Patents Assigned to Sun Microsystems, Inc.
-
Publication number: 20110106981Abstract: The described embodiments provide a system for accessing values for configuration space registers (CSRs). This system includes a CSR data storage mechanism with an address input and a CSR data output. The CSR data storage mechanism includes a memory containing a number of memory locations for storing the true or actual values for CSRs for functions for corresponding devices. In these embodiments, the memory locations are divided into at least one shared region and at least one unique region. In these embodiments, in response to receiving an address for a memory location on the address input, the CSR data storage mechanism accesses the value for the CSR in the memory location in a corresponding shared region or unique region.Type: ApplicationFiled: November 3, 2009Publication date: May 5, 2011Applicant: SUN MICROSYSTEMS, INC.Inventors: John E. Watkins, Elisa Rodrigues
-
Publication number: 20110107050Abstract: Methods and apparatus are provided for adaptively triggering garbage collection. During relatively steady or decreasing rates of allocation of free memory, a threshold for triggering garbage collection is dynamically and adaptively determined on the basis of memory drops (i.e., decreases in free memory) during garbage collection. If a significant increase in the rate of allocation of memory is observed (e.g., two consecutive measurements that exceed a mean rate plus two standard deviations), the threshold is modified based on a memory drop previously observed in conjunction with the current memory allocation rate, or a memory drop estimated to be possible for the current allocation rate.Type: ApplicationFiled: November 5, 2009Publication date: May 5, 2011Applicant: SUN MICROSYSTEMS, INC.Inventor: David Vengerov
-
Publication number: 20110107023Abstract: A system and method for automatically linking partitions on storage media for use within a storage management system is provided to minimize wasted space on the storage media, the time and expense traditionally spent reclaiming partitions containing invalid data, and the computer processing capability required to write data to and read data from the storage media. The storage management system includes a partitioned storage tape, a host application running on a server, and an archive device. The host application is operative to track location information for each host file or data object written to the storage tape. Using the location information, the host application is able to identify one or more “free” or writable partitions that are created on the storage tape as host files expire.Type: ApplicationFiled: October 29, 2009Publication date: May 5, 2011Applicant: SUN MICROSYSTEMS, INC.Inventors: Ryan P. McCallister, David Howard
-
Publication number: 20110107187Abstract: An LDPC coding system includes a number of LDPC encoders and a number of LDPC decoders. The number of encoders/decoders is between one and one fewer than the total number of tracks on the high density tape are provided. The LDPC encoders are operable to break data from an incoming data sector into the data blocks to be written to the high density tape. The LDPC decoders are operable to assemble the data blocks into data sectors.Type: ApplicationFiled: November 3, 2009Publication date: May 5, 2011Applicant: SUN MICROSYSTEMS, INC.Inventors: Richard A. Gill, Jin Lu
-
Publication number: 20110107289Abstract: A method and system of merging gated-clock domains in a semiconductor design includes producing, for each subset of clock gating functions in an initial set of clock gating functions, a set of quantified functions produced by existentially quantifying each clock gating function in the subset over a set of variables that are not part of the support sets of the other clock gating functions of the subset. If the set of quantified functions are equal, selecting one as a super clock gating function and adding it to the set of super clock gating functions. The set of super clock gating functions are sorted according to a criterion and the best is selected and added to the set of final clock gating functions. The remaining super clock gating functions are modified to prevent flip-flops gated by the selected super clock gating function from being gated by remaining super clock gating functions.Type: ApplicationFiled: October 30, 2009Publication date: May 5, 2011Applicant: SUN MICROSYSTEMS, INC.Inventors: Aravind Oommen, Hemanga Das, Krishnan Sundaresan
-
