At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Multiple password policies in a directory server system
The invention proposes a directory server capable of interacting with entries organized in a tree structure in a directory server system. The entries comprise...
Mechanism for starvation avoidance while maintaining cache consistency in
A computer system comprises a system memory, a first active device configured to access data stored in the system memory, and a second active device configured...
Multiprocessing computer system employing capacity prefetching
Various embodiments of a multiprocessing computer system employing capacity prefetching are disclosed. In one embodiment, a cache subsystem implements a method...
Server node with interated networking capabilities
According to one aspect of the invention, a method and apparatus for a server node is disclosed. This server node consists of one or more processors. The...
Method and apparatus for providing application specific strategies to a
JAVA platform including load balancing...
An invention is disclosed for a load balancing method in a JAVA based environment. The method includes executing an application having a first service module and...
System and method for dynamic, transparent migration of services
System and method for the dynamic and transparent migration of services in a peer-to-peer networking environment. Member peers in a peer group using a...
Transparent optimization of network traffic in distributed systems
A distributed system having a client and a server includes a state manager interposed between the client and the server. The state manager has a capability to...
Software development test case analyzer and optimizer
An intelligent test system for testing software code is provided. The intelligent system includes a profiled software component, a test executor, a database, a...
Method, system, and program for character set matching
Disclosed is a technique for matching character sets. One or more data set files are stored. One or more character set files are created, wherein each character...
Transaction optimization of read-only data sources
A system and method for excluding from a transaction accesses to one or more data sources marked as read-only. Data sources may be designated as read-only at a...
Method and apparatus for compressing images using color palettes and rare
A system for compressing an image. The system determines a set of commonly occurring color values in the image and associates a designator with each commonly...
Test circuit for measuring sense amplifier and memory mismatches
Post-manufacture compensation for a sensing offset can be provided, at least in part, by selectively exposing one of a pair of cross-coupled transistors in a...
Integral heatsink grounding arrangement
An electromagnetic (EM) shielding assembly shields an electronic component mounted on a circuit board. The assembly includes a shielding portion that is...
One gate delay output noise insensitive latch
A one gate delay output noise insensitive latch includes an input node, an output node, a storage node, a not storage node, and a data clock line. A primary...
Power distribution system with a dedicated power structure and a high
performance voltage regulator
A system and method for distributing power to an integrated circuit. In one embodiment, a power laminate may be mounted to a printed circuit board (PCB). The...
Application-independent API for distributed component collaboration
A method for a system having distributed collaborating components includes restricting direct interaction between distributed collaborating components by...
Method and apparatus for aggregate resource management of active computing
The present invention is for aggregate resource management of active computing environments. According to one or more embodiments of the present invention a...
Method and apparatus for creating string objects in a programming language
One embodiment of the present invention provides a system for implementing a string object defined in a programming language. Upon receiving characters to be...
Method of automatically virtualizing core native libraries of a virtual
A method of automatically virtualizing core native libraries of a virtual machine is disclosed. In an embodiment, the virtual machine is a java virtual machine...
JSP tag libraries and web services
An invention is provided for incorporating web services into JSP tag libraries for use in JSP pages. As a result, web page authors can develop JSP pages, which...
IBIST interconnect and bridge fault detection scheme
A method and mechanism for detecting interconnect and bridge defects. Contact points in a chip are assigned placement designation such that no two adjacent...
Method and system for hierarchical visibility marks for hierarchical
elements in hierarchical database...
A new interface and methods allow a new versatility both in both managing a database, and in presenting hierarchical database information in a more useful way....
Method for private personal identification number management
A method for private personal identification number (PIN) management comprises ascertaining a first delay period of a preceding PIN. The first delay period is...
System and method for efficiently tracing simulation data in hardware
acceleration simulation systems
A system for tracing signals for a cycle-based simulation includes a traced signal and a system resources availability information of the cycle-based simulation,...
Detecting degradation of components during reliability-evaluation studies
One embodiment of the present invention provides a system that determines the reliability of a component in a system. During operation, the system monitors...
System and method for dynamic rate flow control
A system and method for providing dynamic rate flow control. An originating entity sets requested and target rates of communication within a communication sent...
Programmable delay locked loop
A delay lock loop (DLL) system includes a master DLL and at least one slave DLL. The master DLL comprises a master delay line, a phase detector, and a loop...
Method, system, and articles of manufacture for providing a servlet
container based web service endpoint
Methods, systems, and articles of manufacture consistent with certain principles related to the present invention enable a computing system to layer the...
Termination detection for shared-memory parallel programs
A "garbage collector" employed to reclaim memory dynamically allocated to data objects employs multiple execution threads to perform a parallel-execution...
Computer program product having preloaded software module
A method and system for providing an executable module having an address space for storing program data that is to reside in a read-only storage medium and an...
Method and apparatus for accessing related computer objects
The present invention provides a method and apparatus for accessing related computer objects. In one embodiment, computer objects related to a user's current...
Analyzing system error messages
The present invention provides a method and apparatus for analyzing system error messages. The method includes accessing a report generated in response to an...
Kernel memory defragmentation method and apparatus
Provided is a method and an apparatus for allocating contiguous chunks of physical address space. Specifically, the contiguous chunks are homogenized by...
Method and apparatus for managing configuration information in a
distributed computer system
A configuration manager federated bean is provided for each host computer in the three-tiered management system. The configuration manager federated bean for a...
API representation enabling submerged hierarchy
A method for representing an application programming interface (API) for an object-oriented library includes creating a list of public elements in the library...
Method and apparatus for centralized management of a storage
virtualization engine and data services
SVE management software uses management software running at a central service processor to control storage virtualization engines operating in a plurality...
Methods and apparatus for managing multiple user systems
The techniques of the present invention relate to allocating resources and managing multiple services and multiple users in a multiprocessing computer system. A...
Cluster availability model
The present invention describes a method and system for creating a cluster availability model that takes into account availabilities of software components in...
A method may be provided for establishing a service communication channel to a multi-server computer system comprising a plurality of modular units. At least...
Gas-barrier film and gas-barrier coating agent, and method for production
Provided are a gas-barrier film which is a laminate comprising a substrate layer comprising a thermoplastic resin film and a gas-barrier layer comprising a...
Efficient data buffering in a multithreaded environment
A method and apparatus for buffering data in a multithreaded environment is provided. According to one aspect of the invention, log data is generated in response...
Determinism in a multiprocessor computer system and monitor and processor
A multiprocessor computer system which provides fault tolerance includes a number of processing sets. At least one of the processing sets is operable...
Signal shielding technique using active shields for non-interacting driver
A technique for actively shielding a signal such that a signal driver of the signal only participates in discharge events is provided. Because the signal driver...
Creating and displaying document undo configuration using nested test
A computer-implemented method of processing a document provides a user with a plurality of nested test modes for creating, reviewing and retrieving a plurality...
Scan of chip state from a hierarchical design
A method and mechanism for observation, testing, and diagnosis with scan chains. A device under test is configured to support scan chains. The device includes...
Compliance testing communication protocols implemented on
resource-constrained computing devices
One embodiment of the present invention provides a system that supports compatibility testing of functionality provided through an Application Programming...
Method and apparatus for managing host-based data services using CIM
Management of data services in a distributed computer system is provided by a three-tiered system. The lowest, or agent, tier comprises Common Information Model...
Method and system for creating a reference database for a
A reference database containing, for example, bibliographic data of a computer-readable document like a text document is stored together with the text document...