Patents Assigned to Sun Microsystem, Inc.
-
Publication number: 20110102190Abstract: Some embodiments provide a system that analyzes telemetry data from a computer system. During operation, the system obtains the telemetry data as a set of telemetric signals from the computer system and validates the telemetric signals using a nonlinear, nonparametric regression technique. Next, the system assesses the integrity of a power supply unit (PSU) in the computer system by comparing the telemetric signals to one or more reference telemetric signals associated with the computer system. If the assessed integrity falls below a threshold, the system performs a remedial action for the computer system.Type: ApplicationFiled: November 2, 2009Publication date: May 5, 2011Applicant: SUN MICROSYSTEMS, INC.Inventors: Kalyanaraman Vaidyanathan, Kenny C. Gross
-
Publication number: 20110107050Abstract: Methods and apparatus are provided for adaptively triggering garbage collection. During relatively steady or decreasing rates of allocation of free memory, a threshold for triggering garbage collection is dynamically and adaptively determined on the basis of memory drops (i.e., decreases in free memory) during garbage collection. If a significant increase in the rate of allocation of memory is observed (e.g., two consecutive measurements that exceed a mean rate plus two standard deviations), the threshold is modified based on a memory drop previously observed in conjunction with the current memory allocation rate, or a memory drop estimated to be possible for the current allocation rate.Type: ApplicationFiled: November 5, 2009Publication date: May 5, 2011Applicant: SUN MICROSYSTEMS, INC.Inventor: David Vengerov
-
Publication number: 20110107187Abstract: An LDPC coding system includes a number of LDPC encoders and a number of LDPC decoders. The number of encoders/decoders is between one and one fewer than the total number of tracks on the high density tape are provided. The LDPC encoders are operable to break data from an incoming data sector into the data blocks to be written to the high density tape. The LDPC decoders are operable to assemble the data blocks into data sectors.Type: ApplicationFiled: November 3, 2009Publication date: May 5, 2011Applicant: SUN MICROSYSTEMS, INC.Inventors: Richard A. Gill, Jin Lu
-
Publication number: 20110103397Abstract: A method for arbitration in an arbitration domain. The method includes: receiving, by each node of a plurality of nodes in the arbitration domain, an arbitration request from each sending node of the plurality of nodes in the arbitration domain, where the plurality of nodes in the arbitration domain each use a shared data channel to send data to a set of receiving nodes; assigning, by each node in the arbitration domain, consecutive time slots to each sending node based on a plurality of priorities assigned to the plurality of nodes in the arbitration domain; for each time slot: sending, from the arbitration domain, a switch request to a receiving node designated by the sending node, where the receiving node is in the set of receiving nodes; and sending, by the sending node, data to the receiving node via the shared data channel during the time slot.Type: ApplicationFiled: October 30, 2009Publication date: May 5, 2011Applicant: SUN MICROSYSTEMS, INC.Inventors: Pranay Koka, Michael Oliver McCracken, Herbert DeWitt Schwetman, JR., Xuezhe Zheng, Ashok Krishnamoorthy
-
Publication number: 20110107289Abstract: A method and system of merging gated-clock domains in a semiconductor design includes producing, for each subset of clock gating functions in an initial set of clock gating functions, a set of quantified functions produced by existentially quantifying each clock gating function in the subset over a set of variables that are not part of the support sets of the other clock gating functions of the subset. If the set of quantified functions are equal, selecting one as a super clock gating function and adding it to the set of super clock gating functions. The set of super clock gating functions are sorted according to a criterion and the best is selected and added to the set of final clock gating functions. The remaining super clock gating functions are modified to prevent flip-flops gated by the selected super clock gating function from being gated by remaining super clock gating functions.Type: ApplicationFiled: October 30, 2009Publication date: May 5, 2011Applicant: SUN MICROSYSTEMS, INC.Inventors: Aravind Oommen, Hemanga Das, Krishnan Sundaresan
-
Extraction of Component Models from PCB Channel Scattering Parameter Data by Stochastic Optimization
