Patents Issued in April 20, 2017
-
Publication number: 20170109128Abstract: An electronic device provides a temporal stream of audio clips on an ongoing basis. In particular, the temporal stream of audio clips includes a sequence of temporal subsets of audio content for the audio clips. For example, a temporal subset of the audio content for a given audio clip may include a snippet of the audio content that has a time duration that is a fraction of a time duration of the audio content. In response to a user selection of a particular audio clip, the temporal stream of audio clips is temporarily suspended while at least a remainder of the audio content for the particular audio clip is provided to the user. Moreover, when the temporal stream of audio clips resumes, it may be dynamically modified based on the user selection, one or more previous user selections and/or user selections made by other users.Type: ApplicationFiled: October 18, 2016Publication date: April 20, 2017Applicant: Clammr, Inc.Inventors: Parviz Parvizi, David H. Silverman
-
Publication number: 20170109129Abstract: An analog/digital audio converting apparatus enables listening to both digital and analog audio signals received from a digital receiving apparatus and analog audio signals input from an external source using the same receiver by providing a formatter capable of converting the analog audio signal into a digital audio signal with the digital broadcasting receiving apparatus.Type: ApplicationFiled: December 23, 2016Publication date: April 20, 2017Applicant: SAMSUNG ELECTRONICS CO., LTD.Inventor: Tae-yong SON
-
Publication number: 20170109130Abstract: A method for the communal construction of an audio harmonized electronic card includes loading a greeting card template in response to a request by an initial author. The method also includes receiving a voice track of the initial user along with a textual message and a designated recipient of an electronic card. The method yet further includes transmitting an invitation to a subsequent user with an embedded reference to the loaded card template. Thereafter, a voice track of the subsequent user is received from the subsequent user. Consequently, the voice tracks are composited into a single harmonized audio track with each of the voice tracks providing harmony to the other. An electronic card is then generated by embedding the textual message and the harmonized audio track into the loaded card template. Finally, the electronic card is transmitted to the designated recipient.Type: ApplicationFiled: March 1, 2016Publication date: April 20, 2017Inventor: Ignacio Doncel
-
Publication number: 20170109131Abstract: A system and method for communicating with a virtual reality headset. The wireless earpieces are linked with the virtual reality headset. Playback of audio content is synchronized with visual content displayed by the virtual reality headset. The audio content is played in response to receiving the audio content from the virtual reality headset.Type: ApplicationFiled: October 11, 2016Publication date: April 20, 2017Inventor: Peter Vincent Boesen
-
Publication number: 20170109132Abstract: A computerized information apparatus useful for providing information to a user via a display. In one embodiment, the apparatus comprises a processor apparatus, and speech input apparatus, touch screen input and display apparatus, and at least one computer program configured to run on the processor apparatus, the at least one program being configured to provide a user with contextually relevant content without an affirmative request for such content, but rather based on context divined from one or more “free form” words spoken by the user, whether while searching for information or otherwise. In one variant, the context determination is performed by a remote networked server after having been provided digitized speech samples via wireless interface. In another variant, the context is determined based on soft function key inputs from the user while requesting information. A virtual database structure enabling rapid context determination is also disclosed.Type: ApplicationFiled: December 28, 2016Publication date: April 20, 2017Inventor: Robert F. Gazdzinski
-
Publication number: 20170109133Abstract: An information processing apparatus includes a memory and a processor. The processor is configured to receive an input physical quantity, a value of the input physical quantity, and an output physical quantity. The processor is configured to generate a first array of first conversion operations or a second array of second conversion operations by using conversion rules each for converting a value of a source physical quantity into a value of a target physical quantity. Each conversion operation is a conversion according to a conversion rule or a reverse operation thereof. The first array enables a conversion of the input physical quantity into the output physical quantity. The second array enables the reverse. The processor is configured to convert the received value of the input physical quantity into a value of the output physical quantity by using the first array or the second array.Type: ApplicationFiled: October 4, 2016Publication date: April 20, 2017Inventors: Takanori Ukai, Shohei Yamane
-
Publication number: 20170109134Abstract: Methods and systems for determining whether an infinitely precise result of a reciprocal square root operation performed on an input floating point number is greater than a particular number in a first floating point precision. The method includes calculating the square of the particular number in a second lower floating point precision; calculating an error in the calculated square due to the second floating point precision; calculating a first delta value in the first floating point precision by calculating the square multiplied by the input floating point number less one; calculating a second delta value by calculating the error multiplied by the input floating point number plus the first delta value; and outputting an indication of whether the infinitely precise result of the reciprocal square root operation is greater than the particular number based on the second delta term.Type: ApplicationFiled: October 14, 2016Publication date: April 20, 2017Inventors: Casper VAN BENTHEM, Sam ELLIOTT
