Abstract: An electronics module comprises a housing; and a plurality of electronic and electrical components for example fans. The module includes electromagnetic shielding for example perforated panels side walls etc. that is associated with the housing and/or the electronic components, and which provides a Faraday cage for the electronic components. The shielding is constructed so that one or more of the components can be removed from the module while the module is in operation substantially without affecting the integrity of the Faraday cage. The module enables certain components thereof to be replaced without adding to the downtime of the system or increasing electromagnetic interference.
Abstract: A method and apparatus for shifting a dynamic circuit, driven by a one-shot clock, to a pre-charge mode, during a power-off mode, is provided. Under certain conditions, a floating node may be present in a dynamic circuit. One approach to prevent floating nodes involves the generation of a new one-shot clock signal that is supplied to the last dynamic circuit in the series of dynamic circuits before the output flop (“the final dynamic circuit”). The new one-shot clock signal is driven to a logical low value when the power-off signal has a logical high value. Another approach to prevent floating nodes involves modifying the final dynamic circuit to include a structure that, when the power-off signal has a logical high value, drives the dynamic node to either a logical high value or a logical low value to prevent the dynamic node from becoming a floating node.
Abstract: A technique for offsetting an orientation of signal lines in a printed circuit board involves rotating the printed circuit board prior to or as the signal lines are fabricated in the printed circuit board. Such offsetting results in a printed circuit board in which the signal lines are not orthogonal with an arrangement of woven glass fibers formed in the printed circuit board.
Abstract: In a computer network system, a command line interface system is described having a text-based browser for browsing details of host devices coupled to the network. The command line interface system data includes logic to monitor and manage network devices by allowing a user to traverse the network using text-based commands to view hierarchy and topology information of the network and the hosts. The command line interface browsing system advantageously ensures a command status state change in one hierarchy level of the host device being browsed is retained and communicated to other hierarchy levels as the user browses the network.
Abstract: Disclosed are apparatus and methods for controlling execution of a target software component within an isolated execution unit. In general terms, an intermediary software component is introduced within the isolated execution unit. This intermediary component program can initialize the isolated execution unit, and then start a target software component within the isolated execution unit. The intermediary component also establishes communication back to the parent (e.g., using an inter isolation communication). The intermediary component communicates with the target software component using the target component's unchanged API and mediates the communication back to the parent using the established inter isolation communication.
Abstract: Disclosed is a method and circuit for generating an average binary code from at least two input binary codes. The circuit may be employed in an integrated circuit having first and second circuits for generating binary codes am-1:0 and bm-1:0, respectively. In one embodiment, the circuit asynchronously generates a binary code cm-1:0 representing an average of the binary codes am-1:0 and bm-1:0 generated by the first and second circuits, respectively.
Abstract: A method for conveying a security context, including creating and assigning a virtual address to a client process, issuing a first Internet Protocol version compliant packet wherein the first Internet Protocol version compliant packet comprises a security context, prepending an issued packet with a second Internet Protocol version header producing a second Internet Protocol version compliant packet, forwarding the second Internet Protocol version compliant packet to a recipient, stripping away the second Internet Protocol version compliant header from the second Internet Protocol version compliant packet producing a stripped packet at the recipient, decrypting and authenticating the stripped packet using a particular method as indicated by the security context producing a decrypted and authenticated packet, and routing the decrypted and authenticated packet to a recipient process using the virtual address.
Abstract: Solutions to a value recycling problem that we define herein facilitate implementations of computer programs that may execute as multithreaded computations in multiprocessor computers, as well as implementations of related shared data structures. Some exploitations of the techniques described herein allow non-blocking, shared data structures to be implemented using standard dynamic allocation mechanisms (such as malloc and free). A variety of solutions to the proposed value recycling problem may be implemented. A class of general solutions to value recycling is described in the context of an illustration we call the Repeat Offender Problem (ROP), including illustrative Application Program Interfaces (APIs) defined in terms of the ROP terminology. Furthermore, specific solutions, implementations and algorithm, including a Pass-The-Buck (PTB) implementation are also described. Solutions to the value recycling problem can be applied in a variety of ways to implement dynamic-sized data structures.
Type:
Grant
Filed:
January 10, 2003
Date of Patent:
August 7, 2007
Assignee:
Sun Microsystems, Inc.
Inventors:
Mark S. Moir, Victor Luchangco, Maurice Herlihy
Abstract: Embodiments of a system and method for using mobile agents for managing distribution of content in peer-to-peer networks. An initiating peer node may launch a mobile agent including an itinerary of a group of peer nodes configured to receive and share content from a distributor. The mobile agent may visit the peer nodes on the itinerary to search for and collect information on distributor content stored on the visited peer nodes. The mobile agent may return the payload to the initiating peer node after completing the itinerary. In one embodiment, the mobile agent may include authentication information, and each visited peer node may access the authentication information to verify the mobile agent as authorized by the distributor. The initiating peer node may examine the information provided by the mobile agent to detect unauthorized copies of the distributor content.
Abstract: An apparatus and method for controlling and providing a robust, single entry cache memory is described in connection with an on-board cache memory integrated with a microprocessor. By implementing the single entry cache memory in a redundancy array of the cache memory, CPU debug procedures may proceed independently of the cache debug by disabling part of the cache memory and enabling a dedicated single entry cache in the redundancy array. Use of a cache redundancy array for the single entry cache imposes no area or latency penalties because the existing cache redundancy array already matches the latency of the cache.
