Abstract: A method for keyboard navigation in a graphical user interface, including defining a key event dispatcher for focus ordering of at least one non-focusable component, configured to recognize a special mode entry character and a special mode exit character, upon entry of the special mode entry character by a user, entering a special mode wherein subsequent key events are manipulated by the key event dispatcher to navigate the focus ordering of the at least one non-focusable component while a current focus owner is maintained, and exiting the special mode upon entry of the special mode exit character by the user, wherein the special mode is at least one of the group consisting of an input method mode, an accessible navigation mode and a window navigation mode.
Type:
Grant
Filed:
June 2, 2000
Date of Patent:
November 25, 2003
Assignee:
Sun Microsystems, Inc.
Inventors:
Hania Gajewska, David P Mendenhall, Peter A. Korn, Michael C. Albers, Lynn Monsanto
Abstract: A stub retrieval and loading subsystem is disclosed for use in connection with a remote method invocation system. The stub retrieval and loading subsystem controls the retrieval and loading of a stub for a remote method, into an execution environment, to facilitate invocation of the remote method by a program executing in the execution environment. The stub retrieval subsystem includes a stub retriever for initiating a retrieval of the stub and stub loader for, when the stub is received by the stub retriever, loading the stub into the execution environment, thereby to make the stub available for use in remote invocation of the remote method. In one embodiment, the stub retrieval and loading subsystem effects the retrieval and loading for a program operating in one address space provided by one computer, of stub class instances to effect the remote invocation of methods which are provided by objects operating in another address space, which may be provided by the same computer or a different computer.
Type:
Grant
Filed:
June 30, 1998
Date of Patent:
November 25, 2003
Assignee:
Sun Microsystems, Inc.
Inventors:
Ann M. Wollrath, James H. Waldo, Roger Riggs
Abstract: A method and apparatus for computing leading zero count with offset (LZCO) using a parallel nibble calculation scheme. The invention receives as its input a first operand and a second “offset” operand. The first operand is identified by a plurality of nibbles, each comprising four bits. The LZCO calculator calculates the lower two bits of the result for each nibble while simultaneously (or in parallel) calculating the upper remaining bits of the result for each nibble. The LZCO also selects the resulting nibble calculation for the lower two bits and the upper bits according to the nibble that corresponds to the highest order nibble without all zero values.
Abstract: A method for tracking repair histories includes providing a field replaceable unit having a memory device. Operational history data is collected during the operation of the field replaceable unit. The operational history data is stored in the memory device. A computing system includes a field replaceable unit including a memory device configured to store operational history data associated with the field replaceable unit.
Type:
Application
Filed:
April 14, 2003
Publication date:
November 20, 2003
Applicant:
Sun Microsystems, Inc.
Inventors:
Steven E. Weiss, Raymond J. Gilstrap, Emrys Williams, David S. Gordon, Gregory S. Jumper
Abstract: Provided are a method, system and article of manufacture for a firmware image. A computer readable medium, comprises at least one data structure stored in the computer readable medium. The at least one data structure comprises a firmware image for installation on a hardware device and metadata, wherein the metadata is used to control the installation of the firmware image on the hardware device. A firmware update application on a data processing system interprets the metadata and based on the interpretation installs the firmware image on the hardware device. The firmware update application installs firmware images for different types of devices.
Abstract: A method includes providing a field replaceable unit having a memory device. A first data element including dynamic information associated with the service life of the field replaceable unit is generated. A first tag is generated for the first data element. The first tag is prepended to the first data element to generate a first tagged data element. The first tagged data element is stored in the memory device. A computing system includes a field replaceable unit having a memory device configured to store a first tagged data element, the first tagged data element including a first data element including dynamic information associated with the service life of the field replaceable unit and a first tag associated with the first data element.
Type:
Application
Filed:
April 14, 2003
Publication date:
November 20, 2003
Applicant:
Sun Microsystems, Inc.
