative maintenance assessment module, and a projected service cost assessment module.Type: ApplicationFiled: March 14, 2006Publication date: September 20, 2007Inventors: Robert Appleman, David Champion, Cary De Van, Walter Metz, David Sawin, Hoyt Simmons
-
Patent number: 7190348Abstract: A method and system for use with a computer based system having a touchscreen for distinguishing between a finger and a stylus. The method involves a series of steps including detecting contact with the touchscreen. Also, the method can include generating contact information for the detected contact with the touchscreen. The method includes comparing contact information corresponding to the detected contact with contact criteria, and, based on the comparison of the contact information, determining whether the contact was initiated by a finger or a stylus.Type: GrantFiled: December 26, 2000Date of Patent: March 13, 2007Assignee: International Business Machines CorporationInventors: Peter J. Kennedy, James R. Lewis, David Sawin
-
Publication number: 20060010381Abstract: A method in a data processing system for providing a user of the system with a visual indication of a quality of one or more features of an on-screen help message (e.g., a usefulness, an importance, or a content level of the message). The method involves a generation of a graphical help interface (e.g., a graphical indicator of usefulness within a button)) to visually indicate the quality of the feature(s) of the on-screen help message, and a display of the graphical help interface in a display window associated with the on-screen help message. The method can further involve a customization to the user by the data processing system of one or more of the features of the on-screen help message that are visually indicated by the graphical user interface, and/or one or more additional features of the on-screen help message that are not visually indicated by the graphical user interface.Type: ApplicationFiled: July 7, 2004Publication date: January 12, 2006Applicant: International Business Machines CorporationInventors: Mark Molander, Sandra Kipp, Erik Hennum, David Sawin
-
Patent number: 6897851Abstract: Several methods, and related apparatus, are provided for the entry of formatted ink data (i.e., electronic ink) such that individual items in the data may be parsed and recognized more effectively. Each method allows users to enter formatted ink data in-line, which can then be recognized with constraints and parsed for use in other application programs or databases. In addition, a method is provided for allowing user-specialization of any of these entry methods (or other similar) methods. Note that in any of these methods, the user may send the formatted ink either to the default ink-processing application, or else directly to another application or database.Type: GrantFiled: January 5, 2001Date of Patent: May 24, 2005Assignee: International Business Machines CorporationInventors: Paul Robert Carini, Paul Turquand Keyser, Michael Peter Perrone, David A. Sawin, Jeffrey S. Schaffer, Jayashree Subrahmonia
-
Publication number: 20030025715Abstract: A method and apparatus for generating an input event that allows a user to easily and correctly select a small object on a display screen is provided for. An input event generating method and apparatus, according to the present invention, includes a method of generating an input event in an image display system having a display device and a pointing device for pointing an image displayed on the display screen of the display device with a pointer. There are included therein the steps of: displaying a zoom window for zooming a given area in a display screen in response to a process-initiating action in displaying the screen; and, when a manipulation of the pointing device is detected at first coordinates in the zoom window, generating an input event corresponding to the pointing device manipulation at second coordinates associated with the first coordinates in the given area.Type: ApplicationFiled: June 28, 2002Publication date: February 6, 2003Applicant: International Business Machines CorporationInventors: Jon E. Graham, Hidetoshi Mori, Arimasa Naitoh, David Sawin
-
Publication number: 20020088651Abstract: Several methods, and related apparatus, are provided for the entry of formatted ink data (i.e., electronic ink) such that individual items in the data may be parsed and recognized more effectively. Each method allows users to enter formatted ink data in-line, which can then be recognized with constraints and parsed for use in other application programs or databases. In addition, a method is provided for allowing user-specialization of any of these entry methods (or other similar) methods. Note that in any of these methods, the user may send the formatted ink either to the default ink-processing application, or else directly to another application or database.Type: ApplicationFiled: January 5, 2001Publication date: July 11, 2002Applicant: International Business Machines CorporationInventors: Paul Robert Carini, Paul Turquand Keyser, Michael Peter Perrone, David A. Sawin, Jeffrey S. Schaffer, Jayashree Subrahmonia
-
Publication number: 20020080123Abstract: A method and system for use with a computer based system having a touchscreen for distinguishing between a finger and a stylus. The method involves a series of steps including detecting contact with the touchscreen. Also, the method can include generating contact information for the detected contact with the touchscreen. The method includes comparing contact information corresponding to the detected contact with contact criteria, and, based on the comparison of the contact information, determining whether the contact was initiated by a finger or a stylus.Type: ApplicationFiled: December 26, 2000Publication date: June 27, 2002Applicant: International Business Machines CorporationInventors: Peter J. Kennedy, James R. Lewis, David Sawin