t Multilevel network for distributing trusted time and delegating levels of trust regarding timekeeping By www.freepatentsonline.com Published On :: Tue, 25 May 2004 08:00:00 EDT A network is described for providing estimates of the current time. The network includes multiple computer systems each configured to provide an estimate of the current time in response to a received request. The computer systems are logically arranged to form a hierarchical structure, wherein the hierarchical structure includes multiple levels ranked with respect to one another. Each of the computer systems is assigned one of multiple levels of trust, and occupies one of the levels of the hierarchical structure dependent upon the assigned level of trust. The level of trust assigned to a given computer system is dependent upon a timekeeping dependability of the given computer system. The assigned level of trust may also be dependent upon a timekeeping security of the given computer system, where the timekeeping security is dependent upon a tamper resistance of the time clock of the given computer system. Methods for delegating a level of trust to a new computer system (i.e., a computer system not part of the network) and for adding a new computer system to the network are also described. Full Article
t Method and device for synchronizing integrated circuits By www.freepatentsonline.com Published On :: Tue, 24 Oct 2006 08:00:00 EDT A method and device for synchronizing the time between at least two integrated circuits (201, 202), which receive the same pulse signal. In the integrated circuits (201, 202) a counter (204, 206) is used to count the number of pulses in the received pulse signal to synchronize the common time between said integrated circuits. Full Article
t Magnification device for timepiece By www.freepatentsonline.com Published On :: Tue, 25 Sep 2007 08:00:00 EDT The device consists in compensating for the distortion of the characters marked on the dial caused by a lens, by writing the characters with a reverse pin cushion or barrel distortion. Full Article
t Portable self contained light generating device powered by a flow of falling granular material By www.freepatentsonline.com Published On :: Tue, 15 Jul 2008 08:00:00 EDT A portable self contained light generating device which is powered by a flow of granular material falling under the influence of gravity to impinge upon and cause a paddle wheel to rotate thereby turning a small generator producing electricity to power one or more light emitting diodes for illumination. The device equipped with a multi-position power/illumination control switch and in some embodiments also provided with a battery providing supplemental power. Full Article
t Moon phase menstrual tracking and educational system By www.freepatentsonline.com Published On :: Tue, 24 Feb 2009 08:00:00 EST A system and method for tracking and informing about a physical, emotional, or physiological cycle, such as a menstrual cycle, includes at least one definition entry and at least one date indicator. Each definition entry defines indicia such as color to represent a stage of a physical, emotional, or physiological cycle. Each date indicator includes a date section and a tracking section corresponding to each date section. The date section of the date indicator indicates at least one date, wherein the tracking section is capable of being marked so as to indicate indicia corresponding to a definition entry to signify the stage of the physical, emotional, or physiological cycle for each date. According to one embodiment, the date indicators are arranged according to phases of the moon to allow correlation of a user's cycle to the lunar cycle. Full Article
t Information expressing method By www.freepatentsonline.com Published On :: Tue, 19 Jan 2010 08:00:00 EST A musical rhythm is expressed by the number of the timing marks (for example, three timing marks when in simple triple time); and a musical tempo is expressed by the distance among the timing marks and a timing ball that moves at a fixed speed among those timing marks. Accordingly, a player may easily grasp the tempo of the music and easily determine the rhythm of the music in a sound game. Full Article
t Method for detection of unfastening or removal of absorbent article from the body By www.freepatentsonline.com Published On :: Tue, 07 Sep 2010 08:00:00 EDT A method for detecting and conveying an alarm signal, when an absorbent article is unfastened or, completely removed from the body of the wearer. The method is intended to be used in parallel with a method for detecting wetness in the absorbent article and further relates to an integrated detection-and-alarm method for detecting unfastening and/or wetness in an absorbent article. A system for detecting and conveying an alarm signal when an absorbent article is unfastened or removed from the body of the wearer and/or when the article is wet. The system includes (a) and absorbent article having at least one absorbent layer, the object to be displaced, such as a fastening system, one or more sensoring devices, one or more transmitting devices, and (b) a remote receiver. Furthermore, the system relates to the use of the system in the care of children and adults suffering from incontinence and/or psychological illnesses. Full Article
t Coupled resonator for regulating system By www.freepatentsonline.com Published On :: Tue, 15 Feb 2011 08:00:00 EST The coupled resonator comprises a first low frequency resonator, such as a balance spring (1) and a second higher frequency resonator, such as a tuning fork (2), the two resonators (1 and 2) including permanent mechanical coupling means. Application to the regulating system of a timepiece. Full Article
