Patents Assigned to Sun Microsystems
-
Patent number: 8001122Abstract: A resource analyzer selects a resource (e.g., document) from a grouping of resources. The grouping of resources can be any type of social tagging system used for information retrieval. The selected resource has an assigned uncontrolled tag and an assigned controlled tag. The controlled tag is a term derived from a controlled vocabulary of terms. Having selected the resource for analyzing, the resource analyzer identifies a first set of resources in the grouping of resources having also been assigned a same value as the uncontrolled tag as the selected resource. Similarly, the resource analyzer identifies a second set of resources in the grouping of resources having also been assigned a same value as the controlled tag. With this information, the resource analyzer then produces a comparison result indicative of a similarity between the first set of resources and the second set of resources.Type: GrantFiled: December 12, 2007Date of Patent: August 16, 2011Assignee: Sun Microsystems, Inc.Inventors: Stephen Joseph Green, Jeffrey H. Alexander, Bernard Horan
-
SYSTEM AND METHOD FOR PROVIDING SENSOR DATA FROM EMBEDDED DEVICE TO SOFTWARE DEVELOPMENT ENVIRONMENT
Publication number: 20110191787Abstract: A system and method for providing device data for use in developing application software for a microprocessor-based embedded device having at least one physical sensor using a software development environment include an agent executing on the target embedded device and a connectivity module executing within the software development environment to communicate sensor data from the embedded device to the software development environment. In one embodiment, the target device is a mobile phone that provides sensor data from an integrated physical sensor to a development computer executing mobile phone software within the development environment using the same API's within the development environment as used on the embedded device.Type: ApplicationFiled: February 2, 2010Publication date: August 4, 2011Applicant: SUN MICROSYSTEMS, INC.Inventors: Oren Poleg, Omer Pomerantz -
Publication number: 20110191508Abstract: A method for queuing thread update buffers to enhance garbage collection. The method includes providing a global update buffer queue and a global array with slots for storing pointers to filled update buffers. The method includes with an application thread writing to the update buffer and, when filled, attempting to write the pointer for the update buffer to the global array. The array slot may be selected randomly or by use of a hash function. When the writing fails due to a non-null slot, the method includes operating the application thread to add the filled update buffer to the global update buffer queue. The method includes, with a garbage collector thread, inspecting the global array for non-null entries and, upon locating a pointer, claiming the filled update buffer. The method includes using the garbage collector thread to claim and process buffers added to the global update buffer queue.Type: ApplicationFiled: February 3, 2010Publication date: August 4, 2011Applicant: Sun Microsystems, Inc.Inventors: Antonios Printezis, Paul H. Hohensee
-
Publication number: 20110191506Abstract: Methods and apparatus are provided for simultaneously supporting multiple hosts with a single communication port; each host may host multiple functions. The input/output device comprises multiple buffers; each buffer stores packets for one host, but can be dynamically reallocated to a different host. Multiple buffers may simultaneously support the same host and all of its functions. After a packet is received and classified, it is stored in at least one buffer, along with control information for processing the packet upon egress from the buffer. Egress managers for each buffer extract packets and transfer them to destination host/functions, by speculatively moving the packets forward even while DMA engines perform their processing to facilitate their transfer.Type: ApplicationFiled: February 1, 2010Publication date: August 4, 2011Applicant: SUN MICROSYSTEMS, INC.Inventor: Arvind Srinivasan
-
Publication number: 20110191393Abstract: A method for garbage collection, involving identifying a first object referenced by a second object, determining whether the address of the first object is lower than a pointer position, in response to determining that the address of the first object is lower than the pointer position, adding an identifier for the first object to a mark stack, determining whether a number of identifiers in the mark stack has reached a flush threshold, in response to determining that the number of identifiers in the mark stack has reached the flush threshold, setting a set of marks included in a mark bitmap to grey, setting a region field of a rescan map to indicate that a region of the mark bitmap includes any of the set of marks, and performing a rescan of the region based on the region field.Type: ApplicationFiled: February 1, 2010Publication date: August 4, 2011Applicant: SUN MICROSYSTEMS, INC.Inventors: Thomas Schatzl, Laurent Phillipe Daynes
