Abstract:
A computer system memory is structured as contiguous memory chunks, each chunk having a header. A chunk header includes a first offset value, a sign bit associated with the first offset value, and a number of bits having values that are added to a second offset value that is determined from the first offset value. In particular, the actual offset value can be determined by adding the values of the bits to the second offset value and by multiplying the result by the binary equivalent of four. The second offset value is then used for determining an actual offset value that is applied to a base address to provide a memory location of the memory chunk.
Abstract:
A method and system thereof for managing a computer system memory, where the memory is structured as contiguous memory chunks, each chunk having a header. A chunk header includes a first offset value, a sign bit associated with the first offset value, and a number of bits having values that are added to a second offset value that is determined from the first offset value. The second offset value is then used for determining an actual offset value that is applied to a base address to provide a memory location of the memory chunk. In one such embodiment, the first offset value includes 23 bits (plus the sign bit), the number of bits added to the second offset value is two, and the actual offset value includes 27 bits (plus the sign bit). As such, up to 128 MB of memory can be addressed.
Abstract:
Application usage in a computing environment is monitored to record information that is indicative of what applications are most extensively or recently used, or otherwise preferred by the user. Applications (or data items of a data type of the application) are selected or prioritized over other applications (or data items) when a search operation is performed.
Abstract:
The usage of applications in a computing environment is monitored to generate data that is indicative of the application usage. The data is used to select or prioritize applications (or data items of a data type of the applications) over other applications (or data items) when a search operation is performed.
Abstract:
Data is communicated between a first computing device and a second computing device over a transport employing a communication protocol in a multiplexed manner. The second computing device also includes wireless communication capabilities. Data is received from a first application and a second application through a first virtual port and a second virtual port, respectively, and packets are generated from the data. Tags corresponding to the first application or the second application are added to each packet. The packets are multiplexed and transmitted over the transport according to the communication protocol. The transmitted packets are de-multiplexed based upon the tags to reconstruct the data corresponding to the first or second application.
Abstract:
Data is communicated between a first computing device and a second computing device over a transport employing a communication protocol in a multiplexed manner. The second computing device also includes wireless communication capabilities. Data is received from a first application and a second application through a first virtual port and a second virtual port, respectively, and packets are generated from the data. Tags corresponding to the first application or the second application are added to each packet. The packets are multiplexed and transmitted over the transport according to the communication protocol. The transmitted packets are de-multiplexed based upon the tags to reconstruct the data corresponding to the first or second application.