Patents Issued in July 17, 2008
-
Publication number: 20080172539Abstract: Systems, methods and media for performing auto-migration of data among a plurality of memory devices are disclosed. In one embodiment, memory access of application program data is monitored for each of one or more application programs. The data may be stored in one or more of a plurality of memory storage devices, each with its own performance characteristics. Monitored access is evaluated to determine an optimal distribution of the application programs data, typically stored in files, among the plurality of memory storage devices. The evaluation takes into account service level requirements of each application program. Periodically, data may be automatically transferred from one memory storage device to another to achieve the determined optimal allocation among the available memory storage devices consistent with service level requirements.Type: ApplicationFiled: March 24, 2008Publication date: July 17, 2008Inventors: Gregory Jensen Boss, Christopher James Dawson, Rick Allen Hamilton, Timothy Moffett Waters
-
Publication number: 20080172540Abstract: An interface system is disclosed. In one embodiment, the system includes a buffer that receives data from a source in a first clock domain and stores the data to be read by a destination in a second clock domain, wherein the buffer functions in both the first clock domain and the second clock domain; a write pointer that points to data written by the source; and a read pointer that points to data read by the destination. According to the system and method disclosed herein, the write pointer and the read pointer are utilized to enable the data to be transmitted from the first clock domain to the second clock domain asynchronously.Type: ApplicationFiled: January 11, 2007Publication date: July 17, 2008Applicant: International Business Machines CorporationInventors: Scott J. LEMKE, Kevin N. Magill, Michael S. Siegel
-
Publication number: 20080172541Abstract: A data management apparatus and method. The data management apparatus includes an input unit to receive a request to update information included in a predetermined master BAT (block allocation table) block of a plurality of master BAT blocks; and an update unit to record updated information to the predetermined master BAT block based on the update request.Type: ApplicationFiled: August 13, 2007Publication date: July 17, 2008Applicant: Samsung Electronics Co., Ltd.Inventors: Il-Woo PARK, Jang-seok Seo, Sung-jae Park
-
Publication number: 20080172542Abstract: A method, apparatus and system of a hierarchy of a structure of a volume is disclosed. In one embodiment, a system includes a physical volume, a structure to provide a mapping to a location of a data segment of the physical volume that may include a table having a hierarchy, a logical volume management module to define a logical volume as an arrangement of the physical volume, a snapshot module that may automatically generate a point-in-time image of the logical volume, may prompt the logical volume management module to create and insert a first table and a second table into the hierarchy of the structure, the first table may provide a set of updates to the logical volume, the second table may provide a set of updates to the point-in-time image, and a data processing system to perform a write IO operation and a read IO operation.Type: ApplicationFiled: January 16, 2007Publication date: July 17, 2008Inventor: Shyam Kaushik
-
Publication number: 20080172543Abstract: A method for retrieving information from a storage unit, the method includes: receiving, by an input output memory management unit second-level translation information representative of a partition of a storage unit address space; receiving, by a input output memory management unit, a direct memory access request that comprises a consumer identifier and a second memory address that was first-level translated by a communication circuit translation entity; performing, by the input output memory management unit, a second-level translation of the second memory address such as to provide a third memory address, in response to the identity of the consumer; and accessing the storage unit using the third memory address.Type: ApplicationFiled: January 16, 2007Publication date: July 17, 2008Inventors: Shmuel Ben-Yehuda, Orran Yaakov Krieger, Jon David Mason, James Xenidis
-
Publication number: 20080172544Abstract: A method and apparatus for discovering errors in a translation look-aside buffer (TLB). The TLB comprises a content addressable memory (CAM) and a random access memory (RAM). The TLB contains additional logic to check for error when the TLB is not in normal use to translate from a first set of elements, stored as entries in the CAM, to a second set of elements, stored as entries in the RAM. If the TLB is not in normal use, a RAM entry is selected and checked for errors. If an error is detected in the RAM entry, the corresponding TLB entry is purged.Type: ApplicationFiled: January 11, 2007Publication date: July 17, 2008Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.Inventors: Kevin D. Safford, Jeremy Petsinger
-