-
Publication number: 20110191518Abstract: Methods and apparatus are provided for simultaneously supporting multiple hosts with a single communication port; each host may host multiple functions. The input/output device comprises multiple buffers; each buffer stores packets for one host, but can be dynamically reallocated to a different host. Multiple buffers may simultaneously support the same host and all of its functions. After a packet is received and classified, it is distributed to buffer ingress managers. Within a set of ingress managers serving one buffer, each manager corresponds to one function of the buffer's corresponding host, and is programmed with criteria for identifying packets desired by that function. One copy of the packet is stored in a buffer if at least one of the buffer's ingress managers accepts it, along with control information for processing the packet upon egress from the buffer. Egress managers for each buffer extract packets and transfer them to destination host/functions.Type: ApplicationFiled: February 1, 2010Publication date: August 4, 2011Applicant: SUN MICROSYSTEMS, INC.Inventor: Arvind Srinivasan
-
Publication number: 20110185347Abstract: A method for executing a computer program involving obtaining a statement of the source code, where the statement comprises a method call, and where the source code is composed in a statically-typed programming language. The method also involves, upon entry into a loop included in the computer program: incrementing an entry counter by one; and, for each iteration of the loop, incrementing an iteration counter by one, incrementing a local counter by one to obtain an incremented value of the local counter, incrementing a summation variable by the incremented value of the local counter, and executing the iteration of the loop.Type: ApplicationFiled: January 27, 2010Publication date: July 28, 2011Applicant: SUN MICROSYSTEMS, INC.Inventor: John Rose
-
Publication number: 20110185344Abstract: One embodiment of the present invention provides a system that characterizes content in object code. During operation, the system receives the source code of a program. The system also receives one or more pieces of object code of the program, or creates one or more pieces of object code from the source code. Next, the system identifies a construct in the object code. The system then determines whether the construct is physically present in the source code. If the construct is not physically present, the system determines whether the construct is logically present in the source code, wherein a construct is logically present if it is required by the programming language. If so, the system sets a construct flag to indicate that the construct is “synthesized.” However, if not, the system sets the construct flag to indicate that the construct is “synthetic.” Finally, the construct flag is made available to a reflective API.Type: ApplicationFiled: January 26, 2010Publication date: July 28, 2011Applicant: SUN MICROSYSTEMS, INC.Inventors: Joseph D. Darcy, Alexander R. Buckley
-
Publication number: 20110185144Abstract: A method for queuing update buffers to enhance garbage collection. The method includes running an application thread and providing, for the application thread, a data structure including current and finished update buffer slots. The method includes providing an update buffer for the application thread and storing a pointer to the update buffer in the current update buffer slot. The method includes storing null in the finished update buffer slot and, with the application thread, writing to the update buffer. The thread may write a pointer to the filled update buffer in the finished update buffer slot after the buffer is filled. The method includes using a garbage collector thread to inspect the finished update buffer slot and claim filled buffers and change the pointer to null. The thread then obtains an empty update buffer and updates the current update buffer slot to point to the new buffer.Type: ApplicationFiled: January 26, 2010Publication date: July 28, 2011Applicant: SUN MICROSYSTEMS, INC.Inventors: Antonios Printezis, Paul H. Hohensee
-
Publication number: 20110185129Abstract: A computing system includes a first virtual machine associated with a memory region readable by the first virtual machine, and a first private memory region. A data object is created by the first virtual machine in the sharable memory region, readable and writeable by the first virtual machine and a second virtual machine. A mapping is established between the first virtual machine and a particular area of the shareable memory region. The computing system includes the second virtual machine associated with a second private memory region, and a reference to the particular area of the shareable memory region. The mapping enables both the first virtual machine and second virtual machine to read and write second data in the shareable memory region without creating a copy of the second data in the first and second private memory regions.Type: ApplicationFiled: January 22, 2010Publication date: July 28, 2011Applicant: SUN MICROSYSTEMS, INC.Inventors: Erez Landau, Daniel David Blaukopf, Omer Pomerantz
