Patents by Inventor Scott Dunham
Scott Dunham has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9793104Abstract: Provided is a method of epitaxial deposition, which involves dry-etching a semiconductor substrate with a fluorine containing species and exposing the dry-etched substrate to hydrogen atoms, prior to epitaxially depositing a semiconductor layer to the surface of the substrate.Type: GrantFiled: January 28, 2016Date of Patent: October 17, 2017Assignee: AIXTRON SEInventors: Maxim Kelman, Shahab Khandan, Scott Dunham, Tac van Huynh, Kenneth B. K. Teo
-
Publication number: 20170125269Abstract: A transfer module for a multi-module apparatus may include a) a plurality of facets, wherein a facet of said plurality comprises a port configured to hold a module; and b) at least one robot arm configured to move an object to and from the module through said port via a combination of extension and rotational movements.Type: ApplicationFiled: October 29, 2015Publication date: May 4, 2017Applicant: AIXTRON SEInventors: Scott Dunham, Timothy O'Brien, Tahir Zuberi
-
Publication number: 20160225608Abstract: Provided is a method of epitaxial deposition, which involves dry-etching a semiconductor substrate with a fluorine containing species and exposing the dry-etched substrate to hydrogen atoms, prior to epitaxially depositing a semiconductor layer to the surface of the substrate.Type: ApplicationFiled: January 28, 2016Publication date: August 4, 2016Applicant: AIXTRONInventors: Maxim Kelman, Shahab Khandan, Scott Dunham, Tac van Huynh, Kenneth B.K. Teo
-
Publication number: 20080082314Abstract: A method and system for emulating a hardware Internet Small Computer System Interface (iSCSI) Host Bus Adapter (HBA) without risking an interruption of communication between a computer and a remote secondary storage device is presented. During normal operations, a (hardware emulating) software iSCSI HBA drives a Network Interface Card (NIC) to afford communication between the computer and the remote secondary storage. If an operating system (OS) anomaly occurs in the computer, the NIC is normally disconnected by the OS. To maintain communication between the computer and the secondary storage device if such an event occurs, a failover network device is called up by the computer's System Management Memory (SMM) Basic Input Output System (BIOS), which allows uninterrupted communication to continue between the computer and remote secondary storage device.Type: ApplicationFiled: December 7, 2007Publication date: April 3, 2008Inventors: Sumeet Kochar, Scott Dunham, Eric Kern, John Landry, Theodore Vojnovich
-
Publication number: 20080082313Abstract: A method and system for emulating a hardware Internet Small Computer System Interface (iSCSI) Host Bus Adapter (HBA) without risking an interruption of communication between a computer and a remote secondary storage device is presented. During normal operations, a (hardware emulating) software iSCSI HBA drives a Network Interface Card (NIC) to afford communication between the computer and the remote secondary storage. If an operating system (OS) anomaly occurs in the computer, the NIC is normally disconnected by the OS. To maintain communication between the computer and the secondary storage device if such an event occurs, a failover network device is called up by the computer's System Management Memory (SMM) Basic Input Output System (BIOS), which allows uninterrupted communication to continue between the computer and remote secondary storage device.Type: ApplicationFiled: December 7, 2007Publication date: April 3, 2008Inventors: SCOTT DUNHAM, ERIC KERN, SUMEET KOCHAR, JOHN LANDRY, THEODORE VOJNOVICH
-
Publication number: 20080064253Abstract: A jumper including a connecting face, a light-emitting face, and a light pipe extending from the connecting face to the light-emitting face is provided. The light pipe is operable to transmit a light from a provided computer hardware from the connecting face to the light-emitting face responsive to the jumper forming a circuit with the provided computer hardware. A method for fabricating a jumper is also provided. The method includes forming a plurality of receptacles on a connecting face of the jumper and incorporating a light pipe into the jumper such that the light pipe extends from the connecting face of the jumper to a light-emitting face of the jumper. A method for providing jumper installation feedback is further provided. The method includes mounting a jumper on a provided computer hardware and transmitting a light through the jumper responsive to the jumper forming a circuit with the provided computer hardware.Type: ApplicationFiled: November 16, 2007Publication date: March 13, 2008Applicant: International Business Machines CorporationInventors: Scott Dunham, William Schwartz, Jeffrey Williams, Edward Zorek
-
Publication number: 20070266195Abstract: A method and system for emulating a hardware Internet Small Computer System Interface (iSCSI) Host Bus Adapter (HBA) without risking an interruption of communication between a computer and a remote secondary storage device is presented. During normal operations, a (hardware emulating) software HBA drives a Network Interface Card (NIC) to afford communication between the computer and the remote secondary storage. If an operating system (OS) anomaly occurs in the computer, the NIC is normally disconnected by the OS. To maintain communication between the computer and the secondary storage device if such an event occurs, a failover network device is called up by the computer's System Management Memory (SMM) Basic Input Output System (BIOS), which allows uninterrupted communication to continue between the computer and remote secondary storage device.Type: ApplicationFiled: July 25, 2007Publication date: November 15, 2007Inventors: Scott Dunham, Eric Kern, Sumeet Kochar, John Landry, Theodore Vojnovich
