stem

Information processing system

An information processing system includes a CPU that is connected to a bus; a device that is connected to the bus; a memory that is accessed by the CPU or the device; and a power mode control circuit that sets a power consumption mode. The power mode control circuit sets the power consumption mode based on first information that indicates a cache hit or a cache miss of a cache memory in the CPU and second information that indicates an activated state or a non-activated state of the device.




stem

System and method for using state replication between application instances to provide a collaborative desktop environment

Described herein are systems and methods for enabling a collaborative remote desktop environment. The system includes a computing device and a first application instance that has an application state associated therewith. The first application instance includes, or is associated with, a current state component and application data/data files. The system further includes an application launcher that is used to instantiate a second application instance operating either on the same or on a different computing device. The second application instance similarly has an application state associated therewith and is associated with the application launcher. Upon receiving a request from the second user to interact with the first application instance, the application state and the application data/data files are communicated to the application launcher, and the application launcher instantiates the second application instance so that its state is substantially identical to that of the first application instance.




stem

Systems and methods for dynamic development and deployment of computing applications using blueprints

Systems and methods for dynamic development and deployment of computing applications including a development framework, a visual design subsystem, and a deployment subsystem, where at runtime the deployment subsystem is operable to dynamically deploy a computing application realized by a blueprint by sending a request at runtime for graphs and components instantiated by the blueprint.




stem

System and method for identifying exploitable weak points in a network

The system and method described herein may leverage passive and active vulnerability discovery to identify network addresses and open ports associated with connections that one or more passive scanners observed in a network and current connections that one or more active scanners enumerated in the network. The observed and enumerated current connections may be used to model trust relationships and identify exploitable weak points in the network, wherein the exploitable weak points may include hosts that have exploitable services, exploitable client software, and/or exploitable trust relationships. Furthermore, an attack that uses the modeled trust relationships to target the exploitable weak points on a selected host in the network may be simulated to enumerate remote network addresses that could compromise the network and determine an exploitation path that the enumerated remote network addresses could use to compromise the network.




stem

System and method for providing digital messaging services

An exemplary embodiment of the invention relates to a system and method for providing digital messaging services received from multiple sources over a communications network. The system includes a client system, including a display screen coupled to a communications link; a workstation including a web browser, a memory, and a processor, said workstation coupled to said communications link; a hosting system, including a graphics server, a content server, and a scheduling server, each in communication with each other via a communications link; and a workstation and data storage device coupled to the communications link; and a data storage device for storing data utilized by said hosting system. The client system requests and receives digital messaging services from said hosting system under a subscription agreement. Digital messaging services include advertisements procured from said client system, and one or more local content providers, national advertisers, local advertisers, corporate marketing groups, and advertising agencies. Interactive digital messaging services are also available through the present invention. A user accesses these services via a variety of input devices; such as a bar code scanner, a wireless telephone or personal digital assistant, a kiosk with touch screen design, microphone, or other similar input device.




stem

Systems and methods for controlling error reporting and resolution

Various system and method embodiments are disclosed that include using a first node to receive messages including error information from a plurality of client computers via a computer network. Recommendations for resolving errors associated with the error information are made available to the client computers via the computer network.




stem

Information processing system, information processing apparatus and information processing system control method, capable of providing, regardless of execution/non-execution of an application, data usable by the application to other information processing

A CPU executes a communication partner search process for searching for a communication partner (another game machine). The CPU confirms received data content. If identification information included in the received data matches, application identification information saved in a wireless communication module is compared with application identification information included in the received data. When the pieces of application identification information match, a notice that another game machine having exchange data corresponding to the matched application identification information is found is given to a main body. Then, giving/receiving of exchange data is executed to/from another game machine.




stem

Systems and methods for dynamically configuring communication data items

Systems and methods reconfigure data transmitted on a network, the network using a communication protocol. The systems and methods include a processor that is operable to receive data from a second device on the network; a memory medium; and a data configurator operable to dynamically reconfigure the data from the second device, with the data from the second device being in the form of a network item defined by the second device. The data configurator is operable to pass the reconfigured data to the processor and/or the memory medium in the form of a device item that is native to the device. A data design tool generates a map configuration to define a unique relationship between the network item and the device item. The map configuration includes a network representation portion for data in the network item and a device representation portion for data in the data item.




