Reliability Or Availability Analysis (epo) Patents (Class 714/E11.02)
  • Publication number: 20090019310
    Abstract: Problem determination knowledge is provided by an extraction tool that extracts tag information recorded in identified problem tracking tools, where the tags relate to problem knowledge. The extracted tag information is examined to produce a catalog of symptom definitions that can be utilized by tools such as problem submission, logging and/or analysis tools.
    Type: Application
    Filed: July 9, 2007
    Publication date: January 15, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Denilson Nastacio, Michael L. Wamboldt
  • Publication number: 20090019316
    Abstract: A system for calculating and rendering a risk level. In response to receiving an input to perform an action within a data processing system, a level of risk to the data processing system to perform the action is calculated based on a set of rules. It is determined whether the calculated level of risk presents an elevated risk. In response to determining that the calculated level of risk does present the elevated risk, a user interface is rendered with an appropriate elevated visual warning based on the calculated level of risk.
    Type: Application
    Filed: July 12, 2007
    Publication date: January 15, 2009
    Inventors: Christopher J. Buccella, Sean L. Dague, Daniel McCune Smith
  • Publication number: 20090013207
    Abstract: A method of predicting the lifetime reliability of an integrated circuit device with respect to one or more failure mechanisms includes breaking down the integrated circuit device into structures; breaking down each structure into elements and devices; evaluating each device to determine whether the device is vulnerable to the failure mechanisms and eliminating devices determined not to be vulnerable; estimating, for each determined vulnerable device, the impact of a failure of the device on the functionality of the specific element associated therewith, and classifying the failure into a fatal failure or a non-fatal failure, wherein a fatal failure causes the element employing the given device to fail; determining, for those devices whose failures are fatal, an effective stress degree and/or time; determining one or more of a failure rate and a probability of fatal failure for the devices, and aggregating the same across the structures and the failure mechanisms.
    Type: Application
    Filed: August 11, 2008
    Publication date: January 8, 2009
    Applicant: International Business Machines Corporation
    Inventors: Pradip Bose, Zhigang Hu, Jude A. Rivers, Jeonghee Shin, Victor Zyuban
  • Publication number: 20090006894
    Abstract: An apparatus and method for evaluating a state of an electronic or integrated circuit (IC), each IC including one or more processor elements for controlling operations of IC sub-units, and each the IC supporting multiple frequency clock domains. The method comprises: generating a synchronized set of enable signals in correspondence with one or more IC sub-units for starting operation of one or more IC sub-units according to a determined timing configuration; counting, in response to one signal of the synchronized set of enable signals, a number of main processor IC clock cycles; and, upon attaining a desired clock cycle number, generating a stop signal for each unique frequency clock domain to synchronously stop a functional clock for each respective frequency clock domain; and, upon synchronously stopping all on-chip functional clocks on all frequency clock domains in a deterministic fashion, scanning out data values at a desired IC chip state.
    Type: Application
    Filed: June 26, 2007
    Publication date: January 1, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ralph E. Bellofatto, Matthew R. Ellavsky, Alan G. Gara, Mark E. Giampapa, Thomas M. Gooding, Rudolf A. Haring, Lance G. Hehenberger, Martin Ohmacht
  • Publication number: 20080307256
    Abstract: Embodiments herein provide a fault-handling scheme based on forward recovery for cooperative workflow environments. The fault handling scheme relies on the correct placement of transaction scopes and their associated fault and compensation handlers for maintaining correct application semantics, a fault propagation scheme for forwarding faults to a workflow component that has the corresponding fault handler, and a distributed mechanism for collecting data of completed workflow components to facilitate recovering from faults. The fault handling scheme makes use of control flow messages to facilitate compensation of nested transaction scopes (residing in different components). The workflow components are also modified with additional code for aiding with fault propagation and fault recovery.
