At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
System and method for increasing host visibility in network address
A mechanism for dynamically performing Network Address Translation that allows external devices to contact internal host systems that would otherwise be hidden...
Method and apparatus for memory redundancy in a microprocessor
An apparatus for redundancy of a memory array includes a primary memory array including a plurality of memory cells, one or more of which are defective. A...
Self-retaining vibration isolating fan mount assembly
A fan assembly for an electronic device is provided. The assembly comprises a fan housing, at least one bracket member, and at least one retention peg. The fan...
Upper tray for baby walker
Anti-theft system and method for semiconductor devices and other
A semiconductor device includes a stored device identifier that is accessible to external systems, and a stored secret key that is inaccessible to external...
Nested monitor handling processes
A method of managing nested monitor locks in a computer program is provided for an application having at least a first thread and a second thread wherein a...
Locked prefetch scheduling in general cyclic regions
One embodiment of the present invention provides a system that facilitates locked prefetch scheduling in general cyclic regions of a computer program. The system...
Executing functions determined via a collection of operations from
Reference architecture instructions are translated into target architecture operations. In some embodiments, an execution unit of a processor executes a function...
Instruction set architecture employing conditional multistore
We propose a class of mechanisms to support a new style of synchronization that offers simple and efficient solutions to several existing problems for which...
Practical implementation of arbitrary-sized LL/SC variables
Many conventional lock-free data structures exploit techniques that are possible only because state-of-the-art 64-bit processors are still running 32-bit...
Method and apparatus for performing a real-time root-cause analysis by
analyzing degrading telemetry signals
One embodiment of the present invention provides a system that performs a real-time root-cause-analysis for a degradation event associated with a component under...
Communications chip having a plurality of logic analysers
A communications chip having a plurality of ports. Each port is provided with an interface for attachment to an external communications facility to exchange data...
Scheme for screening weak memory cell
A novel scheme for screening weak memory cell includes a cell coupled to a leakage stress delivery circuitry (LSDC), which, in turn, is coupled to an induced...
Write and read assist circuit for SRAM with power recycling
A memory circuit for reading and writing data into a SRAM memory array using charge recycling is presented. The write and read circuit includes a cell voltage...
Meeting facilitation tool
A meeting facilitation tool may perform and/or facilitate the planning, scheduling, holding, and/or following up of meeting related activities. A meeting...
Method and apparatus for programmatically generating audio file playlists
Method and apparatus for programmatically generating interesting audio file playlists. A playlist generation mechanism may use an N-gram model of audio file...
Process of preparing desaloratadine
The present invention provides substantially pure desloratadine having an HPLC purity greater than 99.5% and having an absorbance less than 0.15 Au at 420 nm for...
Scanning of evacuated objects in a generation managed by the train
In computer systems including memory which execute programs of instructions, vtables associated with objects contain pointers which invoke operations to be...
Address simplification by binary transformation
A method for optimizing executable code includes identifying a plurality of instructions in the executable code matching a predetermined instruction pattern,...
System graphics for security shield
A method for providing a secure lockout from executing application programs is provided. An opaque graphical component obscures graphical components for all...
Data corruption avoidance in DRAM chip sparing
A memory controller, system, and methods are disclosed. The system comprises a memory controller interconnected to a plurality of memory chips. Each memory chip...
Single bit control of threads in a multithreaded multicore processor
A method and mechanism for controlling threads in a multithreaded multicore processor. A processor includes multiple cores, each of which are capable of...
Method and apparatus for implementing virtual transactional memory using
cache line marking
Embodiments of the present invention implement virtual transactional memory using cache line marking. The system starts by executing a starvation-avoiding...
Selective trace cache invalidation for self-modifying code via memory
Selective trace cache invalidation for self-modifying code via memory aging advantageously retains some of the entries in a trace cache even during...
Method and apparatus for using a determined file access pattern to perform
caching in a file system
A system that caches a file within a computer system. During operation, the system monitors accesses to the file, wherein the file is located on a storage...
Cross-coupled peripheral component interconnect express switch
A plurality of PCIe switch complexes are interposed between a plurality of I/O devices and a plurality of microprocessor complexes. Each PCIe switching complex...
