Patents Issued in April 24, 2008
-
Publication number: 20080098112Abstract: Systems and methods are disclosed for network operation and information processing involving engaging users of a network. In one exemplary embodiment, there is provided a method of engaging users of a public-access network. Moreover, the method includes associating a processing component with the public-access network; transmitting a request for authorization to use the public-access network, including transmission of a specific identifier associated with the user; transmitting first data including data determined by processing software as a function of the specific identifier; and opening up a connection to the network for the user. In one or more further embodiments, the specific identifier may include or be a function of a processing component ID or the MAC address of a device associated with the user. Other exemplary embodiments may include building profiles of users who access the network based on information collected.Type: ApplicationFiled: October 31, 2007Publication date: April 24, 2008Inventors: Jasminder Banga, Nitin Shah, Brijesh Patel, Amul Patel
-
Publication number: 20080098113Abstract: A system and method for balancing network traffic that includes a master node addressable by an external device, at least one slave node addressable by the master node, at least one filter running on the master node and the at least one slave node, and a clusterware application running on the master node and the at least one slave node. The clusterware application distributes the network traffic between the master node and the at least one slave node. Techniques for using the same are also disclosed.Type: ApplicationFiled: October 19, 2006Publication date: April 24, 2008Inventors: Gert Hansen, Patrick McHardy, Ulrich Weber, Stephan Scholz
-
Publication number: 20080098114Abstract: Techniques are provided for processing an Input/Output (I/O) request in which an identification message is received from a client computer. It is determined whether the client computer is a rogue client based on whether a current operations record exists for the client computer.Type: ApplicationFiled: December 18, 2007Publication date: April 24, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jason Young, Venkateswararao Jujjuri, Malahal Naineni, James Seeger, Paul Dorwin, Thomas Clark, Ninad Palsule
-
Publication number: 20080098115Abstract: One embodiment of the present method and apparatus for synthesizing a data stream includes retrieving meta data from at least one decision tree, the decision tree comprising a plurality of interconnected nodes, and generating the data stream in accordance with the meta data.Type: ApplicationFiled: October 19, 2006Publication date: April 24, 2008Inventors: Eric Bouillet, Parijat Dube, Zhen Liu
-
Publication number: 20080098116Abstract: In one aspect, a method for establishing a multimedia connection between at least one calling user and at least one called user via packet-oriented computer networks is provided. The users independently recognize contradictory requests of the calling user and the called user to each other and then send a request for delaying execution of the respective task to the respective call partner if contradictory requests occur.Type: ApplicationFiled: September 28, 2005Publication date: April 24, 2008Applicant: SIEMENS AKTIENGESELLSCHAFTInventor: Klaus Hoffmann
-
Publication number: 20080098117Abstract: A communication state between a session initiation protocol server and another session initiation protocol server to be a destination for transmitting a request message is determined. When it is determined that the communication state is in a communication unavailable state, a subsequent session initiation protocol server of the session initiation protocol server designated as the destination is determined to be a new destination based on information on a relay order of the session initiation protocol servers set in header information of the request message.Type: ApplicationFiled: September 6, 2007Publication date: April 24, 2008Applicant: FUJITSU LIMITEDInventors: Ryuji Fukuhara, Ryuji Oda, Yosuke Gondo
-
Publication number: 20080098118Abstract: A computer system enabling mutual exchange of information between users and digital content, in a manner corresponding to each individual disk, comprises a plurality of computers each capable of being loaded with a disk having a unique disk ID, and a verification server capable of being connected with the computers via a network. Each disk has a unique ID, and the verification server has a user database for accumulating user information corresponding to the disk ID. The verification server identifies the disk based on the disk ID, and transmits data corresponding to the disk to the computer.Type: ApplicationFiled: December 6, 2007Publication date: April 24, 2008Applicant: Sony Computer Entertainment Inc.Inventors: Ken Kutaragi, Shinichi Okamoto, Kazuo Miura
-