stem

Application programming interface, system, and method for collaborative online applications

An application framework including different application programming interfaces (APIs) is described which performs a variety of mobile device functions in response to API calls from applications. For example, in response to relatively simple API calls made by applications the application framework manages the complex tasks associated with invitations and matchmaking. By way of example, the details of complex transactions such as establishing peer-to-peer connections between mobile devices may be transparent to the application developer, thereby simplifying the application design process. The application framework may include an application daemon for communicating with a first set of services and an applications services module for communicating with a separate set of services. The application framework may also include a cache for caching data for each of the services based on different cache management policies driven by each of the services. The cache may be updated by push notification cache updates sent from each of the services.




stem

Vehicle connectivity systems, methods and applications

A vehicle communication method comprises receiving a first wireless communication that is transmitted from a first remote device and managing a transmission of the first wireless communication over a vehicle network using a configurable message list. The receiving a first wireless communication is performed by a connectivity device coupled to a communication port of the vehicle network. The managing a transmission of the first wireless communication is performed by a message manager module of the connectivity device.




stem

System and method for supporting video processing load balancing for user account management in a computing environment

A system and method can support user account management in a computing environment. The computing environment can include a video encoding pool to support load balancing and a managing server, such as a privileged account manager server. The video encoding pool includes a set of nodes that are able to perform one or more video processing tasks for another node. Furthermore, the managing server can receive a request from a managed node in the computing environment for delegating a video processing task, and can select one or more nodes from the video encoding pool to load babalance and to perform the video processing task.




stem

Apparatus and method for controlling peripheral in wireless communication system using an IP address

An apparatus and method control a connection between peripheral devices in a control server of a wireless communication system providing an IP-based communication service. The method for controlling the connection between peripheral devices includes registering at least one device in a group list classified by user identification information. The method also includes, if a control node including a user identifier of the group list requests a control of any one device included in the group list, checking an IP address of the device that is requested to be controlled by the control node. The method further includes sending a control command of the control node using the IP address.




stem

System and method for transmission of data

A system and method for data communication connecting on-line networks with on-line and off-line computers. The present system provides for broadcast of up to the minute notification centric information thereby providing an instant call to action for users who are provided with the ability to instantaneously retrieve further detailed information. The notification centric portions of information is wirelessly broadcast to wireless receiving devices which are attached to computing devices. Upon receipt of the information at the personal computer, the user is notified through different multimedia alerts that there is an incoming message. Wirelessly broadcasted URL's, associated with the data, are embedded in data packets and provide an automated wired or wireless connection back to the information source for obtaining detailed data.




stem

System and process for VCR scheduling

A VCR schedule controller receives broadcast data over antenna (1) or cable (2) by a programmable tuner (3), which is connected to a teletext receiver (4). The teletext receiver (4) is connected to a microprocessor (5). Microprocessor output (11) is connected to a video display generator (10), used to create text for television receiver (60) to display a message from the microprocessor (5). After processing embedded data in a broadcast, the microprocessor (5) generates a cue for display on TV receiver (60). Remote control receiver (20) receives a command from a remote controller (22) from a viewer input in response to the cue. Remote control receiver (20) supplies a control signal to cause the microprocessor to store the embedded data in memory (9). The microprocessor then issues a message to the display generator (10) as an acknowledgement of the viewer input. The microprocessor (5) monitors the system clock (6) and compares it with stored schedules from the embedded supplemental data. When the system time corresponds to one of the scheduled times, the microprocessor (5) sets the programmable tuner (3) to the stored channel and initiates recording on VCR (30).




stem

Automatic program ventilation control system

An automatic programmed ventilation control system for operating a fan includes a fan drive circuit; a duty, cycle control circuit including means for selecting a duty cycle and means for setting the selected duty cycle; a timing circuit including means for selecting the time of day and means for setting the selected time of day; a fan speed control circuit including means for selecting a fan speed and means for setting the selected fan speed; and a manual override switch circuit for overriding the set duty cycle and fan speed for operating the fan at a predetermined speed for a preselected period of time.




stem

Electronic postage meter system having plural clock system providing enhanced security