Publication number: 20080172545Abstract: System and method for accessing and displaying personal information along with advertisement, software applications, or the like. The system and method include: retrieving from a memory device a unique identifier and a pointer; retrieving a redirect pointer from a pointer table responsive to the retrieved unique identifier and pointer; executing the retrieved redirect pointer to launch a software application to display a first content; displaying a second content and/or an advertisement with the first content.Type: ApplicationFiled: August 8, 2007Publication date: July 17, 2008Inventor: John Christian Boucard
-
Publication number: 20080172546Abstract: A digital signal processor is provided, comprising at least one cluster. The cluster may comprise at least two function units each conducting different instruction types, at least two private register files each associated with one function unit for data storage, a ping-pong register providing exclusively accessible data storage, and a public register file. The public register file comprises at least two read ports, each coupled to a function unit, providing read accessibility for the function units, and one write port to write data to the public register file.Type: ApplicationFiled: February 26, 2007Publication date: July 17, 2008Applicant: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTEInventors: Chuan-Cheng Peng, Po-Han Huang
-
Publication number: 20080172547Abstract: A data processing system 2 includes an instruction cache 6 having an associated buffer memory 18, 8. The buffer memory 18, 8 can operate in a buffer mode or in a microcache mode. The buffer memory is switched into the microcache mode upon program loop detection performed by loop detector circuitry 20. When operating in the microcache mode, instruction data is read from the buffer memory 18, 8 without requiring an access to the instruction cache 6.Type: ApplicationFiled: January 11, 2007Publication date: July 17, 2008Applicant: ARM LimitedInventors: Frederic Claude Marie Piry, Louis-Marie Vincent Mouton, Stephane Eric Sabastien Brochier, Gilles Eric Grandou
-
Publication number: 20080172548Abstract: One embodiment of the present invention provides a system for measuring processor performance during speculative-execution. The system starts by executing instructions in a normal-execution mode. The system then enters a speculative-execution episode wherein instructions are speculatively executed without being committed to the architectural state of the processor. While entering the speculative-execution episode the system enables a speculative execution monitor. The system then uses the speculative execution monitor to monitor instructions during the speculative-execution episode to record data values relating to the speculative-execution episode. Upon returning to normal-execution mode, the system disables the speculative execution monitor. The data values recorded by the speculative execution monitor facilitate measuring processor performance during speculative execution.Type: ApplicationFiled: January 16, 2007Publication date: July 17, 2008Inventors: Paul Caprioli, Shailender Chaudhry, Sherman H. Yip
-
Publication number: 20080172549Abstract: One embodiment of the present invention provides a system that counts speculatively-executed instructions for performance analysis purposes. During operation, the system counts instructions which are normally executed during a normal-execution mode. Next, the system enters a speculative-execution mode wherein instructions are speculatively executed without being committed to the architectural state of the processor. During the speculative-execution mode, the system counts the speculatively-executed instructions in a manner that enables the count of speculatively-executed instructions to be reset if the speculative execution fails.Type: ApplicationFiled: January 16, 2007Publication date: July 17, 2008Inventors: Paul Caprioli, Shailender Chaudhry, Sherman H. Yip
-
Publication number: 20080172550Abstract: A multi-word transfer instruction, a memory transfer method using the multi-word transfer instruction and a circuit implementation for transferring multiple words between a memory subsystem and a processor register file are provided. The multi-word transfer instruction specifies an access type (load or store), a consecutive register group, a selection mask and a base register for the starting address of the corresponding memory locations. Therefore, the total number of words accessed by this instruction is equal to the number of registers specified in the consecutive register group along with the number of the registers specified by the selection mask. Besides, additional information, such as an address update mode, an order mode and a modification mode, may be further specified in the multi-word transfer instruction.Type: ApplicationFiled: January 12, 2007Publication date: July 17, 2008Applicant: ANDES TECHNOLOGY CORPORATIONInventors: Hong-Men Su, Chuan-Hua Chang, Jen-Chih Tseng
-