Publication number: 20110107292Abstract: Various embodiments herein include one or more of systems, methods, software, and/or data structures to extract models of components (e.g., vias and traces) for PCB channels from measurements (or simulations) taken from physical PCB channels. By applying stochastic optimization to measurements of two PCB channels having different channel lengths, s-matrices (e.g., two-port, four-port, and the like) of the components of a PCB channel may be accurately determined by searching the multi-dimensional parameter space for parameters that comply with the measured values. Once the models for the components have been accurately determined, they may be utilized in constructing a model library that includes component models and is based on physical measurement data.Type: ApplicationFiled: October 29, 2009Publication date: May 5, 2011Applicant: SUN MICROSYSTEMS, INC.Inventors: Juyoung Lee, Drew G. Doblar -
Publication number: 20110106748Abstract: A method for computing power consumption includes querying a software database for a key node and a gate comprising an input port, connected to the key node, and an output port. The software database is created from a net list associated with a design. The method includes calculating a probability of activity level at the output port based on a predetermined activity level at the key node, and querying the software database for next gate comprising a next input port, connected to the previous output port, and a next output port. The method includes calculating a probability of activity level at the next output port based on the probability of activity level at the previous output port. The method includes computing a sub-circuit gate power by sum of power of all the gates based on the probability of activity level at output ports of the gates.Type: ApplicationFiled: October 30, 2009Publication date: May 5, 2011Applicant: SUN MICROSYSTEMS, INC.Inventors: Krishnan Sundaresan, Wei-Lun Hung, Jaewon Oh, Robert E. Mains
-
Publication number: 20110099154Abstract: A data deduplication method providing direct look up and storage in an instance repository (IR). The method includes receiving a data object and processing the data object to generate a fingerprint that includes a location component, which defines a file location within the IR such as by first using a hash function to create a hash for the data object and parsing the hash value into sub-strings defining sub-directories of the IR. The method includes determining whether the data object is a duplicate by verifying the presence of a file in the IR at the file location. Determining if the data is unique involves performing a system call on the IR providing the location component as the file path. The method includes, when a file is not in the IR, updating the IR to store the data object as a file at the file location defined by the location component.Type: ApplicationFiled: October 22, 2009Publication date: April 28, 2011Applicant: SUN MICROSYSTEMS, INC.Inventors: Stacy Lee Maydew, Scott Cary Hammett, Howard Leslie Freeman
-
Publication number: 20110099200Abstract: A data sharing method using fingerprinted data objects for sharing data among untrusted network devices. Each peer device is adapted for storing a plurality of data objects, and a fingerprint generator is used to generate a fingerprint for each stored data object available for sharing or for recovery. The fingerprints are stored in a local data store, and a data manager running on one of the computer devices retrieves from another of the computer devices a copy of one of its data objects through the use of the associated fingerprints. The fingerprints include a hash value output from a strong hashing algorithm. The retrieving includes transmitting query messages with the fingerprints of the needed data objects to the networked, peer devices and then verifying the integrity of received data objects by generating a fingerprint of the received data objects that can be compared with the ones provided in the queries.Type: ApplicationFiled: October 28, 2009Publication date: April 28, 2011Applicant: SUN MICROSYSTEMS, INC.Inventors: JOSEPH BLOUNT, CHARLES BINFORD, STACY LEE MAYDEW
-
Publication number: 20110099175Abstract: Various embodiments herein include one or more of systems, methods, software, and/or data structures to implement a “pluperfect” hash function. Generally, a pluperfect hash function is a hash function that maps distinct elements in a set S to distinct hash values H with no collisions (i.e., perfect hash function) and also includes an additional constraint that the hash function does not map other elements outside the set S into the set of distinct hash values H. In some example embodiments, pluperfect hash functions are used to implement a multi-way branch statement in a computer programming language. The implementation may include generating hash values for each of the case labels of the branch statement according to a pluperfect hash function.Type: ApplicationFiled: October 27, 2009Publication date: April 28, 2011Applicant: SUN MICROSYSTEMS, INC.Inventor: Joseph D. Darcy
-