-
Publication number: 20170109135Abstract: A Method and Apparatus for Randomizer has been disclosed. In one implementation a sequence of randomized connections then exclusive-OR operations and then an adder produce a randomized output.Type: ApplicationFiled: December 26, 2016Publication date: April 20, 2017Applicant: MoSys, Inc.Inventors: Michael J. Miller, Michael J. Morrison, Jay B. Patel
-
Publication number: 20170109136Abstract: Examples of the disclosure provide a system and method for receiving a component at a design surface, the component representing a user interface element of an application. A selection of the component is received and a selection of at least a portion of a first target component is detected. Based on the selection of the first target component, a first property of the first target component is determined to use in an expression, the expression to be dynamically evaluated at runtime of the component. The expression automatically generated to change a property of the component based on the first property of the first target component.Type: ApplicationFiled: October 14, 2015Publication date: April 20, 2017Inventors: Olivier COLLE, Yudhvir Singh CHAUHAN, Laura Sabina ONU
-
Publication number: 20170109137Abstract: Various embodiments of systems and methods are described herein for executing software programs deployed in a distributed network. The enterprise application specific to a geographical jurisdiction may request for the software programs deployed in the distributed network to execute a specific business process. The enterprise application sends a service request to the distributed network for completion of a business process specific to the given jurisdiction. An application executing in the distributed network receives such service requests from multiple enterprise applications. The application retrieves the appropriate software program(s) deployed in the distributed network and generates the localization software program based on the received service request. Execution of the localization software program facilitates completion of the requested business process by generating reports specific to the given jurisdiction.Type: ApplicationFiled: December 2, 2015Publication date: April 20, 2017Inventors: ARUN SUBRAMANIAN, PRAVEENKUMAR ARANGOTTE KOZHISSERI, RACHIT MATHUR
-
Publication number: 20170109138Abstract: An object class (Class1) in a computer system is dynamically created by creating a global generic class (GenericClass) having two possible members, wherein at least one member is an instance of a generic class (GenericAttribute, GenericMethod), and by instantiating the global generic class.Type: ApplicationFiled: October 18, 2016Publication date: April 20, 2017Inventors: Armand NACHEF, Gerard SITBON
-
Publication number: 20170109139Abstract: The present disclosure involves systems, software, and computer implemented methods for predicting critical events using log data. One example method includes receiving an event regarding a visible portion of a window of a programming editor used to display software source code. A currently visible portion of the programming editor window and a content type of the software source code are identified. Syntax rules associated with the content type are determined. Dynamic formatting rules are determined based on the syntax rules of the content type and the currently visible portion of the programming editor window. The dynamic formatting rules are applied to display the software source code in the currently visible portion of the programming editor window in response to the event.Type: ApplicationFiled: October 14, 2015Publication date: April 20, 2017Inventors: Mattan Bitner, Tsahar Sobe
-
Publication number: 20170109140Abstract: The new method and system uses an arbitrary language specification organized as a series of words and characters or a hierarchical list of elements converted to a collection of inline controls to generate and modify any code or symbols using one or more windows. The controls are added to one or more windows depending on the user's choice of how to view/use the changeable controls; inline or in another window that functions as a structured, indented outline so the user can manage controls outside the default editing window. A composite class pattern for expression types and extended controls extends interactivity, and makes a scalable API possible. Word, required value, binary option, ternary option, series option, repeatable and nested, or recursively repeating, expressions are included in the class structure, making any command or syntax possible.Type: ApplicationFiled: October 19, 2015Publication date: April 20, 2017Inventor: Peter Lalka
-
Publication number: 20170109141Abstract: A mobile “Applications Builder” established on the user's mobile handheld device creates a bucket or container for mobile applications (Apps) and selectively downloads applications that are appropriate to a search initiated by the consumer. The user search inputs are used as a contextualization input to identify the relevant product, service or brand and identify the Apps of companies that fall within the search parameters. The identified Apps are downloaded into a bucket and made available to the user to enable his search using tokens or logos for the products, services and brands he is interested in. Users can perform searches using scanned visual logos or visual tokens scanned. Visual tokens and logos contained within the bucket can be used to reduce the customer's effort during the search, while providing enlarged access to related items for consideration by the user as a marketing tool.Type: ApplicationFiled: July 1, 2016Publication date: April 20, 2017Inventors: Ragy Thomas, Pivatar Singh