Publication number: 20080098119Abstract: Software intended to operate in a clustered environment can be tested for appropriate failover behavior through the use of an automated tool which allows failover to be simulated without requiring that the application be deployed in a cluster environment and observing the effects of actual failover. Such an automated tool can measure the characteristics of one or more session objects created by the application and provide appropriate messages for a developer when those characteristics indicate improper coding for failover.Type: ApplicationFiled: September 24, 2007Publication date: April 24, 2008Inventors: Rahul Jindal, Rohit Aggarwal, Mike Sauer
-
Publication number: 20080098120Abstract: Sharing resources on a network include, for example, a domain controller hierarchy scheme, which is used in some implementations to organize and share both secure and non-secure resources in an efficient manner. Using authentication information can be used to architect a trustworthy system to divulging sensitive client data (such as user/computer passwords) to a host system. The sensitive client data can be released to the host system when a client establishes a relationship having a degree of trust with the host.Type: ApplicationFiled: October 23, 2006Publication date: April 24, 2008Applicant: Microsoft CorporationInventors: Gregory C. Johnson, William S. Jack, Nathan D. Muggli, Tarek B. Kamel
-
Publication number: 20080098121Abstract: A P2P SIP enabled multimedia network communication system is disclosed. The network communication system supports various application, such as IP-based audio, video and instant messages. The network communication system comprises a P2P network and a plurality of user terminals. The P2P network comprises a plurality of ADs acting as nodes thereof. Each of the user terminals is connected to the P2P network by an access AD thereof. The AD comprises a SIP interface, an adapter module and a DHT module. The adapter module performs the transfer between the SIP protocol and the P2P protocol. The DHT module performs a registration operation and look up operation based on a P2P message, and returns the result to the adapter module. The registration operation is used to save registration information of the user terminal in the P2P network.Type: ApplicationFiled: October 19, 2007Publication date: April 24, 2008Applicant: NEC (China) Co., Ltd.Inventor: Yichuan WU
-
Publication number: 20080098122Abstract: Methods, apparatuses and systems facilitating integration of the functionality associated with a first on-line service entity with the functionality associated with a second on-line service entity. Embodiments of the present invention allow a first on-line service entity having its own membership model to efficiently collaborate with a second on-line service entity to offer its users the services of the second on-line service entity in a seamless and consistently branded manner. One implementation obviates the need for synchronization of the membership models between the first and second on-line service entities. One implementation allows the second on-line service entity to provide services to the users associated with the first on-line service entity in a seamless manner without the first on-line service entity having to proxy the session between the second on-line service entity and the users.Type: ApplicationFiled: December 21, 2007Publication date: April 24, 2008Inventor: Scott Metzger
-
Publication number: 20080098123Abstract: Implementation of hybrid peer-to-peer streaming with server assistance is described. In one implementation, a media source is selected from amongst a plurality of media sources for retrieval of streaming media content. The selection might be based, for example, on an amount of the streaming media content received at respective time units. In one scenario, if the amount received at a time unit is less than a target amount, the streaming media content is retrieved from at least one streaming media server. Conversely, if the amount received at a time unit is more than the target amount, the streaming media content is retrieved from at least one peer-to-peer network. In another embodiment, a playback buffer is monitored to determine an amount of streaming media content at the respective time units. The media source is then selected based on the amount of the streaming media content in the playback buffer.Type: ApplicationFiled: October 24, 2006Publication date: April 24, 2008Applicant: Microsoft CorporationInventors: Cheng Huang, Philip A. Chou, Jin Li, Anders E. Klemets
-
Publication number: 20080098124Abstract: For a network that connects several computers, a method of determining the network bandwidth between two computers. The method measures a first time interval between when one of the computers (1) sends a first data set to the other computer and (2) receives a first response. It also measures a second time interval between when one of the computers (1) sends a second data set to the other computer and (2) receives a second response. The method then identifies the network bandwidth from the two measured time intervals.Type: ApplicationFiled: December 21, 2007Publication date: April 24, 2008Inventors: Gregory Vaughan, Mythili Devineni
-
