Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-1,023,5203 Techniques for increasing storage system performance in processor-bound workloads with large working sets and...
An improved technique involves processing a workflow in stages, and processing all requests in a queue for a given stage before moving onto the next stage....
US-1,023,5202 Thread interrupt offload re-prioritization
A computing system is provided and includes first and second computing resources defined, during system initialization, as first kernel threads and a second...
US-1,023,5201 Dynamic releasing of cache lines
A computer-implemented method includes, in a transactional memory environment, identifying a transaction and identifying one or more cache lines. The cache...
US-1,023,5200 Virtual switch interceptor
Application management is facilitated by observing messages communicated amongst virtual applications external to application-hosting virtual machines. In one...
US-1,023,5199 Migrating middlebox state for distributed middleboxes
A controller of a network control system for configuring several middlebox instances is described. The middlebox instances implement a middlebox in a...
US-1,023,5198 VM-aware FTL design for SR-IOV NVME SSD
A mass storage device for providing persistent storage. The system includes a plurality of instances of virtual flash translation layers, each associated with a...
US-1,023,5197 Cloud system data management method and apparatus
A cloud system data management method for alleviate a data leakage problem occurring when a user accessed by another user when a virtual data volume of the user...
US-1,023,5196 Virtual machine joining or separating
In one aspect, a method includes separating a set of virtual machines from a first consistency group to a second consistency group and third consistency group....
US-1,023,5195 Systems and methods for discovering private devices coupled to a hardware accelerator
In accordance with embodiments of the present disclosure, an information handling system may include a processor subsystem having access to a memory subsystem...
US-1,023,5194 Compatibility-based configuration of hardware with virtualization software
The disclosed embodiments provide a system that facilitates the use of a computer system with virtualization software. During operation, the system obtains a...
US-1,023,5193 Collecting performance metrics from Java virtual machines
Embodiments include methods, and computing systems, and computer program products for collecting performance metrics from Java virtual machines. Aspects...
US-1,023,5192 Self-learning robotic process automation
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for a self-learning robotic process automation are disclosed....
US-1,023,5191 Application specific configurable graphical user interface
Methods and system are disclosed that manage behavior of a graphical user interface associated with an application during a runtime of the application. In one...
US-1,023,5190 Executing instructions to store context information based on routine to be executed
Optimizations are provided for sibling calls. A sibling caller is marked to indicate that it may call a sibling routine or that it may call an external sibling...
US-1,023,5189 Isolating a redirected smart card reader to a remote session
A smart card stub and a smart card proxy can be employed to enable a redirected smart card reader to be accessed within a remote session. To isolate a...
US-1,023,5188 Method and system for dynamic loading of incremental changes of software
A method and a system for dynamic loading of incremental changes of software in a centralized data management system are provided herein. The method may include...
US-1,023,5187 Merging application configurations to enhance multi-layer performance
Application configurations can be merged to enhance multi-layer performance. When a layering system is employed, a layering registry filter driver can create a...
US-1,023,5186 Method and associated apparatus for performing wake-up management on network devices
A method for performing wake-up management and an associated apparatus are provided, where the method is applied to at least one portion of a network system,...
US-1,023,5185 Computer and controlling method thereof
A computer has a platform controller hub (PCH), a field replaceable unit (FRU), a memory, a complex programmable logic device (CPLD) and a basic input output...
US-1,023,5184 Boot loader for active cable assemblies
According to one embodiment, an active cable assembly may include a cable end, a data receiver, a controller characteristic circuit, and a controller. The data...
US-1,023,5183 Booting a system-on-a-chip device
Example implementations relate to booting a system comprising a system-on-a-chip (SOC) device. For example, boot code and system code comprising at least one...
US-1,023,5182 System and method for hybrid task management across CPU and GPU for efficient data mining
Embodiments described herein provide a system for facilitating hybrid task management across a central processing unit (CPU) and a graphics processing unit...
US-1,023,5181 Out-of-order processor and method for back to back instruction issue
An out-of-order (OOO) processor includes ready logic that provides a signal indicating an instruction is ready when all operands for the instruction are ready,...
US-1,023,5180 Scheduler implementing dependency matrix having restricted entries
A scheduler implementing a dependency matrix having restricted entries is disclosed. A processing device of the disclosure includes a decode unit to decode an...
US-1,023,5179 Data processor selecting a flag out of a plurality of flags generated by an instruction operating on multiple...
The RISC data processor is based on the idea that in case that there are many flag-generating instructions, the number of flags generated by each instruction is...