Method and apparatus for adaptive load balancing
Determining server capabilities during a discrete time period, or interval, allows for more efficient processing of client requests. Updating a proportional...
Method and apparatus for reducing object pre-tenuring overhead in a
generational garbage collector
In some circumstances a generational garbage collector may be made more efficient by "pre-tenuring" objects or directly allocating new objects in an old...
System and method for efficient meta-data driven instrumentation
A method for gathering management information about an asset that includes receiving a first request for the management information about the asset, wherein the...
Method and apparatus for processing network traffic associated with
A system that includes a network interface for receiving a packets from a network, a classifier operatively connected to the network interface that analyzes each...
Reversible, counter-rotating fan modules for a computer chassis
A fan module for use with fan trays or decks within a computer chassis for forced-air cooling with counter-rotating flow to provide higher static pressure. The...
Tape drive with read/write head having legacy read elements and with
special-purpose read channels
A tape drive for reading both new technology tapes and legacy tapes. The tape drive includes a three bump head with two outer read bumps and an inner write bump....
Sub-sampling of weakly-driven nodes
A method and apparatus for performing on-chip voltage sampling of a weakly-driven node of a semiconductor device are disclosed. In some embodiments, the node is...
Carbon nanotubes for active direct and indirect cooling of electronics
A system for cooling a semiconductor device is disclosed. The system includes a lid encasing the semiconductor device, a first plurality of carbon nanotubes...
Detergent composition or component therefor
A particulate detergent composition or component therefor which comprises a bi- or tri-valent carboxylic acid salt, preferably magnesium stearate, which, without...
LED lighting device capable of uniformly dissipating heat
An LED lighting device with a heat dissipating structure is disclosed. The lighting device includes a lamp base coupled with a top cover to form an accommodating...
System and method for compile-time non-concurrency analysis
Compile-time non-concurrency analysis of parallel programs improves execution efficiency by detecting possible data race conditions within program barriers....
Optimized markup language processing using repeated structures in markup
A computer-implemented method of parsing markup-language source data is described. The markup-language source data comprises a plurality of elements. A first...
Method and apparatus for dispatching a remote debugging agent in a
distributed computing environment
A method for dispatching a remote debugging agent (RDA), involving embedding the RDA in a target program to obtain a remotely debuggable target program,...
JXTA rendezvous as certificate of authority
A method for securing a communication between a peer node and an intermediary peer node in a peer-to-peer network comprises the peer node generating a secured...
Software hint to specify the preferred branch prediction to use for a
Software hints embedded in branch instructions direct selection of one of a plurality of branch predictors to use when processing the branch instructions,...
Logging of level-two cache transactions into banks of the level-two cache
stores the transactions for...
A plurality of processor cores on a chip is operated in a normal fashion in a debug and diagnostic mode of operation of the processor. A crossbar switch on the...
System and method for synchronizing mirrored and striped disk writes
A system and method for synchronizing mirrored and striped disk writes. A data storage system may include a client computer system coupled to a first data...
Multi-protocol iSCSI device discovery for on demand device enumeration
A target discovery manager associated with a target discovery layer is interposed between a host initiator and one or more discovery protocols. The target...
System and method for e-mail message action requests
A system, method and computer accessible medium for e-mail message action requests is disclosed. E-mail clients and servers may associate action requests with...
Method and apparatus for tracking activity of a garbage collector with a
plurality of threads that operate...
The time cost of collecting a region in a Garbage-First garbage collector is adjusted to account for concurrent thread activity. The overhead of a concurrent...
Determining a center of rotation for a component in a computer system
Some embodiments of the present invention provide a system that determines a center of rotation for a component in a computer system. During operation, the...
Network interface card virtualization based on hardware resources and
A method for virtualizing a network interface card includes creating a first plurality of virtual NICs, assigning each of a plurality of receive rings on the...
Method and system for using Bayesian network inference for selection of
transport protocol algorithm
A method for optimizing a network stack includes inputting network information into a transport protocol algorithm selector, inputting a first transport protocol...
System and method for conducting fast offloading of a connection onto a
network interface card
Techniques, systems, and apparatus for offloading data connections from a kernel onto an associated TNIC are disclosed. Generally, embodiments of the invention...