Publication number: 20080098125Abstract: A system and method for managing digests comprising electronic messages is presented. A selection criteria that defines message-based content for a digest is defined. Properties and characteristics of the content of the digest are defined. A delivery criteria that specifies periodic sending of the digest is accepted. The digest is constructed as a set of electronic messages. A dynamic stream of the electronic messages is monitored. One or more of the electronic messages is evaluated by filtering the electronic messages against the selection criteria. Only those electronic messages that satisfy the selection criteria are grouped into the digest to which the selection criteria corresponds. The digest is periodically delivered upon satisfaction of the delivery criteria.Type: ApplicationFiled: October 12, 2007Publication date: April 24, 2008Inventors: Michelle Wang Baldonado, Paula Newman, William Janssen
-
Publication number: 20080098126Abstract: Secure communications are provided over a network in a distributed workload environment having target hosts which are accessed through a distribution processor by a common network address. Secure communications are provided by routing both inbound and outbound communications with target hosts which are associated with a secure network communication through the distribution processor. Both inbound and outbound secure network communications are processed at the distribution processor so as to provide network security processing of communications from the target host and network security processing of communications to the target host.Type: ApplicationFiled: December 21, 2007Publication date: April 24, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: James Godwin, David Herr, Linwood Overby
-
Publication number: 20080098127Abstract: A route for routing traffic is established by the emission of a route announcing message to a network element of a network. The network element is then triggered in such a way as to route the traffic according to the route announced in a time-delayed manner by means of an event e.g. the emission of another message. A resource reservation for routing traffic along the announced route is carried out between the route announced and the event. In this way, it is ensured that the required resources are provided for the deviation of traffic onto the new route, and a route modification for traffic can be carried out without affecting the quality of service.Type: ApplicationFiled: July 29, 2005Publication date: April 24, 2008Inventor: Thomas Engel
-
Publication number: 20080098128Abstract: An associative memory 4 for primary searching operation of an associative memory 23 supplies a valid state to a primary match line 13 corresponding to storage data coincident with search data 10 taking mask information into account, and supplies a value obtained from a result of a logical sum operation (an OR operation), with a valid state for the storage data as true, of all said coincident storage data to a counting means 25 as intermediate data 15. The counting means 25 supplies a result of an operation to the intermediate data 15 for counting the number of bits in an invalid state for the storage data to an associative memory 3 for secondary searching operations as secondary search data 19. Among secondary storage data obtained by carrying out said operation to said storage data, the associative memory 3 for secondary searching operation supplies a result of carrying out the searching operation of the secondary search data 19 to a secondary match line 21.Type: ApplicationFiled: October 17, 2007Publication date: April 24, 2008Inventor: Naoyuki Ogura
-
Publication number: 20080098129Abstract: A device (D1) is dedicated to compression of streams of packets of data, for a communication equipment (E1) constituting a transmission end point in an Internet Protocol communication network (R), the packets of a stream each comprising, in particular, an IP header including a destination end point (E2) identifier, a session identifier and stream attributes, and said packets being intended to be transmitted after decomposition into cells.Type: ApplicationFiled: October 23, 2007Publication date: April 24, 2008Applicant: Alcatel LucentInventors: David Niddam, Luc Delamotte, Pascal Wuilque
-
Publication number: 20080098130Abstract: A technique for synchronizing a visual browser and a voice browser. A visual browser is used to navigate through visual content, such as WML pages. During the navigation, the visual browser creates a historical record of events that have occurred during the navigation. The voice browser uses this historical record to navigate the content in the same manner as occurred on the visual browser, thereby synchronizing to a state equivalent to that of the visual browser. The creation of the historical record may be performed by using a script to trap events, where the script contains code that records the trapped events. The synchronization technique may be used with a multi-modal application that permits the mode of input/output (I/O) to be changed between visual and voice browsers. When the mode is changed from visual to voice, the record of events captured by the visual browser is provided to the voice browser, thereby allowing the I/O mode to change seamlessly from visual to voice.Type: ApplicationFiled: October 9, 2007Publication date: April 24, 2008Inventors: Inderpal Mumick, Sandeep Sibal
-
