Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,569,379 Method for burning data into tire pressure monitoring device
A method for burning data into a tire pressure monitoring device includes the steps of preparing a burning tool and a tire pressure monitoring device and...
US-9,569,378 Processing element data sharing
A memory sharing method and system in a distributed computing environment. The method includes placing a first operator and a second operator within a...
US-9,569,376 Method, system, and computer program product for managing shutdown and substitution of I/O enclosures
A storage controller determines a presence of an indication from an Input/Output (I/O) enclosure that the I/O enclosure will perform a shutdown after a...
US-9,569,375 Unifying class device interface with one host interface by using embedded controller
A system, device and method for communicating between a host device and a plurality of peripheral devices wherein the communications utilize a single interface...
US-9,569,374 Information processing apparatus, information processing method, and program
There is provided an information processing apparatus including a device detection part configured to detect a second execution device that is identical or...
US-9,569,373 Sharing message-signaled interrupts between peripheral component interconnect (PCI) I/O devices
A PCI function, such as a device driver, may request that additional MSI resources be allocated to an I/O device coupled to a PCI Host Bridge (PHB). However,...
US-9,569,372 Redirection communication
A method and system of communicating data to or from a remote computer. The remote computer is accessed by a CPU as though it were a local IDE controller...
US-9,569,371 Memory device, memory system, and operating method of memory system
A memory device, a memory system, and an operating method of the memory system is provided. The operating method includes operations of transmitting an...
US-9,569,370 Storing a system-absolute address (SAA) in a first level translation look-aside buffer (TLB)
Embodiments relate to a method, system and computer program product for storing a system-absolute address (SAA) in a first level look-aside buffer (TLB). In one...
US-9,569,369 Software translation lookaside buffer for persistent pointer management
Techniques are provided for performing OID-to-VMA translations during runtime. Vector registers are used to implement a "software TLB" to perform OID-to-VMA...
US-9,569,368 Installing and managing flows in a flow table cache
Some embodiments provide a physical forwarding that installs flows in a flow table cache and uses the flows to process packets. In addition, the physical...
US-9,569,367 Cache eviction based on types of data stored in storage systems
Exemplary methods for improving cache utilization include in response to receiving a request to store data, storing the data in one of a plurality of cache...
US-9,569,366 System and method to provide non-coherent access to a coherent memory system
In one embodiment, a system comprises a memory and a memory controller that provides a cache access path to the memory and a bypass-cache access path to the...
US-9,569,365 Store-exclusive instruction conflict resolution
A data processing system includes a plurality of transaction masters, each with an associated local cache memory and coupled to coherent interconnect circuitry....
US-9,569,364 Multiple history based micro partition prefetch optimization
Techniques are disclosed for prefetching cache lines. One technique includes dispatching a virtual processor and recording a first set of addresses associated...
US-9,569,363 Selective prefetching of physically sequential cache line to cache line that includes loaded page table entry
A microprocessor includes a translation lookaside buffer and a first request to load into the microprocessor a page table entry in response to a miss of a...
US-9,569,362 Programmable ordering and prefetch
An input/output bridge controls access to a memory by a number of devices. The bridge enforces ordering of access requests according to a register storing an...
US-9,569,361 Pre-fetch chaining
According to one general aspect, an apparatus may include a cache pre-fetcher, and a pre-fetch scheduler. The cache pre-fetcher may be configured to predict,...
US-9,569,360 Partitioning shared caches
Technology is provided for partitioning a shared unified cache in a multi-processor computer system. The technology can receive a request to allocate a portion...
US-9,569,359 Methods and apparatuses for addressing memory caches
A cache memory includes cache lines to store information. The stored information is associated with physical addresses that include first, second, and third...
US-9,569,358 Electronic device and method for fabricating the same
An electronic device including a semiconductor memory that includes: a selection element; a first plug and a second plug that are coupled with two different...
US-9,569,357 Managing compressed data in a storage system
Systems, methods, and computer readable storage mediums for optimistically managing compressed data in a storage system. When possible, multiple input blocks...
US-9,569,356 Methods for updating reference count and shared objects in a concurrent system
A method for referencing and updating objects in a shared resource environment. A reference counter counts is incremented for every use of an object subtype in...
US-9,569,355 Memory system and control method
According to an embodiment, a memory system includes multiple nonvolatile memories to/from each of which data can be written/read independently of one another;...
