Synnex Patent Applications

METHODS, SYSTEMS AND COMPUTER READABLE MEDIA FOR PREDICTING OVERLOAD CONDITIONS USING LOAD INFORMATION

Granted: February 5, 2015
Application Number: 20150036504
Methods, systems, and computer readable media for predicting imminent Diameter overload conditions using load information are disclosed. One embodiment of a system for implementing the subject matter described herein includes a first Diameter node including at least one network interface for receiving Diameter messages and a Diameter overload prediction unit. The Diameter overload prediction unit may be configured to extract load information from the Diameter messages, detect a traffic…

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR MITIGATING TRAFFIC STORMS

Granted: February 5, 2015
Application Number: 20150036505
Methods, systems, and computer readable media for mitigating traffic storms are provided herein. In some aspects, a system for mitigating traffic storms includes a traffic storm detector configured to detect an indication of a traffic storm. The system may also include a software defined network (SDN) controller configured to generate and send SDN commands to a controllable network entity for mitigating the traffic storm. In some aspects, a method for mitigating traffic storms includes…

SYSTEM AND METHOD TO SUPPORT SMART OFFLOADING OF AN ONLINE CHARGING SYSTEM USING A SERVICE CAPABILITY INTERACTION MANAGER

Granted: February 5, 2015
Application Number: 20150036547
A system and method which overcome capacity and latency limitations of online charging systems. In an embodiment of the invention an online mediation system includes a SCIM, a Local-OCS and an SDR Processor. The SCIM includes smart offloading functionality which can determine, based on network events and account status, whether a session should be offloaded. Where a session should be offloaded, the SCIM initializes and mediates an offloaded charging session with the Local-OCS. In an…

SYSTEM AND METHOD FOR DETECTING THE OCCURENCES OF IRRELEVANT AND/OR LOW-SCORE STRINGS IN COMMUNITY BASED OR USER GENERATED CONTENT

Granted: February 5, 2015
Application Number: 20150039293
A system and method can detect and/or prevent profane/objectionable content in forums/communities with community based or user generated content. The system generates and provides a disallowed variants dictionary, which can be constructed based on a misuse table, wherein the disallowed variants dictionary contains a plurality of variants of one or more disallowed words in a community based or user generated content. Furthermore, the system checks each word in an incoming message against…

RECIPIENT BEHAVIOR TRACKING FOR CUSTOMER SERVICE RESPONSES

Granted: February 5, 2015
Application Number: 20150039521
Embodiments of the invention provide systems and methods for managing interactions with a customer in a customer relationship management system. Generally speaking, embodiments of the present invention provide the ability to track customer activity resulting from service related emails or other messages by capturing interaction with the message itself (views/clicks) and the subsequent interaction the user has with the website landing pages. This captured information can then be displayed…

BUILDING A HASH TABLE USING VECTORIZED INSTRUCTIONS

Granted: February 5, 2015
Application Number: 20150039626
Techniques for performing database operations using vectorized instructions are provided. In one technique, a hash table build phase involves executing vectorized instructions to determine whether a bucket in a hash table includes a free slot for inserting a key. A number of data elements from the bucket are loaded in a register. A vectorized instruction is executed against the register may be used to determine a position, within the register, that contains the “smallest” data…

PROBING A HASH TABLE USING VECTORIZED INSTRUCTIONS

Granted: February 5, 2015
Application Number: 20150039627
Techniques for performing database operations using vectorized instructions are provided. In one technique, a hash table probe phase involves executing vectorized instructions to determine where in a bucket a particular key is located. This determination may be preceded by one or more vectorized instructions that are used to determine whether the bucket contains the particular key.

PERFORMING AN AGGREGATION OPERATION USING VECTORIZED INSTRUCTIONS

Granted: February 5, 2015
Application Number: 20150039628
Techniques for performing database operations using vectorized instructions are provided. In one technique, an aggregation operation involves executing vectorized instructions to update a data value that corresponds to a particular key. The aggregation operation may be one of count, sum, minimum, maximum, or average.

SUB-LUN AUTO-TIERING

Granted: February 5, 2015
Application Number: 20150039826
Embodiments of the invention include systems and methods for auto-tiering multiple file systems across a common resource pool. Storage resources are allocated as a sub-LUN auto-tiering (SLAT) sub-pool. The sub-pool is managed as a single virtual address space (VAS) with a virtual block address (VBA) for each logical block address of each data block in the sub-pool, and a portion of those VBAs can be allocated to each of a number of file systems. Mappings are maintained between each…

DATA COMPACTION USING VECTORIZED INSTRUCTIONS

Granted: February 5, 2015
Application Number: 20150039852
Techniques for performing database operations using vectorized instructions are provided. In one technique, data compaction is performed using vectorized instructions to identify a shuffle mask based on matching bits and update an output array based on the shuffle mask and an input array. In a related technique, a hash table probe involves using vectorized instructions to determine whether each key in one or more hash buckets matches a particular input key.

