At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Patent # | Description |
---|---|
US-9,569,379 |
Method for burning data into tire pressure monitoring device A method for burning data into a tire pressure monitoring device includes the steps of preparing a burning tool and a tire pressure monitoring device and... |
US-9,569,378 |
Processing element data sharing A memory sharing method and system in a distributed computing environment. The method includes placing a first operator and a second operator within a... |
US-9,569,376 |
Method, system, and computer program product for managing shutdown and
substitution of I/O enclosures A storage controller determines a presence of an indication from an Input/Output (I/O) enclosure that the I/O enclosure will perform a shutdown after a... |
US-9,569,375 |
Unifying class device interface with one host interface by using embedded
controller A system, device and method for communicating between a host device and a plurality of peripheral devices wherein the communications utilize a single interface... |
US-9,569,374 |
Information processing apparatus, information processing method, and
program There is provided an information processing apparatus including a device detection part configured to detect a second execution device that is identical or... |
US-9,569,373 |
Sharing message-signaled interrupts between peripheral component
interconnect (PCI) I/O devices A PCI function, such as a device driver, may request that additional MSI resources be allocated to an I/O device coupled to a PCI Host Bridge (PHB). However,... |
US-9,569,372 |
Redirection communication A method and system of communicating data to or from a remote computer. The remote computer is accessed by a CPU as though it were a local IDE controller... |
US-9,569,371 |
Memory device, memory system, and operating method of memory system A memory device, a memory system, and an operating method of the memory system is provided. The operating method includes operations of transmitting an... |
US-9,569,370 |
Storing a system-absolute address (SAA) in a first level translation
look-aside buffer (TLB) Embodiments relate to a method, system and computer program product for storing a system-absolute address (SAA) in a first level look-aside buffer (TLB). In one... |
US-9,569,369 |
Software translation lookaside buffer for persistent pointer management Techniques are provided for performing OID-to-VMA translations during runtime. Vector registers are used to implement a "software TLB" to perform OID-to-VMA... |
US-9,569,368 |
Installing and managing flows in a flow table cache Some embodiments provide a physical forwarding that installs flows in a flow table cache and uses the flows to process packets. In addition, the physical... |
US-9,569,367 |
Cache eviction based on types of data stored in storage systems Exemplary methods for improving cache utilization include in response to receiving a request to store data, storing the data in one of a plurality of cache... |
US-9,569,366 |
System and method to provide non-coherent access to a coherent memory
system In one embodiment, a system comprises a memory and a memory controller that provides a cache access path to the memory and a bypass-cache access path to the... |
US-9,569,365 |
Store-exclusive instruction conflict resolution A data processing system includes a plurality of transaction masters, each with an associated local cache memory and coupled to coherent interconnect circuitry.... |
US-9,569,364 |
Multiple history based micro partition prefetch optimization Techniques are disclosed for prefetching cache lines. One technique includes dispatching a virtual processor and recording a first set of addresses associated... |
US-9,569,363 |
Selective prefetching of physically sequential cache line to cache line
that includes loaded page table entry A microprocessor includes a translation lookaside buffer and a first request to load into the microprocessor a page table entry in response to a miss of a... |
US-9,569,362 |
Programmable ordering and prefetch An input/output bridge controls access to a memory by a number of devices. The bridge enforces ordering of access requests according to a register storing an... |
US-9,569,361 |
Pre-fetch chaining According to one general aspect, an apparatus may include a cache pre-fetcher, and a pre-fetch scheduler. The cache pre-fetcher may be configured to predict,... |
US-9,569,360 |
Partitioning shared caches Technology is provided for partitioning a shared unified cache in a multi-processor computer system. The technology can receive a request to allocate a portion... |
US-9,569,359 |
Methods and apparatuses for addressing memory caches A cache memory includes cache lines to store information. The stored information is associated with physical addresses that include first, second, and third... |
US-9,569,358 |
Electronic device and method for fabricating the same An electronic device including a semiconductor memory that includes: a selection element; a first plug and a second plug that are coupled with two different... |
US-9,569,357 |
Managing compressed data in a storage system Systems, methods, and computer readable storage mediums for optimistically managing compressed data in a storage system. When possible, multiple input blocks... |
US-9,569,356 |
Methods for updating reference count and shared objects in a concurrent
system A method for referencing and updating objects in a shared resource environment. A reference counter counts is incremented for every use of an object subtype in... |
US-9,569,355 |
Memory system and control method According to an embodiment, a memory system includes multiple nonvolatile memories to/from each of which data can be written/read independently of one another;... |
US-9,569,354 |
System and method to emulate an electrically erasable programmable
read-only memory The disclosure relates to an electronic memory system, and more specifically, to a system to emulate an electrically erasable programmable read-only memory, and... |
