Abstract: A system for performing autonomic monitoring in a computing grid is described. The system includes a plurality of modules, which when implemented into a computing grid, are operable to analyze objects of the grid and identify exception conditions associated with the objects. The system includes a configuration module for receiving information on specified objects to be monitored and exception conditions for the objects, an information collection module to collect job execution data associated with the objects, and an exception module to evaluate the job execution data associated with the objects and identify existing exception conditions. Related methods of performing autonomic monitoring in a grid system are also described.
Abstract: A wide angle display system includes a linear array projector, a curved display surface, and an n-sides scanning mirror. The projector is configured to project an image along an optical axis to the scanning mirror. The scanning mirror continuously rotates about a rotational axis at a speed 1/n the refresh rate, so as to reflect and scan the image onto the display surface.
Type:
Grant
Filed:
March 28, 2005
Date of Patent:
February 26, 2008
Assignee:
Evans & Sutherland Computer Corporation
Inventors:
Harry Streid, Robert R. Christensen, Allen H. Tanner
Abstract: A redundant clock distribution architecture is provided for a blade clustering system to achieve SMP (symmetric multi-processor) capability and flexible system configuration. The architecture mainly provides a central clock signal from a central clock and a local clock signal from an operative local clock configured on each blade module of the system. A clock multiplexer selects the central clock signal and sends to plural local clock consumers on each blade module. The clock multiplexer switches to send the local clock signal if the central clock fails.
Abstract: A computer system with a fixing module for riser card thereof is provided. By allowing the bottom side of the supporting pillar and the bottom parts of the two opposite sides of the supporting pillar engaging with each other, the riser card is supported by stress from all directions around it. Therefore, enough supporting strength is efficiently provided within a limited space and the riser card is prevented from being bended and having deformation because of the heavy weight.
Abstract: A multiple blade computer server housing comprises a cabinet having a first side and a second side, at least one chassis positioned within the cabinet that houses a plurality of server blades and a plurality of interface cards, and at least one door panel hingedly mounted to the second side such that access to the second side is gained by opening the door panel. The door panel has mounted thereon at least one network switch card. Generally, the network switch card can be connected by cables to at least a portion of the plurality of interface cards. In another aspect, the invention pertains to a door for a computing blade server housing where the door comprises a door panel, a track system located on at least one side of the door panel, and plurality of interface connectors located along at least one edge of the door panel.
Abstract: A tunable fiber optic component providing environmental isolation, thermal tuning, and mechanical tuning and a method of tuning a fiber optic component using application of substantially simultaneous varying of temperature and mechanical strain is disclosed. A method of using a tunable fiber optic component, for example, a distributed feedback fiber laser, to compensate variations in an optical system, and a method of making a tunable fiber optic component are also disclosed.
Type:
Grant
Filed:
March 23, 2006
Date of Patent:
February 5, 2008
Assignee:
Evans & Sutherland Computer Corporation
Inventors:
David Marceau, Dennis F. Elkins, Forrest L. Williams, Allen H. Tanner
Abstract: A multilayer midplane board has a front side and a back side and includes a first partially plated through-hole; a second partially plated through-hole spaced away from the first partially plated through-hole, and a first conductive signal track that electrically couples a selected plated section of the first partially plated through-hole directly adjacent the front side to a selected plated section of the second partially plated through-hole adjacent the back side.
Abstract: A method and circuit for improving a quality of display on an LAD screen are disclosed. The method is to synchronize a vertical synchronization signal of a video signal supplied to an LAD system with an oscillation signal produced by a burst mode DC-to-AC inverter driving the lamps of the system in order to suppress interference noise appearing on an LCD screen. The circuit suggested includes mainly two semiconductor switches, impedance elements, and a diode to realize the synchronization function.
Abstract: A network security modeling system which simulates a network and analyzes security vulnerabilities of the network. The system includes a simulator which includes a network vulnerabilities database and a network configuration module having network configuration data. The simulator determines vulnerabilities of the simulated network based on the network configuration data and the vulnerabilities database.
Type:
Grant
Filed:
January 14, 2000
Date of Patent:
January 1, 2008
Assignee:
Secure Computing Corporation
Inventors:
Alan Dowd, Thomas R. Markham, Tomo Foote-Lennox, David Apostal, Raymond Lu
Abstract: A protocol element referred to as a secure handle is described which provides an efficient and reliable method for application-to-application signaling in multi-process and multi-computer environments. The secure handle includes an absolute memory reference which allows the kernel to more quickly and efficiently associate a network data packet with an application's communication context in the kernel.
Type:
Application
Filed:
June 12, 2007
Publication date:
December 27, 2007
Applicant:
Liquid Computing Corporation
Inventors:
Kaiyuan HUANG, Michael Kemp, Ernst Munter
Abstract: The present invention is directed to systems and methods for detecting unsolicited and threatening communications and communicating threat information related thereto. Threat information is received from one or more sources; such sources can include external security databases and threat information data from one or more application and/or network layer security systems. The received threat information is reduced into a canonical form. Features are extracted from the reduced threat information; these features in conjunction with configuration data such as goals are used to produce rules. In some embodiments, these rules are tested against one or more sets of test data and compared against the same or different goals; if one or more tests fail, the rules are refined until the tests succeed within an acceptable margin of error. The rules are then propagated to one or more application layer security systems.
