Patents by Inventor James H. Mulder

James H. Mulder has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20110078421
    Abstract: A monitoring facility that is operable in two modes allowing compatibility with prior existing monitoring facilities. In one mode, in response to encountering a monitored event, an interrupt is generated. In another mode, in response to encountering a monitored event, one or more associated counters are incremented without causing an interrupt.
    Type: Application
    Filed: September 29, 2009
    Publication date: March 31, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Dan Greiner, James H. Mulder, Robert R. Rogers, Robert W. Stjohn
  • Publication number: 20100325385
    Abstract: One or more registers used to form an address usable in accessing storage are examined to determine if a zero address event has occurred in forming the address. In response to an indication that a zero address event has occurred in address formation, an alert is provided to the program using the address to access storage.
    Type: Application
    Filed: June 18, 2009
    Publication date: December 23, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Robert M. Abrams, Mark S. Farrell, Dan F. Greiner, Christian Jacobi, James H. Mulder, Peter J. Relson, Timothy J. Slegel, Peter K. Szwed
  • Patent number: 7650469
    Abstract: A method is provided for determining whether a logical processor of an information processing system has access to an address space of the information processing system. An instruction is issued by a first processor, the instruction referencing a target logical processor and a target address space. In response to the instruction, first information is checked to determine whether the target logical processor is running. When it is determined that the target logical processor is not running, second information is checked by a host program to determine whether the target logical processor has access to the target address space.
    Type: Grant
    Filed: September 6, 2006
    Date of Patent: January 19, 2010
    Assignee: International Business Machines Corporation
    Inventors: Greg A. Dyck, Charles W. Gainey, Jeffrey P. Kubala, James H. Mulder, Damian L. Osisek, Robert R. Rogers, Mark A. Wisniewski, Leslie W. Wyman
  • Publication number: 20090259875
    Abstract: Two forms of TOD Clock instructions are provided, Store Clock and Store Clock Fast. Execution of the Store Clock Fast instruction may produce a time of day (TOD) result that is exactly the same as a previous TOD result, however execution of Store Clock Fast instructions while the clock is running always produce unique TOD results.
    Type: Application
    Filed: June 22, 2009
    Publication date: October 15, 2009
    Applicant: International Business Machines Corporation
    Inventors: Mark A. Check, Mark S. Farrell, Dan F. Greiner, James H. Mulder, Damian L. Osisek, Robert R. Rogers, Timothy J. Slegel, Ronald M. Smith, SR.
  • Publication number: 20090100243
    Abstract: A virtual storage technique is provided to manage a cell pool or a set of cell pools which can be used to satisfy variable-size storage requests. The algorithm uses no locks and relies on an atomic compare-and-swap instruction to serialize updates to the fields that can be simultaneously requested by multiple threads or processes. A free chain is used to manage cells which have already been obtained and freed, while there is an active extent that is used to hand out cells which have not previously been obtained. The algorithm is based on all cell pool extents being the same size, which allows the control information for the extent to be easily located on the extent boundary (e.g. at a 1 MB boundary). Control information for each cell is stored independently of the cell storage in a control array that resides at the head of the extent, along with other control information. This avoids cell overrun from damaging the cell pool control information.
    Type: Application
    Filed: October 16, 2007
    Publication date: April 16, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Donald F. Ault, Peter J. Relson, James H. Mulder, Elpida Tzortzatos, Paula M. Spens
  • Publication number: 20080071502
    Abstract: A method is provided for obtaining time-of-day (“TOD”) clock records on an information processing system. In accordance with such method, a first instruction is issued for recording a TOD clock value. In response to issuing the first instruction, a truncated version of a first current TOD clock value is obtained and recorded as a first TOD clock record, the first TOD clock value being a first current TOD clock value produced by a TOD clock running continuously on the information processing system. Thereafter, a second instruction is issued. In response to issuing the second instruction, a truncated version of a second current TOD clock value is obtained and recorded as a second TOD clock record, the second current TOD clock value being produced by the TOD clock, and the second TOD clock record being permitted to have the same value as the first TOD clock record.
    Type: Application
    Filed: September 15, 2006
    Publication date: March 20, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mark A. Check, Mark S. Farrell, Dan F. Greiner, James H. Mulder, Damian L. Osisek, Robert R. Rogers, Timothy J. Slegel, Ronald M. Smith, Peter G. Sutton
  • Publication number: 20080059719
    Abstract: A method is provided for determining whether a logical processor of an information processing system has access to an address space of the information processing system. An instruction is issued by a first processor, the instruction referencing a target logical processor and a target address space. In response to the instruction, first information is checked to determine whether the target logical processor is running. When it is determined that the target logical processor is not running, second information is checked by a host program to determine whether the target logical processor has access to the target address space.
    Type: Application
    Filed: September 6, 2006
    Publication date: March 6, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Greg A. Dyck, Charles W. Gainey, Jeffrey P. Kubala, James H. Mulder, Damian L. Osisek, Robert R. Rogers, Mark A. Wisniewski, Leslie W. Wyman