Publication number: 20080172551Abstract: To verify an addition-function of a floating-point adder-subtractor in a processor, parameters such as the number of verification patterns of a verification program are set, a floating-point addition instruction to be verified is created, and operands used for this addition are created at random. The floating-point addition instruction thus created is emulated only by a fixed-point instruction and processed only by using the fixed-point execution element, thereby creating an expectation value. The floating-point addition instruction is computed by using the floating-point adder-subtractor to be verified, and the created expectation value is compared with the operation result. If they do not correspond to each other, the set number of operation patterns is checked. If the number has reached a prescribed value, the operation verification is terminated in the normal manner.Type: ApplicationFiled: February 8, 2008Publication date: July 17, 2008Applicant: FUJITSU LIMITEDInventors: Hideo YAMASHITA, Ryuji Kan
-
Publication number: 20080172552Abstract: The invention relates to a method and to a dvice for the selective and/or time-delayed and collective transmission of messages in a TMN system that is managed according to ITU-T recommendations. To this end, a MassEventDiscriminator is defined as the object class and a MassEventPreprocessor, using the MassEventDiscriminator, transmits only those messages from a network element to an operation system that have an information content significant for the management of the system.Type: ApplicationFiled: January 31, 2002Publication date: July 17, 2008Inventor: Alan Burger
-
Publication number: 20080172553Abstract: A method and system for determining an optimal order for rebooting servers in a data center. After an abnormal shutdown event in a data center, a power restoration management (PRM) server detects a restoration of power capable of being available for a rebooting of servers in the data center. A power restoration management program automatically and dynamically determines an optimal order for rebooting the servers, where the order is a result of applying policies based on weighted factors. The PRM server or a manual process reboots the servers in the determined order. The rebooting includes an enhancement of a financial position of an organizational entity associated with the data center. The enhancement of the financial position includes increasing a financial profit of the organizational entity or decreasing a financial loss of the organization entity.Type: ApplicationFiled: January 11, 2007Publication date: July 17, 2008Inventors: Rhonda L. Childress, David Bruce Kumhyr, Christopher L. Molloy
-
Publication number: 20080172554Abstract: Methods, apparatus, and products are disclosed for controlling an operational mode for a logical partition on a computing system that include: receiving, in a hypervisor installed on the computing system, a processor compatibility mode for the logical partition and a firmware compatibility mode for the logical partition, the processor compatibility mode specifying a processor architecture version configured for the logical partition, and the firmware compatibility mode specifying a firmware architecture version configured for the logical partition; providing, by the hypervisor for the logical partition, a firmware interface in dependence upon the firmware compatibility mode; and providing, by the hypervisor for the logical partition, a processor interface in dependence upon the processor compatibility mode.Type: ApplicationFiled: January 15, 2007Publication date: July 17, 2008Inventors: William J. Armstrong, Richard L. Arndt, David A. Larson, Naresh Nayar
-
Publication number: 20080172555Abstract: The invention provides a “thin client”, such as software loaded on a USB memory “stick” or other bootable media, that boots a host machine without using the machine's hard-drive or software and without local applications running in the background. The USB thin client device's use and control of the host machine is safe to the host machine because it does not involve nor alter the hard-drive or software of the machine. The host machine acts like a “dumb” terminal to permit the USB thin client to remotely access a remote server to for example run software and access data remotely for local presentation and interfacing via the host machine's display, keyboard, printer, etc. By using, for example, a broadband Internet connection there is no appreciable delay given today's connection speeds. The USB thin client typically includes a portion in the open and an encrypted portion only accessible after the user, for example, enters a security password.Type: ApplicationFiled: June 22, 2007Publication date: July 17, 2008Inventor: Roderick J. Keenan
-
Publication number: 20080172556Abstract: An information processing apparatus including: a first recording medium which stores a first program; a connection section which is capable of connecting with a second recording medium from outside; and a controller which determines, during BIOS boot-up operation, whether or not the connection section is connected with the second recording medium which stores predetermined authentication information, and if connected, boots a second program stored in the second recording medium, while if not connected, boots the first program stored in the first recording medium.Type: ApplicationFiled: January 9, 2008Publication date: July 17, 2008Inventors: Tetsuya ISHIKAWA, Tomohiro Suzuki, Tomoya Ogawa, Fumikage Uchida, Munetoshi Eguchi, Hiroaki Yago
