Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2016/0342533 APPARATUS FOR MONITORING DATA ACCESS TO INTERNAL MEMORY DEVICE AND INTERNAL MEMORY DEVICE
The application discloses an apparatus for monitoring data access to internal memory device and an internal memory device. The internal memory device is...
2016/0342532 MANAGEMENT OF ENCRYPTION KEYS FOR MULTI-MODE NETWORK STORAGE DEVICE
One method for managing encryption includes identifying an available or a secure mode. During restarts a passphrase must be entered in secure mode but not in...
2016/0342531 IN-VEHICLE NETWORK (IVN) DEVICE AND METHOD FOR OPERATING AN IVN DEVICE
Embodiments of a device and method are disclosed. In an embodiment, an IVN transceiver is disclosed. The IVN transceiver includes an IVN bus interface, a...
2016/0342530 METHOD AND APPARATUS FOR CACHE TAG COMPRESSION
A memory structure compresses a portion of a memory tag using an indexed tag compression structure. A set of higher order bits of the memory tag may be stored...
2016/0342529 PAGE REPLACEMENT ALGORITHMS FOR USE WITH SOLID-STATE DRIVES
A page replacement algorithm is provided. An idle range of memory pages is determined based, at least in part, on indications of references to memory pages in...
2016/0342528 AGGREGATION OF WRITE TRAFFIC TO A DATA STORE
A method and a processing device are provided for sequentially aggregating data to a write log included in a volume of a random-access medium. When data of a...
2016/0342527 DEFERRING REGISTRATION FOR DMA OPERATIONS
Systems and methods for deferring registration for Direct Memory Access (DMA) operations. An example method may comprise: receiving a memory region...
2016/0342526 ELECTRONIC DEVICE HAVING SCRATCHPAD MEMORY AND MANAGEMENT METHOD FOR SCRATCHPAD MEMORY
An electronic device having a scratchpad memory and a management method are provided. A recording circuit records multiple counter values which are...
2016/0342525 PROVIDING INDIRECT DATA ADDRESSING IN AN INPUT/OUTPUT PROCESSING SYSTEM WHERE THE INDIRECT DATA ADDRESS LIST IS...
A computer program product for processing input/output (I/O) data is provided for performing a method that includes receiving a transport control word (TCW)...
2016/0342524 PROCESSOR INCLUDING SINGLE INVALIDATE PAGE INSTRUCTION
A processor including a translation lookaside buffer (TLB), an instruction translator, and a memory subsystem. The TLB caches virtual to physical address...
2016/0342523 TRANSLATION LOOKASIDE BUFFER
Embodiments disclosed pertain to apparatuses, systems, and methods for Translation Lookaside Buffers (TLBs) that support virtualization and multi-threading....
2016/0342522 METHOD FOR DYNAMICALLY STORING A FLASH TRANSLATION LAYER OF A SOLID STATE DISK MODULE
A shared memory is initially set in the solid state module. A command for accessing information is received. The translation time of the flash translation...
2016/0342521 SYSTEMS AND METHODS FOR ADDRESSING A CACHE WITH SPLIT-INDEXES
Cache memory mapping techniques are presented. A cache may contain an index configuration register. The register may configure the locations of an upper index...
2016/0342520 PRESERVING USER CHANGES TO A SHARED LAYERED RESOURCE
User changes may be preserved across updates to a layer. When a layering client mounts a layer, a corresponding layering write cache is mounted. Changes to...
2016/0342519 FILE-BASED CLIENT SIDE CACHE
A file-system filter driver is attached to each cache volume containing a cache and a source volume containing a source file. The file-system filter driver...
2016/0342518 REAL-TIME CACHE BEHAVIOR FORECAST USING HYPOTHETICAL CACHE
Systems and methods for forecasting behavior of caches include a hypothetical cache. The hypothetical cache is configured to emulate cache behavior, and...
2016/0342517 DEMOTE INSTRUCTION FOR RELINQUISHING CACHE LINE OWNERSHIP
A computer system processor of a multi-processor computer system having cache subsystem, executes a demote instruction to cause a cache line exclusively owned...
2016/0342516 CACHE COHERENCE IN MULTI-COMPUTE-ENGINE SYSTEMS
Methods and systems for providing cache coherence in multi-compute-engine systems are described herein. In on example, concise cache coherency directory (CDir)...
2016/0342515 Adaptive Hierarchical Cache Policy In A Microprocessor
A method for determining an inclusion policy includes determining a ratio of a capacity of a large cache to a capacity of a core cache in a cache subsystem of...
2016/0342514 METHOD FOR MANAGING A LAST LEVEL CACHE AND APPARATUS UTILIZING THE SAME
A last-level cache controller includes a system state monitor and a cache partitioning module. The system state monitor is configured to obtain a latency...
2016/0342513 ASSYMETRIC COHERENT CACHING FOR HETEROGENEOUS COMPUTING
A method of caching data in the memory of electronic processor units including compiling, in a first processor configured to perform data-parallel computation,...
2016/0342512 STORAGE SYSTEM AND PROCESSING METHOD
The invention provides a technique for improving processing performance of I/O commands in a storage system in which ownership of each LU is introduced. The...
2016/0342511 MEMORY SYSTEM AND METHOD OF CONTROLLING CACHE MEMORY
According to one embodiment, a memory system includes first and second memories, and a controller configured to switch between first and second modes, search...
2016/0342510 REMOTE MANAGEMENT OF DATA PLANES AND CONFIGURATION OF NETWORKING DEVICES
The subject disclosure relates to implementing a device to remotely manage the data plane and configure memory components (e.g., a forwarding table, ternary...