-
Publication number: 20170109142Abstract: The present disclosure relates systems and methods for creation of a customized mobile application. In an aspect, the system receives one or more customization inputs from a user; automatically and dynamically retrieves at least one user information attribute from one or more servers that the system is operatively coupled with; verifies the received one or more customization inputs and the dynamically retrieved at least one user information attribute; creates at least one configuration file based on the verified one or more customization inputs and the dynamically retrieved at least one user information attribute; creates at least one web service file for configuration or hosting on a web/application server; and builds the at least one configuration file and the at least one web service file to generate and publish an executable file of the mobile application.Type: ApplicationFiled: October 18, 2016Publication date: April 20, 2017Applicant: Cogitate Technology Solutions, Inc.Inventor: Arvind PremLal Kaushal
-
Publication number: 20170109143Abstract: A computer system product includes instructions to identify a primary symbol table associated with a primary source code file and identify a secondary symbol table associated with a secondary source code file. The computer system product includes instructions to receive a source code association indication. The source code association indication includes at least one association relationship between the primary source code file and the secondary source code file. The computer system product includes instructions to create a comprehensive symbol table. The comprehensive symbol table comprises contents of the primary symbol table and contents of the secondary symbol table. A corresponding computer-implemented method and computer system are also disclosed.Type: ApplicationFiled: December 22, 2016Publication date: April 20, 2017Inventor: Jonathan C. Gellin
-
Publication number: 20170109144Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for performing data flow analysis using collapsed contexts. One of the methods includes obtaining data representing a plurality of software elements, wherein one or more software elements are initially designated as elements having the particular property; iteratively designating other software elements to which data of the one or more elements having the particular property flows, including: whenever the program includes multiple calls to a function, analyzing the function in a collapsed context to determine whether any argument flows to a return value of the function, and whenever any data in an argument that has the particular property according to the collapsed context flows to a return value of the function, adding each call to the function throughout the program having one argument having the particular property; and providing the set of software elements having the particular property.Type: ApplicationFiled: October 15, 2015Publication date: April 20, 2017Inventor: Alexander Spoon
-
Publication number: 20170109145Abstract: A computer-implemented method includes, in a code transformation system, identifying save-to-return code instructions, function call code instructions, comparison code instructions, and exceptional code instructions. The function call code instructions are associated with the save-to-return code instructions. The comparison code instructions are associated with the save-to-return code instructions. The exceptional code instructions are associated with the comparison code instructions. A predefined proximity range based on a predefined proximity value as well as a proximity eligibility indicator are determined. The proximity eligibility indicator denotes whether the save-to-return code instructions and the comparison code instructions are within the predefined proximity range.Type: ApplicationFiled: March 8, 2016Publication date: April 20, 2017Inventors: Iain A. Ireland, Allan H. Kielstra, Muntasir A. Mallick
-
Publication number: 20170109146Abstract: A computer-implemented method includes, in a code transformation system, identifying save-to-return code instructions, function call code instructions, comparison code instructions, and exceptional code instructions. The function call code instructions are associated with the save-to-return code instructions. The comparison code instructions are associated with the save-to-return code instructions. The exceptional code instructions are associated with the comparison code instructions. A predefined proximity range based on a predefined proximity value as well as a proximity eligibility indicator are determined. The proximity eligibility indicator denotes whether the save-to-return code instructions and the comparison code instructions are within the predefined proximity range.Type: ApplicationFiled: October 15, 2015Publication date: April 20, 2017Inventors: Iain A. Ireland, Allan H. Kielstra, Muntasir A. Mallick
-
