Abstract: A pre-boot environment is disclosed that manages power of a computing device prior to an operating system runtime phase. The pre-boot environment may be implemented in a computing device having a storage device to store an operating system, a firmware device to store firmware having a boot loader to load and initiate execution of the operating system, and a processor to execute the firmware and the operating system. The firmware in response to being executed by the processor may result in the computing device monitoring operating conditions of the computing device, and initiating a power management response based upon the operating conditions of the computing device and a power management policy.
Abstract: The leakage current and power consumption of phase change memories may be reduced using adaptive word line biasing. Depending on the particular voltage applied to the bitline of a programmed cell, the word lines of unselected cells may vary correspondingly. In some embodiments, the word line voltage may be caused to match the bitline voltage of the programmed cell.
Type:
Grant
Filed:
August 8, 2011
Date of Patent:
July 24, 2012
Assignee:
Intel Corporation
Inventors:
Richard E. Fackenthal, Ferdinando Bedeschi, Meenatchi Jagasivamani, Ravi Annavajjhala, Enzo M. Donze
Abstract: Embodiments of apparatuses, methods, and systems detecting spin loops in a virtual machine environment are disclosed. In one embodiment, an apparatus includes detection logic and virtualization logic. The detection logic is to detect whether a guest is executing a spin loop. The virtualization logic is to transfer control of the apparatus from the guest to a host in response to the detection logic detecting that the guest is executing the spin loop.
Type:
Grant
Filed:
March 30, 2007
Date of Patent:
July 24, 2012
Assignee:
Intel Corporation
Inventors:
Gilbert Neiger, Randolph L. Campbell, James B. Crossland, Gideon Gerzon, Leena K. Puthiyedath, Stephen A. Fischer, Steven M. Bennett, Andrew V. Anderson
Abstract: Interacting with a television program includes beginning playback of the program for perception by a user, analyzing the program to detect a cue within the program, automatically pausing playback of the program when the cue is detected, accepting user input data in response to the cue, resuming playback of the program when the user input data is received, and comparing the user input data to a non-user response. Interactivity provided by the program analysis, pausing playback, accepting user input data, resuming playback, and comparing operations supports execution of at least one of an entertainment application and an educational application at a user's site without requiring modification of the television program by a program provider.
Abstract: Noble metal may be used as a non-oxidizing diffusion barrier to prevent diffusion from copper lines. A diffusion barrier may be formed of a noble metal formed over an adhesion promoting layer or by a noble metal cap over an oxidizable diffusion barrier. The copper lines may also be covered with a noble metal.
Type:
Grant
Filed:
August 31, 2007
Date of Patent:
July 24, 2012
Assignee:
Intel Corporation
Inventors:
Steven W. Johnston, Valery M. Dubin, Michael L. McSwiney, Peter Moon
Abstract: In accordance with some embodiments of the present invention, de-interlacing may be accomplished by using an edge gradient to select a best interpolation direction for several adjacent pixels between two lines of interlaced video. The interpolation of the intermediate line is performed using the best direction. Then the pixels in the line above and below are analyzed to determine whether the interpolated pixel value should actually be used in view of the possible presence of artifacts.
Abstract: In one embodiment, the present invention includes a method for generating a list of files accessed during an operating system (OS) boot process to profile the OS boot process, and optimizing the list of files to generate an optimized file list for use in future OS boot processes, where the optimizing is according to a first optimization technique if the files were accessed from a solid state medium and according to a second optimization technique if the files were accessed from a rotating medium. Other embodiments are described and claimed.
Abstract: In various implementations, a re-configurable phase lock loop may have multiple signal paths, including a feedforward path to operate in a carrier frequency acquisition mode to obtain a carrier frequency estimate and a feedback loop path to operate in a carrier frequency tracking mode to translate an incoming signal to a baseband signal. The multiple signal paths may share most of the hardware to reduce implementation cost.
Abstract: A transformer module includes a main primary winding coupled to a first input power source to receive a medium voltage signal, multiple main secondary windings each to couple to a power cell of a drive system, and an auxiliary primary winding coupled to a second input power source to receive a low voltage signal. The auxiliary primary winding can be spatially separated from the main windings to increase leakage inductance. The auxiliary primary winding can be active during a pre-charge operation to pre-charge the power cells.
