At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Method and apparatus for selecting references for prefetching in an
One embodiment of the present invention provides a system that generates code to perform anticipatory prefetching for data references. During operation, the...
Multi-level undo of main-memory and volatile resources
System resources (e.g., objects or other resources) are managed to provide multiple levels of undo and/or support for delegation of updates on main-memory...
Page mapping cookies
A method for managing virtual memory including placing a first virtual memory page in a physical memory page to create a virtual-to-physical memory mapping,...
Cache accumulator memory for performing operations on block operands
Various embodiments of systems and methods for performing accumulation operations on block operands are disclosed. In one embodiment, an apparatus may include a...
Generalized addressing scheme for remote direct memory access enabled
An apparatus accesses a resource in a computer system. The resource is accessible at a physical memory address (49) of the computer system. The apparatus...
Method and apparatus to facilitate direct transfer of data between a data
device and a network connection
One embodiment of the present invention provides a system that facilitates transferring data between a data device and a data terminal across a network. The...
Method and apparatus for automatically using a predefined peer-to-peer
group as a context for an application
One embodiment of the present invention provides a system that facilitates automatically using a predefined networking group, such as a peer-to-peer group as a...
Continuous random number generation method and apparatus
A method and apparatus for generating continuous random numbers. The method includes generating a value for a continuous random number using a continuous random...
File interval lock generation interface system and method
A computer system having a kernel interface that provides a file lock generation system for generating file interval locks and granting simultaneous access to...
System health monitoring
Monitoring the health of a system module can be carried out during state transitioning, for example when starting or stopping a system module. A monitor module...
Variable memory refresh rate for DRAM
A method and apparatus for controlling a DRAM refresh rate. In one embodiment, a computer system includes a memory subsystem having a memory controller and one...
Interleaved memory heat sink
A heat sink comprises a heat sink base and a row of heat sink extensions that are attached to one side of the heat sink base. An interleaved heat sink structure...
Line switch able to modulate light
A line switch able to modulate light includes an upper cover, a lower cover and a rotary selector positioned between the upper and the lower cover. When the...
Lithographic energy curable inks
An energy curable lithographic ink composition having an asymptotic relative viscosity of about 0.4 to about 1.5 and a water up-take number of at least about...
Support and grounding structure
Various embodiments of a heat sink assembly are disclosed. In one embodiment, the heat sink assembly includes a processor mounted onto a circuit board; a heat...
Smart card with multiple applications
One embodiment of the invention provides a smart card having multiple applications installed thereon. One of the multiple applications is designated as a default...
Stapler with clear window
Remote incremental program verification using API definitions
A method of operating a computer system includes providing a program in memory, verifying the program prior to an installation of the program and generating a...
Method for determining scope and cause of memory corruption
A method for analyzing memory after a system panic to identify scope and cause of memory corruption. The method includes retrieving a memory image for a computer...
Event protocol and resource naming scheme
A method for managing a fault involves detecting an error, gathering data associated with the error to generate an error event, and categorizing the error event...
Method and apparatus for facilitating secure extension of an application
One embodiment of the present invention provides a method for facilitating secure extension of an application. The method operates by first establishing an...
System monitoring service using throttle mechanisms to manage data loads
A system and method for throttling transmissions of gathered computer system monitoring and asset data within a customer's communications network. A relay is...
Task submission systems and methods for a distributed test framework
A system and method of receiving tasks in a distributed test framework (DTF) includes receiving a task in a task feeder. The task is in a task feeder-specific...
A method of generating a function, the function for assessing a parameter. The method includes: displaying a field for receiving a rule on a computer; entering a...
Method for high-level parallelization of large scale QP optimization
One embodiment of the present invention provides a system that performs high-level parallelization of large scale quadratic-problem (QP) optimization. During...
Distributed simulation system having phases of a timestep
A distributed simulation system is provided in which timesteps may be divided into a first phase (referred to as the zero time phase herein) and a second phase...
Clock with removable frame
Frameworks for generation of Java macro instructions for performing
Techniques for generation of Java macro instructions suitable for use in Java computing environments are disclosed. As such, the techniques can be implemented in...
Method and apparatus to facilitate code verification and garbage
collection in a platform-independent virtual...
One embodiment of the present invention provides a system that facilitates code verification and garbage collection in a platform-independent virtual machine....
Semiconductor device and method and apparatus for testing such a device
A semiconductor device includes at least one component which is vulnerable to damage during scan testing for a particular input data configuration, and supports...
Storage device pre-qualification for clustered systems
Methods are provided for testing storage devices and related devices for use in a clustered system. Storage devices may be pre-qualified before cluster software...
IDL event and request formatting for corba gateway
A CORBA Gateway between CORBA-based applications and an enterprise manager may be configurable to manage various networked objects, such as printers, scanners,...
Circuit for selectively providing maximum or minimum of a pair of floating
A floating point max/min circuit for determining the maximum or minimum of two floating point operands includes a first analysis circuit configured to determine...
A cooling module is provided for an electrically powered apparatus. The cooling module comprises a non-volatile memory arranged to store a module identifier code...
Method and apparatus for seamless integration of images using a
An integrated display system includes multiple displays and a transmissive/reflective mirror with a mirror face. Images from display areas of one or more...
Water soluble energy curable stereo-crosslinkable ionomer compositions
A homogenous, aqueous, energy curable, stereo cross linkable ionomer containing coating composition and a method of preparing same.
Padlock with fully integrated dual locking system with indicator/signal
By providing two separate and independent locking systems formed in a single padlock, with both locking systems independently enabling the single shackle to be...
Inner frame for ski goggles
Combined travel mirror and clock
Ribbed bottle with oversized mouth
Secure full swing rack door hinge
Carabiner slide handle cap
Combining write-barriers within an inner loop with fixed step
The present invention provides a technique for reducing the number of write barriers executed in mutator code without compromising garbage collector performance....
Dynamic distributed make
A distributed make command is used when compiling a computer program in order to allow non-dependent processes in the compiling be performed in parallel, such as...
System and method for enhancing communication between devices in a
An apparatus and method for resending a request in a computer system using a delay value is provided. In response to receiving a request, a target device in a...
Method and apparatus for abandoning an interrupted task
A method and apparatus for abandoning an interrupted task is provided. The method includes setting at least one of a plurality of logic elements associated with...
Methods of microprocessor instruction result obfuscation
A CPU executes program instructions which result in valid and invalid intermediate results. By selecting the desired intermediate results, a program is able to...