A system includes a system time counter associated with a micro controller and a secure clock module having a real time clock and an elapsed time counter. The system synchronizes operation between the secure clock module and the system time counter. The synchronized time entered into the system time counter is utilized in the operation of the system. The real time clock time can be caused to be entered into the elapsed time counter at certain point in the operation of the system. The relationship of the time provide enhanced systems security.




stem

Electronic data system for use with sporting impliments

An electronic data system for use with sporting impliments for providing a user with an electronic device integrated into sport gloves to perform various functions unique to that particular sport. The electronic data system for use with sporting impliments includes a glove member designed for substantially enveloping a hand of a user. The glove member has a notch portion in a back side of the glove member. The notch portion is for facilitating insertion and removal of the user's hand from the glove member. The glove member has a tab portion positioned adjacent to a first side of the notch portion. A data assembly has a housing. The housing is operationally coupled to the glove member. The data assembly has a display for presenting a visual representation of information to the user.




stem

Moon phase menstrual tracking and educational system

A system and method for tracking and informing about a physical, emotional, or physiological cycle, such as a menstrual cycle, includes at least one definition entry and at least one date indicator. Each definition entry defines indicia such as color to represent a stage of a physical, emotional, or physiological cycle. Each date indicator includes a date section and a tracking section corresponding to each date section. The date section of the date indicator indicates at least one date, wherein the tracking section is capable of being marked so as to indicate indicia corresponding to a definition entry to signify the stage of the physical, emotional, or physiological cycle for each date. According to one embodiment, the date indicators are arranged according to phases of the moon to allow correlation of a user's cycle to the lunar cycle.




stem

Coupled resonator for regulating system

The coupled resonator comprises a first low frequency resonator, such as a balance spring (1) and a second higher frequency resonator, such as a tuning fork (2), the two resonators (1 and 2) including permanent mechanical coupling means. Application to the regulating system of a timepiece.




stem

Distributing capacity slices across storage system nodes

Various systems and methods are described for configuring a data storage system. In one embodiment, a plurality of actual capacities of a plurality of storage devices of the data storage system are identified and divided into a plurality of capacity slices. The plurality of capacity slices are combined into a plurality of chunks of capacity slices, each having a combination of characteristics of the underlying physical storage devices. The chunks of capacity slices are then mapped to a plurality of logical storage devices. A group of the plurality of logical storage devices is then organized into a redundant array of logical storage devices.




stem

Systems and methods for operating a flash memory file system

A flash memory file system including a plurality of flash modules. Each of the plurality of flash modules includes a respective cache memory, a respective flash memory, and a respective flash controller in communication with the respective cache memory and the respective flash memory. A first flash module of the plurality of flash modules is configured to receive a file lookup message including a path name for file data stored on a second flash module of the plurality of flash modules. A third flash module of the plurality of flash modules is configured to select the second flash module based on the path name and a directory table, and generate a file metadata message responsive to the file lookup message. The file metadata message identifies the second flash module as containing the file data.




stem

Single instance buffer cache method and system

Provided is a method and system for reducing duplicate buffers in buffer cache associated with a storage device. Reducing buffer duplication in a buffer cache includes accessing a file reference pointer associated with a file in a deduplicated filesystem when attempting to load a requested data block from the file into the buffer cache. To determine if the requested data block is already in the buffer cache, aspects of the invention compare a fingerprint that identifies the requested data block against one or more fingerprints identifying a corresponding one or more sharable data blocks in the buffer cache. A match between the fingerprint of the requested data block and the fingerprint from a sharable data block in the buffer cache indicates that the requested data block is already loaded in buffer cache. The sharable data block in buffer cache is used instead thereby reducing buffer duplication in the buffer cache.




stem

Heterogeneous memory system

A heterogeneous memory system includes a main memory arrangement, a first-level cache, and a memory management unit (MMU). The first-level cache includes an SRAM arrangement and a DRAM arrangement. The MMU is configured and arranged to read first data from the main memory arrangement in response to a stored first value associated with the first data and indicative of a start time. The MMU selects one of the SRAM arrangement or the DRAM arrangement for storage of the first data and stores the first data in the selected one of the SRAM arrangement or DRAM arrangement. The MMU reads second data from one of the SRAM arrangement or DRAM arrangement and writes the data to the main memory arrangement in response to a stored second value associated with the second data and indicative of a duration.