-
Publication number: 20080172557Abstract: There is disclosed a device, system, and method for a ROM BIOS based trusted encrypted operating system for use in a gaming environment. The gaming device includes a ROM storing a BIOS, a secure loader, an encrypted operating system, and a decryption key for decrypting the encrypted operating system. The decryption key is partitioned and scattered about the secure loader. The method includes initializing the BIOS, locating the decryption key, decrypting the encrypted operating system with the encryption key, verifying a plurality of check codes, and transferring control to the operating system. The check codes are verified responsive to decrypting the encrypted operating system. The check codes are dispersed about the operating system and are unrelated to the operating system. Control is transferred to the operating system responsive to verifying the check codes.Type: ApplicationFiled: January 14, 2008Publication date: July 17, 2008Applicant: BALLY GAMING, INC.Inventors: Robert W. Crowder, Ronald A. Cadima, Anthony E. Green, Thomas E. Buckeyne, Pravinkumar Patel
-
Publication number: 20080172558Abstract: Provided are a system, and article of manufacture for system recovery. An operating system and a backup copy of the operating system are both maintained in a partition of a computational device. A boot loader receives an indication to load the backup copy of the operating system. The boot loader loads the backup copy of the operating system. The computational device is rebooted with the loaded backup copy of the operating system.Type: ApplicationFiled: March 25, 2008Publication date: July 17, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Christopher John Stakutis, Kevin Michael Stearns, Jennifer Martin Shaw
-
Publication number: 20080172559Abstract: A method and system is presented for configuring a group of OCSP (Online Certificate Status Protocol) responders so that they are highly available. Each of the grouped OCSP responders share a common public key. When responding to an OCSP request, an OCSP responder generates an OCSP response that is signed with a group digital signature; the certificate for the common or group public key can be attached to the OCSP response. An OCSP client uses the group public key to verify the group digital signature on an OCSP response from any of the OCSP responders. For an OCSP client, the availability of this group of responders is greater than the availability of any one member of the group.Type: ApplicationFiled: October 3, 2007Publication date: July 17, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Krishna K. Yellepeddy
-
Publication number: 20080172560Abstract: Embodiments of the present invention relate to systems and methods to authenticate software licenses. One embodiment of the present invention comprises a method where a vendor creates a reversible hash from a known, predetermined seed value, encrypts the hash to generate a digital signature, and sends the digital signature to the customer. The customer enters the digital signature. The customer's client computer reverses the reversible hash to obtain a determined seed value. The client has access to the known seed value used by the vendor. The known seed value is compared to the determined seed value. If the seed values compare, the software license and the associated software is authenticate.Type: ApplicationFiled: January 15, 2007Publication date: July 17, 2008Applicant: Microsoft CorporationInventors: Aidan T. Hughes, Vladimir Tankovich
-
Publication number: 20080172561Abstract: A system and method of performing cooperative non-repudiated message exchange from a first system to a second system in a computer network comprises checking for discrepancies between a current system time in the second system with an actual time; performing a time synchronization process to match the current system time with the actual time; exchanging public encryption keys between the first and second systems; sending a digitally signed message from the first system to the second system; decoding the digitally signed message; sending a digitally signed acknowledgment message from the second system to the first system; decoding the digitally signed acknowledgment message; and committing text of the digitally signed message to an official transcript on the first system.Type: ApplicationFiled: March 25, 2008Publication date: July 17, 2008Applicant: International Business Machines CorporationInventors: Brian D. Goodman, Frank L. Jania, James K. Kebinger, Darren M. Shaw
-
Publication number: 20080172562Abstract: Techniques for encryption and authentication of data. One or more plaintext data blocks ciphertext data blocks and corresponding authentication tags are generated by means of authenticated encryption. A tag tree is generated by means of the authentication tags. The ciphertext data blocks and the tag tree data of the tag tree are stored in an untrusted storage, and the root tag of the tag tree is stored in a trusted storage.Type: ApplicationFiled: January 12, 2007Publication date: July 17, 2008Inventors: Christian Cachin, Paul T. Hurley, Roman A. Pletka
-
