Patents Assigned to Sun Microsystems
-
Publication number: 20020152457Abstract: Methods, systems, and articles of manufacture consistent with the present invention provide polymorphism to a language that does not inherently support polymorphism. Instructions are received from a source code file, wherein at least one of the instructions is a polymorphic extension to provide polymorphism. The source code file with the polymorphic extension is converted into executable code that performs polymorphism.Type: ApplicationFiled: September 10, 2001Publication date: October 17, 2002Applicant: Sun Microsystems, Inc.Inventor: Joerg Jahnke
-
Publication number: 20020152152Abstract: The present invention describes a platform for trading homogenous goods. In particular, a multi-attribute market can be readily configured using the platform of the present invention to provide for an efficient value added trading exchange environment. Aspects of the disclosure include a flattening function which maps predefined order characteristics into an orthogonal, normalized dimensions space. This flattening function provides for a ready comparison between active and passive orders to evaluate a matching occurrence. Additionally, the present disclosure provides a configurable platform to support a pipe and filter approach to matching functionality including name value pair and rule based algorithms. Finally, a close match concept is disclosed whereby a market maker can increase liquidity in the market by conveniently determining closely matching orders and communicating with the market participants to facilitate a transaction.Type: ApplicationFiled: April 6, 2001Publication date: October 17, 2002Applicant: Sun Microsystems, Inc.Inventors: Alejandro H. Abdelnur, Atul Q. Batra, William T. Drake
-
Publication number: 20020150867Abstract: A system and method for generating an online network educational course is provided. A software tool utilizes a graphical user interface (GUI) to communicate with a third party. The GUI provides a straightforward and efficient mechanism for generating a software-based educational course file directory structure for an online environment. The GUI manages the receiving of a collection of data, and the software tool implements the generation of files for configuring, launching, and operating the educational course within a predetermined environment on the network.Type: ApplicationFiled: April 11, 2001Publication date: October 17, 2002Applicant: Sun Microsystems Inc.Inventor: Thomas M. Sirhall
-
Patent number: 6466947Abstract: Use of a policy object for verification in a distributed system. A machine downloads a policy object containing a reference to code governing verification of data. The machine uses the reference to obtain the code and locally verify data or other information. As particular rules for the data change, the policy object may be updated to provide a reference to the code for the new rules when it is downloaded.Type: GrantFiled: March 20, 1998Date of Patent: October 15, 2002Assignee: Sun Microsystems, Inc.Inventors: Kenneth C. R. C. Arnold, Ann M. Wollrath, James H. Waldo
-
Patent number: 6467046Abstract: A computer implemented system, method and computer program product for automatically distributing copies of a replicated database for a computer system comprising at least first and second host computers. Each of the host computers operatively control at least one associated computer mass storage device controller coupled to commonly accessible computer mass storage devices by at least one storage device bus. The system and method comprises the step of enumerating each of the various host computers of the computer system, each of the computer mass storage device controllers associated with each host computer and each of the computer mass storage devices coupled to the storage device buses coupling the controllers.Type: GrantFiled: May 6, 1996Date of Patent: October 15, 2002Assignee: Sun Microsystems, Inc.Inventors: Joseph E. Cunliffe, Dale R. Passmore
-
Patent number: 6466497Abstract: An electronic circuit has a register connected to a sense amplifier via a bitline (the sense amplifier has a primary precharge circuit), and a secondary precharge circuit also connected to the bitline. For bitlines that are relatively long, the secondary precharge circuit is located at a distal end of the bitline with respect to the sense amplifier. The secondary precharge circuit initially pulls up the voltage of the bitline, and the primary precharge circuit in the sense amplifier completes the precharging of the bitline. The secondary precharge circuit includes a cascode transistor coupled to the bitline via a feedback circuit. The feedback circuit is enabled during the precharge phase, when the bitline is discharged below a preset threshold. The threshold of the secondary precharge circuit can be set such that any skew between the precharge pulses of the secondary precharge circuit and the sense amplifier does not affect the falling bitline during the sense amplifier evaluate phase.Type: GrantFiled: April 17, 2001Date of Patent: October 15, 2002Assignee: Sun Microsystems, Inc.Inventors: Shaishav A. Desai, Anup S. Mehta, Srinivasa Gopaladhine
-
Patent number: 6466982Abstract: A method and apparatus for controlling the number of users that attempt to concurrently utilize a peripheral device in a network. In a network many users share various peripheral devices such as microphones, cameras, speakers, etc. In one or more embodiments of the invention, to prohibit the concurrent use of a peripheral device by multiple users, a locking mechanism is utilized. The locking mechanism allows a first user that requests access to a peripheral device to maintain an exclusive lock on that device. Once the first user has concluded using the peripheral device, the lock is released to permit another user to access the device. The locking mechanism is controlled by two protocols: the request and the grant protocols. These protocols establish the rules for exclusive access to network peripheral devices using a locking mechanism. A request includes parameters associated with the particular device, and a return address for the requesting terminal or program.Type: GrantFiled: April 9, 1999Date of Patent: October 15, 2002Assignee: Sun Microsystems, Inc.Inventor: Alan T. Ruberg
