At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Information processing device and method for managing file
[Object] To provide a technology for realizing an environment in which a user can play a game comfortably. [Solving Means] A download executing block 104...
Layered architecture for hybrid controller
Approaches for implementing a controller for a hybrid memory that includes a main memory and a cache for the main memory are discussed. The controller comprises...
Methods of cache preloading on a partition or a context switch
A scheme referred to as a "Region-based cache restoration prefetcher" (RECAP) is employed for cache preloading on a partition or a context switch. The RECAP...
Prefetch with localities and performance monitoring
A locality associated with a read request is identified based at least in part on a read address included in the read request. A predicted read address is...
Control device, and storage system
A control device that controls a reading process of information stored in a unit storage area under control of the control device and a unit storage area under...
Variable distance bypass between tag array and data array pipelines in a
The present application describes embodiments of techniques for picking a data array lookup request for execution in a data array pipeline a variable number of...
Dynamic multithreaded cache allocation
Apparatus and method embodiments for dynamically allocating cache space in a multi-threaded execution environment are disclosed. In some embodiments, a...
Batching modified blocks to the same dram page
To efficiently transfer of data from a cache to a memory, it is desirable that more data corresponding to the same page in the memory be loaded in a line...
Preserving an invalid global domain indication when installing a shared
cache line in a cache
A technique for operating a memory system for a node includes interrogating, by a cache, an associated cache directory to determine whether a shared cache line...
Optimizing write and wear performance for a memory
Determining and using the ideal size of memory to be transferred from high speed memory to a low speed memory may result in speedier saves to the low speed...
Hybrid hardware and software implementation of transactional memory access
Embodiments of the invention relate a hybrid hardware and software implementation of transactional memory accesses in a computer system. A processor including a...
An electronic device includes a semiconductor memory, and the semiconductor memory includes a first magnetic layer having a variable magnetization direction; a...
Line termination methods and apparatus
Methods and apparatus for termination of signal lines coupled to a number of memory devices are disclosed. One such method includes adjusting an input impedance...
Techniques for balancing accesses to memory having different memory types
Embodiments of the present technology are directed toward techniques for balancing memory accesses to different memory types.
Method and apparatus for automatic system cleaning, and storage medium
The invention relates to a method and an apparatus for automatic system cleaning, and a storage medium. The method includes obtaining a triggering occasion and...
Interleaved channels in a solid-state drive
A solid state drive (SSD) includes: non-volatile semiconductor memory (NVSM); a first plurality of flash controllers, each flash controller having a processor;...
Apparatuses for managing and accessing flash memory module
A method for maintaining address mapping for a flash memory module is disclosed including: recording a first set of addresses corresponding to a first set of...
Apparatus for configuring partitions within phase change memory of tablet
computer with integrated memory...
A non-volatile random access memory (NVRAM) is used in a computer system to perform multiple roles in a platform storage hierarchy, specifically, to replace...
Apparatus and method for reducing read-modify-write cycles by combining
unaligned write commands
Write commands for a storage device specify write data with either a first data step size or a second data step size. In the former case, the storage device...
System, method, and computer program for performing software application
operations concurrently with memory...
A system, method, and computer program product are provided for performing software application operations concurrently with memory compaction operations. In...
Nonvolatile memory system including nonvolatile memory device and memory
controller that loads a mapping table...
A method of operating a memory controller controlling a nonvolatile memory device including a user area and a meta area is provided. The method includes...
Graphical conversion between test program languages
A parser may be graphically modified without needing to directly alter the parser software and may be graphically modified to adjust for extensibility of the...
Performing dynamic data generation and verification for functional
validation of data manipulation programs
A system and method for generating a file that includes a name that hashes directly to a request block is provided. The request block includes instructions...
System to enable multi-tenancy testing of business data and validation
logic on the cloud
An adapter can execute a test script in parallel relative to separate tenant installations in a multi-tenant environment. Such tenant installations can be...