Publication number: 20080172563Abstract: A system and method for Write Once, Read Many (WORM) compliant storage is disclosed. A storage administrator in user space is employed as an interface between the kernel space WORM VFS and the user applications. The storage administrator accesses the WORM VFS through the operating system's Virtual File System. The WORM VFS comprises of three layers: a data encryption\compression layer, the WORM filesystem layer and a logical volume manager. The data encryption\compression layer preprocesses the data as it moves between from the user space and the WORM filesystem layer. The WORM filesystem layer stores the compressed and encrypted data on the physical disk drives in a specialized disk format. The logical volume manager manages the physical disk drives. A NVRAM journal aids in crash recovery.Type: ApplicationFiled: January 15, 2008Publication date: July 17, 2008Inventor: Terry Stokes
-
Publication number: 20080172564Abstract: A system and method for controlling the delivery of power to a powered device in a Power over Ethernet Broad Reach (PoE-BR) application. Cabling power loss in a PoE-BR application is related to the resistance of the cable itself. A PHY can be designed to measure electrical characteristics (e.g., insertion loss, cross talk, length, etc.) of the Ethernet cable to enable determination of the cable resistance. The determined resistance in a broad reach cable can be used in increasing a power budget allocated to a power source equipment port.Type: ApplicationFiled: January 16, 2007Publication date: July 17, 2008Applicant: Broadcom CorporationInventors: Wael William Diab, Nariman Yousefi, Kevin Clyde Brown
-
Publication number: 20080172565Abstract: A multi-processor system and a performance adjustment method thereof are disclosed. The multi-processor system includes a first processing unit and a second processing unit, the performance adjustment method includes: first, detecting the load of each processing unit to obtain corresponding detected data; then, determining whether one of the processing units has the most load; finally, if the first processing unit has the most load, increasing the power supply to the first processing unit.Type: ApplicationFiled: December 31, 2007Publication date: July 17, 2008Applicant: ASUSTek COMPUTER INC.Inventors: Shao-Kang Chu, Yi-Wei Chiu
-
Publication number: 20080172566Abstract: A battery module usable with a computer system includes a circuit to generate a power, and a controller to output the power of the circuit to an external device, for example, the computer system, and to prevent the power from being output from the circuit to the external device according to an external signal received from the external device. The computer system includes a circuit to receive the power from the battery module, a second circuit to generate another power other than the power of the battery module, and a second controller to generate a detection signal as the external signal according to existence of the another power of the second circuit. The circuit may include an adapter to receive an extern power from an external power source and a battery to receive the external power from the adapter or to generate an auxiliary power and the power.Type: ApplicationFiled: September 12, 2007Publication date: July 17, 2008Applicant: Samsung Electronics Co., Ltd.Inventor: Jeong-gyu Park
-
Publication number: 20080172567Abstract: The present disclosure is directed to systems and methods of power management of a device. In a particular embodiment, the method includes determining a first power consumption value for a first power management operating sequence of an electronic device. The method also includes determining a second power consumption value for a second power management operating sequence based on previous activity of the electronic device. The method also includes selecting either the first power management operating sequence or the second power management operating sequence.Type: ApplicationFiled: January 11, 2007Publication date: July 17, 2008Applicant: SEAGATE TECHNOLOGY, LLCInventors: Fumin Zhang, Angel Matson, David Scott Seekins
-
Publication number: 20080172568Abstract: For controlling power to an electronic device such as a CPU (central processing unit), each of at least two regulators provides a respective power at a common node of the electronic device. In addition, a logic unit controls each of the at least two regulators to provide variable power such as variable current at the common node depending on an operating mode of the electronic device.Type: ApplicationFiled: December 20, 2007Publication date: July 17, 2008Inventors: Suk-Ki Yoon, Seong-Hye Park
-
Publication number: 20080172569Abstract: A portable display device comprises: a first panel emitting light in a first direction; a second panel emitting light in a second direction; a substrate disposed between the first panel and the second panel; a first power supply unit applying a power supply voltage to the first panel; a second power supply unit applying a power supply voltage to the second panel; a switch control unit selectively controlling the first power supply unit and the second power supply unit; a first positive power supply voltage unit electrically coupled to the first power supply unit and applying a positive power supply voltage to the first panel; a second positive power supply voltage unit electrically connected to the second power supply unit and applying a positive power supply voltage to the second panel; a first negative power supply voltage unit electrically coupled to the first power supply unit and applying a negative power supply voltage to the first panel; and a second negative power supply voltage unit electrically connType: ApplicationFiled: July 11, 2007Publication date: July 17, 2008Inventor: Jaesung Lee