    Type: Application
    Filed: August 19, 2008
    Publication date: December 11, 2008
    Applicant: International Business Machines Corporation
    Inventors: Girish B. Chafle, Sunil Chandra, Pankaj Kankar, Vijay Mann
  • Publication number: 20080307214
    Abstract: A method comprises a system comprising a host device coupled to a first remote device actively operating according to a state diagram that the host device and all remote devices follow during operation of the system. The method further comprises powering up a second remote device while the host device and first remote device are actively operating according to the state diagram. The second remote device determines whether to initialize to a standard protocol or to an advanced protocol. Upon determining to initialize to the advanced protocol, the second remote device then waits for a synchronization point sequence.
    Type: Application
    Filed: June 6, 2008
    Publication date: December 11, 2008
    Applicant: TEXAS INSTRUMENTS INCORPORATED
    Inventor: Gary L. Swoboda
  • Publication number: 20080294944
    Abstract: A method for monitoring event occurrences from a plurality of processor units at a centralized location via a dedicated bus coupled between the plurality of processor units and the centralized location. In particular, the method comprises receiving, at the centralized location, data indicative of cumulative events occurring at one of the processor units, and storing the data in a first temporary memory. The data is then stored in a register based on a tag identifier affixed to the data in an instance where the tag identifier provides indicia of one of the plurality of processor units.
    Type: Application
    Filed: August 5, 2008
    Publication date: November 27, 2008
    Inventors: HILLERY C. HUNTER, Ravi Nair
  • Publication number: 20080288822
    Abstract: Systems and methods that incorporate fuzzing capabilities within an SQL server to facilitate penetration testing. A fuzzing component associated with the SQL server provides an entry point for accessing the fuzzing system to update explicit user specified parameters associated with SQL, wherein the server's in depth knowledge regarding semantics of the language code (e.g., manner of parsing) can be employed to determine vulnerabilities thereof.
    Type: Application
    Filed: May 17, 2007
    Publication date: November 20, 2008
    Applicant: MICROSOFT CORPORATION
    Inventors: Jiazhen Wu, Raul Garcia, Craig Alan Gick, Erik Ismert, Adrian Sorin Baras
  • Publication number: 20080263428
    Abstract: In transmission systems using digital video broadcasting standards for handheld terminals data is transmitted in bursts. Due to the restricted computing time, buffering of one or more bursts is necessary. The invention provides a memory optimalization for consecutive burst support. Thereby, a cyclic or non-cyclic memory model for a memory unit (19) of the device (1) for receiving bursts is provided.
    Type: Application
    Filed: December 8, 2006
    Publication date: October 23, 2008
    Applicant: KONINKLIJKE PHILIPS ELECTRONICS, N.V.
    Inventors: Onno Eerenberg, Arie Geert Cornelis Koppelaar, Armand Stuivenwold
  • Publication number: 20080229139
    Abstract: We explore techniques for designing nonblocking algorithms that do not require advance knowledge of the number of processes that participate, whose time complexity and space consumption both adapt to various measures, rather than being based on predefined worst-case scenarios, and that cannot be prevented from future memory reclamation by process failures. These techniques can be implemented using widely available hardware synchronization primitives. We present our techniques in the context of solutions to the well-known Collect problem. We also explain how our techniques can be exploited to achieve other results with similar properties; these include long-lived renaming and dynamic memory management for nonblocking data structures.
    Type: Application
    Filed: May 30, 2008
    Publication date: September 18, 2008
    Inventors: Mark S. Moir, Victor M. Luchangco, Maurice Herlihy
  • Publication number: 20080215922
    Abstract: A system, method and program enabling users to diagnose applications easily without affecting the operating performance of the application server, optimizing the log mechanism based on the integrated development environment. The method includes running the application in a main running environment and at least one shadow environment, the shadow environment obtained by duplicating the main running environment; and the main running environment interacting with the shadow environment with respect to the fault of the application. The method includes performing the steps of the main running environment: monitoring the exceptions in the system and sending system exception information to the shadow environment in the event of finding exceptions in the system. The shadow environment: receives the system exception information, opens diagnostic log/trace functions to obtain diagnosis log/trace files related to the system exceptions, and analyzes the diagnosis result based on the obtained diagnosis log/trace files.