-
Publication number: 20070260672Abstract: Basic server resources may be extended by the completion of a Capacity on Demand (CoD) Agreement. The CoD Agreement provides authorization to the server for activation of inactive resources. A Power On Self Test (POST) works in conjunction with a system management interrupt, a memory unit, and a plurality of Peripheral Component Interconnect (PCI) host bridges to provide for on demand additions of input and output adapters. The adapters may be added during various phases of operation and may be hot pluggable.Type: ApplicationFiled: May 8, 2006Publication date: November 8, 2007Applicant: International Business Machines CorporationInventors: Jason Almeida, Scott Dunham, Eric Kern, William Schwartz, Adam Soderlund
-
Publication number: 20070150757Abstract: A method and system are disclosed to enable and control power reduction in a blade/chassis system. A “maximum power reduction” attribute is stored in the VPD of the blade (or can otherwise be input to or retrieved or calculated by the management entity). The management module of the chassis in which the blades and power supplies are located uses this information to manage the power reduction of blades when the system is operating in an over-subscription mode and a power supply fails. If throttling is required, the system knows the amount of power reduction available for each blade and controls the throttling by spreading it out among the blades in the system so that, ideally, no blade will cease operation altogether.Type: ApplicationFiled: December 22, 2005Publication date: June 28, 2007Applicant: International Business Machines CorporationInventors: Alfredo Aldereguia, Brian Bigelow, Dhruv Desai, Scott Dunham, Nickolas Gruendler, William Holland, James Hughes, Randolph Kolvick, Challis Purrington, Michael Scollard, Gary Shippy
-
Publication number: 20070150713Abstract: Methods and arrangements to dynamically modify the number of processors active in a multi-node data processing system. are contemplated. Embodiments include transformations, code, state machines or other logic to change the portion of BIOS that a processor loads on power-on. In some embodiments, a signal sent over a GPIO pin may flip an address line to the portion of the BIO that a processor loads on power-on. In some embodiments, a service processor may set a GPIO or non-volatile RAM value. The portion of BIOS controlling the powering-up of the processor may read the value and branch depending upon the value. Embodiments also include transformations, code, state machines or other logic to determine the state of a dynamically activated processor. In some embodiments, a processor may read from a local scratch register to determine if it has been dynamically activated. If so, embodiments may then clear the scratch register and put the processor to sleep.Type: ApplicationFiled: December 22, 2005Publication date: June 28, 2007Applicant: International Business Machines CorporationInventors: Jason Almeida, Scott Dunham, Eric Kern, William Schwartz, Adam Soderlund
-
Publication number: 20070143611Abstract: An apparatus, system, and method are disclosed for deploying sensitive communication parameters to a diskless computing device. A parameter structure module is included to store one or more Internet Small Computer System Interface (“iSCSI”) communication parameters in an extendable data structure configured to store a set of basic parameter settings and a set of extended parameter settings. A link module is included to establish a secure link to a diskless computing device over a physically secure connection. A deployment module is included to deploy the extendable data structure over the secure connection to a non-volatile memory in the diskless computing device. The non-volatile memory is configured to provide sensitive iSCSI communication parameters provided by the extendable data structure to a CPU of the diskless computing device during a boot sequence.Type: ApplicationFiled: December 15, 2005Publication date: June 21, 2007Inventors: Jesse Arroyo, Joseph Bolan, Thomas Brey, Josep Cors, Gregory Dake, Scott Dunham, William Holland, Theodore Vojnovich
-
Publication number: 20070143480Abstract: An apparatus, system, and method are disclosed for distributing configuration parameters. The present invention includes one or more storage devices configured to store data, a first DHCP server configured to process DHCP messages and redirect communications regarding configuration parameters for the storage devices to a second DHCP server, and a configuration datastore configured to store configuration parameters for the storage devices. The second DHCP server may be configured to process DHCP messages and retrieve configuration parameters for the storage devices from the configuration datastore. In certain embodiments, each storage initiator communicates with the DHCP servers, receives the configuration parameters such as iSCSI parameters, and provides the configuration parameters to one or more storage devices.Type: ApplicationFiled: December 15, 2005Publication date: June 21, 2007Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jesse Arroyo, Joseph Bolan, Thomas Brey, Josep Cors, Gregory Dake, Scott Dunham, William Holland, Theodore Vojnovich
-
Publication number: 20070143583Abstract: An apparatus, system, and method are disclosed for automatically verifying access to a multipathed target at boot time. The apparatus is provided with a logic unit containing a plurality of modules configured to functionally execute the necessary steps of identifying a plurality of paths to a target device, automatically selecting one of the plurality of paths to the target device, and verifying access on at least one path to the target device. Beneficially, the disclosed embodiments of the apparatus, system, and method reduce false errors during the boot cycle, improve reliability of the multipathed network, simplify traffic load balancing, and provide for topology mapping for troubleshooting and network metrics. The disclosed embodiments provide a means for verifying multipathed targets automatically, without requiring user assistance, intervention, or interaction.Type: ApplicationFiled: December 15, 2005Publication date: June 21, 2007Inventors: Josep Cors, Scott Dunham, Theodore Vojnovich
