Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,558,121 Two-level cache locking mechanism
A virtually tagged cache may be configured to index virtual address entries in the cache into lockable sets based on a page offset value. When a memory...
US-9,558,120 Method, apparatus and system to cache sets of tags of an off-die cache memory
Techniques and mechanism to provide a cache of cache tags in determining an access to cached data. In an embodiment, a tag storage stores a first set including...
US-9,558,119 Main memory operations in a symmetric multiprocessing computer
Main memory operation in a symmetric multiprocessing computer, the computer comprising one or more processors operatively coupled through a cache controller to...
US-9,558,118 Tracing mechanism for recording shared memory interleavings on multi-core processors
A memory race recorder (MRR) is provided. The MRR includes a multi-core processor having a relaxed memory consistency model, an extension to the multi-core...
US-9,558,117 System and method for adaptive implementation of victim cache mode in a portable computing device
Systems and methods for adaptive implementation of victim cache modes in a portable computing device (PCD) are presented. In operation, an upper level cache is...
US-9,558,116 Coherence de-coupling buffer
A coherence decoupling buffer. In accordance with a first embodiment, a coherence decoupling buffer is for storing tag information of cache lines evicted from a...
US-9,558,115 Write-back caching-based atomicity in a distributed storage system
A method includes receiving an atomic operation for execution, wherein the execution of the atomic operation is to access a data container stored in more than...
US-9,558,114 System and method to store data in an adjustably partitionable memory array
The disclosure relates to an electronic memory system, and more specifically, to a system for storing data in an adjustably partitionable memory array, and a...
US-9,558,113 Secure garbage collection on a mobile device
Methods and systems for performing garbage collection involving sensitive information on a mobile device are described herein. Secure information is received at...
US-9,558,112 Data management in a data storage device
A data storage device includes multiple flash memory devices with each of the flash memory devices being arranged into multiple blocks having multiple pages for...
US-9,558,111 Storage space reclaiming for virtual provisioning
A reclaim system frees previously allocated, but currently unused, storage space in a thin or virtual provisioning environment. The reclaim system may be used...
US-9,558,110 Method for managing a flash memory
A method of managing a rewritable mass memory subdivided into sectors within which data pages are recorded, and data periodically updated, where data erasure in...
US-9,558,109 Method and apparatus for flash memory arithmetic encoding and decoding
A method for reducing an amount of time needed for a single iteration of arithmetic encoding and arithmetic decoding is provided. Rescaling and range are...
US-9,558,108 Half block management for flash storage devices
A method for managing block erase operations is provided for an array of memory cells including erasable blocks of memory cells in the array. The method...
US-9,558,107 Extending useful life of a non-volatile memory by health grading
In at least one embodiment, a controller of a non-volatile memory array determines, for each of a plurality of regions of physical memory in the memory array,...
US-9,558,106 Testing service with control testing
The techniques described herein provide software testing of a candidate software system. In some examples, a testing service compares at least one candidate...
US-9,558,105 Transactional boundaries for virtual model generation
Data is identified that represents a path of a transaction that includes a plurality of transaction fragments associated with a plurality of software...
US-9,558,104 Risk-based test coverage and prioritization
A processor receives a rule containing a first set of code statements. The processor compares the first set of code statements of the rule to a second set of...
US-9,558,103 System and method to indicate code block execution
In one implementation, computer executable instructions are provided to identify a group of instructions corresponding to a code block for an executable module....
US-9,558,102 Pre-translation testing of bi-directional language display
A method for testing the display of bi-directional language script prior to translation in an application under test can include using unidirectional glyphs...
US-9,558,101 Preprocessor directive symbol analyzer devices and methods
Generally discussed herein are systems, apparatuses, or methods for preprocessor directive symbol definition and preprocessor directive symbol usage analysis....
US-9,558,100 Monitoring activities of a software application
Disclosed are a method and a system for monitoring one or more activities offered by a software application in a computer network. The method comprises...
US-9,558,099 Staged program compilation with automated timing closure
When compiling high-level, graphical code (e.g. LabVIEW.TM. code) to a different representation (e.g. different software code or hardware FPGA), information...
US-9,558,098 Method, apparatus, and non-transitory computer readable media for the assessment of software products
A method, apparatus, and non-transitory computer-readable storage medium to objectively assess the quality of software products. The method, apparatus, and...
US-9,558,097 Automated recording and playback of application interactions
Some embodiments of automated recording and playback of application interactions have been presented. In one embodiment, an application proxy server...