Publication number: 20110099535Abstract: Various embodiments herein include one or more of systems, methods, software, and/or data structures to implement a multi-way branch statement in a computer programming language. The multi-way branch statement may include a plurality of case labels each having a non-primitive data type (e.g., strings) and being associated with a block of code to be executed dependent upon a control variable that also has a non-primitive data type. The implementation may include encoding the case labels for the multi-way branch statement as a binary decision diagram (BDD), such as a zero-suppressed binary decision diagram (ZDD), wherein the control variable for the multi-way branch statement may be compared with the case labels by stepping through the BDD. The BDD may include identifiers that provide information regarding which of the case labels is matched by the control variable, such that an appropriate code block may be executed.Type: ApplicationFiled: October 28, 2009Publication date: April 28, 2011Applicant: SUN MICROSYSTEMS, INC.Inventors: ALEXANDER R. BUCKLEY, JOSEPH D. DARCY
-
Patent number: 7933875Abstract: A distributed file system is disclosed which may include one or more input/output (I/O) nodes and one or more compute nodes. The I/O nodes and the compute nodes may be communicably coupled through an interconnect. Each compute node may include applications to perform specific functions and perform I/O functions through libraries and file system call handlers. The file system call handlers may be capable of providing application programming interfaces (APIs) to facilitate communication between the plurality of I/O nodes and the applications. The file system call handlers may use a message port system to communicate with other compute nodes.Type: GrantFiled: August 24, 2006Date of Patent: April 26, 2011Assignee: Sun Microsystems, Inc.Inventors: Harriet G. Coverston, Anton B. Rang, Brian D. Reitz, Andrew B. Hastings
-
Publication number: 20110093731Abstract: Implementations of the present invention may involve methods and systems to improve the combined power consumption and thermal response of individual components of a computer system as the components are stressed concurrently during simulation or testing of the system. A group of operating system-level instruction sets for several individual components of the computer system may be designed to stress the components and executed concurrently while power and thermal measurements are taken. The instruction sets may utilize one or more software threads of the computer system or hardware threads such that minimal interference between components occurs as the system is tested. Further, the system components may be partitioned between separate instruction sets. By minimizing the interference between the components while the system is operating, a more accurate power consumption and thermal effect measurements may be taken on the computer system to better approximate the performance of the system.Type: ApplicationFiled: October 16, 2009Publication date: April 21, 2011Applicant: Sun Microsystems, Inc.Inventors: Alok Parikh, Amandeep Singh
-
Publication number: 20110090910Abstract: A system and method for providing network connectivity to a host, involving creating a virtual switch on the host, specifying at least one data link attribute of the virtual switch, creating a plurality of virtual network interface cards (VNICs) on the host, associating each of the plurality of VNICs with the virtual switch, and assigning the at least one data link attribute of the virtual switch to each of the plurality of VNICs, where the virtual switch is connected to a physical network interface card (NIC) associated with the host, where each of the plurality of VNICs is associated with a different one of a plurality of execution environments, where the plurality of execution environments is located on the host, and where the plurality of VNICs is located on the host.Type: ApplicationFiled: October 16, 2009Publication date: April 21, 2011Applicant: SUN MICROSYSTEMS, INC.Inventors: Sunay Tripathi, Nicolas G. Droux, Kais Belgaied
-
Publication number: 20110093251Abstract: In general, the invention relates to a creating a network model on a host. The invention includes: gathering first component properties associated with a first physical network device on a target network; creating a first container using first component properties; determining that a second physical network device is operatively connected to the first physical network device via a physical network link; gathering second component properties associated with the physical network link; creating a first VNIC associated with the first container; determining that at least one virtual network device is executing on the second physical network device; gathering third component properties associated with the at least one virtual network device; creating a second container, wherein the second container is configured using the third component properties; and creating a second VNIC associated with the second container.Type: ApplicationFiled: October 16, 2009Publication date: April 21, 2011Applicant: SUN MICROSYSTEMS, INC.Inventors: Kais Belgaied, Sunay Tripathi, Nicolas G. Droux