Publication number: 20080098131Abstract: A playback device includes: a USB interface; an information creation section for creating, based on operation in an operation section, information indicating playback sequence for files stored in an external storage device connected to the USB interface; a storage section for storing the created information into the external storage device connected to the USB interface; and a playback section for, based on information stored in an external storage device connected to the USB interface and indicating the playback sequence for the files stored in the external storage device, sequentially playing back the files.Type: ApplicationFiled: September 26, 2007Publication date: April 24, 2008Applicant: Funai Electric Co., Ltd.Inventor: Yoshikazu Onishi
-
Publication number: 20080098132Abstract: In the printing and finishing of sheet-like objects, printing instructions are outputted to a printer. In accordance therewith, sheet-like objects are printed by the printer and are subsequently delivered by the printer directly to the finishing apparatus and then finished by the finishing apparatus. Output data concerning the printing instructions sent to the printer which are at least indicative of the printer capacity required for the printer to process the printing instructions outputted to the printer are registered. Sheet-like objects displaced by the printer are detected and signaled by the detector. At least periodically, production data in accordance with the signals received from the detector are generated. These data are at least indicative of a production quantity realized by the printer in response to the printing instructions sent to the printer. Depending on the production data, the output of next ones of the printing instructions to the printer is dosed.Type: ApplicationFiled: December 13, 2007Publication date: April 24, 2008Applicant: NEOPOST INDUSTRIE B.V.Inventor: Bertus Edens
-
Publication number: 20080098133Abstract: A wired interface for communicating between a first part and a second part of a device including a line for controlling activation of the second part of the device by a signal from the first part of the device, two lines for transfer of data from the first part of the device to the second part of the device, two lines for transfer of data from the second part of the device to the first part of the device, two lines for the transfer of an indication signal from the second part of the device to the first part of the device regarding the validity of the data transferred by two lines from the second part of the device, and five lines for transferring control signals between the two parts.Type: ApplicationFiled: August 10, 2005Publication date: April 24, 2008Inventors: Tamir Shaanan, Lev Freilicher
-
Publication number: 20080098134Abstract: A portable storage device (MC) is disclosed, which comprises a memory (MEM) for storing data (DAT), a data interface (INT) for exchanging data (DAT) between the memory (MEM) and a host device (DEV), radio communication interface (RI) designed for receiving a key (K) from a transponder (T), checking means (COMP) for checking if a key (K) has a predefined value (V, and access inhibit means (SW) for controlling access to the memory (MEM), wherein the access inhibit means (SW) are controlled by the checking means (COMP). Access to the memory (MEM) is only granted if a certain key (K) can be received, which means that a certain transponder (T) has to be in the vicinity of the portable storage device (MC) for granting access. Furthermore, data (DAT) which is transferred from host device (DEV) to memory (MEM) can be encrypted and data (DAT) which is transferred from memory (MEM) to host device (DEV) can be decrypted. In this way for example commonly used memory cards can be secured against unauthorized use.Type: ApplicationFiled: August 31, 2005Publication date: April 24, 2008Applicant: KONINKLIJKE PHILIPS ELECTRONICS, N.V.Inventors: Victor Martinus Van Acht, Martinus Wilhelmus Blum, Nicolas Lambert, Pierre Hermanus Woerlee
-
Publication number: 20080098135Abstract: Techniques are provided for processing an Input/Output (I/O) request. At least one data block is allocated for use in completing the I/O request. A current operations record is stored for the I/O request. It is determined whether the I/O request has been completed within a specified period of time. In response to determining that the I/O request has not been completed within the specified period of time, the allocated at least one data block is fenced.Type: ApplicationFiled: December 18, 2007Publication date: April 24, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jason Young, Venkateswararao Jujjuri, Malahal Naineni, James Seeger, Paul Dorwin, Thomas Clark, Ninad Palsule
-
Publication number: 20080098136Abstract: There is described a periphery unit for an automatic device, which can be actuated as an analog input and as an analog output. A number of connections which are to be used as inputs and the number of connections which are to be used as outputs can be adapted in a flexible manner on the respective application from a predetermined number of connections of the periphery unit. As a result, a redundant automatic device wherein said types of periphery units can be used, is provided.Type: ApplicationFiled: August 15, 2005Publication date: April 24, 2008Inventors: Walter Kreb, Ulrich Lehmann, Robert Schwab