-
Patent number: 6467037Abstract: Methods and systems for executing instructions utilizing a program counter with one or more data counters are provided. A program counter specifies an instruction in an instruction section to be executed by the computer. A data counter specifies a data location in a data section that includes information to be utilized when the instruction specified by the program counter is executed. By utilizing both a program counter and a data counter, instructions can be efficiently executed without unnecessarily wasting memory space and without wasting time to access data that is not aligned.Type: GrantFiled: June 30, 1998Date of Patent: October 15, 2002Assignee: Sun Microsystems, Inc.Inventor: Robert Griesemer
-
Patent number: 6466660Abstract: During peak usage times in a communications system, a communications control system and a billing system are required to handle a very large volume of communications from a large number of communications devices. Due to the large s volume, the control system and billing system are often overburdened, causing them to not record each and every communication. As a result, some of the communications conducted during peak times are not recorded and hence are not billed to customers, thereby causing a loss in potential revenue. The present invention provides a solution to this problem. Namely, each communications device is adapted to maintain a log of the communications conducted using that communications device. This log information is communicated to the control system at some later time (probably during an off-peak period) to enable the control system to retroactively update the billing system.Type: GrantFiled: May 14, 1999Date of Patent: October 15, 2002Assignee: Sun Microsystems, Inc.Inventor: Charles Merriam
-
Patent number: 6466974Abstract: A method for creating and managing a computer network management agent that includes a Java development management kit (“JDMK”)-created object is provided. In one embodiment, the method a JDMK agent object configured to provide computer network management functions is created. Address, type, and object class information are provided for the JDMK agent object. The JDMK agent object is installed on the computer network. In another embodiment, the method of the invention includes communicating with the JDMK agent object over the computer network.Type: GrantFiled: December 4, 1998Date of Patent: October 15, 2002Assignee: Sun Microsystems, Inc.Inventors: Jamie Nelson, Jonathan Nelson, David Spencer, Rajeev Angal
-
Patent number: 6466206Abstract: A method and graphics system capable of super-sampling and performing real-time convolution to form a soft-edge alpha key are disclosed. In one embodiment, the computer graphics system may comprise a graphics processor, a sample buffer, and a sample-to-pixel calculation unit. The graphics processor may be configured to receive 3D graphics data comprising a plurality graphics primitives and then generate a plurality of samples from the 3D graphics data. The samples may comprise both color and alpha information. The super-sampled sample buffer may be coupled to receive and store the samples from the graphics processor. The sample buffer may also be configured to double-buffer at least a portion of each stored sample. The sample-to-pixel calculation unit may be coupled to receive and filter samples from the super-sampled sample buffer to form output pixels and alpha pixels in real time, wherein the alpha pixels are usable to form an alpha key.Type: GrantFiled: February 17, 1999Date of Patent: October 15, 2002Assignee: Sun Microsystems, Inc.Inventor: Michael F. Deering
-
Patent number: 6467008Abstract: A network interface is polled by a process operating on a host computer system. Each time the network interface is polled the process determines whether any packets have been transferred to the host. If so, they are processed. Interrupts that would normally be issued from the network interface in response to the transfer of packets are suppressed or postponed during the polling mode of operation. If, however, a predetermined period of time has elapsed or a predetermined number of packets have been transferred since a previous poll or a previous interrupt, then an interrupt may be generated.Type: GrantFiled: March 1, 1999Date of Patent: October 15, 2002Assignee: Sun Microsystems, Inc.Inventors: Denton E. Gentry, Jr., Linda T. Cheng
-
Patent number: 6466449Abstract: A disk cage assembly into which multiple disk drives may be removably inserted is formed from two separate frames which are identical in shape and design and include complimentary mating features enabling the frames to be joined to form a symmetrical four-sided structure. The frames are symmetrical about a midpoint and are easily manufactured since all interior surfaces are accessible during the manufacturing process. A surface of the frames defines a plurality of channels into which modular disk drives may be inserted. In one embodiment, the frames are designed to accommodate a mid-panel which is securable within the structure and can be used to increase the number modular disk drives which can be disposed therein. The assembly may be formed from a number of different materials, including structural foam which can be used to help absorb vibrations among the disk drives within the assembly.Type: GrantFiled: August 1, 2001Date of Patent: October 15, 2002Assignee: Sun Microsystems, Inc.Inventors: Lewis B. Sheen, Robert S. Antonuccio
-