US-9,558,096 Method and apparatus for supporting performance analysis
Aspects of the disclosure provide a method to support performance analysis. The method includes compiling bytecodes to generate native codes corresponding to...
US-9,558,095 Monitoring system noises in parallel computer systems
Various embodiments monitor system noise in a parallel computing system. In one embodiment, at least one set of system noise data is stored in a shared buffer...
US-9,558,094 System and method for selecting useful smart kernels for general-purpose GPU computing
The present systems and methods leverage aspects of GPU architecture to improve the operational efficiency of the GPU. In one aspect, a set of complementary GPU...
US-9,558,093 Visual tools for failure analysis in distributed systems
Visual tools are provided for failure analysis in distributed systems. Errors from synthetic measurements and usage data associated with a cloud based service...
US-9,558,092 Runtime-agnostic management of applications
An application may be modeled as a collection of resource usage. The model allows the application to be elastic so that additional resource usage can be added...
US-9,558,091 Information processing device, fault avoidance method, and program storage medium
An information processing device includes a detection unit and an avoidance unit. The detection unit monitors one or both of a utilization rate of memory...
US-9,558,090 Non-intrusive monitoring and control of integrated circuits
A method of monitoring operations of a set of ICs. The method loads a first set of configuration data into a first IC for configuring a group of configurable...
US-9,558,089 Testing insecure computing environments using random data sets generated from characterizations of real data sets
The disclosed embodiments provide a system that facilitates testing of an insecure computing environment. During operation, the system obtains a real data set...
US-9,558,088 Using environmental signatures for test scheduling
Method and system are provided for using environmental signatures for test scheduling. The method includes: generating an environmental signature for a test...
US-9,558,087 Test virtual volumes for test environments
For test virtual volume operation testing, an identification module determines if an input/output (I/O) operation for a test virtual volume is directed to...
US-9,558,086 System on chip with debug controller and operating method thereof
A System on Chip (SOC) is disclosed. The SOC comprises a first UART controller, a second UART controller, a debug controller, a processor, a UART port, a first...
US-9,558,085 Creating and reverting to a snapshot of a virtual disk
An administrator provisions a virtual disk in a remote storage platform and defines policies for that virtual disk. A virtual machine writes to and reads from...
US-9,558,084 Recovery control in mirrored disks
A method for operating a mirrored disk storage system, comprises a determiner component for determining a repair characteristic of a pair of mirrored disks, a...
US-9,558,083 Triangular asynchronous replication
Storing recovery data includes providing chunks of data to a remote destination, where each chunk of data represents data written before a first time and after...
US-9,558,082 VM availability during migration and VM network failures in host computing systems
Techniques for virtual machine (VM) availability during migration network failure and VM network failure in a first host computing system in a failover cluster...
US-9,558,081 Hypervisor assisted virtual memory obfuscation
Remote computing resource service providers allow customers to execute one or more applications in a virtual environment on computer systems provided by the...
US-9,558,080 Crash recovery using non-volatile memory
Crash recovery of a computing system in the context in which the computing system includes a volatile memory which has contents lost due to the crash, an...
US-9,558,079 Flash copy for disaster recovery (DR) testing
In one embodiment, a system includes a processor and logic integrated with and/or executable by the processor. The logic is configured to cause the processor to...
US-9,558,078 Point in time database restore from storage snapshots
Archiving a database and point in time recovery of the database. A method includes taking a first snapshot of a database. The first snapshot of the database...
US-9,558,077 Relational database recovery
A database recovery method involves: a) accessing image copies; b) accessing updates to be re-applied to reconstruct the database; c) reading into objects, from...
US-9,558,076 Methods and systems of cloud-based disaster recovery
In one embodiment, a computer-implemented method includes the step of communicatively coupling with an application-server local area network (LAN). The physical...
US-9,558,075 Synthetic full backup generation
System and method for generating a synthetic full backup. A request to perform an incremental backup may be received at a target computer. The incremental...
US-9,558,074 Data replica control
A replica control system includes software to control replication in virtual environments. The replica control system identifies a plurality of data blocks...
US-9,558,073 Incremental block level backup
Disclosed are systems, computer-readable mediums, and methods for incremental block level backup. An initial backup of a volume is created at a backup server,...
US-9,558,072 Block-level incremental recovery of a storage volume
A source volume is restored to the time of a selected incremental backup volume without writing over all of the data blocks in the source volume. If the source...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.