-
Publication number: 20080098137Abstract: A protocol adapter for transferring diagnostic messages between networks within a vehicle and a host computer. The protocol adapter operates as a voltage translator to support J1708 software. The protocol adapter also recognizes when the protocol adapter is connected to a host computer running the J1939 and/or J1708 protocols and automatically switches to that protocol.Type: ApplicationFiled: December 17, 2007Publication date: April 24, 2008Applicant: Dearborn Group, Inc.Inventors: Robert McClure, David Such
-
Publication number: 20080098138Abstract: The present invention provides a key device with external storage and the using method thereof, which is an invention in computer security technology field. In order to solve the problem of the inconvenient using method that the prior art could not deal with, this invention provides a key device with external storage. It consists of a micro-controller unit and an off-chip mass storage. The micro-controller unit comprises a host interface module, a CPU, a key data storage module, a firmware program storage module and an off-chip mass storage interface module. The present invention provides a using method of the key device with external storage as well, which including: the key device builds connection with the host and reports itself as amass storage device; the host starts the application program; and the user uses and manages the information.Type: ApplicationFiled: October 22, 2007Publication date: April 24, 2008Applicant: Feitian Technologies Co., Ltd.Inventors: Zhou Lu, Huazhang Yu
-
Publication number: 20080098139Abstract: A high speed transmission system comprises a host controller with a host logic unit and a device controller with a device logic unit. The host controller transmits and receives a digital signal through the first interface according to the first descriptor in a memory. The device controller transmits and receives the digital signal through the second interface according to the second descriptor in the memory.Type: ApplicationFiled: February 16, 2007Publication date: April 24, 2008Applicant: VIA TECHNOLOGIES, INC.Inventors: Chia-Chun Lien, Yu-Tin Hsu
-
Publication number: 20080098140Abstract: An access control device controls access to a first device and a second device. The first device is connected with a first bus conforming to a first standard and conforms to the first standard. The second device is connected with the first bus and conforms to a second standard. The access control device includes a first signal generator and a second signal generator. The first signal generator generates a first transaction start signal indicating start of a transaction for the first device. The second signal generator generates a second transaction start signal for the second device based on the first transaction start signal.Type: ApplicationFiled: October 22, 2007Publication date: April 24, 2008Inventor: Tetsuya Kato
-
Publication number: 20080098141Abstract: A bridge is provided with a first portal connected to a first communication line forming one part of a network for transmitting/receiving information via the first communication line, and a second portal connected with a second communication line forming the other part of the network for transmitting/receiving information via the second communication line. These first and second portals can transfer information received, to each other. When one of the first and second portals receives, in case a connection has already been established on the network including that bridge, environment updating information for updating the using environment of the connection, via one of the first and second communication lines, one of the first and second portals transfers the environment updating information received, to the other. The other of the first and second portals updates the using environment of the other of the first and second communication lines in accordance with the environment updating information transferred.Type: ApplicationFiled: July 15, 2005Publication date: April 24, 2008Inventors: Kinya Ohno, Kunihiro Minoshima
-
Publication number: 20080098142Abstract: A memory card includes a clock I/O circuit, a data I/O circuit, a delay element, and an adjustment value holding circuit. The clock input/output circuit receives a first clock from a host apparatus. The data I/O circuit receives a second clock from the host apparatus in a write timing adjustment mode. The data I/O circuit transmits and receives data to and from the host apparatus in a data transfer mode. In the write timing adjustment mode, the delay element adjusts a phase of the second clock in accordance with the first clock so as to receive the data received in the data transfer mode in response to the first clock. The adjustment value holding circuit holds an adjustment value for the phase of the second clock adjusted. In the data transfer mode, the delay element adjusts a phase of the data in accordance with the adjustment value.Type: ApplicationFiled: September 27, 2007Publication date: April 24, 2008Inventor: Akihisa FUJIMOTO
-