Publication number: 20020147725Abstract: A computer-based method for defining properties of columns of database tables includes receiving a user input selecting at least one source column of a first database table as a source from which metadata defining the properties of said at least one source column is to be copied, receiving a user input selecting a location of a definition table as a target into which said metadata is to be copied wherein said definition table defines column properties of a second database table, and copying said metadata from said source to said target to define the properties of at least one column of said second database table such that said at least one column of said second database table corresponds to the definition of the properties of said at least one source column of said first database table selected as said source.Type: ApplicationFiled: April 5, 2002Publication date: October 10, 2002Applicant: Sun Microsystems, Inc.Inventors: Ocke Janssen, Frank Schoenheit
-
Publication number: 20020147817Abstract: Provided is a computer implemented method, system, and program for enabling communication between a first network device that communicates using a first address format and a second network device that communicates using a second address format. A frame from the first network device directed toward the second network device is received. A determination is made as to whether one address in the second address format is available to communicate with the second network device. A correspondence is defined between the first network device address in the first address format and the determined address in the second address format if one address in the second address format is available, wherein the determined address is used to represent the first network device to the second network device.Type: ApplicationFiled: April 4, 2001Publication date: October 10, 2002Applicant: Sun Microsystems, Inc.Inventor: Raghavendra Rao
-
Publication number: 20020147843Abstract: Provided is a computer implemented method, system, and program for enabling communication between one network device that is a member of a first set of network devices that communicate using a first address format and one network device that is a member of a second set of network devices that communicate using a second address format. One frame is received from a first network device in the first set, wherein the frame is part of a first exchange of multiple frames between the first network device and one network device in the second set. A first address in the second address format is allocated to the first network device to use to communicate with the network device of the second set during the first exchange of the frames. One frame is also received from a second network device that is a member of the first set pursuant to a second exchange of multiple frames between the second network device and one network device in the second set.Type: ApplicationFiled: April 4, 2001Publication date: October 10, 2002Applicant: Sun Microsystems, Inc.Inventor: Raghavendra Rao
-
Publication number: 20020147812Abstract: A method for enabling applet execution in networks using proxy servers is disclosed. An applet not requiring a Domain Name Server (DNS) lookup is embedded into a web page prior to the appearance of other applets in the web page. The web page is retrieved by a web browser and the first applet is used to verify network and web browser settings. The applet checks for the presence of a proxy server and verifies the proxy settings of the web browser. A warning is displayed to the user of the web browser if the proxy settings are not enabled.Type: ApplicationFiled: April 10, 2001Publication date: October 10, 2002Applicant: SUN MICROSYSTEMS, INC.Inventor: Chad A. Schoettger
-
Publication number: 20020147872Abstract: A sequentially performed implementation of a compound compare-and-swap (nCAS) operation has been developed. In one implementation, a double compare-and-swap (DCAS) operation does not result in a fault, interrupt, or trap in the situation where memory address A2 is invalid and the contents of memory address A1 are unequal to C1. In some realizations, memory locations addressed by a sequentially performed nCAS or DCAS instruction are reserved (e.g., locked) in a predefined order in accordance with a fixed total order of memory locations. In this way, deadlock between concurrently executed instances of sequentially performed nCAS instructions can be avoided. Other realizations defer responsibility for deadlock avoidance to the programmer.Type: ApplicationFiled: April 9, 2001Publication date: October 10, 2002Applicant: Sun Microsystems, Inc.Inventors: Guy L. Steele, Ole Agesen, Nir N. Shavit
-
Publication number: 20020147905Abstract: A system and method for shortening a certificate chain to form a collapsed certificate. The certificate chain comprises a plurality of linked certificates issued by a corresponding plurality of entities. The certificate chain extends from a first entity, through at least one intermediate entity, to a target entity associated with certain predetermined information. The plurality of linked certificates in the certificate chain is converted by the first entity into a collapsed certificate that is signed by the first entity and includes the predetermined information and an identification of the at least one intermediate entity. By utilizing the collapsed certificate in place of the plurality of linked certificates in the certificate chain, bandwidth utilization within a network and certificate processing overhead are reduced.Type: ApplicationFiled: April 5, 2001Publication date: October 10, 2002Applicant: Sun Microsystems, Inc.Inventor: Radia J. Perlman
-
Publication number: 20020147847Abstract: A method for remotely compiling, converting, storing and displaying data is disclosed. The illustrated embodiment of the present invention converts data in documents submitted over a network into XML documents. The XML documents are stored in a central location where designated users may convert them into different viewable formats using a multitude of stylesheets, such as XSL stylesheets, thereby allowing display of the same data from a number of different viewpoints.Type: ApplicationFiled: April 9, 2001Publication date: October 10, 2002Applicant: Sun Microsystems, Inc.Inventors: Mark E. Brewster, Jason A. Heddings