    Type: Application
    Filed: January 15, 2008
    Publication date: September 4, 2008
    Applicant: International Business Machines Corporation
    Inventors: Long Cheng, Ying Chen, Dong Jun Lan, Qingbo Wang, Meng Ye
  • Publication number: 20080215911
    Abstract: A storage device capable of meeting the reliability has a storage capacity and the reliability of the storage device is defined. The storage device includes at least one first storage unit, at least one second storage unit, and a control unit. The first storage unit forms the storage capacity of the storage device. The second storage unit is allocated to form a spare capacity according to the storage capacity and the reliability. The second storage unit replaces the bad blocks in the first storage unit. The control unit controls the first storage unit and the second storage unit to transmit and convert the data with an application system. Thereby, by allocating the spare capacity of the second storage unit, the different reliability requirement is met, and the storage capacity of the first storage unit is unaffected.
    Type: Application
    Filed: July 30, 2007
    Publication date: September 4, 2008
    Inventor: Hui-Neng Chang
  • Publication number: 20080215925
    Abstract: Methods and systems are provided for testing distributed computer applications using finite state machines. A finite state machine definition for use in a distributed computer system is combined with the fault injections definitions contained within a fault injection campaign that is created for testing the computer application employing that finite state machine. The definition and combination of the finite state machine definition and the fault injection campaign is carried out automatically or manually, for example using a graphical user interface. This combination creates at least one modified finite state machine definition containing the desired injected faults. The modified finite state machine definition is separate from the originally identified finite state machine definition, and the originally identified finite state machine remains intact without injected faults.
    Type: Application
    Filed: March 2, 2007
    Publication date: September 4, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: LOUIS R. DEGENARO, James R. Challenger, James R. Giles, Gabriela Jacques Da Silva
  • Publication number: 20080209281
    Abstract: Data in a storage medium is scanned while a storage device is in an idle state. A proportion of scanned data in entire data in the storage medium is compared with a threshold value. If the proportion of the scanned data is less than the threshold value, an unscanned data in the storage medium is scanned during a time interval between commands received by the storage device from outside. The process is repeated until the proportion of the scanned data is equal to or more than the threshold value.
    Type: Application
    Filed: November 20, 2007
    Publication date: August 28, 2008
    Applicant: Fujitsu Limited
    Inventors: Yasuyuki Nagashima, Hironori Kanno
  • Publication number: 20080195895
    Abstract: According to the method for configuring an information system (1), components (2) are provided for the information system (1) and component-specific error susceptibility data (3) on the individual components (2). For a given system configuration (5), error susceptibility information (7) is determined for the information system (1) in this given system configuration (5) as a function of the component-specific error susceptibility data (3). The error susceptibility information (7) is evaluated with reference to given evaluation criteria (8). In a subsequent step, the information system (1) is configured in the given system configuration (5) if the error susceptibility information (7) satisfies the given evaluation criteria (8). By means of the method, it is achieved that only system configurations are accepted that satisfy requirements specified by the evaluation criteria (8) with respect to the reliability of the information system (1).
    Type: Application
    Filed: April 22, 2008
    Publication date: August 14, 2008
    Applicant: Fujitsu Siemens Computers GmbH
    Inventors: Gerald Kaefer, Reiner Schmid
  • Publication number: 20080195892
    Abstract: A method and apparatus for a template based parallel checkpoint save for a massively parallel super computer system using a parallel variation of the rsync protocol, and network broadcast. In preferred embodiments, the checkpoint data for each node is compared to a template checkpoint file that resides in the storage and that was previously produced. Embodiments herein greatly decrease the amount of data that must be transmitted and stored for faster checkpointing and increased efficiency of the computer system. Embodiments are directed to a parallel computer system with nodes arranged in a cluster with a high speed interconnect that can perform broadcast communication. The checkpoint contains a set of actual small data blocks with their corresponding checksums from all nodes in the system. The data blocks may be compressed using conventional non-lossy data compression algorithms to further reduce the overall checkpoint size.
    Type: Application
    Filed: April 16, 2008
    Publication date: August 14, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Charles Jens Archer, Todd Alan Inglett
  • Publication number: 20080189572
    Abstract: Techniques are provided for locating data. Mapping information for blocks associated with a file is provided. It is determined that a copy service has copied source blocks to target blocks. It is determined whether the mapping information should be updated to refer to the target blocks. Then, updated mapping information is provided in response to determining that the mapping information should be updated to refer to the target blocks.