t Control device for mobile body By www.freepatentsonline.com Published On :: Tue, 19 Jun 2012 08:00:00 EDT A control device for a mobile body makes it possible to smoothly correct the deviation of an actual posture of a base body of a mobile body, which travels with the base body thereof moving up and down, from a desired posture of the base body while restraining an overshoot or an undershoot from occurring. To determine a required manipulated variable according to a feedback control law in order to converge a state amount deviation related to the posture of the base body of the mobile body to zero, the feedback gain of the feedback control law is determined by using the time series in a period from current time to predetermined time in the future in the time series of a desired inertial force of the mobile body or the base body. The required manipulated variable is determined by the calculation of the feedback control law on the basis of the determined feedback gain and an observed value of the state amount deviation. Full Article
t Microelectronic machine-based ariable By www.freepatentsonline.com Published On :: Tue, 02 Dec 2014 08:00:00 EST A tunable resonator is provided that has a high Q for each resonate frequency. The tunable resonator is a MEMs tunable resonator wherein the tuner is affected by moving a moveable mass, associated with the resonating portion of the resonator, form a first position to a second position such that the moveable mass is held in the first position or second position by a detent rather than a constant electromagnet magnetic or electrostatic force applied thereon. Full Article
t Wristwatch with atomic oscillator By www.freepatentsonline.com Published On :: Tue, 30 Dec 2014 08:00:00 EST A wristwatch, which comprises an atomic oscillator comprising a system for detecting the beat frequencies obtained by the Raman effect. Full Article
t Lighter and method for eliminating smoking that includes interactive self-learning software By www.freepatentsonline.com Published On :: Tue, 06 Jan 2015 08:00:00 EST Smoking cessation lighter is configured for lighting cigarettes for a smoker, and learning software is provided for monitoring smoking behavior of a smoker during a first data collection period and guiding a smoker's smoking cessation by directing the smoker when the smoker is to smoke a cigarette based on data collected during the first data collection period. The learning software monitors user behavior and collects data during use of the lighter by the smoker after the initial data collection period in order to analyze and further guide the smoker based on the smoker's cheating behavior, the smoker's behavior of lighting a cigarette for a friend, and the smoker's behavior of skipping use of the lighter at a time when the smoker has been directed to light a cigarette by the lighter. Full Article
t Writing of new data of a first block size in a raid array that stores both parity and data in a second block size By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A Redundant Array of Independent Disks (RAID) controller receives new data that is to be written, wherein the new data is indicated in blocks of a first block size. The RAID controller reads old data, and old parity that corresponds to the old data, stored in blocks of a second block size that is larger in size than the first block size. The RAID controller computes new parity based on the new data, the old data, and the old parity. The RAID controller writes the new data and the new parity aligned to the blocks of the second block size, wherein portions of the old data that are not overwritten by the RAID controller are also written to the blocks of the second block size. Full Article
t Writing of new data of a first block size in a raid array that stores both parity and data in a second block size By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A Redundant Array of Independent Disks (RAID) controller receives new data that is to be written, wherein the new data is indicated in blocks of a first block size. The RAID controller reads old data, and old parity that corresponds to the old data, stored in blocks of a second block size that is larger in size than the first block size. The RAID controller computes new parity based on the new data, the old data, and the old parity. The RAID controller writes the new data and the new parity aligned to the blocks of the second block size, wherein portions of the old data that are not overwritten by the RAID controller are also written to the blocks of the second block size. Full Article
t Distributing capacity slices across storage system nodes By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Various systems and methods are described for configuring a data storage system. In one embodiment, a plurality of actual capacities of a plurality of storage devices of the data storage system are identified and divided into a plurality of capacity slices. The plurality of capacity slices are combined into a plurality of chunks of capacity slices, each having a combination of characteristics of the underlying physical storage devices. The chunks of capacity slices are then mapped to a plurality of logical storage devices. A group of the plurality of logical storage devices is then organized into a redundant array of logical storage devices. Full Article
t Sliding-window multi-class striping By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A sequence of storage devices of a data store may include one or more stripesets for storing data stripes of different lengths and of different types. Each data stripe may be stored in a prefix or other portion of a stripeset. Each data stripe may be identified by an array of addresses that identify each page of the data stripe on each included storage device. When a first storage device of a stripeset becomes full, the stripeset may be shifted by removing the full storage device from the stripeset, and adding a next storage device of the data store to the stripeset. A class variable may be associated with storage devices of a stripeset to identify the type of data that the stripeset can store. The class variable may be increased (or otherwise modified) when a computer stores data of a different class in the stripeset. Full Article