2016/0342509 Hierarchical FTL Mapping Optimized for Workload
In a memory system having non-volatile memory and volatile memory, write data are stored in a write-coalescing buffer in the volatile memory until the write...
2016/0342508 IDENTIFYING MEMORY REGIONS THAT CONTAIN REMAPPED MEMORY LOCATIONS
A method for identifying memory regions that contain remapped memory locations is described. The method includes determining, from a number of tracking bits on...
2016/0342507 SYSTEM AND METHOD FOR DYNAMICALLY TESTING NETWORKED TARGET SYSTEMS
A computerized method and system for conducting performance testing of a networked target system (NTS). The method comprises receiving at least one instruction...
2016/0342506 DATA PROCESSING
One or more processors acquire dependency metadata, where the dependency metadata is used for representing dependency on data among at least two components of...
2016/0342505 DATA PROCESSING
One or more processors acquire dependency metadata, where the dependency metadata is used for representing dependency on data among at least two components of...
2016/0342504 PERFORMANCE TESTING OF WEB COMPONENTS USING IDENTITY INFORMATION
Performance testing of web components using identity information includes providing a web component for testing having business logic code and an associated...
2016/0342503 AUTOMATIC RISK ANALYSIS OF SOFTWARE
Techniques are described herein that are capable of performing automatic risk analysis of software. An automatic risk analyzer may determine correlations...
2016/0342502 HOW TO TRACK OPERATOR BEHAVIOR VIA METADATA
Embodiments presented herein describe techniques for tracking operators of a distributed computing environment (e.g., a streams processing environment) using...
2016/0342501 Accelerating Automated Testing
System and method for accelerating automated testing is disclosed. First, a test script of a screen is recorded to identify user interface elements comprising...
2016/0342500 Template Identification for Control of Testing
Template identification techniques for control of testing are described. In one or more implementations, a method is described to control testing of one or...
2016/0342499 ERROR DIAGNOSTIC IN A PRODUCTION ENVIRONMENT
Troubleshooting data can be collected to debug a computer appliance running in a production environment. A computer system can record inbound and outbound...
2016/0342498 SYMBOL TABLES FOR PROCESSING HIERARCHICAL DATA STRUCTURES IN DATA FLOW ANALYSIS
Disclosed are a system, a computer-readable storage medium storing at least one program, and a computer-implemented method of code analysis. Whether a...
2016/0342497 SYSTEMS AND METHODS FOR MEASURING THE CAPACITY AND CAPABILITY OF A MOBILE DEVICE PRIOR TO PROVIDING A SOFTWARE...
Systems, methods and articles of manufacture provide for determining the capabilities of a remote mobile devices (e.g., determining the processing capability...
2016/0342496 SYSTEM AND METHOD FOR DIAGNOSING LINE REPLACEABLE UNIT FAILURE
A system and method of identifying part failures is provided. The system may comprise monitoring a sensor, detecting a failure mode, selecting a row from a...
2016/0342495 REGISTER ERROR PROTECTION THROUGH BINARY TRANSLATION
Some implementations provide techniques and arrangements for detecting a register value having a life longer than a threshold period based, at least in part,...
2016/0342494 BLOCK BEHAVIOR TRACKING IN A MEMORY SYSTEM
A storage device with a memory may include memory block health monitoring and behavior tracking Each memory block may be analyzed based on one or more dummy...
2016/0342493 Generation of Debugging Log List in a Blade Server Environment
Methods, non-transitory storage medium, and systems for generating an aggregated list of problem conditions associated with blade servers to facilitate...
2016/0342492 USB INTERFACE DETECTOR
Systems and methods are disclosed, including a USB interface detector, a detection method, a USB connector, and an electronic device. The detection method may...
2016/0342491 DATA REDUNDANCY IN A MULTIPLE NODE SYSTEM
In some examples, a system includes a plurality of nodes connected to one or more networks, and each of the nodes may include at least one processor and one or...
2016/0342490 METHOD AND APPARATUS TO VIRTUALIZE REMOTE COPY PAIR IN THREE DATA CENTER CONFIGURATION
A first storage system manages a first volume, with a first internal volume identifier, and to provide the first volume with a given first virtual volume...
2016/0342489 OPTIMIZING THE NUMBER AND TYPE OF DATABASE BACKUPS TO ACHIEVE A GIVEN RECOVERY TIME OBJECTIVE (RTO)
A method of optimizing the number and type of database backups to achieve a given RTO is provided and may include receiving a RTO and receiving a heuristic for...
2016/0342488 MECHANISM FOR PROVIDING VIRTUAL MACHINES FOR USE BY MULTIPLE USERS
According to one aspect of the invention, a request to generate a state checkpoint of a computer is initiated within a user-level software entity, such as a...
2016/0342487 HIGH PERFORMANCE PERSISTENT MEMORY
The embodiments described herein describe technologies for non-volatile memory persistence in a multi-tiered memory system including two or more memory...
2016/0342486 SYSTEM AND METHOD FOR OBJECT-BASED CONTINUOUS DATA PROTECTION
A system and method for protecting data in a protected storage system. A replication of the protected storage system at a predetermined time point is stored in...
2016/0342485 RESTORING NON-TRANSACTIONAL MESSAGES IN QUEUES FOR ADVERTISEMENT DATA FLOW PROCESSING
The disclosed online system includes a number of processing blocks, including a feeding service that sends a data stream and a consuming service that receives...
2016/0342484 Point in Time Recovery on a Database
Disclosed herein are system, method, and computer program product embodiments for providing point in time recovery on a database. An embodiment operates by...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.