-
Publication number: 20080172570Abstract: A data line repair mechanism for a display including a data driver, a plurality of data lines, at least one rescue line is disclosed, wherein each data line includes a second end and a first end coupled to the data driver, the rescue line is coupled to the data driver, and when a first data line fails, the rescue line is coupled to the second end of the first data line via a single one weld point. The mechanism includes an address storage unit storing the addresses of the first data line and rescue line, and a data processor receiving an input data to output an output data to the data driver, wherein the input data includes a first display data corresponding to the first data line, and the first display data is transmitted to the rescue line based on the addresses of the first data line and rescue line.Type: ApplicationFiled: November 20, 2007Publication date: July 17, 2008Applicant: AU OPTRONICS CORP.Inventors: Chih-Che Hsu, Hung-Min Shih
-
Publication number: 20080172571Abstract: A method and system utilizing backup disk drives in disk array systems. In one aspect, a disk array system includes one or more disk arrays, each including two or more disk drives. The system includes a spare disk drive, and a controller operative to assign the spare disk drive to a particular one of the disk arrays having a type different than the type of the spare disk drive in response to a failure of a disk drive of the particular disk array, such that the spare disk drive stores data from and operates in place of the failed disk drive.Type: ApplicationFiled: January 11, 2007Publication date: July 17, 2008Applicant: International Business Machines CorporationInventors: Shawn C. Andrews, Don S. Keener, Thomas H. Newsom, Adam Roberts
-
Publication number: 20080172572Abstract: Provided are a method, system, and article of manufacture for using virtual copies in a failover and failback environment. Updates are copied from a primary first storage at the primary site to a secondary first storage at the secondary site during system operations. A second storage is maintained at at least one of the primary and secondary sites. A failover is performed from the primary site to the secondary site after a failure at the primary site. The at least one second storage is used after recovery of the primary site to synchronize the secondary site to the primary site. Only updates made to the secondary site during the failover are copied to or from the at least one second storage in response to the recovery at the primary site.Type: ApplicationFiled: January 12, 2007Publication date: July 17, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Brent Cameron Beardsley, Gregory Edward McBride, Robert Francis Bartfai
-
Publication number: 20080172573Abstract: A method and an electrical system for a vehicle. A digital information carrier sends digital data on. A first computing device is arranged to execute an installed first application software. A second computing device includes an installed backup application software, identical to the first application software. The second computing device is configured to execute an installed second application software different from the first application software. The second computing device is configured to initiate an execution of the installed backup application software when an error occurs in the first computing device in parallel with the execution of the second application software.Type: ApplicationFiled: December 19, 2007Publication date: July 17, 2008Applicant: SAAB ABInventors: Tomas Jansson, Lars Holmlund
-
Publication number: 20080172574Abstract: An embodiment of a method for providing technical support service includes generating a plurality of problem resolutions that are determined to resolve an identified technical problem; attributing weights to each of said plurality of problem resolutions according to frequency of use; and in response to a request to resolve said identified problem, selecting a problem resolution from among said plurality of problem resolutions based at least in part on said attributed weights.Type: ApplicationFiled: December 28, 2007Publication date: July 17, 2008Applicant: Peak8 Partners, LLCInventor: John W. Fisher
-
Publication number: 20080172575Abstract: A simulated internet is connected to a corporate network to more easily and effectively facilitate testing the impact of internet security devices and settings on internet software. The simulated internet has communications pathways between two firewall devices, a web proxy and a publishing firewall, that also protect the corporate network. A test web server on the corporate network is published to the simulated internet by the publishing firewall through reverse proxy as a unique internet name that only exists on the simulated internet One or more test client machines on the corporate network are configured to use the forward proxy firewall of the corporate web proxy to access the unique internet name. With this configuration all the pieces are in place for what the Internet does, except the simulated internet is a private internet under the control of the software tester.Type: ApplicationFiled: January 15, 2007Publication date: July 17, 2008Applicant: Microsoft CorporationInventor: Stephen Dunagan
