Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0292089 Configurable Multiport Medical Interface Device
A multiport interface device and method of use in a patient data routing system for connecting peripheral devices to one or more patient monitors is provided....
2016/0292088 DYNAMIC STORAGE KEY ASSIGNMENT
A dynamic storage key assignment is provided. An aspect includes receiving, by a host bridge, a request. An aspect includes determining, by the host bridge,...
2016/0292087 PROTECTING CONTENTS OF STORAGE
Protecting contents of storage in a computer system from unauthorized access. The computer system comprises one or more processing units sharing the storage,...
2016/0292086 PROTECTING CONTENTS OF STORAGE
Protecting contents of storage in a computer system from unauthorized access. The computer system comprises one or more processing units sharing the storage,...
2016/0292085 PROTECTING STORAGE FROM UNAUTHORIZED ACCESS
Protecting contents of storage in a computer system from unauthorized access. The computer system includes one or more processing units sharing the storage....
2016/0292084 CACHING SCHEME SYNERGY FOR EXTENT MIGRATION BETWEEN TIERS OF A STORAGE SYSTEM
A method according to one embodiment includes determining to move an extent from a source-tier in a storage system to a destination-tier in the storage system,...
2016/0292083 SELECTIVE SPACE RECLAMATION OF DATA STORAGE MEMORY EMPLOYING HEAT AND RELOCATION METRICS
Space of a data storage memory of a data storage memory system is reclaimed by determining heat metrics of data stored in the data storage memory; determining...
2016/0292082 SELECTIVE PURGING OF PCI I/O ADDRESS TRANSLATION BUFFER
A method of enhancing a refresh PCI translation (RPCIT) operation to refresh a translation lookaside buffer (TLB) includes determining, by a computer...
2016/0292081 Instruction and Logic for Support of Code Modification In Translation Lookaside Buffers
A processor includes a core with logic to execute a translated instruction. The translated instruction is translated from an instruction stored in a memory...
2016/0292080 VIRTUAL REGISTER FILE
The present disclosure is related to a virtual register file. Source code can be compiled to include references to a virtual register file for data subject to...
2016/0292079 PACKET PROCESSING SYSTEM, METHOD AND DEVICE HAVING REDUCED STATIC POWER CONSUMPTION
A buffer logic unit of a packet processing device including a power gate controller. The buffer logic unit for organizing and/or allocating available pages to...
2016/0292078 System and Method for Preventing Solid State Drive Corruption After Dirty Shutdown Power Loss
An information handling system a first controller and a solid state drive. The first controller receives an indication that a forced shutdown of the...
2016/0292077 LOW-LATENCY LOSSY PROCESSING OF MACHINE DATA
A method includes monitoring, using a system resource monitor in a system, a plurality of system resource metrics. The system includes a ring buffer with...
2016/0292076 APPARATUS, PROGRAM, AND METHOD FOR UPDATING CACHE MEMORY
A dataflow controller to store dataflow specifications and to control execution of the dataflow specified the specification specifying a series of linked data...
2016/0292075 SYSTEM AND METHOD OF DISTINGUISHING SYSTEM MANAGEMENT MODE ENTRIES IN A TRANSLATION ADDRESS CACHE OF A PROCESSOR
A processor including a memory that stores a system management mode (SMM) value indicative of whether the processor is in SMM, a translation address cache...
2016/0292074 SYSTEM AND METHOD FOR CREATING SNAPSHOTS IN OPENFLAME ENVIRONMENT
A method for creating snapshots and backups in a virtual computing environment is provided. The method includes writing application output of an application...
2016/0292073 TIME DE-INTERLEAVING CIRCUIT AND TIME DE-INTERLEAVING METHOD
A time de-interleaving circuit applied to a communication system to de-interleave an interleaved signal is provided. The interleaved signal includes a...
2016/0292072 REFERENCE COUNTING FOR MEMORY AREAS
Technique for analyzing memory areas based on local copies of a global counter by: (i) determining a plurality of currently-executing fast threads and a...
2016/0292071 CONSERVATIVE GARBAGE COLLECTION AND ACCESS PROTECTION
A method of memory management can include creating an initial root set of pointers for a program during execution of the program and performing a marking...
2016/0292070 CONTROL PATH SUBSYSTEM, METHOD AND DEVICE UTILIZING MEMORY SHARING
A packet processing system having a control path memory of a control path subsystem and a datapath memory of a datapath subsystem. The datapath subsystem...
2016/0292069 Utilizing semantic clusters to Predict Software defects
A method, apparatus and product for utilizing semantic clusters to predict software defects. The method comprising: obtaining a plurality of software elements...
2016/0292068 CODE COVERAGE RATE DETERMINATION METHOD AND SYSTEM
Embodiments of the present application relate to a code coverage rate determination method, a code coverage rate determination system, and a computer program...
2016/0292067 SYSTEM AND METHOD FOR KEYWORD BASED TESTING OF CUSTOM COMPONENTS
Systems and methods for testing a custom component associated with a software application. A set of custom components and a set of metadata associated with the...
2016/0292066 Source Code Inspection and Verification
A source code module inspection method comprising generating a build list, wherein the build list comprises a list of one or more source code modules,...
2016/0292065 Anomaly Analysis For Software Distribution
A population of devices provides telemetry data and receives software changes or updates. Event buckets for respective events are found. Event buckets have...