Type:
Grant
Filed:
February 26, 2009
Date of Patent:
July 17, 2012
Assignee:
TECO—Westinghouse Motor Company
Inventors:
Mehdi Abolhassani, Thomas Keister, Alex Skorcz, Ryan Edwards, Enrique Ledezma
Abstract: In accordance with some embodiments, a phase change memory may be formed in which the thermal conductivity in the region outside the programmed volume of phase change material is reduced. This may reduce the power consumption of the resulting phase change memory. The reduction in power consumption may be achieved by forming distinct layers of phase change material that have little or no mixing between them outside the programmed volume. For example, in one embodiment, a diffusion barrier layer may be maintained between the two distinct phase change layers. In another embodiment, a face centered cubic chalcogenide structure may be utilized.
Type:
Grant
Filed:
December 9, 2011
Date of Patent:
July 17, 2012
Assignee:
Ovonyx, Inc.
Inventors:
Charles H. Dennison, Stephen J. Hudgens
Abstract: In one embodiment, the present invention includes a method for receiving a user-level instruction for a checksum operation in a processor, where the user-level instruction specifies a source operand of a first size and a destination operand of a second size, receiving the source operand and the destination operand in the processor, and performing the checksum operation using the source operand and the destination operand in the processor responsive to the instruction. In an embodiment, the processor has multiple hardware engines that each can perform the checksum operation for one of multiple data sizes. Other embodiments are described and claimed.
Type:
Grant
Filed:
April 29, 2011
Date of Patent:
July 17, 2012
Assignee:
Intel Corporation
Inventors:
Steven R. King, Frank Berry, Michael E. Kounavis
Abstract: A method may include distributing ranges of addresses in a memory among a first set of functions in a first pipeline. The first set of the functions in the first pipeline may operate on data using the ranges of addresses. Different ranges of addresses in the memory may be redistributed among a second set of functions in a second pipeline without waiting for the first set of functions to be flushed of data.
Abstract: A technique for receiving a data stream including a spreading sequence packet of information containing a data payload and, in addition to the data payload, packet overhead including at least periodic information and at least one unique section of known coded information that defines a unique position within the packet, includes performing a plurality of processing steps to detect the position of the unique section within the packet of information. The steps include detecting the periodicity of the periodic information in a first processing step; in a second processing step after periodicity in the received data stream has been determined, estimating the position of the unique section within the packet of information; and in a third processing step, correlating the information in the packet of information about the estimated position with the known coded information.
Abstract: A method includes receiving a communication in a protocol stack coupled to a tunneling interconnect, determining whether a communication type is subject to altered timing to accommodate a delay associated with the tunneling interconnect, adjusting a timing of at least one stack logic to accommodate the delay, and handling the communication using the adjusted timing. Other embodiments are described and claimed.
Abstract: An administrative interface is provided between a first network and a second network, where the administrative interface is separate from one or more communications session signaling interfaces between the first network and second network. At least one of authorization, authentication, and accounting messages is communicated over the administrative interface. A module associated with the administrative interface is provided to perform topology hiding of the first network such that topology information of the first network is hidden from the second network.
Abstract: A system may include a graphics memory, a data bus, a processor, and a vertex shader. The data bus may be operatively connected to the graphics memory. The processor may send vertex data to the graphics memory via the data bus. The vertex shader may read the vertex data from the graphics memory and may subdivide the vertex data into subdivided vertex data. The vertex shader may also write the subdivided vertex data to the graphics memory.
Abstract: A scheme for securing a locally generated data on a system using authenticated write operations is disclosed. According to an embodiment of the present invention, a private/public key pair is randomized and repeatedly generated to protect operations to data blocks.
Abstract: In one embodiment, a method includes generating a current that is proportional to a mobility and an oxide capacitance of a tracking device and independent of a threshold voltage variation of the tracking device, generating a voltage from the current, and providing the voltage as at least part of a bias voltage for another device. In one embodiment, this other device may be a compensation circuit coupled to a main device to compensate for capacitance non-linearity of the main device.
Type:
Grant
Filed:
October 14, 2009
Date of Patent:
July 10, 2012
Assignee:
Javelin Semiconductor, Inc.
Inventors:
Anil Samavedam, David E. Bockelman, Vishnu Srinivasan
Abstract: A method, computer system, and computer-readable medium with instructions to provide a client security management layer and a content player that ensure that the content is protected from malware on the receiving computer system. The client security management layer controls access to a protected portion of a memory of a computer system on behalf of a component, such as the content player, running on the processor of the computer system. The client security management layer receives an encrypted content key from the component, confirms the integrity of the component, decrypts the encrypted content key to provide a decrypted content key, and places the decrypted content key in the protected portion of the memory in response to confirming the integrity of the component. Other embodiments are described and claimed.