    Type: Application
    Filed: April 16, 2008
    Publication date: August 7, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Gregory Edward McBride, Cuong Minh Le, David Michael Shackelford
  • Publication number: 20080178050
    Abstract: A data backup system and a method for sychronizing a replication of permanent data between primary and secondary disk subsystems and a replication of temporary data between primary and secondary computer servers in the event of an operational error are provided. The method includes detecting an operational error. The method further includes stopping replication of permanent data from the primary disk subsystem to the secondary disk subsystem at a first predetermined time, in response to the detection of the operational error. The method further includes stopping any further replication of temporary data from the primary computer server to the secondary computer server at the first predetermined time, in response to the detection of the operational error.
    Type: Application
    Filed: January 23, 2007
    Publication date: July 24, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Robert F. Kern, David B. Petersen, David H. Surman, Peter G. Sutton
  • Publication number: 20080178045
    Abstract: The present invention relates to a verification system and method for BCM software wherein data extracted from an orthogonal array are applied to verification for BCM software to reduce the number of tests such that verification for each BCM can be performed in a short period of time before manufacturing a prototype, reliability of verification results can be improved using a verification program regardless of an evaluator, and errors in the software for each BCM can be found and corrected at an early stage. To this end, the present invention provided a verification system for BCM software which comprises a BCM for controlling functions of convenience equipment in a vehicle; a computer equipped with a verification program and capable of exchanging information with the BCM through serial communication; and a power supply unit for applying power to the computer and the BCM.
    Type: Application
    Filed: October 25, 2007
    Publication date: July 24, 2008
    Inventor: Jung Duck Son
  • Publication number: 20080175383
    Abstract: The present invention discloses a method for communicating between communication apparatuses and a communication unit. The method includes: sending, by a first communication apparatus, a first request for establishing a Peer to Peer (P2P) connection to a second communication apparatus through a server; initiating, by the first communication apparatus or the second communication apparatus, a command for establishing a P2P connection with the other side; establishing directly a P2P channel between the first communication apparatus and second communication apparatus based on the command for establishing a P2P channel and transmitting data packets over the P2P channel. In the present invention, a P2P channel is directly established between the communication apparatuses to communicate, so data can be forwarded without a server. Thus, the load of the server may be reduced and information interaction rate of users may be improved.
    Type: Application
    Filed: December 12, 2007
    Publication date: July 24, 2008
    Applicant: Tencent Technology (Shenzhen) Company, Ltd.
    Inventor: Hongyu Sun
  • Publication number: 20080168310
    Abstract: Described is a headless server appliance configured with a secondary actuation mechanism that when actuated, enters the headless server appliance into a diagnostic mode. For example, the diagnostic mode may correspond to a secondary operating system booted from a BIOS component activated by the secondary actuation mechanism. In the diagnostic mode, primitives may be communicated between a client device coupled (e.g., via a network or USB connection) to the headless server appliance, such as to provide the client device with access to the headless server appliance's hard disk. Other primitives, such as communicated via APIs, may provide the client device with access to the BIOS. The secondary operating system and/or client device may perform diagnostics and recovery operations on the headless server appliance. For example, the client device or similar source may restore or update the primary operating system image to a storage medium of the headless server appliance.
    Type: Application
    Filed: January 5, 2007
    Publication date: July 10, 2008
    Applicant: Microsoft Corporation
    Inventors: Cesare John Saretto, James C. Gray, James M. Lyon
  • Publication number: 20080163031
    Abstract: A method of facilitating reliably accessing flash memory is provided. During the write-in process, the present invention utilizes the steps of coding write-in data to generate extra data, and then generating the first error correction code by performing an error-correcting operation on the write-in data and the extra data. Finally, store the N write-in data and the generated K extra data into the data area and the first ECC into the spare area. During read process, the present invention utilizes the steps of reading data from the data area of the target flash-memory page to generate the second ECC, counting with the counter a number of bit differences between the first ECC and the second ECC, and selecting M data from the N write-in data and the K extra data as decoding factors to retrieve the N write-in data. The higher the counter values, the lower the likelihood the corresponding bit is selected to be retrieved.