t Virtualized data storage in a network computing environment By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Methods and systems for load balancing read/write requests of a virtualized storage system. In one embodiment, a storage system includes a plurality of physical storage devices and a storage module operable within a communication network to present the plurality of physical storage devices as a virtual storage device to a plurality of network computing elements that are coupled to the communication network. The virtual storage device comprises a plurality of virtual storage volumes, wherein each virtual storage volume is communicatively coupled to the physical storage devices via the storage module. The storage module comprises maps that are used to route read/write requests from the network computing elements to the virtual storage volumes. Each map links read/write requests from at least one network computing element to a respective virtual storage volume within the virtual storage device. Full Article
t Streaming content storage By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A computing system includes a plurality of dispersed storage (DS) processing units operable to receive a continuous data stream, simultaneously disperse storage error encode the continuous data stream to produce a plurality of encoded data slices and store the plurality of encoded data slices in a DS memory. Full Article
t Memory storage apparatus, memory controller, and method for transmitting and identifying data stream By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A memory storage apparatus, a memory controller and method for transmitting and identifying data streams are provided. The memory controller passes at least a portion of a data stream received from a host system to a smart card chip of the memory storage apparatus. Then, the host system accurately receives a response message from the smart card chip by executing a plurality of read commands. The memory controller is capable of adding a first verification code to a response data stream sent to the host system, and is capable of adding a write token to each of data segments of the response data stream. The host system confirms the accuracy of the response data stream by verifying the first verification code or by verifying the write token of each of the data segments. Full Article
t Adjustment of the number of task control blocks allocated for discard scans By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A controller receives a request to perform a release space operation. A determination is made that a new discard scan has to be performed on a cache, in response to the received request to perform the release space operation. A determination is made as to how many task control blocks are to be allocated to the perform the new discard scan, based on how many task control blocks have already been allocated for performing one or more discard scans that are already in progress. Full Article
t Efficient processing of cache segment waiters By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT For a plurality of input/output (I/O) operations waiting to assemble complete data tracks from data segments, a process, separate from a process responsible for the data assembly into the complete data tracks, is initiated for waking a predetermined number of the waiting I/O operations. Full Article
t Systems and methods for operating a flash memory file system By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A flash memory file system including a plurality of flash modules. Each of the plurality of flash modules includes a respective cache memory, a respective flash memory, and a respective flash controller in communication with the respective cache memory and the respective flash memory. A first flash module of the plurality of flash modules is configured to receive a file lookup message including a path name for file data stored on a second flash module of the plurality of flash modules. A third flash module of the plurality of flash modules is configured to select the second flash module based on the path name and a directory table, and generate a file metadata message responsive to the file lookup message. The file metadata message identifies the second flash module as containing the file data. Full Article
t Cache policies for uncacheable memory requests By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Systems, processors, and methods for keeping uncacheable data coherent. A processor includes a multi-level cache hierarchy, and uncacheable load memory operations can be cached at any level of the cache hierarchy. If an uncacheable load misses in the L2 cache, then allocation of the uncacheable load will be restricted to a subset of the ways of the L2 cache. If an uncacheable store memory operation hits in the L1 cache, then the hit cache line can be updated with the data from the memory operation. If the uncacheable store misses in the L1 cache, then the uncacheable store is sent to a core interface unit. Multiple contiguous store misses are merged into larger blocks of data in the core interface unit before being sent to the L2 cache. Full Article
t Single instance buffer cache method and system By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Provided is a method and system for reducing duplicate buffers in buffer cache associated with a storage device. Reducing buffer duplication in a buffer cache includes accessing a file reference pointer associated with a file in a deduplicated filesystem when attempting to load a requested data block from the file into the buffer cache. To determine if the requested data block is already in the buffer cache, aspects of the invention compare a fingerprint that identifies the requested data block against one or more fingerprints identifying a corresponding one or more sharable data blocks in the buffer cache. A match between the fingerprint of the requested data block and the fingerprint from a sharable data block in the buffer cache indicates that the requested data block is already loaded in buffer cache. The sharable data block in buffer cache is used instead thereby reducing buffer duplication in the buffer cache. Full Article