Publication number: 20170109147Abstract: Embodiments disclose a method, computer program product, and system for optimizing computer functions. The embodiment may create a control flow graph from a computer function. The control flow graph may contain an entry block, an exit block, and basic blocks located between the entry block and the exit block. The embodiment may classify each of the basic blocks as an original heavy basic block or an original light basic block. The embodiment may classify the original heavy block, the exit block and each of the basic blocks that are located between each original heavy block and the exit block as a determined heavy block. The embodiment may create light computer functions and heavy computer functions from the computer function. Each heavy computer function contains the basic blocks classified as determined heavy. The light computer functions contains the remaining basic blocks, the exit block and calls to the heavy computer functions.Type: ApplicationFiled: October 15, 2015Publication date: April 20, 2017Inventors: Jaques Clapauch, Steven J. Perron
-
Publication number: 20170109148Abstract: Disclosed herein are representative embodiments of tools and techniques for installing, executing, and/or updating managed applications through generation of native code from code in an intermediate language. According to one exemplary technique, a computing device receives machine dependent intermediate language code (MDIL code) generated by an online provider for an application. Additionally, the computing device installs the application on the computing device by generating a native image for the application, which includes binding a portion of the MDIL code with one or more libraries on the computing device. Also, the native image is stored on the computing device for use in loading the application for execution.Type: ApplicationFiled: December 28, 2016Publication date: April 20, 2017Applicant: Microsoft Technology Licensing, LLCInventors: Sameer Tejani, Adina M. Trufinescu, Yasser Shaaban, Abolade Gbadegesin, Ashish Babbar, Mei-Chin Tsai, Subramanian Ramaswamy, Casimir Lakshan Fernando
-
Publication number: 20170109149Abstract: Embodiments disclose a method, computer program product, and system for optimizing computer functions. The embodiment may create a control flow graph from a computer function. The control flow graph may contain an entry block, an exit block, and basic blocks located between the entry block and the exit block. The embodiment may classify each of the basic blocks as an original heavy basic block or an original light basic block. The embodiment may classify the original heavy block, the exit block and each of the basic blocks that are located between each original heavy block and the exit block as a determined heavy block. The embodiment may create light computer functions and heavy computer functions from the computer function. Each heavy computer function contains the basic blocks classified as determined heavy. The light computer functions contains the remaining basic blocks, the exit block and calls to the heavy computer functions.Type: ApplicationFiled: April 28, 2016Publication date: April 20, 2017Inventors: Jaques Clapauch, Steven J. Perron
-
Publication number: 20170109150Abstract: Method and system for arranging data comprising receiving a data set including one or more data elements. Generating from an indication of properties of the one or more data elements an arrangement scheme describing how to arrange the data elements. Arranging the data elements according to the arrangement scheme. Generating a set of computer readable procedures for returning the data elements from the arranged data elements.Type: ApplicationFiled: June 11, 2015Publication date: April 20, 2017Inventor: John Terrell Davies
-
Publication number: 20170109151Abstract: According to some embodiments, method for managing an application installation queue on a mobile device is described. The method may include evaluating environmental context information, determining whether the environmental context information corresponds to an application, and queuing the application in the application installation recommendation queue.Type: ApplicationFiled: October 16, 2015Publication date: April 20, 2017Inventors: Paul R. Bastide, Lisa Seacat DeLuca, Aaron J. Quirk
-
Publication number: 20170109152Abstract: A computing device for receiving an update package comprising a plurality of updates for a plurality of hardware and/or software components of the computer device. An update engine may determine a time order for performing the updates based on relationships and groupings of the updates. The update engine may identify common groupings, interdependent groupings, and any independent updates in the received update package. The update engine may perform a common grouping update method for all identified common groupings and an interdependent grouping update method for all identified interdependent groupings. In the circumstance that all updates in the update package are determined to be independent updates, the update engine may perform an independent update method that enables a selected independent component to be made available at the beginning of the update period, while other components are updated and enabled, and then the selected independent component is updated last.Type: ApplicationFiled: October 19, 2015Publication date: April 20, 2017Inventors: Abhinand Pissey, Shyju THEKKUMBADAN
-
Publication number: 20170109153Abstract: Supplemental functionalities may be provided for an executable program via an ontology instance. In some embodiments, a computer program (e.g., an executable program or other computer program) associated with an ontology may be caused to be run. The ontology may include information indicating attributes for a set of applications. An instance of the ontology may be obtained, which may correspond to an application of the set of applications. Based on the ontology instance, supplemental information may be generated for the computer program. The supplemental information may be related to one or more functionalities of the application to be added to the executable program. The supplemental information may be provided as input to the computer program. The supplemental information, at least in part, may cause the one or more functionalities of the application to be made available via the executable program.Type: ApplicationFiled: December 28, 2016Publication date: April 20, 2017Inventor: Michel DUFRESNE