    Type: Application
    Filed: December 27, 2007
    Publication date: July 3, 2008
    Applicant: GENESYS LOGIC, INC.
    Inventors: Jen-wei Hsieh, Tei-wei Kuo, Hsiang-chi Hsieh
  • Publication number: 20080162993
    Abstract: An image forming device which enables a user to determine a diagnostic item and to perform a system diagnosis easily. The image forming device includes a storage unit to store information corresponding to diagnostic items and keyword information for the respective diagnostic items, an input unit to receive an input of at least one input device, and a control unit to search for information corresponding to a diagnostic item stored in the storage unit which corresponds to the at least one input keyword if the at least one keyword is inputted, and performing a system diagnosis of the image forming device.
    Type: Application
    Filed: December 12, 2007
    Publication date: July 3, 2008
    Applicant: Samsung Electronics Co., Ltd
    Inventor: Hung-joon OH
  • Publication number: 20080155344
    Abstract: A recording medium for storing start position information for each zone and a method of managing data using the information. In a disc having a plurality of zones which form a group, and a spare area which is allocated at the start portion or the end portion of the group for replacing defects, when start logical sector numbers of each zone are changed by slipping replacement during initialization or reinitialization, the information is stored in the defect management area to thereby increase the compatibility of the medium. In particular, by the method of managing data using information stored in a defect management area, generation of errors is prevented in reading or writing due to the change of a physical position of a real-recorded file which are caused by wrong calculation of the start logical sector numbers for each zone.
    Type: Application
    Filed: March 4, 2008
    Publication date: June 26, 2008
    Applicant: Samsung Electronics Co., Ltd.
    Inventor: Jung-wan KO
  • Publication number: 20080148108
    Abstract: Separate handling of read and write operations of Read-Modify-Write Commands in an XDRâ„¢ memory system is provided. This invention allows the system to issue other commands between the reads and writes of a RMW. This insures that the dataflow time from read to write is not a penalty. A RMW buffer is used to store the read data and a write buffer is used to store the write data. A MUX is used to merge the read data and the write data, and transmit the merged data to the target DRAM via the XIO. The RMW buffer can also be used for scrubbing commands.
    Type: Application
    Filed: February 20, 2008
    Publication date: June 19, 2008
    Inventors: Melissa A. Barnum, Paul Allen Ganfield, Lonny Lambrecht
  • Publication number: 20080148106
    Abstract: Methods and apparatus are described for evaluating a binary classification system operable to classify each of a plurality of events as a first event type or a second event type. At least some of the events of the first event type are independently verifiable with reference to verification data. The binary classification system is susceptible to a first error type in which events of the first event type are classified as the second event type, and a second error type in which events of the second event type are classified as the first event type. Operation of a first configuration of the binary classification system is evaluated with reference to an objective function. The objective function is derived by expressing a number of errors of the second error type in terms of a number of errors of the first error type with reference to the verification data, and by assuming relative proportions of the first and second event types within the plurality of events.
    Type: Application
    Filed: December 18, 2006
    Publication date: June 19, 2008
    Applicant: YAHOO! INC.
    Inventors: Richard Tao-Hwa Chow, Pavel Berkhin, Elena Eneva, Boris Klots, Nicolas Eddy Mayoraz, Rajesh Girish Parekh
  • Publication number: 20080141057
    Abstract: A fault-tolerant computer uses multiple commercial processors operating synchronously, i.e., in lock-step. In an exemplary embodiment, redundancy logic isolates the outputs of the processors from other computer components, so that the other components see only majority vote outputs of the processors. Processor resynchronization, initiated at predetermined time, milestones, and/or in response to processor faults, protects the computer from single event upsets. During resynchronization, processor state data is flushed and an instance of these data in accordance with processor majority vote is stored. Processor caches are flushed to update computer memory with more recent data stored in the caches. The caches are invalidated and disabled, and snooping is disabled. A controller is notified that snooping has been disabled. In response to the notification, the controller performs a hardware reset of the processors. The processors are loaded with the stored state data, and snooping and caches are enabled.