Inventors:
Steven E. Weiss, Raymond J. Gilstrap, Robert Abramovitz, David S. Gordon, Gregory S. Jumper, Daniel J. Hain, Fongyan Gang
Abstract: Provided are a method, system, and an article of manufacture for installing firmware. A device independent application receives a firmware image. The device independent application requests a device dependent application to install the firmware image on at least one hardware device, wherein the at least one hardware device is determined by the device dependent application.
Abstract: A system and method of sharing a resource includes receiving a request for a shared resource in a locking repository. The request is from a requestor and the requestor is one of several applications. Each of the applications is running on one of several Java virtual machines (JVMs). The shared resource is locked to the requester, if the shared resource is identified as available in the master locking repository.
Abstract: Management of data services in a distributed computer system is provided by a three-tiered system. The lowest, or agent, tier comprises Common Information Model (CIM) provider objects that can make method calls on the low-level kernel routines in the host providing the data service. The middle, or logic, tier is a set of management facades and federated Java beans. The federated Java beans include a general configuration bean for data services and configuration and health monitor service beans for each individual data service. The upper, or presentation, tier of the inventive system comprises web-based presentation programs that provide a first view go of the services provided by the federated beans for policy-based management and a second view of the data management facades for element-based management.
Type:
Application
Filed:
May 16, 2002
Publication date:
November 20, 2003
Applicant:
Sun Microsystems, Inc.
Inventors:
Chhandomay Mandal, Jillian I. DaCosta, Lanshan Cao, Roberta A. Pokigo
Abstract: A computer system comprises a plurality of field replaceable units (FRUs) for supplying processing resources and a system controller. Each of the plurality of FRUs has a field replaceable unit identification (FRUID) memory adapted store a capacity-on-demand (COD) indication associated with the FRU, wherein the COD indication is indicative of whether the FRU is a base level resource or a COD resource. The system controller is configured to access the FRUID memory of each of the plurality of FRUs to detect the COD indication. Additionally, the system controller is configured to enable at least those of the plurality of FRUs for which the corresponding COD indication indicates that the FRU is a base level resource. The system controller is further configured to identify a need for additional processing resources, and is configured to enable additional ones of the plurality of FRUs responsive to identifying the need for additional processing resources.
Type:
Application
Filed:
April 14, 2003
Publication date:
November 20, 2003
Applicant:
Sun Microsystems, Inc.
Inventors:
Shankar Prasad Venkoba Rao, Raymond J. Gilstrap
Abstract: Methods and apparatus for protecting fixed storage entertainment assets are disclosed. A digital entertainment product stored on a digital media comprises a hub including a smart card storing thereon a certificate or private key and an exterior portion of the digital entertainment product surrounding the hub. The exterior portion stores encrypted digital entertainment content in a read-only format. The smart card is adapted for enabling decryption of the digital entertainment content using the certificate or private key. For instance, when public encryption schemes are desired, the smart card is adapted for accessing a public key and for generating a decryption key from the private key and the public key for decrypting the encrypted digital entertainment content. A player may then use this decryption key for decrypting the encrypted digital entertainment content for presentation to a user.
Abstract: A system and method for remotely testing an application includes providing a harness server and providing a first harness client. The first harness client is in communication with the harness server. Also a test script is provided to the harness server. A first application is executed by the first harness client and according to the test script. The first application outputs data to a central location. The output data can be monitored and the execution of first application controlled according to the output data.
Abstract: A method for configuring a computer system includes identifying a defective component in the computer system; disabling at least the defective component; and dynamically reconfiguring the computer system to allow continued operation with the defective component disabled. A computer system includes a plurality of components and a system controller. The system controller is adapted to identify a defective component from the plurality of components, disable at least the defective component, and dynamically reconfigure the computer system to allow continued operation with the defective component disabled.
Type:
Application
Filed:
April 14, 2003
Publication date:
November 20, 2003
Applicant:
Sun Microsystems, Inc.
Inventors:
Raymond J. Gilstrap, Daniel J. Hain, Fongyan Gang, David S. Gordon
Abstract: A method includes providing a field replaceable unit having a memory device. Static information associated with the identity of the field replaceable unit is stored in the memory device. Dynamic data associated with a service life of the field replaceable unit is stored in the memory device. A computing system includes a field replaceable unit having a memory device storing static information associated with the identity of the field replaceable unit and dynamic data associated with a service life of the field replaceable unit.