stem

Memory system with fixed and variable pointers

A memory system includes a volatile first storing unit, a nonvolatile second storing unit, and a controller. The controller performs data transfer, stores management information including a storage position of the data stored in the second storing unit into the first storing unit, and performs data management while updating the management information. The second storing unit has a management information storage area for storing management information storage information including management information in a latest state and a storage position of the management information. The storage position information is read by the controller during a startup operation of the memory system and includes a second pointer indicating a storage position of management information in a latest state in the management information storage area and a first pointer indicating a storage position of the second pointer. The first pointer is stored in a fixed area in the second storing unit and the second pointer is stored in an area excluding the fixed area in the second storing unit.




stem

Methods and systems for replicating an expandable storage volume

Machine implemented method and system for generating a disaster recovery copy of an expandable storage volume having a namespace for storing information for accessing data objects stored at a data constituent volume is provided. A transfer operation for transferring a point in time copy of the expandable storage volume from a first location to a second location is generated. Information regarding the expandable storage volume from the first location is retrieved and a destination expandable storage volume is resized to match components of the expandable storage volume at the first location. Thereafter, the point in time copy of the expandable storage volume is transferred from the first location to the second location and configuration information regarding the point in time copy is copied from the first location to the second location.




stem

System cache with quota-based control

Methods and apparatuses for implementing a system cache with quota-based control. Quotas may be assigned on a group ID basis to each group ID that is assigned to use the system cache. The quota does not reserve space in the system cache, but rather the quota may be used within any way within the system cache. The quota may prevent a given group ID from consuming more than a desired amount of the system cache. Once a group ID's quota has been reached, no additional allocation will be permitted for that group ID. The total amount of allocated quota for all group IDs can exceed the size of system cache, such that the system cache can be oversubscribed. The sticky state can be used to prioritize data retention within the system cache when oversubscription is being used.




stem

System and method for determining a level of success of operations on an abstraction of multiple logical data storage containers

Various systems and methods are described for configuring a logical data storage container. In one embodiment, an instruction to perform an operation to modify an attribute of the logical data storage container that is an abstraction of a plurality of pertinent storage containers is received. A translated instruction to perform a sub-operation associated with the operation is transmitted to each of a number of the plurality of pertinent storage containers. A level of success of the performing of the operation on the logical data storage container is detected based on a comparison of a threshold value to a level of success of the performing of the sub-operation on each of the number of the plurality of pertinent storage containers. A report of the detected level of success is communicated.




stem

System and method for virtual machine conversion

System and method for conversion of virtual machine files without requiring copying of the virtual machine payload (data) from one location to another location. By eliminating this step, applicant's invention significantly enhances the efficiency of the conversion process. In one embodiment, a file system or storage system provides indirections to locations of data elements stored on a persistent storage media. A source virtual machine file includes hypervisor metadata (HM) data elements in one hypervisor file format, and virtual machine payload (VMP) data elements. The source virtual machine file is converted by transforming the HM data elements of the source file to create destination HM data elements in a destination hypervisor format different from the source hypervisor format; maintaining the locations of the VMP data elements stored on the persistent storage media constant during the conversion from source to destination file formats without reading or writing the VMP data elements; and creating indirections to reference the destination HM data elements in the destination hypervisor format and the existing stored VMP data elements.




stem

Memory management unit for a microprocessor system, microprocessor system and method for managing memory

The invention pertains to a memory management unit for a microprocessor system, the memory management unit being connected or connectable to at least one processor core of the microprocessor system and being connected or connectable to a physical memory of the microprocessor system. The memory management unit is adapted to selectively operate in a hypervisor mode or in a supervisor mode, the hypervisor mode and the supervisor mode having different privilege levels of access to hardware The memory management unit comprises a first register table indicating physical address information for mapping at least one logical physical address and at least one actual physical address onto each other; a second register table indicating an allowed address range of physical addresses accessible to a process running in or under supervisor mode; wherein the memory management unit is adapted to prevent write access to the second register table by a process not in hypervisor mode. The memory management unit is further adapted to allow write access to the first register table of a process running in or under supervisor mode to reconfigure the physical address information indicated in the first register table with memory mapping information relating to at least one physical address, if the at least one physical address is in the allowed address range, and to prevent write access to the first register table of the process running in or under supervisor mode if the at least one physical address is not in the allowed address range. The invention also pertains to a microprocessor system and a method for managing memory.