-
Publication number: 20110090915Abstract: A system including first and second virtualized execution environments and a hypervisor for sending packets between virtualized execution environments. The first virtualized execution environment includes a first VNIC associated with a first hardware address (HA), a first proxy VNIC associated with a second HA, and a virtual switch. A Vswitch table for the virtual switch includes entries associating the first HA with the first VNIC and the second HA with the first proxy VNIC. The second virtualized execution environment includes a second proxy VNIC associated with the first HA. The virtual switch receives a first packet associated with the second HA. The virtual switch sends the first packet to the first proxy VNIC when Vswitch table entry associates the second HA with the first proxy VNIC. The first VNIC proxy sends the first packet from the first virtualized execution environment to the second virtualized execution environment using the hypervisor.Type: ApplicationFiled: October 16, 2009Publication date: April 21, 2011Applicant: SUN MICROSYSTEMS, INC.Inventors: Nicolas G. Droux, Sunay Tripathi
-
Publication number: 20110093721Abstract: Some embodiments provide systems and techniques for performing parameterizable cryptography. An encryption key can be determined based at least on a string associated with an authorization policy. The encryption key can then be used to encrypt information. The decryption key can also be determined based at least on the string associated with the authorization policy. Note that the authorization policy must be satisfied to decrypt information. In some embodiments, the systems and techniques for performing parameterizable cryptography are blindable. These blindable embodiments can be used to preserve privacy.Type: ApplicationFiled: October 20, 2009Publication date: April 21, 2011Applicant: SUN MICROSYSTEMS, INC.Inventor: Radia J. Perlman
-
Publication number: 20110093646Abstract: A method for processing a read request identifying an address. The method includes receiving, at a module including a flash memory and a memory buffer, the read request from a requesting processor, mapping, using a coherence directory controller within the module, the address to a cache line in a cache memory associated with a remote processor, and sending a coherency message from the module to the remote processor to change a state of the cache line in the cache memory. The method further includes receiving, at the module, the cache line from the remote processor, sending, using processor bus and in response to the read request, the cache line to the requesting processor, identifying a requested page stored within the flash memory based on the address, storing a copy of the requested page in the memory buffer, and writing the cache line to the copy of the requested page.Type: ApplicationFiled: October 16, 2009Publication date: April 21, 2011Applicant: SUN MICROSYSTEMS, INC.Inventors: Pranay Koka, Michael Oliver McCracken, Herbert Dewitt Schwetman, JR., Jan Lodewijk Bonebakker
-
Publication number: 20110091035Abstract: A system including a memory; a software interface, operatively connected to the memory, and configured to generate a modified version of a confidentially key (CKey), and a modified version of an integrity key (IKey); and a Kasumi engine having a hardware implementation of a Kasumi cipher and configured to load the modified version of the CKey from the memory to perform a confidentiality function, and to load the modified version of the IKey from memory to perform an integrity function.Type: ApplicationFiled: October 20, 2009Publication date: April 21, 2011Applicant: SUN MICROSYSTEMS, INC.Inventors: Lawrence Spracklen, Farnad Sajjadian, Christopher H. Olson, Sanjay Patel
-
Publication number: 20110091157Abstract: A multi-chip module (MCM), which includes a three-dimensional (3D) stack of chips that are coupled using optical interconnects, is described. In this MCM, disposed on a first surface of a middle chip in the 3D stack, there are: a first optical coupler, an optical waveguide, which is coupled to the first optical coupler, and a second optical coupler, which is coupled to the optical waveguide. The first optical coupler redirects an optical signal from the optical waveguide to a first direction (which is not in the plane of the first surface), or from the first direction to the optical waveguide. Moreover, the second optical coupler redirects the optical signal from the optical waveguide to a second direction (which is not in the plane of the first surface), or from the second direction to the optical waveguide. Note that an optical path associated with the second direction passes through an opening in a substrate in the middle chip.Type: ApplicationFiled: October 19, 2009Publication date: April 21, 2011Applicant: SUN MICROSYSTEMS, INC.Inventors: Jin Yao, Xuezhe Zheng, Ashok V. Krishnamoorthy, John E. Cunningham