The following operators can be used to better focus your queries.
( ) , AND, OR, NOT, W/#
? single char wildcard, not at start
* multi char wildcard, not at start
(Cat? OR feline) AND NOT dog?
Cat? W/5 behavior
(Cat? OR feline) AND traits
Cat AND charact*
This guide provides a more detailed description of the syntax that is supported along with examples.
This search box also supports the look-up of an IP.com Digital Signature (also referred to as Fingerprint); enter the 72-, 48-, or 32-character code to retrieve details of the associated file or submission.
Concept Search - What can I type?
For a concept search, you can enter phrases, sentences, or full paragraphs in English. For example, copy and paste the abstract of a patent application or paragraphs from an article.
Concept search eliminates the need for complex Boolean syntax to inform retrieval. Our Semantic Gist engine uses advanced cognitive semantic analysis to extract the meaning of data. This reduces the chances of missing valuable information, that may result from traditional keyword searching.
Disclosed is a methodology of capturing information relating to a failure condition at the instance of failure detection.
English (United States)
This text was extracted from a PDF file.
This is the abbreviated version, containing approximately
94% of the total text.
Page 1 of 1
Error Information Logged When Unexpected Return Code From an Os/2
Software Function Call
Disclosed is a methodology of capturing information relating to a failure
condition at the instance of failure detection.
In a multitasking environment, a failure condition may occur, but its aftermath
may not be obvious until later on when another task is executing. This makes
locating the source of the failure very difficult. An example of this may be an
unexpected return code from an Operating System function call returned to an
application many layers beneath the user interface.
The methodology consists of a discipline whereas a plurality of functions
within a subsystem, log information relating to an unexpected return code from
an Operating System function call to a local error log. The information logged
should include the function call which was being invoked (this may be the actual
name of the function call or a decimal value relating to a specific function call),
the return code from the function call, an identification of the task that was
making the call (this may be the actual name of the task), a Module ID and
Offset. The Module ID and Offset are used to pinpoint the exact subroutine
within the task and the exact offset into the subroutine where the Operating
System function was called. This data should also be timestamped.
When a failure condition is detected at the user interface layer of a
subsystem, the error log can be examined to determine which layer of th...