Month of March 2014 - Page Number 9

Showing 81 - 90 of 476 from March 2014
Browse Prior Art Database
  1. 81.
    Email is becoming very important mode of communication between enterprise as well as non-enterprise users. In an enterprise, user collaborates and share information with each other using emails. The necessity of communication between multiple parties generates chain mails which sometime can cause a heavy traffic....
    IPCOM000235876D | 2014-Mar-28
  2. 82.
    Cloud Computing is a rather new area that provides one with the flexibility to buy just enough computing resource that is required without having to own and maintain it. This can be extended to include the concept of secondary market that will give the cloud users a variety of options on how these resources can be...
    IPCOM000235875D | 2014-Mar-28
  3. 83.
    This paper proposes a Design Verification Ecosystem, a platform to track logic changes iteratively , assign verification scope for each processed change and trigger cross communication between teams for sustain sign off and closusre of the changes.
    IPCOM000235874D | 2014-Mar-28
  4. 84.
    HW uses interrupt mechanism to inform Firmware about events happening on it. These interrupts are processed by Firmware at higher priority then other tasks. All events on HW are not of equal priority. These can be from just informational events to critical events. Generally HW provides priority information when...
    IPCOM000235873D | 2014-Mar-28
  5. 85.
    In a SW Development environment, with teams spread across different geographical locations, Next Step approach helps in identifying the bottlenecks and tracking the progress at a minute level. It also helps in analysis of issues causing delay in closure of activities.
    IPCOM000235872D | 2014-Mar-28
  6. 86.
    During ATPG test process, patterns are shifted in during a scan phase. During capture phase, a capture pulse is applied to excite functional paths and capture logic values in flops. Typically, all the flops of a design are pulsed at the same time, creating a very high power consumption in a chip. Multiple such...
    IPCOM000235871D | 2014-Mar-28
  7. 87.
    There are various ways to achieve workload consolidation while providing IaaS to the customers of cloud computing. Providing stable plans for workload consolidation involves optimal usage of resources. Historical usage data of workloads give a pattern of workload behavior that can be used to predict the future...
    IPCOM000235870D | 2014-Mar-28
  8. 88.
    Majority of the trajectorie data generated at plenty these days, are collected at a low sampling rate and only provide partial observations on their actually traversed routes. Consequently, they are mired with uncertainty. A system is designed here, to infer uncertain trajectories from network-constrained partial...
    IPCOM000235869D | 2014-Mar-28
  9. 89.
    As an example let us consider a simple example. During the release time, it is very important for the stakeholders to monitor the defects very closely. For analyzing the defects, current defect tracking systems (including Rational) does not allow stakeholders to get the overall view of the defect without going...
    IPCOM000235868D | 2014-Mar-28
  10. 90.
    Disclosued is a method to generate declassified dump files using source code annotations. Kernel crash dumps typically contain sensitive data such as crypto keys, confidential data that customers would want to scrub before sending the dump to service personnel. Tools are available to compress and filter out...
    IPCOM000235867D | 2014-Mar-28