Abstract: A protocol suite for inter-process communication in multi-process and multi-computer environments is described which supports one or more loosely flow-controlled connections to be established over a tightly flow-controlled connection. The tightly flow-controlled connections between processes provide a reliable underlying network between the members of a multiprocessing environment over which multi-computer applications can then efficiently communicate by setting up loosely flow-controlled connections.
Type:
Application
Filed:
June 12, 2007
Publication date:
December 20, 2007
Applicant:
Liquid Computing Corporation
Inventors:
Kaiyuan HUANG, Michael F. Kemp, Ernst Munter
Abstract: A power switch device and method for a cluster computer is described. A power input circuit receives plural input powers and plural state signals corresponding to the input powers. A first output circuit supplies the input powers to a head node and at least one compute node. A second output circuit supplies the input powers to the head node. A gate produces a switch signal according to the state signals. According to the switch signal, a switch module connects the power input circuit to the first output circuit or the second output circuit. And a spare power module, connected to the first and second output circuits, stores a spare power charged from the first output circuit and supplies the spare power to the second output circuit during a switch period.
Abstract: An embodiment of one of the inventions disclosed herein is a computer system that includes a plurality of interconnected computational hosts, each of which are connected to one of a plurality of buffers. Each of the buffers includes a plurality of buffer spaces. Each of the computational hosts may be configured such that each transfer of a data packet from one of the plurality of computational hosts acting as a source of the data packet to another one of the plurality of computational hosts acting as a destination of the data packet is controlled by an availability of buffer spaces in the buffer coupled to the destination computational host.
Type:
Application
Filed:
June 12, 2007
Publication date:
December 20, 2007
Applicant:
Liquid Computing Corporation
Inventors:
Kaiyuan HUANG, Michael F. Kemp, Ernst Munter
Abstract: A reliable method for inter-computer packet transport in multi-process and multi-computer environments includes acknowledgments of received packets. To enhance the reliability and fast recovery of lost packets, a bit-mapped message is used for selective acknowledgments by which individual messages may be selected for retransmission. Further functionalities cover the cases where packets may have been received out-of-order, or an acknowledgment was lost.
Type:
Application
Filed:
June 12, 2007
Publication date:
December 20, 2007
Applicant:
Liquid Computing Corporation
Inventors:
Kaiyuan Huang, Michael F. Kemp, Ernst Munter
Abstract: A system and method for defining and enforcing a security policy. Security mechanism application specific information for each security mechanism is encapsulated as a key and exported to a semantic layer. Keys are combined to form key chains within the semantic layer. The key chains are in turn encapsulated as keys and passed to another semantic layer. A security policy is defined by forming key chains from keys and associating users with the key chains. The security policy is translated and exported to the security mechanisms. The security policy is then enforced via the security mechanisms.
Type:
Grant
Filed:
January 14, 2000
Date of Patent:
December 11, 2007
Assignee:
Secure Computing Corporation
Inventors:
Daniel Jay Thomsen, Richard O'Brien, Jessica Bogle, Charles Payne
Abstract: Systems and methods for an associative policy model are provided. One embodiment of the present invention provides a method for implementing an associative policy. In this embodiment, the method includes providing a policy on a policy server, the policy having a service definition that contains first and second relational components, providing first and second network entities, operatively coupling the first and second network entities to the policy server, dynamically associating the first network entity with the second network entity (wherein such associating includes binding the first relational component of the service definition in the policy to the first network entity, and binding the second relational component of the service definition in the policy to the second network entity), and enforcing the policy on the first and second network entities.
Type:
Grant
Filed:
October 28, 2002
Date of Patent:
December 11, 2007
Assignee:
Secure Computing Corporation
Inventors:
Thomas R. Markham, Jessica J. Bogle, Charles N. Payne, Jr.
Abstract: Embodiments of the present invention include enhanced functionalities and components within a Communication Endpoint Processor (CEP) that act as an interface between computational and communications domains. The embodiments disclosed herein deliver a complete memory mapped high performance interface that has the ability to support the simultaneous transmission of multiple frames of multiple sizes, and that has the ability to interrupt the transmission of lower priority frames in order to send higher priority frames.
Abstract: A computer system capable of detecting an identification (ID) of a peripheral device connected thereto includes a connection circuit having a peripheral interface connectable to the peripheral device and a data transmission interface for data transmission between the peripheral device and a CPU of the computer system, a detect circuit connected to the connection circuit and a DC voltage source of the computer system, and a convert unit. The detect circuit has an output terminal set and a plurality of resistors having resistances for producing a specific DC potential divided by the DC voltage source at the output terminal set. The convert unit is coupled to the output terminal set and the CPU for converting the specific DC potential at the output terminal set into a digital signal corresponding to the ID of the peripheral device for output to the CPU.
Abstract: A novel NPBL and ANPL light emitting semiconductor device and a method for fabricating the same are provided. In the present invention, plural nano-particles are applied in the active layer of the light emitting semiconductor device, so that the leakage current thereof is reduced. In addition, the provided light emitting semiconductor device fabricated via a planar technology process is microscopically planar, but not planar at micro- and nano-scale. Hence the parasitic wave guiding effect, which suppresses the light extraction efficiency of the light emitting semiconductor device, is destroyed thereby.
Type:
Grant
Filed:
June 10, 2005
Date of Patent:
September 4, 2007
Assignee:
Arima Computer Corporation
Inventors:
Stephen Lee, Yury Georgievich Shreter, Yury Toomasovich Rebane, Ruslan Ivanovich Gorbunov