    Type: Application
    Filed: February 19, 2008
    Publication date: June 12, 2008
    Applicant: Maxwell Technologies, Inc.
    Inventors: Robert A. Hillman, Mark Steven Conrad
  • Publication number: 20080133942
    Abstract: A method of installing software on a storage device controlling apparatus which includes at least one channel controller having a circuit board on which are formed a file access processing section receiving requests to input and output data in files as units from an information processing apparatus via a first network and an I/O processor outputting I/O requests corresponding to the requests to input and output data to a storage device; at least one disk controller executing input and output of data into and from the storage device in response to the I/O requests sent from the I/O processor; and a second network connecting the channel controller and the disk controller so as to be able to communicate with each other, the method comprises the step of writing software for enabling the file access processing section to function, into the storage device by communicating with the channel controller via the second network.
    Type: Application
    Filed: November 8, 2007
    Publication date: June 5, 2008
    Applicant: Hitachi Ltd.
    Inventors: Hiroshi Ogasawara, Yutaka Takata, Naotaka Kobayashi, Jinichi Shikawa, Nobuyuki Saika
  • Publication number: 20080126858
    Abstract: Disclosed herein is a data visualization methodology to assist network administrators and service engineers for complex computing systems in diagnosing and addressing faults, errors and other conditions within the computing system, and related computerized processes and network architectures and systems supporting the methodology. The methodology produces a visual representation of the relative severity and similarity of a various fault conditions occurring within a plurality of devices within the complex computing system. The visual representation visually depicts the various computing devices and/or resources within a three-dimensional grid located according to a first axis representing the severity of fault conditions being experienced by the devices/resources and second and third axes representing the similarity/disparity of the types of fault conditions being experienced by the devices/resources.
    Type: Application
    Filed: August 25, 2006
    Publication date: May 29, 2008
    Inventor: Doyle Barras
  • Publication number: 20080126869
    Abstract: Input data is validated by generating code based on the input data. A schema is generated based on the input data indicating conditions for the input file. The schema may then be customized based on a type of application to consume the input data. A validator executable code is generated based on the schema and checks the input file for compliance with the conditions determined by the schema. Results of validation may be provided to the application in yes or no form, or as number of non-compliances. In the latter case, the application may decide to accept or reject the data based on predetermined non-compliance levels.
    Type: Application
    Filed: September 26, 2006
    Publication date: May 29, 2008
    Applicant: Microsoft Corporaion
    Inventors: Tara Kraft, Matthew D. Wood, Benjamen E. Ross
  • Publication number: 20080126850
    Abstract: A storage array disposed in a data storage system is reconfigured. A data storage system is supplied comprising a plurality of data storage devices, wherein each of the plurality of data storage devices is assigned to one of a plurality of data storage arrays, or is assigned as a spare device. An unassigned data storage device is detected. If any of the plurality of data storage arrays comprises an intermixed data storage array, the storage array is reconfigured to restore the intermixed data storage array to a homogeneous technology class comprising the unassigned device. If any of the plurality of data storage arrays comprises a degraded data storage array, the storage array is reconfigured to restore the degraded storage array to optimal reliability, optimal performance, and optimal efficiency.
    Type: Application
    Filed: August 28, 2006
    Publication date: May 29, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Robert A. Kubo, Richard A. Ripberger
  • Publication number: 20080120520
    Abstract: A method comprising: detecting a sub-system to be controlled in a reduced resource mode in a device having an interconnecting system architecture; sending a resource reducing request to an interconnect node of the sub-system, the interconnect node belonging to a first power/clock signal domain; and reducing resources of processing elements of the sub-system belonging to a second power/clock signal domain.
    Type: Application
    Filed: November 17, 2006
    Publication date: May 22, 2008
    Inventor: Timo Eriksson
  • Publication number: 20080115007
    Abstract: An original data stream is encoded into a high priority data stream and a low priority data stream. The high priority data stream is encoded so as to permit decoding of the high priority data steam independently of the low priority data stream. The high priority data stream is transmitted twice, while the low priority data claim 25. is transmitted in two portions, but only once. If both the first portion and the second portion of the low priority data stream are received, and at least one complete transmission of the high priority data stream is received, then the two data streams are combined to produce a signal output of high quality. However, if any portions of the low priority data stream is lost then the low priority data stream is not used, and only the high priority data stream is used to produce output. Overall throughput is greater than would be achieved if the original data stream were transmitted with complete redundancy.