Publication number: 20110101833Abstract: A storage rack for supporting a server chassis in a storage cabinet. The storage rack includes front and rear vertical support members and one or more rack mount kits for slidably supporting one or more computing devices (e.g., servers). Each rack mount kit may include a pair of rail assemblies, each rail assembly including outer, middle and inner rail assemblies. The outer rail assembly may include first and second outer rail members that are slidable relative to each other and one or more locking mechanisms that may be operable to selectively limit sliding or translation of the first and second outer rail members relative to each other. In one arrangement, a locking mechanism may include a ratchet assembly that may allow the first and second outer rail members to slide in a first direction when the locking mechanism is engaged and in the first direction and an opposite second direction when the locking mechanism is released.Type: ApplicationFiled: October 30, 2009Publication date: May 5, 2011Applicant: SUN MICROSYSTEMS, INC.Inventors: Timothy W. Olesiewicz, Brett C. Ong
-
Publication number: 20110102190Abstract: Some embodiments provide a system that analyzes telemetry data from a computer system. During operation, the system obtains the telemetry data as a set of telemetric signals from the computer system and validates the telemetric signals using a nonlinear, nonparametric regression technique. Next, the system assesses the integrity of a power supply unit (PSU) in the computer system by comparing the telemetric signals to one or more reference telemetric signals associated with the computer system. If the assessed integrity falls below a threshold, the system performs a remedial action for the computer system.Type: ApplicationFiled: November 2, 2009Publication date: May 5, 2011Applicant: SUN MICROSYSTEMS, INC.Inventors: Kalyanaraman Vaidyanathan, Kenny C. Gross
-
Publication number: 20110099200Abstract: A data sharing method using fingerprinted data objects for sharing data among untrusted network devices. Each peer device is adapted for storing a plurality of data objects, and a fingerprint generator is used to generate a fingerprint for each stored data object available for sharing or for recovery. The fingerprints are stored in a local data store, and a data manager running on one of the computer devices retrieves from another of the computer devices a copy of one of its data objects through the use of the associated fingerprints. The fingerprints include a hash value output from a strong hashing algorithm. The retrieving includes transmitting query messages with the fingerprints of the needed data objects to the networked, peer devices and then verifying the integrity of received data objects by generating a fingerprint of the received data objects that can be compared with the ones provided in the queries.Type: ApplicationFiled: October 28, 2009Publication date: April 28, 2011Applicant: SUN MICROSYSTEMS, INC.Inventors: JOSEPH BLOUNT, CHARLES BINFORD, STACY LEE MAYDEW
-
Publication number: 20110099175Abstract: Various embodiments herein include one or more of systems, methods, software, and/or data structures to implement a “pluperfect” hash function. Generally, a pluperfect hash function is a hash function that maps distinct elements in a set S to distinct hash values H with no collisions (i.e., perfect hash function) and also includes an additional constraint that the hash function does not map other elements outside the set S into the set of distinct hash values H. In some example embodiments, pluperfect hash functions are used to implement a multi-way branch statement in a computer programming language. The implementation may include generating hash values for each of the case labels of the branch statement according to a pluperfect hash function.Type: ApplicationFiled: October 27, 2009Publication date: April 28, 2011Applicant: SUN MICROSYSTEMS, INC.Inventor: Joseph D. Darcy
-
Publication number: 20110099535Abstract: Various embodiments herein include one or more of systems, methods, software, and/or data structures to implement a multi-way branch statement in a computer programming language. The multi-way branch statement may include a plurality of case labels each having a non-primitive data type (e.g., strings) and being associated with a block of code to be executed dependent upon a control variable that also has a non-primitive data type. The implementation may include encoding the case labels for the multi-way branch statement as a binary decision diagram (BDD), such as a zero-suppressed binary decision diagram (ZDD), wherein the control variable for the multi-way branch statement may be compared with the case labels by stepping through the BDD. The BDD may include identifiers that provide information regarding which of the case labels is matched by the control variable, such that an appropriate code block may be executed.Type: ApplicationFiled: October 28, 2009Publication date: April 28, 2011Applicant: SUN MICROSYSTEMS, INC.Inventors: ALEXANDER R. BUCKLEY, JOSEPH D. DARCY
-