Performance testing of software applications
Identifying performance issues in an application under test (AUT). The AUT executes on a system under test (SUT) in a test environment, and uses one or more...
Method of optimizing execution of test cases and a system thereof
The present subject matter relates to a computer implemented method and a computer system for optimizing execution of test cases. The method comprises...
System and method for test data generation and optimization for data
A system, medium and method for automatically generating test data to be applied to test a target software code is disclosed. Input parameter data is received...
Method and system for multi-mode testing through operation interface and
scenario abstraction in a multi-tenant...
Embodiments are described for a system and method for testing a hosted application through a test framework that uses the same operational test code for any one...
Coverage analysis for variable size signals
An embodiment can include one or more computer-readable media storing executable instructions that when executed on processing logic process variable signals....
Screen bounds for view debugging
A visual debugger provides a three-dimensional view of a user interface of an application. The application's user interface is built from a hierarchy of view...
Detecting race condition vulnerabilities in computer software applications
Testing computer software applications is performed by identifying first and second executable portions of the computer software application, where the portions...
Techniques for adaptive trace logging
Techniques for adaptive trace logging include, in one embodiment, obtaining input data on trace logging behavior and computing resources used by trace logging....
Managing software performance tests based on a distributed virtual machine
Managing software performance debugging based on a distributed VM system is provided. In response to determining a debugging state of a software system running...
Memory management tools
The present technology monitors events that allocate and deallocate virtual memory regions in a device, wherein the events include system calls from user space....
Monitoring and correlating a binary process in a distributed business
A dynamic monitoring process begins with configuring a start and end method to be monitored. The dynamic monitoring process may intercept both the start and end...
Anomaly detection system, anomaly detection method, and program for the
An anomaly detection system for detecting an anomaly within a network as a first embodiment in order to provide an anomaly detection system, anomaly detection...
Monitoring cloud computing environments
A monitoring system can provide monitoring services to users of cloud computing environment. The monitoring system can receive access information from users...
Performance evaluation device and performance evaluation method
A performance evaluation device includes: a workload controlling unit that sequentially generates, for each of plural single workload types, plural workloads...
Method for determining a power consumption in an electric installation and
alternating current electric...
A group including a plurality of individual distribution branches connected in parallel is connected to an alternating-current power supply. A method includes:...
Error protection for bus interconnect circuits
In an approach for detecting faults on a bus interconnect that connects a bus master circuit to bus slave circuits, application program code and fault detection...
Method for checking an installation location of a component and automation
A method for checking an installation location of a component in a failsafe automation system, wherein the components are connected to one another in series and...
Method and system for hardware implementation of uniform random shuffling
Methods and systems for hardware implementation of uniform random shuffling are disclosed. According to one aspect, a system for hardware implementation of...
Method, system, and apparatus for cloud application redundancy
A redundancy method, system, and apparatus, which can acquire first description information of a cloud application needing redundancy, where the first...
Managing contingency capacity of pooled resources in multiple availability
A network-based services provider may reserve and provision primary resource instance capacity for a given service (e.g., enough compute instances, storage...
Microprocessor system for controlling or regulating at least partly
A microprocessor system (50) for controlling or regulating at least partly safety-critical processes, comprising two central processing units (1, 2) integrated...
Virtual resource-based backup
A device may receive a virtual image of a first state of a first virtual machine. Session information of the state of the first virtual machine may be...
Volume snapshot in a shared environment
A system may receive information associated with a write operation to be performed on a data volume. The data volume may be maintained by one or more cloud...
Apparatus and method for monitoring and auditing activity of a legacy
An apparatus and a method for monitoring and auditing activity of a legacy environment. The apparatus includes an analyzer and a mirror manager. The analyzer is...
Method and system for removing fault applied for machine to machine
Provided are a method and a system for removing a fault applied for an M2M gateway. The method includes: receiving, by an M2M gateway, an automatic code...
Optimizing spare capacity and spare distribution
Configuring spare sections in a system having a plurality of devices and having a plurality of erasure encoding groups, each of the devices having a plurality...