or
 
 
 
Results for ATTORNEY: meyertons hood kivlin kowert
Showing 1 – 10 of 2651
An system and method for providing software upgrades to components of a vehicle, wherein the labor, time and expense of providing the upgrades are minimized. In one embodiment, a network is installed in the vehicle, wherein the network comprises a transmission medium and one or more network devices coupled thereto. The network devices are addressable using IP addresses or object terminology. Data, software or service upgrades may be provided to the devices coupled to the network. The data, softw…
 
A system employing asymmetric distributed block virtualization includes a volume server, a plurality of volume clients, and one or more physical block devices. The volume server aggregates storage in the physical block devices into a logical volume and makes the logical volume accessible to the volume clients for input/output (I/O) operations. In order to manage different I/O access requirements (such as read-only access versus read-write access) of the volume clients, the volume server maintain…
 
A system and method for creating and using configuration diagrams for configuring distributed systems. The methods described herein may be used for various types of operations in configuring distributed systems, including creating programs, managing programs in the distributed system, deploying programs to various distributed devices, configuring remote execution or inter-operation of distributed programs, and executing distributed applications. Embodiments of the invention utilize graphical ico…
 
In a first embodiment, an information handling system determines whether a resource is likely misrepresented as a trusted resource within a global computer network. In a second embodiment, the information handling system outputs an indication of whether a resource within a global computer network is recognized as a known trusted resource.
 
A messaging scheme to synchronize processes within a distributed memory multiprocessing computer system having two or more processing nodes interconnected using an interconnect structure of dual-unidirectional links. Each unidirectional link forms a point-to-point interconnect to transfer packetized information between two processing nodes. A lock acquisition request from a lock requesting node is placed into service by an arbitrating node when no previous lock requests are pending for service. …
 
A method for determining an order in which to stream modules of an application from a server to a client, where the application uses modules in an execution-time dependent order, employs a predictive model to determine which module transitions are most likely to occur in the future in view of the clients present state in the application and then stream the modules to the client in the determined order. Different sets of transition weights can be used for clients falling into different categories…
 
In one embodiment, a cache memory system includes a cache memory coupled to a cache controller. The cache memory controller may receive an address and generate an index value corresponding to the address for accessing a particular entry within the cache memory. More particularly, the cache controller may generate the index value by performing a hash function on a first portion of the address such as an address tag, and combining a result of the hash function with a second portion of the address …
 
In one embodiment, a computer system includes a first client subsystem, a second client subsystem and a network. The network is coupled to convey a packet between the first client subsystem and the second client subsystem. The network is partitioned into a plurality of network slices and the packet is partitioned into a plurality of packet slices. Each packet slice is conveyed on a respective one of the plurality of network slices. At least one of the plurality of packet slices includes redundan…
 
A system and method of identifying methods of quiescing a storage object. Data is received identifying the storage object and a freeze list is generated. The freeze list includes one or more freeze methods appropriate for quiescing the storage object. Generating includes creating a hierarchy of logical storage objects below the identified storage object, associating quiesce characteristics with each logical storage object below the identified storage object and generating freeze vectors as a fun…
 
An application uses a set of resources, where the set of resources may include a variety of software and hardware resources, such as database management software, file systems, logical volumes, and physical disks. Configuration information, including various attributes of individual resources and dependencies among resources, is used to manage the set of resources. For example, tuning parameters for a database management system and information describing the dependency of the database management…
 
1 2 3 4 5 6 7 8 9 10
 
 
About |  FAQs |  Terms & Disclaimer |  Link to Us |  Contact Us