-
Publication number: 20170109154Abstract: A system for providing a consistent user experience of an application across disparate mobile devices comprises a computing device including a display analysis application, and one or more mobile devices including a display analysis application is provided. In one example, a mobile device comprises a memory storing a version of an operating system, a display analysis patch, and a patched application. A consistency module of the mobile device is configured to access the application with the display analysis patch, obtain one or more display parameters of the mobile device via the application with the display analysis patch, and transmit the obtained one or more display parameters to a computing device.Type: ApplicationFiled: December 28, 2016Publication date: April 20, 2017Inventors: JOSHUA SCOTT MATTHEWS, DAVID MICHAEL TEITELBAUM
-
Publication number: 20170109155Abstract: Embodiments of the present invention relate to scheduling updates on a personal electronic device based on biometric data gathered from a user. The personal electronic device, or another computing device, may receive a pending software update. The personal electronic device, or another computing device, may receive biometric data of the user from one or more biometric sensors. The biometric data may provide sufficient information to determine a sleep status of the user. The personal electronic device, or another computing device, may determine a sleep status of the user. The personal electronic device, or another computing device, may install the pending software update in response to determining that the user is sleeping. The personal electronic device, or another computing device, may delay the pending software update in response to determining that the user is not sleeping.Type: ApplicationFiled: January 3, 2017Publication date: April 20, 2017Inventors: Simon A. Briggs, Alfonso Perianez Gomez, Michal G. Parusinski, Adam C. Roberts
-
Publication number: 20170109156Abstract: A system including software enables the running software to he upgraded without stopping any service. A system including software includes a task block loaded into a memory the task block being communicable with the outside through a message, and a dynamic module block loaded into the memory, the dynamic module block being symbolically linked with the task block to provide a service corresponding to the message.Type: ApplicationFiled: May 25, 2016Publication date: April 20, 2017Inventors: Seung Woo HONG, Ho Sun YOON, Ho Yong RYU
-
Publication number: 20170109157Abstract: A system, method and computer program product for allocating shared resources. Upon receiving requests for resources, the system determines whether there are any pending updates for a VM image for provisioning a virtual machine (VM) for the request. For each image with pending updates the system determines whether to replace the stored image with an updated VM image and provision from the replacement or, update a single instance of the image and provision from the single instance. The system also determines an optimal time to update images with pending updates. After replacing an image, the system provides an alert indicating that an updated said VM was provisioned.Type: ApplicationFiled: January 3, 2017Publication date: April 20, 2017Applicant: International Business Machines CorporationInventors: Marcos Dias De Assuncao, Marco Aurelio Stelmar Netto, Lakshminarayanan Renganarayana, Christopher C. Young
-
Publication number: 20170109158Abstract: A computer-implemented method includes identifying a primary symbol table associated with a primary source code file and identifying a secondary symbol table associated with a secondary source code file. The computer-implemented further includes receiving a source code association indication. The source code association indication includes at least one association relationship between the primary source code file and the secondary source code file. The computer-implemented further includes creating a comprehensive symbol table. The comprehensive symbol table comprises contents of the primary symbol table and contents of the secondary symbol table. A corresponding computer program product and computer system are also disclosed.Type: ApplicationFiled: October 14, 2015Publication date: April 20, 2017Inventor: Jonathan C. Gellin
-
Publication number: 20170109159Abstract: Techniques are described for updating documentation for an application including but not limited to a web application, a software application or a mobile application. In one example, techniques include generating an entry in a documentation for an application, linking the entry to an element of the application, including recording a run-time state for the element; determining that the element has changed; and generating an alert indicating that the element has changed.Type: ApplicationFiled: October 14, 2015Publication date: April 20, 2017Inventors: Adam G. Archer, Miran Badzak, Robin Y. Bobbitt, Mark T. Duquette, Robert Retchless, Fariz Saracevic, Lauren J. Schaefer, Christopher N. Taylor
-
Publication number: 20170109160Abstract: A processor is described having a functional unit within an instruction execution pipeline. The functional unit having circuitry to determine whether substantive data from a larger source data size will fit within a smaller data size that the substantive data is to flow to.Type: ApplicationFiled: August 16, 2016Publication date: April 20, 2017Inventors: MARTIN G. DIXON, BAIJU V. PATEL, RAJEEV GOPALAKRISHNA
