Abstract:
PROBLEM TO BE SOLVED: To solve such a problem that outdated software sometimes is not properly executed on a new machine even when the new machine has the same architecture data as those of an outdated machine and can "understand" the outdated machine in order to access stored status data (e.g., for loading and storing an instruction defined by an ISA). SOLUTION: A method for operating a data processing machine is described in which data about a state of the machine is written to a location in storage. The location is one that is accessible to software that may be written for the machine. The written status data is encoded. This status data may be recovered from the storage according to a decoding process. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
A method and apparatus for evaluating the importance of an event to a person and taking action if the level of importance meets or exceeds one threshold, but is below or only meeting another; attempting to contact at least one person if the level of importance meets or exceeds a threshold; or attempting to contact at least one person using a first way to do so if the level of importance meets or exceeds a threshold, and selecting and using a second way to contact the at least one person if the at least one person has not responded within a period of time after using the first way.
Abstract:
Methods and apparatus are provided for processing information items. Processing comprises one of context filtering, context prioritizing, or both context filtering and context prioritizing. In some embodiments the set of context items form which processing criteria are derived includes a user's calendar or appointments, schedule changes, exceptions, and the like.
Abstract:
A method, apparatus and system enable a management virtual machine to act as a proxy for other virtual machines on a virtual machines host. In one embodiment, the management virtual machine may maintain a database of network management information pertaining to each virtual machine on the host. An enhanced virtual machine manager on the host may provide an interface to the management virtual machine to enable the management virtual machine to trap management messages destined for virtual machines on the host. The management virtual machine may respond to the messages based on information in the database and/or issue queries to the virtual machines to obtain the requisite information. In one embodiment, the management virtual machine may aggregate the information from various virtual machines prior to responding to the network management message.
Abstract:
The invention provides a cache management system comprising in various embodiment pre-load and pre-own functionality to enhance cache efficiency in shared memory distributed cache multiprocessor computer systems. Some embodiments of the invention comprise an invalidation history table to record the line addresses of cache lines invalidated through dirty or clean invalidation, and which is used such that invalidated cache lines recorded in an invalidation history table are reloaded into cache by monitoring the bus for cache line addresses of cache line recorded in the invalidation history table. In some further embodiments, a write-back bit associated with each L2 cache entry records when either a hit to the same line in another processor is detected or when the same line is invalidated in another processor's cache, and the system broadcasts write-backs from the selected local cache only when the line being written back has a write-back bit that has been set.
Abstract:
Embodiments of a system and method for automatic creation of a multimedia presentation or highlight collection from a collection of candidate contents are generally described herein. In some embodiments, each one of a plurality of videos or images in the candidate contents are automatically evaluated for quality, content, metadata, and desirability based on user specified inclusion factors. Inclusion factors may be utilized to generate one or more scores for the candidate contents, which provide for automatic ranking of the candidate contents. Based on scores generated from the selected inclusion factor criteria a highlight collection of images is automatically generated. The highlight collection can be included in a multimedia presentation, in the form of a memory book, slideshow, or digital narrative, and can be automatically generated from the plurality of videos or images.
Abstract:
A method and apparatus for attempting to contact at least one person in response to an event if the level of importance of the event to a first person meets or exceeds one threshold.
Abstract:
A traditional registry, such as a global UDDI server, is not designed to accommodate transitory devices, e.g., devices that may frequently attach and detach from a network, often-times without warning, such as virtual machines offering or desiring services that are periodically instantiated and then suspended or destroyed. To accommodate such transitory devices, a dynamic resource/service registry may be implemented that leverages lower-level protocols or state to determine appropriate registry updates to keep the registry state consistent with currently-active virtual machines. For example, a virtual machine monitor (VMM) may track creation and suspension or deletion of a virtual machine (VM), and resources advertised by the VM, where the VMM appropriately adds or removes registry entries for the VM as the state of the VM changes or provides hooks (e.g. notifications) or other instrumentation based on said state or protocols to enable other associated modules or agents (e.g. management modules or the registry) to take appropriate actions.
Abstract:
A method and apparatus for evaluating the importance of an event to a person and taking action if the level of importance meets or exceeds one threshold (310), but is below or only meeting another; attempting to contact at least one person if the level of importance meets or exceeds a threshold (330); or attempting to contact at least one person using a first way to do so if the level of importance meets or exceeds a threshold (350), and selecting and using a second way to contact the at least one person if the at least one person has not responded within a period of time after using the first way (360).
Abstract:
A traditional registry, such as a global UDDI server, is not designed to accommodate transitory devices, e.g., devices that may frequently attach and detach from a network, often-times without warning, such as virtual machines offering or desiring services that are periodically instantiated and then suspended or destroyed. To accommodate such transitory devices, a dynamic resource/service registry may be implemented that leverages lower-level protocols or state to determine appropriate registry updates to keep the registry state consistent with currently-active virtual machines. For example, a virtual machine monitor (VMM) may track creation and suspension or deletion of a virtual machine (VM), and resources advertised by the VM, where the VMM appropriately adds or removes registry entries for the VM as the state of the VM changes or provides hooks (e.g. notifications) or other instrumentation based on said state or protocols to enable other associated modules or agents (e.g. management modules or the registry) to take appropriate actions.