At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
User interface area coverage
A method for user interface (UI) automation area coverage is presented. The method extracts document information from a unit test class, the unit test class...
Displaying violated coding rules in source code
A device performs a verification analysis of source code, where the verification analysis includes a coding rules check of the source code based on coding...
Technologies for application validation in persistent memory systems
Technologies for software testing include a computing device having persistent memory that includes a platform simulator and an application or other code module...
Identifying the lines of code that caused the error as identified in the
stack trace in a source code version...
A method, system and computer program product for identifying lines of code that caused an error as identified in a stack trace in a source code version that...
Identifying high impact bugs
Test cases are executed by the software engineering test system. The test cases target software products. Test outputs are generated indicating whether the...
Application development environment for portable electronic devices
A method for developing and testing an application for a device with one or more sensors using a sensor emulation environment that may allow testing of the...
Remote diagnostics for a computing device
For remote diagnostics of a computing device, a method is disclosed that includes collecting failure information from a computing device, wherein the computing...
System, method, and computer program product for collecting execution
statistics for graphics processing unit...
A system, method, and computer program product are provided for collecting trace information based on a computational workload. The method includes the steps of...
Dynamic border line tracing for tracking message flows across distributed
The present invention enables capturing API level calls using a combination of dynamic instrumentation and library overriding. The invention allows event level...
Systems and methods for providing information regarding resource
consumption or environmental impact associated...
In one embodiment, a system and a method pertain to monitoring on the computing device resource consumption, storing resource consumption data obtained from the...
Apparatus and method to track device usage
In an embodiment, a processor includes measurement logic to measure a usage associated with the processor. The processor also includes statistical logic to...
Agent dynamic service
A dynamic service module is embedded in an agent and able to add functionality to the agent. The service module may manage .jar files for execution by the...
Delivering a page including a plurality of modules is disclosed. A plurality of candidate modules are selected. A corresponding module score for each of the...
Systems and methods for implementing data analysis workflows in a
non-destructive testing system
A collaboration system may include a first computing device that may communicate with at least one other computing device via a computing network. The computing...
System and methods for automated plant asset failure detection
A system for performing failure signature recognition training for at least one unit of equipment. The system includes a memory and a processor coupled to the...
Recovering from uncorrected memory errors
A method for recovering from uncorrected memory errors may include receiving, at an operating system, a correctable error (CE) associated with a first memory...
User-defined storage system failure detection and failover management
A storage system failure detection and failover application includes a command execution engine that loads and interprets both user-defined storage system...
Resilient routing for session initiation protocol based communication
Resilient routing management approaches are provided based on primary/backup and failover/failback relationships in a clustered network environment, where each...
Resiliency to memory failures in computer systems
A resiliency system detects and corrects memory errors reported by a memory system of a computing system using previously stored error correction information....
Managing network failure using back-up networks
A method for managing network failure identifying a plurality of hypervisors, each of the plurality of hypervisors being associated with a plurality of...
Management and recovery of distributed storage of replicas
A method of data replica recovery that is based on separate storage drives connected to a network where each storage drive has a storage space divided to...
Xcopy in journal based replication
A method, system, and program product for data replication, comprising reading do metadata, xcopying data from a storage medium to an undo stream, xcopying data...
Concurrent data recovery and input/output processing
A method, article of manufacture, and apparatus for restoring LUs from a backup is discussed. In an embodiment, a primary storage system may continue to process...
Apparatus, systems, and methods for data recovery
The embodiments disclosed herein provide a flash aware snapshot technique for two-way data recovery and back-in-time execution. The disclosed snapshot technique...
Systems and methods for maintaining virtual component checkpoints on an
Generally described, aspects of the present disclosure relate to offload device virtual component checkpointing for fast recovery from virtual component...
System and method for managing group policy backup
A method, system and program product for group policy backup management in a network having a plurality of domains including components and modules for steps of...
Method, apparatus and computer for data operation
A method, an apparatus and a computer for data operation are provided. The method includes: determining, when writing data to a sector of a storage device,...
Server system, method for controlling the same, and program for executing
parallel distributed processing
If the number of task attempts has not exceeded the maximum number of attempts, a server system transmits a regular job to cause tasks to execute a particular...
Monitoring hierarchical container-based software systems
A computer receives a heartbeat message that includes both program reset information and at least one segment, of the heartbeat message, that is configured to...
Method and system for data migration
A method and a system for data migration are described, the method for data migration including: slicing data in an original system to obtain a data slice;...
System and method for policy based management of a communication device
An information handling system includes a communication device and a service processor. The communication device includes a first terminal, and a second...
Storage control device, non-transitory computer-readable recording medium
having stored therein program, and...
There is provided a storage control device that is communicably connected to a plurality of storage devices and a plurality of spare storage devices through a...
Prioritizing data reconstruction in distributed storage systems
A method of prioritizing data for recovery in a distributed storage system includes, for each stripe of a file having chunks, determining whether the stripe...
Transparent and lightweight recovery from hardware memory errors
Systems and methods are disclosed that allow for transparently recovering from an uncorrected multi-bit error of arbitrary length located at a memory address....
High-performance ECC decoder
Methods for Error Correction Code (ECC) decoding include producing syndromes from a set of bits, which represent data that has been encoded with the ECC. An...
Dynamic cache row fail accumulation due to catastrophic failure
A technique is provided for accumulating failures. A failure of a first row is detected in a group of array macros, the first row having first row address...
Adaptive targeting of read levels in storage devices
A storage device may include a controller and a plurality of memory devices logically divided into a plurality of pages. Each page in the plurality of pages may...
ECC method for flash memory
A method of operating a memory storing data sets, and ECCs for the data sets is provided. The method includes when writing new data in a data set, computing and...
Self monitoring and self repairing ECC
Exemplary embodiments of the present invention disclose a method and system for monitoring a first Error Correcting Code (ECC) device for failure and replacing...
Firmware dump collection from primary system dump device adapter
A method of firmware dump collection from a primary dump adapter is provided. The method includes identifying a primary system dump device and a secondary...
Method, apparatus and system for handling data error events with a memory
Techniques and mechanisms for providing error detection and correction for a platform comprising a memory including one or more spare memory segments. In an...
System file repair method and apparatus
A method and an apparatus for repairing a system file are provided. The computer-implemented method for repairing a system file, comprises: detecting, by a...
Varying logging depth based on user defined policies
Techniques for writing logging files, where the logging files include multiple pieces of logging information. The pieces of logging information are based on...
Method and system for predicting redundant array of independent disks
Techniques for determining vulnerability of disks are described herein. According to one embodiment, for each of a plurality of disks representing a redundant...
Reestablishing synchronization in a memory system
Embodiments relate to reestablishing synchronization across multiple channels in a memory system. One aspect is a system that includes a plurality of channels,...
Defect management policies for NAND flash memory
Systems and methods of managing defects in nonvolatile storage systems that can be used to avoid an inadvertent loss of data, while maintaining as much useful...
Dataflow alerts for an information management system
Disclosed herein are systems and methods for managing information management operations. The system may be configured to employ a work flow queue to reduce...
Session-based remote management system and load balance controlling method
A session-based remote management system and a load balance controlling method are provided. The session-based remote management system includes a plurality of...
Methods, apparatus and system for notification of predictable memory
A method for providing notification of a predictable memory failure includes the steps of: obtaining information regarding at least one condition associated...
Packet processing on a multi-core processor
A method for packet processing on a multi-core processor. According to one embodiment of the invention, a first set of one or more processing cores are...