Abstract:
A system and method for verifying cache snoop logic and coherency between instruction cache and data cache using instruction stream “holes” that are created by branch instructions is presented. A test pattern generator includes instructions that load/store data into instruction stream holes. In turn, by executing the test pattern, a processor thread loads an L2 cache line into both instruction cache (icache) and data cache (dcache). The test pattern modifies the data in the dcache in response to a store instruction. In turn, the invention described herein identifies whether snoop logic detects the change and updates the icache's corresponding cache line accordingly.
Abstract:
A computer architecture and programming model for high speed processing over broadband networks are provided. The architecture employs a consistent modular structure, a common computing module and uniform software cells. The common computing module includes a control processor, a plurality of processing units, a plurality of local memories from which the processing units process programs, a direct memory access controller and a shared main memory. A synchronized system and method for the coordinated reading and writing of data to and from the shared main memory by the processing units also are provided. A hardware sandbox structure is provided for security against the corruption of data among the programs being processed by the processing units. The uniform software cells contain both data and applications and are structured for processing by any of the processors of the network. Each software cell is uniquely identified on the network.
Abstract:
A memory controller design tool retrieves parameter ranges supported by a memory controller, and identifies troublesome parameter value combinations. The memory controller design tool suggests to 1) add logic to the memory controller to resolve the conflict, 2) incorporate a constraint that reduces/eliminates command collisions, data conflicts, and/or the need to check particular timing parameters, or 3) a combination of both. The memory controller design tool may work in conjunction with a memory controller designer to define and use the constraints.
Abstract:
Accessibility insurance coverage management is provided. An insurance server receives a coverage request from a requestor that includes a user identifier corresponding to a user (i.e. policyholder). The insurance server matches the user identifier with a stored policyholder identifier and retrieves accessibility data corresponding to the matched policyholder identifier. If required, the insurance server updates the policyholder's accessibility data by receiving accessibility data from an accessibility database server. The insurance server identifies the policyholder's coverage using the user's accessibility data along with the user's policy information. The insurance server sends a message to the requestor which indicates an amount of the particular item corresponding to the coverage request the insurance server covers. The insurance server receives accessibility service bills on a frequent basis, such as monthly. The insurance server verifies the billing information, pays the bill, and updates policyholder claims paid to date information.
Abstract:
A graphical component determines its appearance and runtime behavior based upon the type of container to which it belongs is provided. The container type corresponds to an implementation construct such as a class in C++ and Java, or a struct in C. This implementation construct is referred to as the classtype. The graphical component determines the classtype of it's parent container at runtime and dynamically alters its appearance and behavior based upon a programmatic heuristic or a configuration file. For example, a smart graphical component placed inside of a container with a classtype of “desktop” may display descriptive text, however, the same component may not display the descriptive text when in a toolbar. Runtime behavior may also be determined based upon the classtype of the parent container. Component behavior resulting from user activation can also vary depending upon the parent container classtype.
Abstract:
A system and method for managing object relationships in an enterprise is presented. A request manager receives a view request from a user. The request manager retrieves a management definition object (MDO) and a perspective that corresponds to the view request, which the request manager uses to generate a view that includes nodes corresponding to an enterprise's objects. The user analyzes the generated view, and sends a command request to the request manager that corresponds to a plurality of the nodes. The request manager uses the retrieved perspective, and the MDO in order to identify objects that correspond to the command request. Once the objects are identified, the command manager sends a command to the identified objects.
Abstract:
A system and method for installing and retaining an input/output connector without tools is presented. A user removes a module from a computer system in order to add or remove a transceiver. The module includes a housing and a front bezel, whereby a bezel latch attaches the front bezel to the housing. The user depresses the bezel latch to remove the front bezel from the housing. As a result, a retention beam is exposed on the housing that secures transceivers to a circuit board. The user unlatches the retention beam, inserts a transceiver onto a mounting area, and latches the retention beam. The retention beam applies pressure to the transceiver, which results in a coupling of the transceiver to a circuit board included in the housing. In turn, the user attaches the front bezel to the housing via the bezel latch and reinserts the module into the computer system.
Abstract:
A system and method for improved scroll mouse operation is presented. A user operates a computer mouse, which includes a scroll ring that functions as a middle mouse button. During operation, the user configures a scroll suppression manager to discard a particular number of scroll commands when the user moves the computer mouse's scroll ring. The user specifies a number of scroll commands to discard when the computer mouse's pointer location is positioned over particular mouse-over conditions, such as a web page link or a drop down menu. Once the scroll suppression manager has discarded the user-specified number of scroll commands, the scroll suppression manager processes subsequent scroll commands until the user stops scrolling or the user selects an object on the user's computer screen.
Abstract:
A system and method for organizational risk based on personnel planning factors is provided. Each employee has an employee profile data area that is used to store planning data and actual data corresponding to the employee. Planning data includes risk analysis data, compensation data, and development planning data. Actual data includes current compensation data and performance data. Inhibitors and motivators corresponding to employees is used to determine a flight risk that pertains to the employee. A contribution level, corresponding to the employee's contribution to the organization, is analyzed along with the flight risk to determine a risk quadrant that is assigned to the employee. Managers can select a risk quadrant and obtain information about common inhibitors and motivators. Incentive data, such as stock options, compensation, and awards, is planned in light of an employee's risk quadrant in order to motivate high contributors to remain with the organization.
Abstract:
A system and method for programmable high precision quantization of analog variable is provided. A signal conversion circuit includes a digital switch subtractor, an ADC, and a counter/adder. During the ADC's first sampling stage, the digital switch subtractor activates a bypass switch that allows the ADC to sample an original analog input signal and generate a first digital value using the original analog input signal. During the ADC's second sampling stage, the digital switch subtractor configures resistor network switches based upon the first digital value, thereby creating a voltage drop across the resistor network when the original analog input signal is applied. As a result, the digital switch subtractor's output is a modified analog signal, which the ADC samples and generates a second digital value. The counter/adder combines the first digital value and the second digital value to produce a digital output that a computer system processes.