At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Mechanism for tracking the execution progress of a parent task which
spawns one or more concurrently executing...
An improved mechanism for tracking the execution progress of a task is disclosed. In one implementation, the execution progress of a parent task and one or more...
System and method for a page rendering framework
Efficient development of conventional web applications suggests extensive and thorough knowledge of web page delivery technologies such as HTML, Java, and JSPs....
System and method for implementing a radio frequency identifier (RFID)
Deployment of an RFID system in a business entails a thorough analysis of the 3-dimensional topography in which it is deployed. A deployment field may have...
Integrated thermal solution for electronic packages with materials having
mismatched coefficient of thermal...
A decoupling package stack including a circuit board, a substrate mounted on and electrically coupled to the circuit board, a semiconductor die mounted on and...
Conditioning method for indanthrone pigments
Crude indanthrone is milled, with or without other additives, to reduce and normalize particle size and distribution to a sub-pigmentary, near amorphous, state....
Detachable lamp socket
A detachable lamp socket includes a top cover, a mounting plate secured on the top cover, a housing detachably mounted on the mounting plate, a base secured in...
Dynamic downloading of keyboard keycode data to a networked client
The present invention is directed toward dynamic downloading of keyboard keycode data to a networked client. According to one or more embodiments of the present...
Systems and methods for efficient queue pair number re-use
Systems and methods are described for providing queue pair numbers for a queue pair to more effectively track and manage the frequency of use and re-use of queue...
Method and apparatus for integration of URL into standard file systems
Embodiments of the present invention are directed to a method and apparatus for integration of URL's into standard file systems of a local computer. In one...
Method and apparatus for accuracy-aware analysis
A method for accuracy-aware analysis of a program involving obtaining source code for the program comprising a floating point variable, instrumenting the source...
Dynamic soft-error-rate discrimination via in-situ self-sensing coupled
with parity-space detection
A system that facilitates distinguishing between soft errors and the onset of hardware degradation in a computer system. During operation, the system receives...
Systems and methods for performing quiescence in a storage virtualization
Systems consistent with the present invention perform quiescence of a network storage system in a storage virtualization environment including a virtualization...
Method and apparatus for fast loss-less memory data compression wherein
data corresponds to a cache line of...
A method and apparatus for compressing uncompressed data by applying a transform prior to the application of a data compression scheme. At decompression time, a...
Method and apparatus for buffering data at a transport layer on a client
One embodiment of the present invention provides a system that buffers data inside of a byte-stream protocol at a transport layer on a client, which is receiving...
Community access control in a multi-community node
A method and mechanism of enforcing community access control in a computer network, wherein access to objects by users and processes is controlled. A...
Generation of localized software applications
Methods, systems, and articles of manufacture provide a single multi-language source code file and effects single-language executable files from the...
PLI-less co-simulation of ISS-based verification systems in hardware
A method for providing verification for a simulation design, including obtaining the simulation design comprising a programming language interface system call,...
Fully lazy linking with module-by-module verification
A method, computer program, and apparatus verify instructions in a module of a computer program during linking using pre-verification constraints with fully lazy...
Secure access of objects generated from data representation language
representations of the objects in a...
A mechanism for securely decompiling representations of objects into copies of the objects is described. A virtual machine may include extensions for decompiling...
Method and apparatus for providing dynamic locks for global resources
One embodiment of the present invention provides a system that facilitates applying a dynamic lock to a range of a resource within a computer system. Upon...
A system links architecture neutral code downloaded to a resource constrained computer. The code may be separated into one or more packages having one or more...
Inter-process communication using different programming languages
A method for inter-process communication between a first process and a second process. The method includes receiving a request from the first process for...
Method and apparatus for facilitating debugging of an integrated circuit
One embodiment of the present invention provides a system that facilitates debugging an integrated circuit without probing signal lines within the integrated...
RMI-IIOP request failover mechanism
Embodiments of a request failover mechanism may be used to failover requests from clients of server instances in a cluster to alternative server instances. One...
Method and apparatus for delivering device drivers
A method and apparatus for delivering a device driver to an operating system without user intervention. One or more operating systems (e.g., different operating...
Method and system for trace generation using memory index hashing
A method and system for trace generation using memory index hashing. A method may include generating an extended trace representative of M threads of instruction...
Speculative memory accesses in a proximity communication-based off-chip
cache memory architecture
A proximity interconnect module includes a plurality of processors operatively connected to a plurality of off-chip cache memories by proximity communication....
System and method for an efficient transport layer transmit interface
A kernel data transfer optimizing system for dynamically subdividing data blocks which are presented by application programs to be transferred to the kernel's...
Method and apparatus for routing data across an n-dimensional grid network
One embodiment of the present invention provides a system for routing data between integrated circuit devices. This system couples together an n-dimensional grid...
Transferring system identities
First and second host systems can each include a respective repository of host identities. The first host system can encode a host identity to be transferred to...
Application programming interface for provisioning services
An invention is provided for provisioning services to client devices. In one embodiment, discovery transactions are included that allow an adapter software...
Floating point status information accumulation circuit
A floating point flag combining or accumulating circuit includes an analysis circuit that receives a plurality of floating point operands, each having encoded...
Method for scheduling jobs using distributed utility-based preemption
One embodiment of the present invention provides a system that assigns jobs to a system containing a number of central processing units (CPUs). During operation,...
Method and apparatus for identifying a drift in a quantized signal in a
One embodiment of the present invention provides a system that identifies a drift in a signal in a computer system. During operation, the system receives a...
Execution unit for performing the data encryption standard
An execution unit adapted to perform at least a portion of the Data Encryption Standard. The execution unit includes a Left Half input; a Key input; and a Table...
System for scaling by parallelizing network workload
A method for scaling a network system which includes providing at least one network interface and providing a flexible association between packets and a...
Method and apparatus for source authentication in a communications network
One embodiment of the invention provides a method of handling an incoming packet at a node in a network. The method includes associating at least one source...
Reduced-power memory with per-sector ground control
A reduced-power memory (such as for a cache memory system of a processor or a microprocessor) provides per-sector ground control to advantageously reduce power...
25 degree tool-less expansion card bracket
An expansion card bracket for a computer server has an expansion card support attachable to a motherboard and an expansion card accepting portion disposed near a...
High-frequency linear phase-frequency detector with wide-pulse outputs
A circuit and method are provided for detecting a phase difference between at least two periodic signals. The circuit and method disclosed herein provide pulsed...
A cooling fan includes: a casing having a base wall and a surrounding wall that extends transversely from the base wall, and that has an inner wall surface and a...
Pen cap and clip
Set of pot handles
Method for placing graphical user interface components in three dimensions
A method for creating a three-dimensional (3D) graphical user interface (GUI) involves creating a first two-dimensional (2D) container and a second 2D container,...
System and method for guarding against infinite loops from multi-point
redirects in a multi-threaded environment
A computer system having a user specified web browsing system for selectively monitoring application request to web based applications to detect and track...
Resolving conflicts between network service rule sets for network data
traffic in a system where rule patterns...
One embodiment of the present invention provides a system that resolves conflicts between network service rules for network data traffic in a system where rule...
Methods and apparatus for producing a configuration for components of a
A computerized device displays graphical representations of network components of the network where each graphical representation shows corresponding...
Separation of data from metadata in a tracing framework
A method for storing a data set having an enabled probe identification component and an associated data component, including obtaining data from an instrumented...