-
Publication number: 20060259291Abstract: A method and system for emulating a hardware Internet Small Computer System Interface (iSCSI) Host Bus Adapter (HBA) without risking an interruption of communication between a computer and a remote secondary storage device is presented. During normal operations, a (hardware emulating) software iSCSI HBA drives a Network Interface Card (NIC) to afford communication between the computer and the remote secondary storage. If an operating system (OS) anomaly occurs in the computer, the NIC is normally disconnected by the OS. To maintain communication between the computer and the secondary storage device if such an event occurs, a failover network device is called up by the computer's System Management Memory (SMM) Basic Input Output System (BIOS), which allows uninterrupted communication to continue between the computer and remote secondary storage device.Type: ApplicationFiled: May 12, 2005Publication date: November 16, 2006Applicant: International Business Machines CorporationInventors: Scott Dunham, Eric Kern, Sumeet Kochar, John Landry, Theodore Vojnovich
-
Publication number: 20060047858Abstract: A method and system for booting up multiple PCI peripheral devices, such that the number of bootable PCI peripheral devices is not limited by the amount of computer system memory that is dedicated to storing executable boot code for the peripheral devices. The executable boot code is stored on a Read Only Memory (ROM) on each peripheral device. When a new PCI peripheral device begins to boot up, a check for available memory space in a ROM scan memory address space is performed. If there is not enough available room in the ROM scan memory address space for the new device's executable boot code, then a ROM scan detection logic pages an image of another peripheral device's executable boot code out of the ROM scan memory address space before storing the new device's executable boot code into the ROM scan memory address space.Type: ApplicationFiled: August 30, 2004Publication date: March 2, 2006Applicant: International Business Machines Corp.Inventors: William Atherton, Daryl Cromer, Richard Dayan, Scott Dunham, Eric Kern, Howard Locker, William Schwartz, Adam Soderlund
-
Publication number: 20050283523Abstract: A method and system for allowing nodes in a multi-node computer to be appropriated by a master node in the multi-node computer. The node to be appropriated is suspended into an ACPI S3 Sleep State, causing current system operations state information to be stored in a backup memory in the appropriated node. The master node then populated a primary memory in the appropriated node with OS and other information required to join a partition that includes the master node. When the master node no longer wishes to use the appropriated node, the backup memory in the appropriated node is mirrored back into the primary memory. When the appropriated node “wakes up” from the S3 state, it continues executing software commands where it left off, without knowing anything that had happened after going into the S3 state.Type: ApplicationFiled: May 14, 2004Publication date: December 22, 2005Applicant: International Business Machines CorporationInventors: Jason Almeida, Scott Dunham, Eric Kern, William Schwartz
-
Publication number: 20050071625Abstract: A method, system, and program product supporting dynamic configuring of a multi-node computer. The system includes a scalability management module directly coupled to each node in the multi-node computer.Type: ApplicationFiled: September 30, 2003Publication date: March 31, 2005Applicant: International Business Machines CorporationInventors: William Schwartz, Adam Soderlund, Edward Zorek, Jason Almeida, Scott Dunham, Eric Kern
-
Patent number: 6714952Abstract: Described is a technique for a backup and restoration of data in a network that includes a multi-lingual file system and a multi-lingual network file server. Multiple meta data files are associated with a single data file in the network. Provided are services for packaging the metadata as a single parameter of an application programming interface (API) for a particular data file being backed up or restored over a network. These techniques may be used in both full and incremental backups and restores of data over a network.Type: GrantFiled: November 10, 1999Date of Patent: March 30, 2004Assignee: EMC CorporationInventors: Scott Dunham, Rulian Fiske, Hal Hansen, Sanjay Jain, Madhav Mutalik, Edgar St. Pierre, Puneet Lal, Uresh Vahalia
-
Publication number: 20020091710Abstract: Described is a technique for a backup and restoration of data in a network that includes a multi-lingual file system and a multi-lingual network file server. Multiple meta data files are associated with a single data file in the network. Provided are services for packaging the metadata as a single parameter of an application programming interface (API) for a particular data file being backed up or restored over a network. These techniques may be used in both full and incremental backups and restores of data over a network.Type: ApplicationFiled: November 10, 1999Publication date: July 11, 2002Inventors: SCOTT DUNHAM, RULIAN FISKE, HAL HANSEN, SANJAY JAIN, MADHAY MUTALIK, EDGAR ST. PIERRE, PUNEET LAL, URESH VAHALIA
-
Patent number: D261124Type: GrantFiled: August 6, 1979Date of Patent: October 6, 1981Inventor: Scott Dunham