stem

Dynamically expandable and contractible fault-tolerant storage system with virtual hot spare

A dynamically expandable and contractible fault-tolerant storage system employs a virtual hot spare that is created from unused storage capacity across a plurality of storage devices. This unused storage capacity is available if and when a storage device fails for storage of data recovered from the remaining storage device(s). On an ongoing basis, the storage system may determine the amount of unused storage capacity that would be required for the virtual hot spare (e.g., based on the number of storage devices, the capacities of the various storage devices, the amount of data stored, and the manner in which the data is stored) and generate a signal if additional storage capacity is needed for a virtual hot spare.




stem

Decentralized caching system

In a satellite communication system comprising at least a hub and a plurality of terminals, at least one terminal may include a cache for storing data objects. The cache may be based on a detachable memory device that may be inserted to or removed from the terminal at any given time, including after the terminal is deployed. Aspects are directed to preventing a prefetching of objects already stored in a cache of a remote terminal. In some embodiments, an efficient multicasting of content to terminals over an adaptive link may occur in a manner which may benefit terminals comprising a cache while not affecting or minimally affecting the performance of terminals that may not include a cache.




stem

Method and system for dynamic distributed data caching

A method and system for dynamic distributed data caching is presented. The system includes one or more peer members and a master member. The master member and the one or more peer members form cache community for data storage. The master member is operable to select one of the one or more peer members to become a new master member. The master member is operable to update a peer list for the cache community by removing itself from the peer list. The master member is operable to send a nominate master message and an updated peer list to a peer member selected by the master member to become the new master member.




stem

Process and system for the separation and drying of carboxylic acid crystals

In a process for the separation and drying of crude carboxylic acid crystals from a slurry in a solvent, the slurry is supplied to a filter operating at pressure and at a temperature above the atmospheric boiling point of the solvent. A cake of separated crystals is removed from the filter and passed to a thermal dryer. In a system for the separation and drying of crude carboxylic acid from a slurry in a solvent, a pressure filter device has a slurry inlet and an outlet for a cake of carboxylic acid crystals. The system also has a thermal dryer and means for transporting the cake of carboxylic acid crystals from the pressure filter device to the dryer. The pressure filter device is configured to operate at a pressure and temperature above the atmospheric boiling point of the solvent.




stem

Systems and processes for the production of isophthalic acid and terephthalic acid

Various embodiments of the present invention generally disclose systems and processes for the conversion of a feed stream comprising at least one C8 aromatic into a product stream comprising isophthalic acid and purified terephthalic acid (IPA/TA).




stem

Systems and methods for data security

A system comprises a basic-input-output-system (“BIOS”), a disk drive, and a security system configured to prevent unauthenticated access to the disk drive. For each of at least two users out of a plurality of users, the BIOS authenticates the user based on the user's token. The BIOS also accesses secured data based on the authentication, and provides the secured data to the security system without input from the user.




stem

Power-saving network management server, network system, and method of determining supply of power

A power-saving network management server, which is coupled to a network system including a network device and manages a state of power to the network device, wherein the power-saving network management server is configured to: store network configuration information and task allocation information; determine starting or stopping of the power supply to the port of the network device based on the updated network configuration information and task allocation information; store a determination result of the starting or stopping of the power supply to the port as a port determination result; and control the power supply to the port of the network device based on the port determination result.




stem

Energy management device and power management system

An energy management system has an application storage, an application executing unit, a plurality of network interfaces, a policy setting unit configured to set whether each application should be permitted to access each of the network interfaces, a policy storage configured to store identification information for each application set by the policy setting unit, and access permit/inhibit information showing whether the application is permitted to access each of the network interfaces, an I/F management unit managing a correspondence relationship between a network address and each of the network interfaces, and to specify a network interface used by the application executed by the application executing unit, and an access controller configured to judge whether the application executed by the application executing unit is permitted to access the network interface to be used thereby, based on the access permit/inhibit information stored in the policy storage.