Type:
Application
Filed:
April 14, 2003
Publication date:
November 20, 2003
Applicant:
Sun Microsystems, Inc.
Inventors:
Robert Abramovitz, Emrys Williams, Steven E. Weiss, Scott P. Mitchell, Raymond J. Gilstrap, David S. Gordon, Gregory S. Jumper, William C. Jackson
Abstract: A method is disclosed for conveying component data identifying a component and indicating one or more states of the component existing during component operation (e.g., one or more component operating conditions). One embodiment of the method includes receiving a component data file including the component data, and transmitting the component data file (e.g., to a component data repository). Prior to the transmitting, the component data file may be compressed an/or encrypted. For example, a transmitted encrypted compressed component data file may be received and decrypted to produce a copy of a compressed component data file. The compressed component data file may be decompressed to produce a copy of the component data file, and the component data may be extracted from the component data file. Multiple component data files may be received at different times, compressed to produce corresponding compressed component data files, and the compressed component data files may be stored in a designated location.
Abstract: Techniques for developing and exchanging virtual machine implementations and/or support library implementations are described. In one embodiment, the virtual machine design specifies a set of functions for executing all or substantially all support library operations that are dependent on the implementation of the virtual machine. When a developer desires to substitute one virtual machine implementation for another, the developer is able to basically “plug-in” the second virtual machine implementation with minimal impact on the support libraries since both virtual machine implementations provide implementations for the set of specified functions that are dependent on the implementation of the respective virtual machine. Conversely, different support libraries may be utilized in conjunction with a particular virtual machine implementation.
Abstract: A computer graphics system that utilizes a super-sampled sample buffer and a sample-to-pixel calculation unit for refreshing the display. The graphics system may have a graphics processor, a super-sampled sample buffer, and a sample-to-pixel calculation unit. The graphics processor renders samples into the sample buffer and may utilize a window ID that specifies attributes of pixels on a per object basis. The window ID may specify one or more of a sample mode, filter type, color attributes, or source attributes. The sample mode may include single sample per pixel mode and multiple samples per pixel mode. The graphics system may be further operable to generate a single sample per pixel for certain windows of the screen in order to provide backwards compatibility with legacy systems.
Type:
Grant
Filed:
July 12, 2002
Date of Patent:
November 18, 2003
Assignee:
Sun Microsystems, Inc.
Inventors:
Nathaniel David Naegle, Michael F. Deering, Michael G. Lavelle, Carol A. Lavelle, Scott R. Nelson
Abstract: A method for reducing sub-threshold leakage during the burn-in procedure for a semi-conductor is disclosed. The method includes applying a back-bias voltage to the device during the burn-in procedure. The back-bias voltage increases the threshold voltage of the semi-conductor device and consequently, reduces the sub-threshold leakage current.
Abstract: A system and method are provided for managing information concerning a network flow comprising packets sent from a source entity to a destination entity served by a network interface. A network flow is established for each datagram sent from the source entity to the destination entity. A flow key, identifying the source and destination entities, is stored in a data structure along with information concerning validity of the flow, sequence of data in the flow datagram and how recently the flow was active. Once a flow is established, it is updated each time a packet containing data from the flow's datagram is received. When such a packet is received, an operation code is generated for identifying whether the packet is suitable for a particular network interface function. An operation code may, for example, indicate that a packet contains data to be re-assembled with other data from the same flow. Another operation code may indicate that a packet is not suitable for data re-assembly.
Abstract: A delay locked loop that uses a differential push/pull buffer is provided. The differential push/pull buffer of the DLL is used to create a buffered output that closely follows the characteristics of the buffer's input over a range of temperature, power supply noise operating conditions, and process (manufacturing) variations. Further, an integrated circuit that contains a delay locked loop that uses a differential push/pull buffer is provided. Further, a delay locked loop with means for buffering a delayed signal is provided. Further, a method for buffering a delayed clock signal using a differential push/pull buffer is provided.