US-9,569,353 |
Automotive electronic control unit and data rewriting method for
automotive electronic control unit An automotive electronic control unit receives rewrite data wirelessly transmitted in units of a predetermined size from an external device and rewrites data... |
US-9,569,352 |
Storage module and method for regulating garbage collection operations
based on write activity of a host A storage module and method for regulating garbage collection operations based on write activity of a host are disclosed. In one embodiment, a storage module... |
US-9,569,351 |
Storing corresponding data units in a common storage unit A storage device controller may segregate data units that are typically accessed together to a common storage unit. In one example, a storage device includes a... |
US-9,569,350 |
Multidimensional resource manager/allocator An apparatus and method for multidimensional resource allocation and management are provided. The method includes receiving a request for allocation of a block... |
US-9,569,349 |
Method and apparatus for reallocating memory content Coherent memory copy logic is operative to copy data from a source memory location to a destination memory location and duplicate a write request to a source... |
US-9,569,348 |
Method for automatic page table compression One embodiment of the present invention sets forth a technique for performing a method for compressing page table entries (PTEs) prior to storing the PTEs in a... |
US-9,569,347 |
Testing optimized binary modules Various embodiments test an optimized binary module. In one embodiment, a region in a set of original binary code of an original binary module in which branch... |
US-9,569,346 |
Asynchronous code testing A method and system for asynchronous code testing. Test cases are generated from an input code that includes code blocks organized in a hierarchy of nesting... |
US-9,569,345 |
Architectural failure analysis Localizing errors by: (i) running the testcase on a software model version of a processor to yield first testcase-run results in the form of a first set of... |
US-9,569,344 |
Testing system for a mobile object in a navigation map An example of the invention is a test support system for supporting testing of a function of a program that works depending on a position of a mobile object in... |
US-9,569,343 |
Integration of a software content space with test planning and test case
generation A computer-implemented method for test planning and test case generation, includes collecting, by a processor, a plurality of requirements, creating, by the... |
US-9,569,342 |
Test strategy for profile-guided code execution optimizers Systems, methods and computer program products are described herein for testing a system that is designed to optimize the execution of code within an... |
US-9,569,341 |
Function execution prioritization Methods, systems, and apparatus, including computer programs encoded on computer storage media, for assigning levels of priority to selected source code... |
US-9,569,340 |
Generating production server load activity for a test server A method of replicating on a test server a production load of a production server. The method can include creating the production load on the production server... |
US-9,569,339 |
Debugging in an actor-based system Techniques for debugging of a collection of instructions executed by a computing system including a set of actors are described herein. A first sub-set of... |
US-9,569,338 |
Fingerprint-initiated trace extraction Techniques relate to fingerprint-initiated trace extraction. A determination is made of whether a fingerprint is present in software that is currently executing... |
US-9,569,337 |
System and method for managing traceability suspicion with suspect
profiles A method, computer program product, and computer system for generating, at a computing device, a first suspect profile of a plurality of suspect profiles that... |
US-9,569,336 |
System and method for managing traceability suspicion with suspect
profiles A method, computer program product, and computer system for generating, at a computing device, a first suspect profile of a plurality of suspect profiles that... |
US-9,569,335 |
Exploiting software compiler outputs for release-independent remote code
vulnerability analysis A central check system (CCS) is coupled to a remote software system (RSS). Data is fetched from the RSS, the data being software code derivatives generated by a... |
US-9,569,334 |
Techniques for traversing representations of source code Methods, apparatus, and systems for traversing a representation of an application source code, such as an abstract syntax tree (AST), are disclosed. Steps for... |
US-9,569,333 |
Method for retrieving information from presentations and meetings using a
network A method and system for processing recorded communications over a network provides a communication via a network to a recording server adapted for hosting a... |
US-9,569,332 |
System and method for investigating anomalies in API processing systems A method is provided for detecting irregularities of one or more application programmer interface (API) entities. The method includes receiving a request for... |
US-9,569,331 |
System for automatic decommissioning of network participants based on
pressure applied to compression element... Disclosed is a memory device in which the state of the memory may be set by a mechanical action, with or without mains power present. The memory state may be... |
US-9,569,330 |
Performing dependency analysis on nodes of a business application service
group A method and apparatus of determining enterprise network component dependency in a business application service group is disclosed. An example method may... |
US-9,569,329 |
Cache control device, control method therefor, storage apparatus, and
storage medium Disclosed is a cache control device which makes it possible to, even when a failure is occurred in a cache, reduce a risk that information is lost due to the... |