US-9,569,354 System and method to emulate an electrically erasable programmable read-only memory
The disclosure relates to an electronic memory system, and more specifically, to a system to emulate an electrically erasable programmable read-only memory, and...
US-9,569,353 Automotive electronic control unit and data rewriting method for automotive electronic control unit
An automotive electronic control unit receives rewrite data wirelessly transmitted in units of a predetermined size from an external device and rewrites data...
US-9,569,352 Storage module and method for regulating garbage collection operations based on write activity of a host
A storage module and method for regulating garbage collection operations based on write activity of a host are disclosed. In one embodiment, a storage module...
US-9,569,351 Storing corresponding data units in a common storage unit
A storage device controller may segregate data units that are typically accessed together to a common storage unit. In one example, a storage device includes a...
US-9,569,350 Multidimensional resource manager/allocator
An apparatus and method for multidimensional resource allocation and management are provided. The method includes receiving a request for allocation of a block...
US-9,569,349 Method and apparatus for reallocating memory content
Coherent memory copy logic is operative to copy data from a source memory location to a destination memory location and duplicate a write request to a source...
US-9,569,348 Method for automatic page table compression
One embodiment of the present invention sets forth a technique for performing a method for compressing page table entries (PTEs) prior to storing the PTEs in a...
US-9,569,347 Testing optimized binary modules
Various embodiments test an optimized binary module. In one embodiment, a region in a set of original binary code of an original binary module in which branch...
US-9,569,346 Asynchronous code testing
A method and system for asynchronous code testing. Test cases are generated from an input code that includes code blocks organized in a hierarchy of nesting...
US-9,569,345 Architectural failure analysis
Localizing errors by: (i) running the testcase on a software model version of a processor to yield first testcase-run results in the form of a first set of...
US-9,569,344 Testing system for a mobile object in a navigation map
An example of the invention is a test support system for supporting testing of a function of a program that works depending on a position of a mobile object in...
US-9,569,343 Integration of a software content space with test planning and test case generation
A computer-implemented method for test planning and test case generation, includes collecting, by a processor, a plurality of requirements, creating, by the...
US-9,569,342 Test strategy for profile-guided code execution optimizers
Systems, methods and computer program products are described herein for testing a system that is designed to optimize the execution of code within an...
US-9,569,341 Function execution prioritization
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for assigning levels of priority to selected source code...
US-9,569,340 Generating production server load activity for a test server
A method of replicating on a test server a production load of a production server. The method can include creating the production load on the production server...
US-9,569,339 Debugging in an actor-based system
Techniques for debugging of a collection of instructions executed by a computing system including a set of actors are described herein. A first sub-set of...
US-9,569,338 Fingerprint-initiated trace extraction
Techniques relate to fingerprint-initiated trace extraction. A determination is made of whether a fingerprint is present in software that is currently executing...
US-9,569,337 System and method for managing traceability suspicion with suspect profiles
A method, computer program product, and computer system for generating, at a computing device, a first suspect profile of a plurality of suspect profiles that...
US-9,569,336 System and method for managing traceability suspicion with suspect profiles
A method, computer program product, and computer system for generating, at a computing device, a first suspect profile of a plurality of suspect profiles that...
US-9,569,335 Exploiting software compiler outputs for release-independent remote code vulnerability analysis
A central check system (CCS) is coupled to a remote software system (RSS). Data is fetched from the RSS, the data being software code derivatives generated by a...
US-9,569,334 Techniques for traversing representations of source code
Methods, apparatus, and systems for traversing a representation of an application source code, such as an abstract syntax tree (AST), are disclosed. Steps for...
US-9,569,333 Method for retrieving information from presentations and meetings using a network
A method and system for processing recorded communications over a network provides a communication via a network to a recording server adapted for hosting a...
US-9,569,332 System and method for investigating anomalies in API processing systems
A method is provided for detecting irregularities of one or more application programmer interface (API) entities. The method includes receiving a request for...
US-9,569,331 System for automatic decommissioning of network participants based on pressure applied to compression element...
Disclosed is a memory device in which the state of the memory may be set by a mechanical action, with or without mains power present. The memory state may be...
US-9,569,330 Performing dependency analysis on nodes of a business application service group
A method and apparatus of determining enterprise network component dependency in a business application service group is disclosed. An example method may...
US-9,569,329 Cache control device, control method therefor, storage apparatus, and storage medium
Disclosed is a cache control device which makes it possible to, even when a failure is occurred in a cache, reduce a risk that information is lost due to the...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.