t Optimizing a cache back invalidation policy By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method, a system and a computer program product for enhancing a cache back invalidation policy by utilizing least recently used (LRU) bits and presence bits in selecting cache-lines for eviction. A cache back invalidation (CBI) utility evicts cache-lines by using presence bits to avoid replacing a cache-line in a lower level cache that is also present in a higher level cache. Furthermore, the CBI utility selects the cache-line for eviction from an LRU group. The CBI utility ensures that dormant cache-lines in the higher level caches do not retain corresponding presence bits set in the lower level caches by unsetting the presence bits in the lower level cache when a line is replaced in the higher level cache. Additionally, when a processor core becomes idle, the CBI utility invalidates the corresponding higher level cache by unsetting the corresponding presence bits in the lower level cache. Full Article
t Heterogeneous memory system By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A heterogeneous memory system includes a main memory arrangement, a first-level cache, and a memory management unit (MMU). The first-level cache includes an SRAM arrangement and a DRAM arrangement. The MMU is configured and arranged to read first data from the main memory arrangement in response to a stored first value associated with the first data and indicative of a start time. The MMU selects one of the SRAM arrangement or the DRAM arrangement for storage of the first data and stores the first data in the selected one of the SRAM arrangement or DRAM arrangement. The MMU reads second data from one of the SRAM arrangement or DRAM arrangement and writes the data to the main memory arrangement in response to a stored second value associated with the second data and indicative of a duration. Full Article
t Data bus efficiency via cache line usurpation By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Embodiments of the current invention permit a user to allocate cache memory to main memory more efficiently. The processor or a user allocates the cache memory and associates the cache memory to the main memory location, but suppresses or bypassing reading the main memory data into the cache memory. Some embodiments of the present invention permit the user to specify how many cache lines are allocated at a given time. Further, embodiments of the present invention may initialize the cache memory to a specified pattern. The cache memory may be zeroed or set to some desired pattern, such as all ones. Alternatively, a user may determine the initialization pattern through the processor. Full Article
t Block memory engine with memory corruption detection By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Techniques for handling version information using a copy engine. In one embodiment, an apparatus comprises a copy engine configured to perform one or more operations associated with a block memory operation in response to a command. Examples of block memory operations may include copy, clear, move, and/or compress operations. In one embodiment, the copy engine is configured to handle version information associated with the block memory operation based on the command. The one or more operations may include operating on data in a cache and/or modifying entries in a memory. In one embodiment, the copy engine is configured to compare version information in the command with stored version information. The copy engine may overwrite or preserve version information based on the command. The copy engine may be a coprocessing element. The copy engine may be configured to maintain coherency with other copy engines and/or processing elements. Full Article
t Distributed cache coherency protocol By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Systems, methods, and other embodiments associated with a distributed cache coherency protocol are described. According to one embodiment, a method includes receiving a request from a requester for access to one or more memory blocks in a block storage device that is shared by at least two physical computing machines and determining if a caching right to any of the one or more memory blocks has been granted to a different requester. If the caching right has not been granted to the different requester, access is granted to the one or more memory blocks to the requester. Full Article
t Storage device By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT To provide a storage device with low power consumption. The storage device includes a plurality of cache lines. Each of the cache lines includes a data field which stores cache data; a tag which stores address data corresponding the cache data; and a valid bit which stores valid data indicating whether the cache data stored in the data field is valid or invalid. Whether power is supplied to the tag and the data field in each of the cache lines is determined based on the valid data stored in the valid bit. Full Article
t Virtual machine trigger By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A computing system includes a parent partition, child partitions, a hypervisor, shared memories each associated with one of the child partitions, and trigger pages each associated with one of the child partitions. The hypervisor receives a system event signal from one of the child partitions and, in response to receiving the system event signal, accesses the trigger page associated with that child partition. The hypervisor determines whether the trigger page indicates whether data is available to be read from the shared memory associated with the child partition. The hypervisor can send an indication to either the parent partition or the child partitions that data is available to be read from the shared memory associated with the child partition if the hypervisor determines that the trigger page indicates that data is available to be read from the shared memory associated with the child partition. Full Article