-
Publication number: 20170109161Abstract: Method, apparatus, and program means for nonlinear filtering and deblocking applications utilizing SIMD sign and absolute value operations. The method of one embodiment comprises receiving first data for a first block and second data for a second block. The first data and said second data are comprised of a plurality of rows and columns of pixel data. A block boundary between the first block and the second block is characterized. A correction factor for a deblocking algorithm is calculated with a first instruction for a sign operation that multiplies and with a second instruction for an absolute value operation. Data for pixels located along said block boundary between the first and second block are corrected.Type: ApplicationFiled: December 29, 2016Publication date: April 20, 2017Applicant: Intel CorporationInventors: William W. Macy, JR., Huy V. Nguyen
-
Publication number: 20170109162Abstract: A processor includes an instruction decoder to receive a first instruction to process a secure hash algorithm 2 (SHA-2) hash algorithm, the first instruction having a first operand associated with a first storage location to store a SHA-2 state and a second operand associated with a second storage location to store a plurality of messages and round constants. The processor further includes an execution unit coupled to the instruction decoder to perform one or more iterations of the SHA-2 hash algorithm on the SHA-2 state specified by the first operand and the plurality of messages and round constants specified by the second operand, in response to the first instruction.Type: ApplicationFiled: December 31, 2016Publication date: April 20, 2017Inventors: Kirk S. YAP, Gilbert M. WOLRICH, James D. GUILFORD, Vinodh GOPAL, Erdinc OZTURK, Sean M. GULLEY, Wajdi K. FEGHALI, Martin G. DIXON
-
Publication number: 20170109163Abstract: Vector single instruction multiple data (SIMD) shift and rotate instructions are provided specifying: a destination vector register comprising fields to store vector elements, a first vector register, a vector element size, and a second vector register. Vector data fields of a first element size are duplicated. Duplicate vector data fields are stored as corresponding data fields of twice the first element size. Control logic receives an element size for performing a SIMD shift or rotation operation. Through selectors corresponding to a vector element, portions are selected from the duplicated data fields, the selectors corresponding to any particular vector element select all portions similarly from the duplicated data fields for that particular vector element responsive to the first element size, but selectors corresponding to any particular vector element select at least two portions from the duplicated data fields differently for that particular vector element responsive to a second element size.Type: ApplicationFiled: December 27, 2016Publication date: April 20, 2017Inventors: Asaf Rubinstein, Tom Aviram
-
Publication number: 20170109164Abstract: A method includes receiving a packed data instruction indicating a first narrower source packed data operand and a narrower destination operand. The instruction is mapped to a masked packed data operation indicating a first wider source packed data operand that is wider than and includes the first narrower source operand, and indicating a wider destination operand that is wider than and includes the narrower destination operand. A packed data operation mask is generated that includes a mask element for each corresponding result data element of a packed data result to be stored by the masked packed data operation. All mask elements that correspond to result data elements to be stored by the masked operation that would not be stored by the packed data instruction are masking out. The masked operation is performed using the packed data operation mask. The packed data result is stored in the wider destination operand.Type: ApplicationFiled: October 24, 2016Publication date: April 20, 2017Applicant: lntel CorporationInventors: Edward T. Grochowski, Seyed Yahya Sotoudeh, Buford M. Guy
-
Publication number: 20170109165Abstract: A mechanism is provided for improving performance when executing unaligned load instructions which load an unaligned block of data from a data store. In a first unaligned load handling mode, a final load operation of a series of load operations performed for the instruction loads a full data word extending beyond the end of the unaligned block of data to be loaded by that instruction. If an initial portion of the unaligned block of data to be loaded by a subsequent unaligned load instruction corresponds to the excess part in the stream buffer for the earlier instruction, then an initial load operation for the subsequent instruction can be suppressed. A mechanism is also described for allowing series of dependent data access operations triggered by a given instruction to be halted partway through when a stall condition arises, and resumed partway through later, by defining overlapping sequences of transactions.Type: ApplicationFiled: October 19, 2015Publication date: April 20, 2017Inventor: Max John BATLEY
-