-
Publication number: 20110184907Abstract: A method for migrating files including receiving, from a client, a file system (FS) operation request for a target FS, making a first determination that migration for a source FS is not complete, making a second determination that the FS operation request specifies a directory and that a directory level attribute for the directory on the target FS specifies that the directory is un-migrated. In response to the first and second determination, creating, using the meta-data for content in the directory, a directory entry for a file in the directory on the target FS, where the directory entry for the file is associated with a file level attribute that specifies the file is un-migrated, adding an unique identification (UID) for the file to a pending list, adding the UID for the directory to a removed list, and servicing, after the creating, the first FS operation request using target FS.Type: ApplicationFiled: January 27, 2010Publication date: July 28, 2011Applicant: SUN MICROSYSTEMS, INC.Inventors: Eric Noah Schrock, Adam H. Leventhal
-
Publication number: 20110185195Abstract: A system including a first physical network interface card (NIC) include a number of rings, where at least one of the rings is an active ring. The system further includes a host, operatively connected to the first NIC, and including Media Access Control (MAC) layer. The MAC layer is configured to obtain a power management policy, obtain a load associated with the active ring, determine, using the power management policy and the load, that the state associated with at least one of the rings must be changed, and change, in response to the determining, the state of at least one of the of rings.Type: ApplicationFiled: January 26, 2010Publication date: July 28, 2011Applicant: SUN MICROSYSTEMS, INC.Inventors: Sunay Tripathi, Nicolas G. Droux
-
Publication number: 20110185150Abstract: Systems and methods for performing single instruction multiple data (SIMD) operations on a data set. The methods may include examining a structure of the data set to determine what reorganization may be necessary to facilitate SIMD processing. The method may include selecting a stored bit mask corresponding to the organization of the data set and loading the bit mask into an application specific register (ASR). Subsequently, the data may be reorganized inline according to the ASR as the data is loaded into the SIMD functional unit such that the SIMD functional unit may operate on the data set. The results of the SIMD operation may be written to a results register.Type: ApplicationFiled: January 26, 2010Publication date: July 28, 2011Applicant: SUN MICROSYSTEMS, INC.Inventor: Lawrence A. Spracklen
-
Publication number: 20110184996Abstract: A method for migrating files involves receiving, from a client, a file system (FS) operation request for a target FS, making a first determination that migration for a source FS is not complete, making a second determination that the FS operation request specifies a directory and that a directory level attribute for the directory on the target FS specifies that the directory is un-migrated. In response to the first and second determination, creating, using the meta-data for content in the directory, a directory entry for a file in the directory on the target FS, where the directory entry for the file is associated with a file level attribute that specifies the file is un-migrated, and servicing, after the creating, the first FS operation request using target FS.Type: ApplicationFiled: January 27, 2010Publication date: July 28, 2011Applicant: SUN MICROSYSTEMS, INC.Inventors: Adam H. Leventhal, Eric Noah Schrock
-
Patent number: 7987269Abstract: A domain manager establishes an administrative domain for a network that has an associated set of assets and an associated set of users. The domain manager identifies at least one asset of the set of assets to be included in the administrative domain. An asset can be a hardware resource (e.g., computer, router, etc.) and/or a software resource (e.g., word processing application). In addition, the domain manager identifies at least one user of the set of users to be included in the administrative domain. The domain manager also establishes a set of roles within the administrative domain. For example, each role can define permissions (e.g., levels of accessibility) between a user and an asset (or group of assets) in the administrative domain.Type: GrantFiled: December 18, 2007Date of Patent: July 26, 2011Assignee: Sun Microsystems, Inc.Inventors: Martin Paul Mayhead, Michael J. Wookey, Brandon Eugene Taylor