t Dynamically improving memory affinity of logical partitions By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT In a computer system that includes multiple nodes and multiple logical partitions, a dynamic partition manager computes current memory affinity and potential memory affinity to help determine whether a reallocation of resources between nodes may improve memory affinity for a logical partition or for the computer system. If so, the reallocation of resources is performed so memory affinity for the logical partition or computer system is improved. Memory affinity is computed relative to the physical layout of the resources according to a hardware domain hierarchy that includes a plurality of primary domains and a plurality of secondary domains. Full Article
t Memory system with fixed and variable pointers By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A memory system includes a volatile first storing unit, a nonvolatile second storing unit, and a controller. The controller performs data transfer, stores management information including a storage position of the data stored in the second storing unit into the first storing unit, and performs data management while updating the management information. The second storing unit has a management information storage area for storing management information storage information including management information in a latest state and a storage position of the management information. The storage position information is read by the controller during a startup operation of the memory system and includes a second pointer indicating a storage position of management information in a latest state in the management information storage area and a first pointer indicating a storage position of the second pointer. The first pointer is stored in a fixed area in the second storing unit and the second pointer is stored in an area excluding the fixed area in the second storing unit. Full Article
t Storage device and method for controlling data invalidation By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A storage device according to an embodiment includes: a host interface connected to a host; a memory including a first buffer that stores a logical address range designated by an invalidation instruction received from the host via the host interface and a second buffer that stores an internal logical address range which is an area combination with the logical address range; a nonvolatile memory; and a controller. The controller includes: an invalidation instruction processor that stores the logical address range designated by the invalidation instruction in the first buffer; an area combination executor that generates the internal logical address range by the area combination with the logical address range and stores the internal logical address range in the second buffer; and an invalidation executor that executes invalidation processing on the nonvolatile memory based on the internal logical address range. Full Article
t Method and apparatus for optically backing up data By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT An optical backup apparatus is provided and includes an optical storage device, an interface module to connect with at least one type of external storage medium, and a control unit to back up data from the external storage medium to the optical storage device in response to an external remote control operation. Full Article
t Methods and systems for replicating an expandable storage volume By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Machine implemented method and system for generating a disaster recovery copy of an expandable storage volume having a namespace for storing information for accessing data objects stored at a data constituent volume is provided. A transfer operation for transferring a point in time copy of the expandable storage volume from a first location to a second location is generated. Information regarding the expandable storage volume from the first location is retrieved and a destination expandable storage volume is resized to match components of the expandable storage volume at the first location. Thereafter, the point in time copy of the expandable storage volume is transferred from the first location to the second location and configuration information regarding the point in time copy is copied from the first location to the second location. Full Article
t Moving blocks of data between main memory and storage class memory By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT An abstraction for storage class memory is provided that hides the details of the implementation of storage class memory from a program, and provides a standard channel programming interface for performing certain actions, such as controlling movement of data between main storage and storage class memory or managing storage class memory. Full Article
t Memory data management By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method and computer-readable storage media are provided for rearranging data in physical memory units. In one embodiment, a method may include monitoring utilization counters. The method may further include, comparing the utilization counters for a match with an instance in a first table containing one or more instances when data may be rearranged in the physical memory units. The table may further include where the data should be relocated by a rearrangement. The method may also include, continuing to monitor the utilization counters if a match is not found with an instance in the first table. The method may further include, rearranging the data in the physical memory units if a match between the utilization counters and an instance in the first table is found. Full Article