Publication number: 20170109166Abstract: Method and system for restoring results to a register file of a processing unit is provided. An instruction is dispatched in a processing slice of the processing unit, targeting a register file, wherein the processing unit includes two or more processing slices, each processing slice including a corresponding history buffer and at least a portion of a register file. The processing unit evicts previous result data from the register file entry to a history buffer corresponding to the processing slice, by writing new result data into the register file entry, in response to the instruction. The processing unit detects a trigger condition relating to a rollback of the processing unit to a previous state, and restores the previous result data from the history buffer to the register file entry, in response to the trigger.Type: ApplicationFiled: October 14, 2015Publication date: April 20, 2017Inventors: Susan E. EISEN, Cliff KUCHARSKI, Hung Q. LE, Dung Q. NGUYEN, David R. TERRY
-
Publication number: 20170109167Abstract: Method and system for restoring data to a register file of a processing unit are provided. A history buffer entry (HBE) is marked for restoration to a register file entry. Result data and control information is sent from the HBE to an Issue Queue (ISQ). The ISQ issues an instruction for loading the result data into the register file entry based on the control information. A write back operation is performed to restore the result data to the register file entry, in response to issuing of the instruction.Type: ApplicationFiled: October 14, 2015Publication date: April 20, 2017Inventors: Susan E. EISEN, Cliff KUCHARSKI, Hung Q. LE, Dung Q. NGUYEN, David R. TERRY
-
Publication number: 20170109168Abstract: Method and system for managing a speculative transaction in a processing unit is provided. The speculative transaction is initiated by dispatching a first instruction indicating start of the speculative transaction. One or more register file (RF) entries are marked as pre-transaction memory (PTM), in response to the initiating. At least one second instruction targeting at least one of the marked RF entries is dispatched, while the transaction is active, wherein the at least one second instruction writes new result data into the at least one RF entry. Previous result data evicted from the at least one RF entry by the new result data, is saved into a history buffer (HB) entry. The HB entry is marked as PTM, in response to the saving, wherein the processing unit, upon detecting a trigger, is rolled back to a state before the initiating the transaction by restoring the previous result data to the at least one RF entry.Type: ApplicationFiled: October 14, 2015Publication date: April 20, 2017Inventors: Salma AYUB, Susan E. EISEN, Glenn O. KINCAID, Cliff KUCHARSKI, Christopher M. MUELLER, Dung Q. NGUYEN, David R. TERRY
-
Publication number: 20170109169Abstract: An aspect includes pruning a design space when generating a maximum power stressmark. A multi-stage design space search process is performed. Each stage includes calculating a number of instructions per cycle (IPC) for each instruction sequence in a set of instruction sequences that place a power stress on a system under analysis, removing one or more of the instruction sequences having an IPC lower than a pruning threshold from the set, evaluating at least one power metric of the remaining instruction sequences in the set, removing one or more of the instruction sequences having at least one power metric evaluated outside of one or more pruning ranges from the set, and passing the remaining instruction sequences in the set to a next stage. A maximum power stressmark is generated based on the evaluating of the at least one power metric from a final stage.Type: ApplicationFiled: October 20, 2015Publication date: April 20, 2017Inventors: Ramon Bertran, Pradip Bose, Alper Buyuktosunoglu, Timothy J. Slegel
-
Publication number: 20170109170Abstract: Technical solutions are described for dynamically managing an operand-store-compare (OSC) prediction table for load and store operations executed out-of-order. One general aspect includes a method that includes receiving a request to retire a queue entry corresponding to an instruction. The method also includes identifying an OSC prediction for the instruction based on an OSC prediction table entry, where the OSC prediction indicates if the instruction is predicted to hit an OSC hazard. The method also includes determining if the instruction hit the OSC hazard. The method also includes in response to the OSC prediction indicating that the instruction is predicted to hit the OSC hazard and the instruction not hitting the OSC hazard, invalidating the OSC prediction table entry corresponding to the instruction. The present document further describes examples of other aspects such as methods, computer products.Type: ApplicationFiled: October 19, 2015Publication date: April 20, 2017Inventors: Khary J. Alexander, Jane H. Bartik, Jatin Bhartia, James J. Bonanno, Adam B. Collura, Jang-Soo Lee, James R. Mitchell, Anthony Saporito
-
Publication number: 20170109171Abstract: Method and system for writing a history buffer in a processing unit is provided. At least a first instruction and a second instruction are dispatched in a single processing cycle, targeting a same register file entry. The processing unit includes two or more processing slices, each processing slice comprising a corresponding history buffer and at least a portion of a register file. Upon determining that first result data corresponding to the first instruction is older than second result data corresponding to the second instruction, the first result data is written into a history buffer bypassing the register file entry, in response to the determination. Further, the second result data is written into the register file entry.Type: ApplicationFiled: October 14, 2015Publication date: April 20, 2017Inventors: Susan E. EISEN, Cliff KUCHARSKI, Hung Q. LE, Dung Q. NGUYEN, David R. TERRY
-