Publication number: 20080098143Abstract: Systems including both distributed and centralized architectures for providing multiple levels of security using “virtual” switches. Ports and channels are assigned the same time slots on a TDMA bus only when they have matching security levels.Type: ApplicationFiled: March 31, 2006Publication date: April 24, 2008Inventors: Jeffrey Canter, Michael Weller, Michael Zimmer
-
Publication number: 20080098144Abstract: Methods and systems for allowing multiple devices to share the same serial lines (e.g., SDIO, SEN and SCLK) are provided. Such devices can be located, e.g., on an optical pick-up unit. Each device includes a serial interface, a device enable number (DEN) that differs from the DEN of each other device, and a plurality of registers, with at least one register being designated a device select register (DSR). The DSRs of the plurality of devices share a common address. The plurality of serial interfaces are collectively enabled and collectively disabled (e.g., via the SEN line). However, only one of the plurality of serial interfaces can be selected at one time, with the remaining of the plurality of serial interfaces being deselected. The serial interface of a device is selected when the DEN of the device is the same as the content of the DSR of the device, and deselected when the DEN of the device is not the same as the content of the DSR of the device.Type: ApplicationFiled: January 19, 2007Publication date: April 24, 2008Applicant: INTERSIL AMERICAS INC.Inventors: Theodore D. Rees, D. Stuart Smith, Dong Zheng
-
Publication number: 20080098145Abstract: A method and an apparatus of memory access request priority queue arbitration comprises sorting the requests into plurality of different priority levels firstly. The priority queues of different priority levels are arranged respectively according to the following steps: counting the cycles and latencies of each access request; counting the total cycles; comparing the latencies of each access request and total cycles respectively, if the total cycles is larger than the latency of a request, then arranging one more the same request in the priority queue, else executing the priority queue in order.Type: ApplicationFiled: December 19, 2007Publication date: April 24, 2008Inventor: Ting-Kun Yeh
-
Publication number: 20080098146Abstract: An interrupt hooking method for a computing apparatus, which includes a processing device and an interrupt controller, includes the steps of: enabling the processing device to convert a hardware interrupt request (IRQ) number of a system control interrupt (SCI) into a predefined interrupt vector according to an operating mode of the interrupt controller; and enabling the processing device to modify a pointer in an interrupt descriptor table that corresponds to the predefined interrupt vector for directing to a corresponding interrupt handler of the application program. A computing apparatus, which includes the processing device that performs the interrupt hooking method, is also disclosed.Type: ApplicationFiled: October 20, 2006Publication date: April 24, 2008Inventor: Jang-Ying Lee
-
Publication number: 20080098147Abstract: A bus repeater lying within a demodulation IC performs a bus repeat operation after a repeat operation has been made effective, and terminates the repeat operation on an autonomous basis when a stop condition for each serial data is detected. During the repeater operation, control on the direction of data transfer of a master-side IIC bus and control on the direction of data transfer of a tuner-side IIC bus corresponding to a repeat destination are performed by a master-side IIC bus transaction while they are being synchronized with each other. Therefore, the CPU-side IIC bus and the tuner-side IIC bus seem to be through-connected as the flow of the serial data. Further, data transfer can be done only when the swapping of the data with the tuner side is needed.Type: ApplicationFiled: September 27, 2007Publication date: April 24, 2008Applicant: Oki Electric Industry Co., Ltd.Inventor: Shigeru Amano
-
Publication number: 20080098148Abstract: A system comprises a first host bus adapter (HBA) that uses a first context to facilitate the transmission of packets through a logical connection through the first HBA. The system also comprises a second HBA and memory in which the first context is stored. The memory is accessible by both of the first and second HBAs. Upon receiving a packet associated with the logical connection, the second HBA accesses the memory to use the first context to process the packet in accordance with the first context.Type: ApplicationFiled: October 24, 2006Publication date: April 24, 2008Inventors: Michael Sean McGee, Darda M. Chang, Daniel N. Cripe
-