t System cache with quota-based control By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Methods and apparatuses for implementing a system cache with quota-based control. Quotas may be assigned on a group ID basis to each group ID that is assigned to use the system cache. The quota does not reserve space in the system cache, but rather the quota may be used within any way within the system cache. The quota may prevent a given group ID from consuming more than a desired amount of the system cache. Once a group ID's quota has been reached, no additional allocation will be permitted for that group ID. The total amount of allocated quota for all group IDs can exceed the size of system cache, such that the system cache can be oversubscribed. The sticky state can be used to prioritize data retention within the system cache when oversubscription is being used. Full Article
t Management apparatus and management method By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Proposed are a management apparatus and a management method capable of improving the stability of the overall computer system. In a computer system which manages a storage area provided by each of a plurality of mutually connected storage apparatuses as a logical pool, provides to a host computer a virtual volume associated with the logical pool, and assigns a real storage area from the logical pool to the virtual volume when the host computer writes into the virtual volume, when a storage apparatus is added to the plurality of storage apparatuses, the host computer is controlled to switch the access path to the added storage apparatus. Full Article
t Automatically preventing large block writes from starving small block writes in a storage device By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A mechanism is provided in a storage device for performing a write operation. The mechanism configures a write buffer memory with a plurality of write buffer portions. Each write buffer portion is dedicated to a predetermined block size category within a plurality of block size categories. For each write operation from an initiator, the mechanism determines a block size category of the write operation. The mechanism performs each write operation by writing to a write buffer portion within the plurality of write buffer portions corresponding to the block size category of the write operation. Full Article
t System and method for determining a level of success of operations on an abstraction of multiple logical data storage containers By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Various systems and methods are described for configuring a logical data storage container. In one embodiment, an instruction to perform an operation to modify an attribute of the logical data storage container that is an abstraction of a plurality of pertinent storage containers is received. A translated instruction to perform a sub-operation associated with the operation is transmitted to each of a number of the plurality of pertinent storage containers. A level of success of the performing of the operation on the logical data storage container is detected based on a comparison of a threshold value to a level of success of the performing of the sub-operation on each of the number of the plurality of pertinent storage containers. A report of the detected level of success is communicated. Full Article
t Dispersed storage unit and method for configuration thereof By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A dispersed storage (DS) unit for use within a dispersed storage network is capable of self-configuring using registry information provided to the DS unit. The registry information includes a slice name assignment indicating a range of slice names corresponding to a plurality of potential data slices of potential data objects to be stored in the DS unit. Based on the registry information, the DS unit allocates a portion of physical memory to store the potential data slices. Full Article
t Managing CPU resources for high availability micro-partitions By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A partition manager relocates a logical partition from a primary shared processor pool to a secondary shared processor pool in response to a predetermined condition, such as a hardware failure. The relocated logical partition is allocated a smaller quantity of processing units from the secondary pool than it was allocated from the primary pool. A quantity of processing units reserved for a second logical partition is identified in the secondary shared processor pool, and a portion of those reserved processing units are allocated to the relocated logical partition. The reserved processing units may be redistributed among multiple relocated logical partitions. Full Article
t System and method for virtual machine conversion By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT System and method for conversion of virtual machine files without requiring copying of the virtual machine payload (data) from one location to another location. By eliminating this step, applicant's invention significantly enhances the efficiency of the conversion process. In one embodiment, a file system or storage system provides indirections to locations of data elements stored on a persistent storage media. A source virtual machine file includes hypervisor metadata (HM) data elements in one hypervisor file format, and virtual machine payload (VMP) data elements. The source virtual machine file is converted by transforming the HM data elements of the source file to create destination HM data elements in a destination hypervisor format different from the source hypervisor format; maintaining the locations of the VMP data elements stored on the persistent storage media constant during the conversion from source to destination file formats without reading or writing the VMP data elements; and creating indirections to reference the destination HM data elements in the destination hypervisor format and the existing stored VMP data elements. Full Article