Publication number: 20110099154Abstract: A data deduplication method providing direct look up and storage in an instance repository (IR). The method includes receiving a data object and processing the data object to generate a fingerprint that includes a location component, which defines a file location within the IR such as by first using a hash function to create a hash for the data object and parsing the hash value into sub-strings defining sub-directories of the IR. The method includes determining whether the data object is a duplicate by verifying the presence of a file in the IR at the file location. Determining if the data is unique involves performing a system call on the IR providing the location component as the file path. The method includes, when a file is not in the IR, updating the IR to store the data object as a file at the file location defined by the location component.Type: ApplicationFiled: October 22, 2009Publication date: April 28, 2011Applicant: SUN MICROSYSTEMS, INC.Inventors: Stacy Lee Maydew, Scott Cary Hammett, Howard Leslie Freeman
-
Patent number: 7933875Abstract: A distributed file system is disclosed which may include one or more input/output (I/O) nodes and one or more compute nodes. The I/O nodes and the compute nodes may be communicably coupled through an interconnect. Each compute node may include applications to perform specific functions and perform I/O functions through libraries and file system call handlers. The file system call handlers may be capable of providing application programming interfaces (APIs) to facilitate communication between the plurality of I/O nodes and the applications. The file system call handlers may use a message port system to communicate with other compute nodes.Type: GrantFiled: August 24, 2006Date of Patent: April 26, 2011Assignee: Sun Microsystems, Inc.Inventors: Harriet G. Coverston, Anton B. Rang, Brian D. Reitz, Andrew B. Hastings
-
Publication number: 20110090225Abstract: A method for level of detail in a 3D environment application involves establishing a tiered system for processing a graphical object at a distance from a perspective point. The tiered system comprises a first level and a second level, the first level for processing the graphical object at a first range from the perspective point, and the second level for processing the graphical object at a second range from the perspective point. The method also involves determining the distance of the graphical object from the perspective point, assigning, while rendering the graphical object and based on the distance, the graphical object to a corresponding level of the tiered system, and executing a virtual processor assigned to the graphical object. The virtual processor executes every frame when the graphical object is assigned to the first level, less than every frame when assigned to the second level, and displaying the graphical object.Type: ApplicationFiled: October 20, 2009Publication date: April 21, 2011Applicant: SUN MICROSYSTEMS, INC.Inventor: Douglas Clay Twilleager
-
Publication number: 20110090910Abstract: A system and method for providing network connectivity to a host, involving creating a virtual switch on the host, specifying at least one data link attribute of the virtual switch, creating a plurality of virtual network interface cards (VNICs) on the host, associating each of the plurality of VNICs with the virtual switch, and assigning the at least one data link attribute of the virtual switch to each of the plurality of VNICs, where the virtual switch is connected to a physical network interface card (NIC) associated with the host, where each of the plurality of VNICs is associated with a different one of a plurality of execution environments, where the plurality of execution environments is located on the host, and where the plurality of VNICs is located on the host.Type: ApplicationFiled: October 16, 2009Publication date: April 21, 2011Applicant: SUN MICROSYSTEMS, INC.Inventors: Sunay Tripathi, Nicolas G. Droux, Kais Belgaied
-
Publication number: 20110091157Abstract: A multi-chip module (MCM), which includes a three-dimensional (3D) stack of chips that are coupled using optical interconnects, is described. In this MCM, disposed on a first surface of a middle chip in the 3D stack, there are: a first optical coupler, an optical waveguide, which is coupled to the first optical coupler, and a second optical coupler, which is coupled to the optical waveguide. The first optical coupler redirects an optical signal from the optical waveguide to a first direction (which is not in the plane of the first surface), or from the first direction to the optical waveguide. Moreover, the second optical coupler redirects the optical signal from the optical waveguide to a second direction (which is not in the plane of the first surface), or from the second direction to the optical waveguide. Note that an optical path associated with the second direction passes through an opening in a substrate in the middle chip.Type: ApplicationFiled: October 19, 2009Publication date: April 21, 2011Applicant: SUN MICROSYSTEMS, INC.Inventors: Jin Yao, Xuezhe Zheng, Ashok V. Krishnamoorthy, John E. Cunningham