Publication number: 20080098149Abstract: A signal history controlled slew-rate transmission method and bus interface transmitter provide an improved channel equalization mechanism having low complexity. A variable slew-rate feed-forward pre-emphasis circuit changes the slew rate of the applied pre-emphasis in conformity with the history of the transmitted signal. The pre-emphasis circuit may be implemented by a pair of current sources supplying the output of the transmitter, and having differing current values. The current sources are controlled such that upon a signal value change, a high slew rate is provided and when the signal value does not change for two consecutive signal periods, the slew rate is reduced. A current source having a controlled magnitude may be employed to provide a slew rate that changes over time and is continuously reduced until another transmission value change occurs.Type: ApplicationFiled: December 21, 2007Publication date: April 24, 2008Inventors: Daniel De Araujo, Daniel Dreps, Bhyrav Mutnury
-
Publication number: 20080098150Abstract: Provided is a method for forming a route map in a wireless 1394 bridge network. The method for forming a route map in a wireless 1394 bridge network, including the steps of: a) storing route map information; b) collecting changed bus information when a new network is formed according to addition/removal of a bridge; c) checking whether a quantity of the collected bus information exceeds a threshold; d) forming a route map having all bus information when the quantity of the collected bus information exceeds a threshold; and e) forming a route map having changed bus information when collected bus information does not exceed the threshold.Type: ApplicationFiled: October 23, 2007Publication date: April 24, 2008Inventors: Il-Soon JANG, Seong-Hee PARK, Seong-Hee LEE, Sang-Sung CHOI
-
Publication number: 20080098151Abstract: A memory crossbar adapted to transmit a memory transaction to a network resource. The memory crossbar includes a plurality of input ports. Each of the plurality of input ports includes a TAGS generator and a queue adapted to receive a first portion of a first memory transaction and a first portion of a second memory transaction. Each of the plurality of inputs ports also includes an arbiter coupled to the queue and adapted to independently select either the first portion of the first memory transaction or the first portion of the second memory transaction based on a priority associated with the first portion of the first memory transaction and the first portion of the second memory transaction and a multiplexer coupled to the arbiter.Type: ApplicationFiled: September 25, 2007Publication date: April 24, 2008Applicant: PASTERNAK SOLUTIONS LLCInventors: Stephen Purcell, Scott Kimura
-
Publication number: 20080098152Abstract: Embodiments of the invention generally provide a memory device and a method for providing the memory device. In one embodiment, the method includes providing one or more layers including a memory array of the memory device. The one or more layers are arranged in a manner allowing selection of a configuration for the memory device from at least a first configuration and a second configuration. Operation of the memory device is different in the first configuration with respect to the second configuration. The method also includes selecting a configuration for the memory device from at least the first configuration and the second configuration. The method further includes providing a first layer disposed on the one or more layers if the first configuration is selected. The first layer corresponds to the first configuration. The method also includes providing a second layer disposed on the one or more layers if the second configuration is selected. The second layer corresponds to the second configuration.Type: ApplicationFiled: October 19, 2006Publication date: April 24, 2008Inventor: Josef Schnell
-
Publication number: 20080098153Abstract: A memory access controller includes: an access request bank analyzer which generates access request bank information indicative of a bank of a memory to be accessed according to a memory access request signal; a bank use state information holder for holding the access request bank information for a predetermined period to use the held information as bank use state information; and an access permission signal generator for generating, based on the access request bank information and the bank use state information, an access permission signal which is to be used for controlling whether or not to accept a subsequent memory bank access. The bank use state information regarding an access-permitted memory bank is updated according to the access information, such as transfer direction information, access unit information, memory initialization information, etc.Type: ApplicationFiled: August 22, 2007Publication date: April 24, 2008Inventors: Yasuo Nishioka, Takahide Baba, Seiji Horii, Yoshiharu Watanabe
-
Publication number: 20080098154Abstract: A method is provided for increasing the efficiency of virtual machine processing. A parent virtual machine is provided on a host computer. The parent virtual machine is temporarily or permanently suspended. A child virtual machine is created at a new location by forking the parent virtual machine. The child virtual machine may not initially include all the stored data that is associated with the parent virtual machine.Type: ApplicationFiled: December 21, 2007Publication date: April 24, 2008Applicant: Microsoft CorporationInventors: Eric Traut, Rene Vega
-