-
Publication number: 20080172576Abstract: A diagnostic process applicable to VLSI designs to address the accuracy of diagnostic resolution. Environmentally based fail data drives adaptive test methods which hone the test pattern set and fail data collection for successful diagnostic resolution. Environmentally based fail data is used in diagnostic simulation to achieve a more accurate environmentally based fault callout. When needed, additional information is included in the process to further refine and define the simulation or callout result. Similarly, as needed adaptive test pattern generation methods are employed to result in enhanced diagnostic resolution.Type: ApplicationFiled: January 11, 2007Publication date: July 17, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mary P. Kusko, Gary W. Maier, Franco Motika, Phong T. Tran
-
Publication number: 20080172577Abstract: Provided are a testing apparatus and method using a test script in a mobile communication terminal. The testing method includes receiving a test scenario to be tested: loading the test script according to the test scenario, performing a test based on the test script; generating a test oracle during the test; and comparing the generated test oracle with the test script to determine test success or failure.Type: ApplicationFiled: August 9, 2007Publication date: July 17, 2008Applicant: Samsung Electronics Co., Ltd.Inventors: Eu-Jin Ha, In-Hoe Koo, Jung-Hoon Ahn
-
Publication number: 20080172578Abstract: A detection device and a method therefor are provided. The detection device is used to activate the main-board, when the power-on interval of the main-board is equal to the predetermined power-on interval. The detection device compares the value of the status signal transmitted with the predetermined status value. In case that the two values are not equal, the detection device generates and displays a first error message; otherwise, in case that the two values are equal, then the detection device powers-off the main-board, and upon determining that the voltage after its power-off is not equal to zero voltage, the detection device generates and displays a second error message; and upon determining that the accumulated detection number is not equal to the predetermined detection number, the detection device will reactivate the main-board and repeats the above steps, after the power-off interval of the main-board has reached to the predetermined power-off interval.Type: ApplicationFiled: January 11, 2007Publication date: July 17, 2008Applicant: INVENTEC CORPORATIONInventor: Sheng-Yuan Tsai
-
Publication number: 20080172579Abstract: The invention relates to a test device (1) and associated method for verifying a batch processing in a data processing device (2) comprising a first scheduling device (3) for controlling a data processing which processes the script library (5) scripts by means of a first script interface (4), thereby carrying out or controlling the operation of a company subordinate devices. The aim of said invention is to verify a batch processing without degrading a verifiable system performance. For this purpose, a second scheduling device (7) for simulating the processing of the script library (5) scripts and for transmitting said scripts to the device (1) for testing data resulting from the simulation by a second script interface (8) dependent of the first scheduling device (3) is added.Type: ApplicationFiled: March 10, 2006Publication date: July 17, 2008Inventors: Uwe Hahm, Roland Griessbach
-
Publication number: 20080172580Abstract: Code coverage data may be collected and reported. First, in response to running a plurality of different test cases, a first plurality of traces may be received. Each of the first plurality of traces may respectively correspond to a first plurality of outputs respectively produced by running each of the plurality of different test cases on a software program. Next, in response to a plurality of users running the software program, a second plurality of traces may be received. Each of the second plurality of traces may respectively correspond to a second plurality of outputs produced by the users running the software program. Then, the first plurality of traces may be compared to the second plurality of traces. A report may be created showing the comparison.Type: ApplicationFiled: January 15, 2007Publication date: July 17, 2008Applicant: Microsoft CorporationInventors: Brian D. Davia, Micah Lewis
-