-
Publication number: 20110093251Abstract: In general, the invention relates to a creating a network model on a host. The invention includes: gathering first component properties associated with a first physical network device on a target network; creating a first container using first component properties; determining that a second physical network device is operatively connected to the first physical network device via a physical network link; gathering second component properties associated with the physical network link; creating a first VNIC associated with the first container; determining that at least one virtual network device is executing on the second physical network device; gathering third component properties associated with the at least one virtual network device; creating a second container, wherein the second container is configured using the third component properties; and creating a second VNIC associated with the second container.Type: ApplicationFiled: October 16, 2009Publication date: April 21, 2011Applicant: SUN MICROSYSTEMS, INC.Inventors: Kais Belgaied, Sunay Tripathi, Nicolas G. Droux
-
Publication number: 20110093646Abstract: A method for processing a read request identifying an address. The method includes receiving, at a module including a flash memory and a memory buffer, the read request from a requesting processor, mapping, using a coherence directory controller within the module, the address to a cache line in a cache memory associated with a remote processor, and sending a coherency message from the module to the remote processor to change a state of the cache line in the cache memory. The method further includes receiving, at the module, the cache line from the remote processor, sending, using processor bus and in response to the read request, the cache line to the requesting processor, identifying a requested page stored within the flash memory based on the address, storing a copy of the requested page in the memory buffer, and writing the cache line to the copy of the requested page.Type: ApplicationFiled: October 16, 2009Publication date: April 21, 2011Applicant: SUN MICROSYSTEMS, INC.Inventors: Pranay Koka, Michael Oliver McCracken, Herbert Dewitt Schwetman, JR., Jan Lodewijk Bonebakker
-
Publication number: 20110089540Abstract: A semiconductor die is described. This semiconductor die includes an electro-static discharge (ESD) device with a metal component coupled to an input-output (I/O) pad, and coupled to a ground voltage via a signal line. Moreover, adjacent edges of the metal component and the I/O pad are separated by a spacing that defines an ESD gap. When a field-emission or ionization current flows across the ESD gap, the metal component provides a discharge path to the ground voltage for transient ESD signals. Furthermore, the ESD gap is at least partially enclosed so that there is gas in the ESD gap.Type: ApplicationFiled: October 16, 2009Publication date: April 21, 2011Applicant: SUN MICROSYSTEMS, INC.Inventors: Robert J. Drost, Robert D. Hopkins, Alex Chow
-
Publication number: 20110091035Abstract: A system including a memory; a software interface, operatively connected to the memory, and configured to generate a modified version of a confidentially key (CKey), and a modified version of an integrity key (IKey); and a Kasumi engine having a hardware implementation of a Kasumi cipher and configured to load the modified version of the CKey from the memory to perform a confidentiality function, and to load the modified version of the IKey from memory to perform an integrity function.Type: ApplicationFiled: October 20, 2009Publication date: April 21, 2011Applicant: SUN MICROSYSTEMS, INC.Inventors: Lawrence Spracklen, Farnad Sajjadian, Christopher H. Olson, Sanjay Patel
-
Publication number: 20110093721Abstract: Some embodiments provide systems and techniques for performing parameterizable cryptography. An encryption key can be determined based at least on a string associated with an authorization policy. The encryption key can then be used to encrypt information. The decryption key can also be determined based at least on the string associated with the authorization policy. Note that the authorization policy must be satisfied to decrypt information. In some embodiments, the systems and techniques for performing parameterizable cryptography are blindable. These blindable embodiments can be used to preserve privacy.Type: ApplicationFiled: October 20, 2009Publication date: April 21, 2011Applicant: SUN MICROSYSTEMS, INC.Inventor: Radia J. Perlman