Publication number: 20170109172Abstract: A data processing apparatus and method are provided for executing a stream of instructions out-of-order with respect to original program order. At least some of the instructions in the stream identify one or more architectural registers from a set of architectural registers. The apparatus comprises a plurality of out-of-order components configured to manage execution of a first subset of instructions out-of-order, the plurality of out-of-order components being configured to remove false dependencies between instructions in the first subset. The plurality of out-of-order components include a first issue queue into which the instructions in the first subset are buffered prior to execution. A second issue queue is used to buffer a second subset of instructions prior to execution, the second subset of instructions being constrained to execute in order.Type: ApplicationFiled: March 18, 2015Publication date: April 20, 2017Inventors: Faissal Mohamad SLEIMAN, Thomas Friedrich WENISCH
-
Publication number: 20170109173Abstract: A method for determining instruction sequences, a related device, and a system. A method for determining instruction sequences may include: acquiring a function identifier; and determining M1 instruction sequences used to implement a function identified by the function identifier, where each instruction sequence in the M1 instruction sequences includes a unique entry instruction, and each instruction sequence in the M1 instruction sequences includes a unique exit instruction, where M1 is a positive integer, and the M1 instruction sequences are instruction sequences for creating a network packet processing program used to process a network packet. Solutions of embodiments of the present disclosure are advantageous for improving an extent of matching between a packet forwarding device and an instruction sequence that is executed by the packet forwarding device and used to process a network packet, and reducing an amount of invalid code run by the packet forwarding device.Type: ApplicationFiled: December 27, 2016Publication date: April 20, 2017Inventors: Nan LI, Linchun WANG
-
Publication number: 20170109174Abstract: Techniques for adaptive interface support are described. In one embodiment, for example, an apparatus may comprise logic, at least a portion of which is in hardware, the logic to execute a basic input/output system (BIOS), determine a respective impedance state for each of one or more pins in an M.2 physical interface, determine an interface type for a peripheral device coupled with the M.2 physical interface based on the impedance states for the one or more pins, and control an operational state of the peripheral device during execution of the BIOS, based on the interface type for the peripheral device. Other embodiments are described and claimed.Type: ApplicationFiled: December 30, 2016Publication date: April 20, 2017Applicant: INTEL CORPORATIONInventors: Nathaniel L. DESIMONE, Robert E. GOUGH, Sean C. DARDIS
-
Publication number: 20170109175Abstract: A method includes identifying a subset of components of a node that should be loaded during the next boot of the node, storing a list of the identified subset of components in a file outside of a basic input output system, and initiating boot of the node. The method further comprises the basic input output system accessing the file and controlling boot of the node to load only the identified subset of components of the node. Another method stores a plurality of such files, wherein each file is associated with maintenance of a target component of the node. After selecting one of the files, the basic input output system may access the selected file and control boot of the node to load only the subset of components that the selected file indicates should be loaded for purposes of a maintaining or testing the target component.Type: ApplicationFiled: October 15, 2015Publication date: April 20, 2017Inventors: Srihari V. Angaluri, Gary D. Cudak, James S. Worley, Chulho Kim, Ajay Dholakia, Sumeet Kochar, Gregory B. Pruett
-
Publication number: 20170109176Abstract: Various examples of the present technology provide a method for iSCSI based bare metal OS image deployment and diskless boot in a server system. In some examples, methods for iSCSI based bare metal OS image deployment and diskless boot in a server system comprise setting a boot order of a BIOS of the server system to iSCSI NIC of a controller (e.g., BMC) of the server system, setting iSCSI boot configuration to the controller, updating the boot order based at least upon information from the controller, syncing the iSCSI boot configuration to the BIOS of the server system based upon the information from the controller, and causing the server system to be booted from a specific target IP and LUN of an iSCSI storage server of a SAN.Type: ApplicationFiled: December 28, 2015Publication date: April 20, 2017Inventor: Ching-Chih Shih
-
Publication number: 20170109177Abstract: An information handling system includes a communication device and a service processor. The communication device includes a first terminal, and a second terminal to communicate with a network storage array. The service processor includes a first terminal to receive configuration settings for the communication device, and a second terminal to provide the configuration settings to the communication device. The service processor configures the communication device based on the configuration settings during a first boot sequence of the information handling system. A power-on self test of a basic input/output system of the information handling system is stalled while the service processor configures the communication device based on the configuration settings, and the information handling system is booted from a workload on a storage array identified in the configuration settings without using a second boot sequence of the information handling system.Type: ApplicationFiled: December 30, 2016Publication date: April 20, 2017Inventor: Jon R. Hass