Publication number: 20080172581Abstract: Various technologies and techniques are disclosed for performing load tests based upon user pace. A load test application is provided. Load test settings are received from a user that includes a test mix based upon user pace. A test start interval is calculated using the text mix. A load test is performed based upon the text mix. For example, the tests are executed at a pace that is based upon the test start interval for the particular user profile that the test is contained within.Type: ApplicationFiled: January 11, 2007Publication date: July 17, 2008Applicant: Microsoft CorporationInventors: Ed Glas, Bill Barnett
-
Publication number: 20080172582Abstract: Security peer failure, in a network, is reduced by detecting peer liveness after a session has been established between a first and a second peer utilizing a protocol for setting up a security association. A protocol for detecting faults establishes a session between the first and second peer and the fault detecting session is associated with the security association session. Alternatively the security association may be registered with the fault detecting session. The purpose of registering the fault detecting session and the security association session is to determine liveness of the security association peer and when the fault detecting session fails, the peer is notified to take corrective action.Type: ApplicationFiled: January 12, 2007Publication date: July 17, 2008Inventors: David Sinicrope, Jim Comen
-
Publication number: 20080172583Abstract: A computerized method for collecting error data and providing error reports relating to occurrences of errors of software applications installed on one or more computing devices is disclosed. Data for describing software applications and identifying software application errors is collected from the computing devices and stored in a catalog. Data associated with error occurrences is obtained and combined with related data being stored in the catalog. A report is generated based on the error occurrences and related catalog data.Type: ApplicationFiled: January 15, 2007Publication date: July 17, 2008Applicant: MICROSOFT CORPORATIONInventors: Dhananjay Madhusudan Mahajan, John Leo Ellis, Ram P. Papatla
-
Publication number: 20080172584Abstract: Methods and systems for in-place updating original content of an original version stored in a non-volatile storage device and for yielding updated content of an updated version. Some of the described embodiments illustrate the possibilities for reduction in storage operations, storage blocks, and/or update package size. Some of the described embodiments include the storage of error recovery result(s) such as XOR result(s) which enable the recovery of data in case of an interruption of the update process. In some of the described embodiments, there is re-usage of a buffer protecting content which is required in the update process.Type: ApplicationFiled: January 11, 2007Publication date: July 17, 2008Applicant: Red Bend Ltd.Inventors: Evyatar Meller, Sharon Peleg
-
Publication number: 20080172585Abstract: A system and method for self-test of an integrated circuit are disclosed. As one example, an integrated circuit is disclosed. The integrated circuit includes a digital signal processing chain, a random sequence generator coupled to an input of the digital signal processing chain, and a checksum calculator coupled to an output of the digital signal processing chain.Type: ApplicationFiled: January 12, 2007Publication date: July 17, 2008Applicant: Samsung Electronics Co., LtdInventor: William Milton Hurley
-
Publication number: 20080172586Abstract: The present disclosure describes novel methods and apparatuses for directly accessing JTAG Tap domains that exist in a scan path of many serially connected JTAG Tap domains. Direct scan access to a selected Tap domain by a JTAG controller is achieved using auxiliary digital or analog terminals associated with the Tap domain and connected to the JTAG controller. During direct scan access, the auxiliary digital or analog terminals serve as serial data input and serial data output paths between the selected Tap domain and the JTAG controller.Type: ApplicationFiled: March 26, 2008Publication date: July 17, 2008Applicant: TEXAS INSTRUMENTS INCORPORATEDInventor: Lee D. Whetsel
-
Publication number: 20080172587Abstract: A method, system and computer readable medium for on-chip testing is presented. In one embodiment, the method, system or computer readable medium includes identifying which LBIST channels of a plurality of LBIST channels do not contribute to a particular test and excluding from that particular test each LBIST channel that does not contribute to that particular test.Type: ApplicationFiled: January 11, 2007Publication date: July 17, 2008Inventor: Steven M. Douskey
-
Publication number: 20080172588Abstract: A system and method for testing a plurality of packet data transmitters in which multiple devices-under-test (DUTs) are tested by providing similar transmit data streams to the DUTs each of which, in response thereto, provides a respective packet data signal. At least a portion of each packet data signal is captured to provide captured data packets, which are processed to provide multiple sets of test data respective ones of which, in turn, are analyzed in view of the transmit data to determine an operational status of each DUT.Type: ApplicationFiled: April 5, 2007Publication date: July 17, 2008Applicant: LitePoint Corp.Inventor: Christian Volf Olgaard