stem

Host initiated state control of remote client in communications system

A system and method for low-cost, fault tolerant, EMI robust data communications, particularly for an EV environment. A data communications method, including a) enabling a transmission of a wake signal from a host to a remote client through an isolator disposed at the remote client when the wake signal is asserted from the host at a host-portion of the isolator concurrent with a periodic enablement of a client-portion of the isolator by the remote client; and thereafter b) transmitting the wake signal from the host to the remote client through the isolator; c) controlling enablement of the client-portion responsive to the wake signal transmitted through the isolator; and thereafter d) disabling the transmission by deassertion of the wake signal at the host.




stem

Method and apparatus for power-efficiency management in a virtualized cluster system

A method and apparatus for power-efficiency management in a virtualized cluster system. The virtualized cluster system includes a front-end physical host and at least one back-end physical host, and each of the at least one back-end physical host comprises at least one virtual machine and a virtual machine manager. Flow characteristics of the virtualized cluster system are detected at a regular time cycle, then a power-efficiency management policy is generated for each of the at least one back-end physical host based on the detected flow characteristics, and finally the power-efficiency management policies are performed. The method can detect the real-time flow characteristics of the virtualized cluster system and make the power-efficiency management policies thereupon to control the power consumption of the system and perform admission control on the whole flow, thereby realizing optimal power saving while meeting the quality of service requirements.




stem

Methods and apparatuses for controlling the temperature of a data processing system

Methods and apparatuses to manage working states of a data processing system. At least one embodiment of the present invention includes a data processing system with one or more sensors (e.g., physical sensors such as tachometer and thermistors, and logical sensors such as CPU load) for fine grain control of one or more components (e.g., processor, fan, hard drive, optical drive) of the system for working conditions that balance various goals (e.g., user preferences, performance, power consumption, thermal constraints, acoustic noise). In one example, the clock frequency and core voltage for a processor are actively managed to balance performance and power consumption (heat generation) without a significant latency. In one example, the speed of a cooling fan is actively managed to balance cooling effort and noise (and/or power consumption).




stem

Multi-cluster processing system and method of operating the same

A multi-cluster processing system and a method of operating a multi-cluster processing system are provided. The multi-cluster processing system includes: a first cluster including a plurality of first-type cores: a second cluster including a plurality of second-type cores; and a control unit configured to monitor loads of the first-type cores and the second-type cores, wherein when utilization of at least one of enabled first-type cores exceeds a predetermined threshold utilization of each of the first-type cores, the control unit enables at least one of disabled first-type cores in a first mode, and the control unit enables at least one of the disabled second-type cores and disables the first cluster in a second mode, wherein an amount of computation per unit of time of each of the second-type cores is greater than an amount of computation per unit of time of each of the first-type cores.




stem

Image forming apparatus, system-on-chip (SoC) unit, and driving method thereof

An image forming apparatus is connected to a host device including first and second power domains which are separately supplied with power and includes first and second memories to be disposed in the second power domain, a main controller disposed in the first power domain and to perform a control operation using the first memory in a normal mode, and a sub-controller disposed in the second power domain and perform a control operation using the second memory in a power-saving mode, where when the normal mode is changed to the power-saving mode a power supply to the first power domain is shut off, the first memory operates in a self-refresh mode, and the main controller copies central processing unit (CPU) context information into a context storage unit, and when the power-saving mode is changed to the normal mode, the main controller is booted using the CPU context information stored in the context storage unit.




stem

Power supply control system, method, and computer program product

According to an embodiment, a control system includes a detector, an estimating unit, a determining unit, and a controller. The detector detects an idle state. The estimating unit estimates an idle period. When the idle state is detected, the determining unit determines whether a first power consumption when writeback of data which needs to be written back to a main storage device is performed and supply of power to a cache memory is stopped, is larger than a second power consumption when writeback of the data is not performed and supply of power is continued for the idle period. The controller stops the supply of power to the cache memory when the first power consumption is determined to be smaller than the second power consumption and continues the supply of power when the first power consumption is determined to be larger than the second power consumption.