Publication number: 20080098155Abstract: A file download method adapted for a download apparatus is provided. The apparatus includes a storage unit for storing connection data and search fields, the connection data specifies an external device which the apparatus connects to, and the search fields are used as download conditions for downloading files from the external device connected thereto. The method includes: reading the connection data; connecting the apparatus to the external device according to the connection data; reading the search fields; searching the connected external device for files that match the read search fields; and downloading the matched files. A related download apparatus is also provided.Type: ApplicationFiled: October 17, 2007Publication date: April 24, 2008Applicants: ENSKY TECHNOLOGY (SHENZHEN) CO., LTD., ENSKY TECHNOLOGY CO., LTD.Inventors: Hua-Dong Cheng, Wen-Chuan Lian, Han-Che Wang
-
Publication number: 20080098156Abstract: The disclosed systems and methods provide for the protection of protected memory, for example, a hard disk, in a computer system. The systems and methods are configured to re-direct read and write access commands from locations in the protected memory to alternative storage locations. The systems and methods provide the ability for the user to accept or reject any BIOS changes that are to be made to the computing system. In addition, the systems and methods protect against operating system crash due to missing or corrupted files. The systems and methods are additionally operable to recover mistakenly deleted or damaged application data from a hard disk level, as well as to protect the operating system and data of the computing system against virus penetration. In other embodiments, the systems and methods are operable to provide for a security lock to the computing system and its associated data.Type: ApplicationFiled: December 20, 2007Publication date: April 24, 2008Inventors: Andrew Shen, Hanxiang Sun, Zhang Jian
-
Publication number: 20080098157Abstract: One embodiment of a non-volatile memory system comprises block-accessible non-volatile memory, random access memory arranged to be linearly addressable by a processor as part of the processor's memory address space, to be read from and written to by the processor, and logic interposed between the block-accessible non-volatile memory and the random access memory and arranged to write parts of the content of the random access memory in blocks to blocks of the non-volatile, block-accessible memory. The logic is arranged to monitor processor writes to the random access memory, and to write blocks of the random access memory that differ from a most recent copy in the non-volatile, block-accessible memory to the non-volatile, block-accessible memory.Type: ApplicationFiled: October 23, 2006Publication date: April 24, 2008Inventors: J. Michael Andrewartha, James Hess, David Maciorowski, Edward A. Cross
-
Publication number: 20080098158Abstract: To enable a capacity of an entire storage device to be kept by adding a flash drive or a flash module in the flash drive for a flash memory that has a failure, even if the storage device using the flash memory has a failure in its part such as a part of flash memory chip has a failure, for example, the flash memory chip has run out of its lifetime. In a storage device 101 equipped with two or more memory device units 105 with a plurality of semiconductor memory devices 107, each of which has a functional capacity unit 109 smaller than a capacity of an entire semiconductor memory device and has a writing lifetime for each functional capacity unit, only a functional capacity unit whose writing lifetime is run out to be determined as unable to be written is substituted by a functional capacity unit in a memory device of the other memory device unit to keep a predetermined capacity of the entire device.Type: ApplicationFiled: January 11, 2007Publication date: April 24, 2008Inventor: Jun KITAHARA
-
Publication number: 20080098159Abstract: A memory system which includes a host and a data storage device which is configured to receive an invalidated block address and to interrupt a merge operation for an invalidated block.Type: ApplicationFiled: December 26, 2006Publication date: April 24, 2008Inventors: Dong-Hyun Song, Chan-Ik Park, Shea-Yun Lee
-
Publication number: 20080098160Abstract: Methods and devices generating and processing update packages containing multiple updates for updating compressed firmware and file systems in an electronic device.Type: ApplicationFiled: April 2, 2007Publication date: April 24, 2008Inventors: Marko Slyz, Shao-Chun Shen, LaShawn McGhee
-
Publication number: 20080098161Abstract: A control method of a memory device including a storage area formed of a nonvolatile semiconductor memory, includes updating a file stored in the storage area by using a file system which supports an incremental write method, recording, in the storage area, an allocation table representing a correlation between a logical address indicating a recording position of the file and a virtual address representing a virtual recording position of the file and management information of the allocation table, and recording position information representing a recording position of the management information in a position information area of the storage area.Type: ApplicationFiled: October 8, 2007Publication date: April 24, 2008Inventor: Takafumi Ito