-
Publication number: 20110176675Abstract: A method of protecting a media key including obtaining the media key, obtaining an auxiliary key, calculating a split key using the media key and the auxiliary key, encrypting the split key using a wrap key to generate an encrypted split key, assembling the encrypted split key and a communication key to obtain a data bundle, and sending the data bundle to a token, where the media key is extracted from the data bundle on the token to protect data on a storage device.Type: ApplicationFiled: September 7, 2006Publication date: July 21, 2011Applicant: Sun Microsystems, Inc.Inventors: James P. Hughes, Alexander S. Stewart, Dwayne A. Edling
-
Publication number: 20110179230Abstract: A method of read-set and write-set management distinguishes between shared and non-shared memory regions. A shared memory region, used by a transactional memory application, which may be shared by one or more concurrent transactions is identified. A non-shared memory region, used by the transactional memory application, which is not shared by the one or more concurrent transactions is identified. A subset of a read-set and a write-set that access the shared memory region is checked for conflicts with the one or more concurrent transactions at a first granularity. A subset of the read-set and the write-set that access the non-shared memory region is checked for conflicts with the one or more concurrent transactions at a second granularity. The first granularity is finer than the second granularity.Type: ApplicationFiled: January 15, 2010Publication date: July 21, 2011Applicant: Sun Microsystems, Inc.Inventor: Yuan C. Chou
-
Publication number: 20110179400Abstract: A method for overflow detection using partial evaluations. The method includes obtaining a section of code from a source code file stored on a storage device, analyzing the section of code to identify a buffer with an index, determining a plurality of statements that are statically-computable and dependent on the index of the buffer, and generating a code segment including the plurality of statements. The method further includes replacing an access statement of the plurality of statements with a conditional statement returning true when bounds of the buffer are exceeded, where the access statement uses the index to access the buffer, adding an unconditional statement returning false to the code segment, and executing the code segment on a computer processor to obtain a determination of whether the bounds of the buffer are exceeded.Type: ApplicationFiled: January 15, 2010Publication date: July 21, 2011Applicant: SUN MICROSYSTEMS, INC.Inventors: Bernhard F. Scholz, Cristina N. Cifuentes, Nathan Robert Albert Keynes
-
Publication number: 20110178997Abstract: A computer readable medium having software instructions that, when executed, perform a method for preserving data stored in a file system with a plurality of files. The method involves determining whether storage capacity of the file system has reached a threshold level, wherein the threshold level is stored in at least one of a plurality of size-reducing policies, obtaining a criterion from the at least one size-reducing policy, identifying a subset of the plurality of files that match the criterion, accessing metadata of each of the identified subset of files, wherein the metadata of each of the identified subset of files comprises at least one option for reducing a size of the file, and performing a size-reducing action to reduce a size of each of the identified subset of files based on the option for reducing the size of each of the identified subset of files and the criterion.Type: ApplicationFiled: January 15, 2010Publication date: July 21, 2011Applicant: SUN MICROSYSTEMS, INC.Inventors: Darrin P. Johnson, William H. Moore, Eric C. Saxe
-
Publication number: 20110179231Abstract: A system and method for controlling access to a shared storage device in a computing cluster having at least two nodes configured as cluster members provide fencing and quorum features without using the device controller hardware/firmware so fencing can be provided with storage devices that do not support disk reservation operations, such as with non-SCSI compliant disks. A polling thread on each node periodically reads a designated storage space on the shared storage device at a polling interval to determine if its corresponding node registration key is present, and halts the node if the key has been removed. A cluster membership agent removes a corresponding node registration key from the designated storage space of the shared storage device and publishes new membership information indicating that the corresponding node has departed the cluster only after delaying for a time period greater than the polling interval.Type: ApplicationFiled: January 21, 2010Publication date: July 21, 2011Applicant: SUN MICROSYSTEMS, INC.Inventor: Ellard Roush