Abstract: A system and method for cooling electronic components. The system includes a surface. One or more electronic components are coupled to the surface, the one or more electronic components including an integrated circuit in contact with a heat sink. A blower is coupled to the surface, the blower having a first port, a second port, and an impeller that rotates around an axis. The blower is oriented such that the axis is perpendicular to the surface and non-intersecting with the heat sink, wherein the blower moves air across the heat sink.
Type:
Grant
Filed:
November 27, 2001
Date of Patent:
August 7, 2007
Assignee:
Sun Microsystems, Inc.
Inventors:
Shlomo Novotny, Arthur S. Rousmaniere, Marlin Vogel
Abstract: A computer network may include one or more systems coupled to many components. The computer network may be a storage network that includes one or more systems connected to one or more storage systems. One or more components coupled to the computer network may be modular components such as field replaceable units (FRUs). A component may include a non-volatile memory that stores a value for an operational parameter of the component. The value for the operational parameter may specify an operating condition for the component. A monitor may be coupled to the component and may be configured to access the operational parameter value on the nonvolatile memory to determine if the component is operating outside of the specified operating condition.
Type:
Grant
Filed:
October 16, 2002
Date of Patent:
August 7, 2007
Assignee:
Sun Microsystems, Inc.
Inventors:
Seth J. Abrahams, Brian D. Osterhout, Michel M. Nguyen
Abstract: A method for optimizing low threshold-voltage (Vt) devices in an integrated circuit design. The method includes identifying paths and nodes within the integrated circuit design, determining node overlap within the integrated circuit design, calculating possible solutions for addressing timing violations within the integrated circuit design, choosing a solution for addressing timing violations, inserting low Vt devices at particular nodes of the integrated circuit design, and repeating the calculated possible solutions wherein choosing a solution and inserting low Vt devices at particular nodes to address timing violations within the integrated circuit design.
Abstract: The present invention provides a method and apparatus for defining verbs and adverbs. The method includes creating at least one of a verb and adverb, wherein the at least one of a verb and adverb are adapted to form sequences and the sequences are adapted to create errors in a system. The method further includes defining attributes of the at least one of a verb and adverb.
Abstract: A method for dynamic application tracing in virtual machine environments comprises receiving an instrumentation request that includes an identification of a probe point at which instrumentation code is to be inserted within an application. The method may further comprise making a determination whether the instrumentation code meets one or more acceptance criteria. If the instrumentation code is found to be acceptable, the method may further comprise inserting the instrumentation code at the probe point within the application while the application is executing within a virtual machine, and obtaining information indicative of application state from an execution of the instrumentation code when the probe point is reached during application execution.
Abstract: An audio management apparatus manages simultaneous streams of packet-switched audio data for a network conference tool, and allows the combining of conferences that are not co-located. The apparatus uses at least two audio bridges, each of which receives audio inputs from a plurality of local connection points, does mixing of the audio data for each local connection-point and provides the audio outputs thereto. Also provided is a communications link between the two audio bridges, and each of the audio bridges creates an audio mix from its local connection points and outputs it over the communications link to the other audio bridge. Each bridge may treat the audio data from the other audio bridge as it does any other call. In this way, the combining of the two conferences is accomplished in a simple and straightforward manner.
Abstract: In some circumstances a generational garbage collector may be made more efficient by “pre-tenuring” objects or directly allocating new objects in an old generation instead of allocating them in the normal fashion in a young generation. A pre-tenuring decision is made by a two step process. In the first step, during a young-generation collection, an execution frequency is determined for each allocation site and sites with the highest execution frequency are selected as candidate sites. In the second step, during a subsequent young-generation collection, the survival rates are determined for the candidate sites. After this, objects allocated from sites with sufficiently high survival rates are allocated directly in the old generation.
Type:
Application
Filed:
January 27, 2006
Publication date:
August 2, 2007
Applicant:
Sun Microsystems, Inc.
Inventors:
Antonios Printezis, David Detlefs, Fabio Rojas
Abstract: A method and system are provided for reporting a status from a first node in a network to a second node in the network. The first node maintains a first value and a second value, both of which represent some status at the first node. When this status is modified, the first value is updated in accordance with the modified status. Once this has been done, a transmission is sent indicating the updated first value from the first node to the second node. The second node maintains a third value that also represents the status at the first node. Therefore, when the second node receives the transmission from the first node indicating the updated first value, it updates this third value in accordance with the updated first value. It then sends a confirmation back to the first node. Once this confirmation has been received at the first node, the second value is updated in accordance with the updated status. In this way, the third value mirrors the first value, and the second value mirrors the third value.
Abstract: A mechanism may couple an electrical assembly with circuit boards in a computer system. The mechanism may include injectors on the electrical assembly and a receptacle on each of the circuit boards. The injectors may engage the receptacles to couple header connector parts on the electrical assembly with receptacle connector parts on the receptacles. The electrical assembly may include a latch device that holds the injectors in a closed position after injection of the electrical assembly.
Abstract: For validating user input fields in a graphical user interface, a data entry field includes a graphical validation indicator. In response to user activation of the validation indicator, such as by hovering with an on-screen pointer, a message is displayed in visual association with the data entry field. The message describes one or more expected characteristics of the data to be entered, for example that the data is numerical. As the user enters data consistent with the expected characteristics, the validation indicator is displayed with a neutral appearance, indicating that no errors have been detected. If incorrect data is detected, the validation indicator takes on an emphasized appearance, such as a higher intensity and/or an error-indicating color such as red, providing an immediate error indication to the user. An error message may also be displayed in visual association with the data entry field.
Type:
Grant
Filed:
June 22, 2004
Date of Patent:
July 31, 2007
Assignee:
SUN Microsystems, Inc.
Inventors:
Michael C. Albers, Anne M. Fowler, Suzanna L. Smith