stem

Methods, systems, apparatuses, and computer-readable media for waking a SLIMbus without toggle signal

Arrangements for restarting data transmission on a serial low-power inter-chip media bus (SLIMbus) are presented. A clock signal may be provided in an active mode to a component communicatively coupled with the SLIMbus. Immediately prior to the clock signal in the active mode being provided, the clock signal may have been in a paused mode. While the clock signal was in the paused mode at least until the clock signal is provided in the active mode, the data line may have been inactive (e.g., a toggle on the data line may not have been present). Frame synchronization data for a frame may be transmitted. The frame synchronization data for the frame, as received by the component, may not match expected frame synchronization data. Payload data may be transmitted as part of the frame to the component, wherein the payload data is expected to be read properly by the component.




stem

Experiment manager for manycore systems

An execution environment may have a monitoring, analysis, and feedback loop that may configure and tune the execution environment for currently executing workloads. A monitoring or instrumentation system may collect operational and performance data from hardware and software components within the system. A modeling system may create an operational model of the execution environment, then may determine different sets of parameters for the execution environment. A feedback loop may change various operational characteristics of the execution environment. The monitoring, analysis, and feedback loop may optimize the performance of a computer system for various metrics, including throughput, performance, energy conservation, or other metrics based on the applications that are currently executing. The performance model of the execution environment may be persisted and applied to new applications to optimize the performance of applications that have not been executed on the system.




stem

Method for operating invisible system services on android platform

A method for operating an invisible system service on Android platform is disclosed. The method for operating system services on Android platform includes selectively registering a created system service in a context manager according to a type of the created system service, where the type of the system service comprises a first type for permitting access from an outside and a second type for not permitting access from the outside, and the selectively registering comprises registering in the context manager the created system service belonging to the first type and not registering in the context manager the created system service belonging to the second type.




stem

Variable domain resource data security for data processing systems

The variable domain data access control system and method described herein use the same variable domain to describe a data security model and a variable domain data model, such as a product configuration model. A variable domain is a set of resource data that can be described using a logical relationship data structure. The variable domain utilizes logical relationship expressions, such as a Boolean logic language, to define resource data in terms of parts, rules and/or attributes, and any other property that can be accessed for viewing, manipulation, or other purposes. The data security model represents an access control list (ACL) that includes security attributes as resource data and uses the same data structure and logical relationship expressions as an associated variable domain data model. An application, such as a configuration engine, can be used to create controlled access to the variable domain data model using the data security model.




stem

System, method, and device for delivering communications and storing and delivering data

A system, method, and device includes a platform data storage that stores a wrap that secures an executable controller and executable sensors. The wrap is verified, optionally through a downloaded authentication driver. After verifying the wrap, the wrap is opened and a sister of the executable controller is installed into the platform memory to cooperate with the executable controller. Additionally or alternatively, the authentication driver may cooperate with the executable controller. The executable controller allows the platform processor to access data secured in a vault and/or verify the platform to create a connection to a connection server.




stem

Secured wireless access system and related method

The disclosure is directed to a system and method for establishing a secured wireless connection allowing the exchange of information between a wireless device and aircraft equipment. The secured wireless access system may require a user controlling the wireless device to interact with an onboard interface to initiate a connection. The user may be further required to enter a randomly generated security passcode to pair the mobile device to the aircraft equipment. Further security measures may be implemented, such as tiered user access levels restricting certain equipment and/or information based upon a user identity of the user requesting access.




stem

Computer system for storing and retrieval of encrypted data items, client computer, computer program product and computer-implemented method

A system is disclosed comprising multiple sets of client computers each client computer having installed thereon an application program The application program comprising client computer specific log-in information, a database system coupled to the set of client computers via a network. The database system having a log-in component for logging-in the client computers, and being partitioned into multiple relational databases each one of which is assigned to one set of the sets of client computers. Each database further storing encrypted data items, each data item being encrypted with one of the user or user-group specific cryptographic keys, the key identifier of the cryptographic key with which one of the data items is encrypted being stored in the database as an attribute of the one of the encrypted data items. The log-in component comprising assignment information indicative of the assignment of the databases to the set of client computers.