    Type: Application
    Filed: November 9, 2007
    Publication date: May 15, 2008
    Applicant: QUALCOMM INCORPORATED
    Inventor: Ahmad Jalali
  • Publication number: 20080098050
    Abstract: A write recovery strategy for optical recorders, whereby one good or certified disc extent is searched for once the disc is first loaded. The certified disc extent is reserved and is used as space to rewrite data for which initial writing attempts were unsuccessful. The reserved areas is used for write recovery at times of at the start, real-time AV data will not be lost and recording performance is improved. A series of lists are maintained including a reserved list of extents that are certified as being free of defects and lists for free and written areas of the disc. The defect list used is updated by the defect management scheme so that it is always up-to-date.
    Type: Application
    Filed: June 24, 2005
    Publication date: April 24, 2008
    Applicant: KONINKLIJKE PHILIPS ELECTRONICS, N.V.
    Inventor: Josephus Joannes Mathijs Maria Geelen
  • Publication number: 20080077831
    Abstract: A semiconductor integrated circuit includes a memory, a BIST main circuit and a BIST sub circuit. The BIST sub circuit is to generate a row address pattern or a column address pattern of the memory and includes a boundary address generation circuit for alternately generating a top address and a bottom address of the memory for at least one of the row address pattern and the column address pattern. The BIST main circuit is provided in common with a plurality of memories and the BIST sub circuit is individually provided corresponding to the memories. The boundary address generation circuit includes a top address memory unit for storing the top address and a top/bottom address generation unit for reading out the top address and alternately outputting the top address and the bottom address.
    Type: Application
    Filed: September 26, 2007
    Publication date: March 27, 2008
    Inventors: Tomonori Sasaki, Toshiharu Asaka, Yoshiyuki Nakamura
  • Publication number: 20080059845
    Abstract: In a computer system, each personal computer includes a bootup management device managing the start operation thereof. The bootup management device excludes a personal computer that failed to start, and provides a user with another personal computer. The user operates the terminal device connected to a network, and can accomplish his work whichever personal computer is connected to his terminal device. An original bootup disk image is allocated to the personal computer determined to be abnormal and it is checked whether the personal computer can operate normally or not. If the personal computer can operate normally, this personal computer is registered in the bootup management device. If unable to operate normally, the personal computer is registered and notified as needing to be maintained.
    Type: Application
    Filed: July 31, 2007
    Publication date: March 6, 2008
    Inventor: Yasunori YAMADA
  • Publication number: 20080052394
    Abstract: A system and method for diagnosing a problem on a packet network. Network performance information associated with data packet communications over a packet network may be collected. A network performance information parameter may be monitored and a determination that the network performance information parameter crosses a threshold value may be made. In response to determining that the network performance information parameter crossed the threshold value, diagnostics may be initiated to determine a cause of the network performance information parameter crossing the threshold value.
    Type: Application
    Filed: May 31, 2007
    Publication date: February 28, 2008
    Inventors: Michael K. Bugenhagen, Stephen K. Edwards, William L. Wiley, James L. McNaughton, John M. Heinz, Steven E. Kozisek
  • Publication number: 20080022159
    Abstract: To efficiently detect, in an information processing system including a plurality of information processing apparatuses, an information processing apparatus in which an abnormality has occurred. For each of the information processing apparatuses, a detection apparatus stores a previously estimated average processing time per service for a plurality of services provided by the information processing apparatuses. Then, for each of the information processing apparatuses, by using communication packets acquired in a predetermined period, the detection apparatus computes the number of calling times when the services have been called, and computes a busy time, which is a total amount of time when transactions are performed.
    Type: Application
    Filed: July 18, 2007
    Publication date: January 24, 2008
    Inventors: Sei Kato, Takahide Nogayama, Toshiyuki Yamane