2016/0292064 ITERATIVE TEST GENERATION BASED ON DATA SOURCE ANALYSIS
A method of testing a software program may include generating a test driver by assigning concrete values to input variables of a software program. The method...
2016/0292063 DYNAMIC TRACING FRAMEWORK FOR DEBUGGING IN VIRTUALIZED ENVIRONMENTS
Embodiments of the present invention provide a system and method for a dynamic tracing framework for debugging in a virtualized environment. Embodiment of the...
2016/0292062 SYSTEM AND METHOD FOR DETECTION OF DUPLICATE BUG REPORTS
A system and method for detection of duplicate bug reports. A receiver is configured to receive a first bug report and a word matrix. An extractor extracts...
2016/0292061 TIME TRAVEL DEBUGGING FOR BROWSER COMPONENTS
Various technologies described herein pertain to performing time travel debugging. A computer-executable program can be executed. The computer-executable...
2016/0292060 SYSTEMS AND METHODS FOR REGULATING DEVICE USAGE
A device is provided, comprising at least one processor and at least one computer-readable storage medium having encoded thereon executable instructions that,...
2016/0292059 Run Time ECC Error Injection Scheme for Hardware Validation
Systems and methods for a run-time error correction code ("ECC") error injection scheme for hardware validation are disclosed. The systems and methods include...
2016/0292058 STREAM PUBLISHING AND DISTRIBUTION CAPACITY TESTING
Some embodiments dynamically test capacity of a streaming server under test (SUT). The dynamic testing involves a test server generating different test...
2016/0292057 REAL TIME TERMINAL FOR DEBUGGING EMBEDDED COMPUTING SYSTEMS
One or more circular debug buffers can allow terminal output data to be provided from the target system to a host without halting the target system or causing...
2016/0292056 FAILOVER IN A SAN ENVIRONMENT
A method, system, and computer program product for managing performance of an application I/O comprising determining paths from a first host to a node in a...
2016/0292055 FAILURE RECOVERY IN AN ASYNCHRONOUS REMOTE MIRRORING PROCESS
A method for generating a remote replicate of a logical entity, the method may include: calculating, by a local site, a replication cycle content that is...
2016/0292054 Failover Method, Apparatus and System
A failover method, apparatus and system to implement fast failover between a primary processor and a secondary processor, where the method includes receiving,...
2016/0292053 FAULT TOLERANCE FOR HYBRID CLOUD DEPLOYMENTS
A technique for providing fault tolerance for virtual machines in a hybrid cloud computing system is discussed. When a primary virtual machine (VM) in a...
2016/0292052 RECOVERY OF A TRANSACTION AFTER XA END
Embodiments of the present invention disclose a method for recovery of a two-phase commit transaction. A computer receives an end command prior to completing...
2016/0292051 COMMUNICATION APPARATUS AND WIRELESS COMMUNICATION SYSTEM
A communication apparatus of an embodiment of the present invention includes a storage temporarily storing data received via a wireless network from another...
2016/0292050 ELASTIC VIRTUAL MULTIPATH RESOURCE ACCESS USING SEQUESTERED PARTITIONS
Technologies for virtual multipath access include a computing device configured to sequester a recovery partition from a host partition while allowing the...
2016/0292049 DATA RECOVERY FOR A RELATIONAL DATABASE MANAGEMENT SYSTEM INSTANCE IN A HETEROGENEOUS DATABASE SYSTEM
A method and apparatus for data recovery for a RDBMS instance in a heterogeneous database system is provided. A failure of a first RDBMS instance is detected...
2016/0292048 DATA DEDUPLICATION USING CHUNK FILES
Systems and methods are disclosed for performing file backup and restore in a computing system. Certain embodiments provide a communication interface for...
2016/0292047 CLONE FILE BACKUP AND RESTORE
In an approach to backup and restore one or more clone file trees, one or more processors generate a clone management table. One or more processors record a...
2016/0292046 METHOD AND SYSTEM FOR COHERENT AGGREGATION AND SYNCHRONIZATION OF GATHERED DATA FROM SPREAD DEVICES
In a method for gathering time-variable data from electronic slave devices in data communication through a data transmission channel with an electronic master...
2016/0292045 DISASTER RECOVERY AS A SERVICE
Providing disaster recovery of a distribute file system metadata server as a service is disclosed. In various embodiments, an indication is received to provide...
2016/0292044 METHODS AND APPARATUS FOR PROVIDING HYPERVISOR LEVEL DATA SERVICES FOR SERVER VIRTUALIZATION
A data center for data backup and replication, including a pool of multiple storage units for storing a journal of I/O write commands issued at respective...
2016/0292043 EFFICIENT BACKUP, SEARCH AND RESTORE
A backup, search, and restore service is provided. The service can be achieved through a backup system, and a search and restore server. A user can be enabled...
2016/0292042 Method and Apparatus of Automatically Backing up Application Data and Performing Restoration as Required
A method and apparatus for automatically backing up application data and performing restoration as required are disclosed in the embodiments of the present...
2016/0292041 CLONE FILE BACKUP AND RESTORE
In an approach to backup and restore one or more clone file trees, one or more processors generate a clone management table. One or more processors record a...
2016/0292040 STORAGE MANAGEMENT OF DATA USING AN OPEN-ARCHIVE ARCHITECTURE, INCLUDING STREAMLINED ACCESS TO PRIMARY DATA...
An illustrative "open archive" architecture relieves the immediate need to add network-attached storage (NAS) devices to a storage management system. The open...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.