t Memory management unit for a microprocessor system, microprocessor system and method for managing memory By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT The invention pertains to a memory management unit for a microprocessor system, the memory management unit being connected or connectable to at least one processor core of the microprocessor system and being connected or connectable to a physical memory of the microprocessor system. The memory management unit is adapted to selectively operate in a hypervisor mode or in a supervisor mode, the hypervisor mode and the supervisor mode having different privilege levels of access to hardware The memory management unit comprises a first register table indicating physical address information for mapping at least one logical physical address and at least one actual physical address onto each other; a second register table indicating an allowed address range of physical addresses accessible to a process running in or under supervisor mode; wherein the memory management unit is adapted to prevent write access to the second register table by a process not in hypervisor mode. The memory management unit is further adapted to allow write access to the first register table of a process running in or under supervisor mode to reconfigure the physical address information indicated in the first register table with memory mapping information relating to at least one physical address, if the at least one physical address is in the allowed address range, and to prevent write access to the first register table of the process running in or under supervisor mode if the at least one physical address is not in the allowed address range. The invention also pertains to a microprocessor system and a method for managing memory. Full Article
t Apparatuses and methods for providing data from multiple memories By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT Apparatuses and methods for providing data are disclosed. An example apparatus includes a plurality of memories coupled to a data bus. The memories provide data to the data bus responsive, at least in part, to a first address. The plurality of memories further provide at least a portion of the data corresponding to the first address to the data bus during a sense operation for a second address provided to the plurality of memories after the first address. Each of the plurality of memories provides data to the data bus corresponding to the first address at different times. Moreover, a plurality of memories may provide at least 2N bits of data to the data bus responsive, at least in part, to an address, each of the plurality of memories provide N bits of data to the data bus at different times. Full Article
t Prefetch optimizer measuring execution time of instruction sequence cycling through each selectable hardware prefetch depth and cycling through disabling each software prefetch instruction of an instruction sequence of interest By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A prefetch optimizer tool for an information handling system (IHS) may improve effective memory access time by controlling both hardware prefetch operations and software prefetch operations. The prefetch optimizer tool selectively disables prefetch instructions in an instruction sequence of interest within an application. The tool measures execution times of the instruction sequence of interest when different prefetch instructions are disabled. The tool may hold hardware prefetch depth constant while cycling through disabling different prefetch instructions and taking corresponding execution time measurements. Alternatively, for each disabled prefetch instruction in the instruction sequence of interest, the tool may cycle through different hardware prefetch depths and take corresponding execution time measurements at each hardware prefetch depth. The tool selects a combination of hardware prefetch depth and prefetch instruction disablement that may improve the execution time in comparison with a baseline execution time. Full Article
t Dynamically expandable and contractible fault-tolerant storage system with virtual hot spare By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A dynamically expandable and contractible fault-tolerant storage system employs a virtual hot spare that is created from unused storage capacity across a plurality of storage devices. This unused storage capacity is available if and when a storage device fails for storage of data recovered from the remaining storage device(s). On an ongoing basis, the storage system may determine the amount of unused storage capacity that would be required for the virtual hot spare (e.g., based on the number of storage devices, the capacities of the various storage devices, the amount of data stored, and the manner in which the data is stored) and generate a signal if additional storage capacity is needed for a virtual hot spare. Full Article
t Dynamic consolidation of virtual machines By www.freepatentsonline.com Published On :: Tue, 26 May 2015 08:00:00 EDT A method and apparatus are disclosed of monitoring a number of virtual machines operating in an enterprise network. One example method of operation may include identifying a number of virtual machines currently operating in an enterprise network and determining performance metrics for each of the virtual machines. The method may also include identifying at least one candidate virtual machine from the virtual machines to optimize its active application load and modifying the candidate virtual machine to change its active application load. Full Article