At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Method and apparatus for generating an EMI fingerprint for a computer
A system that generates an electromagnetic interference (EMI) fingerprint for a computer system is presented. During operation, the system executes a load script...
Using EMI signals to facilitate proactive fault monitoring in computer
A system that monitors electromagnetic interference (EMI) signals to facilitate proactive fault monitoring in a computer system is presented. During operation,...
Method and apparatus for dynamic assignment of network interface card
A method for dynamically changing a virtual network interface card (VNIC) binding. If the use of a hardware receive ring (HRR) is below the first threshold and...
Method and system for controlling virtual machine bandwidth
A method of controlling bandwidth including receiving and classifying a packet, sending the packet to a hardware receive ring based on a classification of the...
Multi-chip module and single-chip module for chips and proximity
A single-chip module is described. The module includes a first semiconductor die having a first surface and a second surface. The first semiconductor die is...
Piperazino based photoinitiators
Compounds of formula (I): [where: the substituents R.sup.1 are individually selected from C.sub.1-C.sub.10 alkyl groups and optionally substituted benzyl groups;...
Protecting cover and LED lamp tube having the same
A light emitting diode (LED) lamp tube structure includes a tube, a circuit board, a plurality of LED lamps, two electric connectors and a protecting cover. The...
Tumble dryer dispenser
A device for treating fabrics in a tumble dryer comprising a reservoir for storing a fabric treatment composition and transfer device to expose fabric treatment...
Food container with deep lid
Method for developing platform independent launchable applications
A method, computer program product, and system for providing launchable application source code are presented. A determination is made regarding which target...
Displaying and browsing through a sparse view of content items in a
One embodiment of the present invention provides a system that displays and facilitates browsing through a sparse view of content items in a hierarchy. First,...
Method and template for physical-memory allocation for implementing an
in-system memory test
An in-system memory testing method includes transparently selecting and "stealing" a portion of memory from the memory system for running memory tests, then...
Mechanism for hardware tracking of return address after tail call
elimination of return-type instruction
A technique maintains return address stack (RAS) content and alignment of a RAS top-of-stack (TOS) pointer upon detection of a tail-call elimination of a...
Preventing register data flow hazards in an SST processor
One embodiment of the present invention provides a system that prevents data hazards during simultaneous speculative threading. The system starts by executing...
Configuration space compaction
In an interconnect apparatus for interconnecting at least one host to at least a plurality of presentation registers provide a presentation interface for the...
Approach for managing interrupt load distribution
A method and apparatus for distributing multiple interrupts among multiple processors is disclosed. According to one embodiment, an interrupt daemon monitors the...
Distributed network identity
A distributed network identity is provided. An identity provider stores a portion of a user's personal information. A service provider accesses user information...
Overload management in an application-based server
An overload manager device including a monitoring function for evaluating successive values of the server operation parameter as a function of time, a first...
Method and apparatus for initializing interval computations through
One embodiment of the present invention provides a system that uses a computer to evaluate a function within a domain using an interval computing technique....
Simultaneous global transaction and local transaction management in an
A system and a method for simultaneously managing a local transaction and a global transaction in an application server. In one embodiment, a system may manage a...
Technique for resolving "no-trouble-found" (NTF) events in electronic
A system that diagnoses a failure in a computer system is described. During operation, the system tests the computer system using a sequence of tests, where a...
System and method for infiniband receive flow control with combined
buffering of virtual lanes and queue pairs
A system and method for implementing flow control, at the link and/or transport layers, for InfiniBand receive traffic. A shared memory structure may be used for...
Two-branch broadband antenna
A broadband antenna is capable of generating an upper resonant mode (at about 700 MHz) from a first radiating arm and a lower resonant mode (at about 500 MHz)...
Automatic phase-detection circuit for clocks with known ratios
An automatic phase detection circuit for generating an internal synchronization signal when two clock input signals achieve a certain phase relationship. No...
Instant insertion and extractable wire connector
This invention is to provide an instant insertion and extractable wire connector, comprising a shell, a clip, at least two wire extracting chunks, an insert and...
Techniques for permitting access across a context barrier on a small
footprint device using an entry point object
A small footprint device can securely run multiple programs from unrelated vendors by the inclusion of a context barrier isolating the execution of the programs....
Network interface decryption and classification technique
Encrypted data packets are received by a network interface card. The network interface card, upon determining that the received data packets are encrypted,...
Method and apparatus for communicating using a display
Disclosed is a visual method of communicating an abnormal situation (e.g., the crashed or downed state) of the computer system including a display. The system...
Computer system including network slices that map to field replaceable
In one embodiment, a computer system includes a first client subsystem, a second client subsystem and a network. The network is coupled to convey a packet...
System for predicting and preventing escalations
In one embodiment, a method and apparatus for predicting and preventing escalations is disclosed. The method includes generating a predictive model from analysis...
Cache memory system including a partially hashed index
In one embodiment, a cache memory system includes a cache memory coupled to a cache controller. The cache memory controller may receive an address and generate...
Method and apparatus for dynamically pre-tenuring objects in a
generational garbage collection system
In a generational garbage collector, a decision is made to pre-tenure, or allocate new objects directly in the old generation, by a two step process. In the...
Multi-node computer system implementing global access state dependent
A node in a multi-node system includes a memory, an active device that includes a cache, an interface that sends and receives coherency messages on an inter-node...
Trace cache for efficient self-modifying code processing
A trace cache for efficient self-modifying code processing enables selective invalidation of entries of the trace cache, advantageously retaining some of the...
Dynamic routing of I/O requests in a multi-tier storage environment
A method for routing an incoming service request is described wherein the service request is routed to a selected storage tier based on that selected storage...
Address packets with variable-size mask format
A system may include a device configured to initiate a transaction by sending an address packet and an additional device configured to respond to the address...
Dynamic intent log
A method for dynamic intent logging in a file system. The method including pre-allocating a first log block, receiving a request to write a first set of deltas...
Concurrent a-box and t-box generation for use in web ontology language
(OWL) database and knowledge base...
In accordance with one embodiment of the present invention, there are provided mechanisms and methods for implementing concurrent generation of an a-box and a...
Self-checking simulations using dynamic data loading
A system for evaluating a simulation includes a reference simulator configured to execute a simulation image to obtain golden data, a test simulator configured...
Simple switch control language with switch controller
A method for configuring a switch with a switch controller that includes obtaining a switch program, wherein the switch program comprises a plurality of...
Protective glasses assembly
A protective glasses assembly has an integrally formed designed lens, a frame made of a soft material and fitted in with the designed lens and a band. A...
Structure for fragile plate packaging and protection device
Disclosed is an improved structure for a fragile plate packaging and protection device, comprising: a box main body provided with an accommodating space, a...
Performance management in a virtual computing environment
A virtual zone management framework manages one or more virtual computing zones forming a global computing zone residing on a host computer. The virtual zone...
Method and apparatus for loading relocatable in-place executable files in
a virtual machine
One embodiment of the present invention provides a system that facilitates loading of an in-place executable file into a virtual machine. The system operates by...
System and method for marking software code
A method to instrument software code may comprise marking one or more blocks of code in an application program to provide a marked code. The marking may comprise...
Method and apparatus for self-validating checksums in a file system
A method for storing a data block, involving storing the data block in a storage pool, obtaining a data block location, calculating a data block checksum for the...
Method and system for registering binary data
Systems, methods, and products provided for facilitating the reuse of data blocks. In one implementation, a registration server receives request data objects...
Switch method and apparatus with cut-through routing for use in a
One embodiment of the invention provides a method of operating a switch with cut-through routing in a communications network. The method includes receiving a...