US-1,023,5178 Performance scaling for binary translation
Embodiments relate to improving user experiences when executing binary code that has been translated from other binary code. Binary code (instructions) for a...
US-1,023,5176 Techniques for metadata processing
Techniques are described for metadata processing that can be used to encode an arbitrary number of security policies for code running on a processor. Metadata...
US-1,023,5175 Processors, methods, and systems to relax synchronization of accesses to shared memory
A processor of an aspect includes a plurality of logical processors. A first logical processor of the plurality is to execute software that includes a memory...
US-1,023,5174 Conditional instruction end operation
A conditional instruction end facility is provided that allows completion of an instruction to be delayed. In executing the machine instruction, an operand is...
US-1,023,5173 Program code optimization for reducing branch mispredictions
Systems, apparatuses, and methods for implementing an IF2FOR transformation are disclosed. In one embodiment, a first group of instructions include an...
US-1,023,5172 Branch predictor performing distinct non-transaction branch prediction functions and transaction branch...
A branch predictor for predicting branch instructions performs different branch prediction operations for branches executing in a transaction than those...
US-1,023,5171 Method and apparatus to efficiently handle allocation of memory ordering buffers in a multi-strand out-of-order...
An apparatus includes a first circuit to determine a real program order (RPO) of an eldest undispatched instruction from among a plurality of strands, a second...
US-1,023,5170 Decimal load immediate instruction
An instruction generates a value for use in processing within a computing environment. The instruction obtains a sign control associated with the instruction,...
US-1,023,5169 Implementing a received add program counter immediate shift (ADDPCIS) instruction using a micro-coded or...
A computer program product for implementing a received add program counter immediate shift (ADDPCIS) instruction using a micro-coded or cracked sequence is...
US-1,023,5168 Load register on condition immediate or immediate instruction
A data processor comprising a plurality of registers, and instruction execution circuitry having an associated instruction set, wherein the instruction set...
US-1,023,5167 Microprocessor with supplementary commands for binary search and associated search method
A microprocessor for a vehicle control device includes: an instruction set; a register section with a status register, a first flag being provided in the status...
US-1,023,5166 Code quality evaluation and user interfaces
A processor may generate a UI. The processor may instantiate a plurality of collectors. Each collector may be configured to collect data in real time from a...
US-1,023,5165 Creating optimized shortcuts
An embodiments of the invention may include a method, computer program product and computer system for optimizing computer programs. The embodiment may include...
US-1,023,5164 Method, storage medium, and apparatus
A method includes: first identifying, from among one or more items included in a source code of a program, a first item used for storing data input to the...
US-1,023,5163 Coordinating software builds for different computer architectures
Software can be built for different computer architectures. For example, an orchestration node in an orchestration cluster of nodes can receive a request from a...
US-1,023,5162 Customizing a software application based on a user's familiarity with the software program
A software program is executed, the software program requiring one or more physical interactions with a user through an input/output (I/O) device, wherein each...
US-1,023,5161 Techniques of adding security patches to embedded systems
In an aspect of the disclosure, a method, a computer-readable medium, and an apparatus are provided. The apparatus may be an embedded-system device. The...
US-1,023,5160 Controlled deployment of application feature
Controlled deployment of an application feature is provided. A deployment service initiates operations to control deployment of the application feature by...
US-1,023,5159 System and method for providing automatic firmware update management
A method for updating firmware of cable modems optimizing management resources in a network comprising a web application, network collector, more than one cable...
US-1,023,5158 Optimizing feature deployment based on usage pattern
Variety of approaches to optimize a feature deployment based on an usage pattern are described. A hosted service initiates operations to optimize the feature...
US-1,023,5157 Method and system for analytics-based updating of networked devices
A system (100) includes an update server (110) in communication with one or more client devices (106,107,108) across a network (102). A smart scheduler engine...
US-1,023,5156 Versioned extension points of graphical user interfaces
In some examples, version data in an extension point of a graphical user interface of a version of a software application may be identified. In some examples,...
US-1,023,5155 Selective update of core mobile device user interface through application marketplace
Systems and methods for selectively updating or extending built in functionality on a mobile device are disclosed. The updates may be provided to selective...
US-1,023,5154 Over-the-air trigger to vehicle interrogator updates
A vehicle may subscribe to a topic of a topic tree maintained by a message broker and associated with the vehicle. The vehicle may send, to a service delivery...
US-1,023,5153 Downloading data into distant equipment
The disclosure herein updates distant equipment while avoiding protocols and connections and concerns a deported downloading system of data on distant...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.