ESTIMATING A COST OF PERFORMING DATABASE OPERATIONS USING VECTORIZED INSTRUCTIONS

Granted: February 5, 2015
Application Number: 20150039853
Techniques for performing database operations using vectorized instructions are provided. In one technique, it is determined whether to perform a database operation using one or more vectorized instructions or without using any vectorized instructions. This determination may comprise estimating a first cost of performing the database operation using one or more vectorized instructions and estimating a second cost of performing the database operation without using any vectorized…

SYSTEM ON A CHIP HARDWARE BLOCK FOR TRANSLATING COMMANDS FROM PROCESSOR TO READ BOOT CODE FROM OFF-CHIP NON-VOLATILE MEMORY DEVICE

Granted: February 5, 2015
Application Number: 20150039874
Translation of boot code read request commands from an on-board processor of a system on a chip (SoC) from a bus protocol (e.g., advanced high-performance bus (AHB) protocol) into a sequence of commands understandable by a serial interface of the SoC to read boot code from an off-board (e.g., flash or other non-volatile) memory device. The serial interface of the memory device may include a relatively low pin count (e.g., 5 pins) and boot code of the memory device may be modified after…

Systems and Methods for Retiring and Unretiring Cache Lines

Granted: February 5, 2015
Application Number: 20150039938
The systems and methods described herein may provide a flush-retire instruction for retiring “bad” cache locations (e.g., locations associated with persistent errors) to prevent their allocation for any further accesses, and a flush-unretire instruction for unretiring cache locations previously retired. These instructions may be implemented as hardware instructions of a processor. They may be executable by processes executing in a hyper-privileged state, without the need to quiesce…

PROCESSOR DESIGN VERIFICATION

Granted: February 5, 2015
Application Number: 20150039940
A system and method for verifying that a processor design having caches conforms to a specific memory model. The caches might not be maintained coherent in real time. Specifically, the system and method make use of a checker that conforms to the memory model, a time-stamping scheme, and a store buffering scheme to identify a bug(s) in the processor design that violates the memory model and/or loads an incorrect value in response to a load instruction.

METHOD AND SYSTEM FOR A HIGH AVAILABILITY FRAMEWORK

Granted: February 5, 2015
Application Number: 20150039946
A method for providing a high availability framework, comprises executing a first component of the high availability framework within a shared kernel based on a first operating system, executing a second component of the high availability framework within a first userland of the first operating system, and executing a third component of the high availability framework within a second userland of a second operating system, wherein the second operating system is an older version of the…

ENTRY OF VALUES INTO MULTIPLE FIELDS OF A FORM USING TOUCH SCREENS

Granted: February 5, 2015
Application Number: 20150039989
An aspect of the present disclosure facilitates users of touch screens to conveniently provide values for fields of a form. In an embodiment, a mapping is maintained to map symbols to corresponding profiles, with each profile being defined to specify a respective value for each of a corresponding set of fields. A form is sent for display on a touch screen, and a user is permitted to perform a touch action constituting a sequence of touch points (and representing input symbol) on the…

METHOD AND SYSTEM FOR CREATING A VIRTUAL FILE SYSTEM FROM A UNIFIED ARCHIVE

Granted: February 5, 2015
Application Number: 20150040123
A method for creating a virtual environment (VE) in a non-global zone (NGZ) from a unified archive (UA). An instruction is received to create a VE within a NGZ of a global zone (GZ) using an image file of the VE located in the UA. The contents of the UA are accessible via a virtual file system (VFS) having an index. A directory of the VFS corresponding to guest data of the UA is identified. The guest data is associated with the NGZ and includes the image file. A copy of the index…

APPLYING HOT FIXES FOR METADATA CUSTOMIZING USER INTERACTIONS BASED ON A SOFTWARE PROGRAM DEPLOYED IN MULTIPLE VERSIONS

Granted: January 29, 2015
Application Number: 20150033216
An aspect of the present disclosure provides for applying hot fixes to metadata customizing user interactions based on a software program. In an embodiment, a hot fix containing new files is received. Each new file contains a corresponding modified metadata. The user is presented for selection, differences between each new file and a corresponding existing file. Only the selected differences are then used to form patched files, which thereafter control the user interactions, for example,…

EXTERNAL PLATFORM EXTENSIONS IN A MULTI-TENANT ENVIRONMENT

Granted: January 29, 2015
Application Number: 20150033217
Methods and systems are described for allowing third party developers to add extensions to a cloud service provider's software as a service (SaaS) services by editing an ‘empty’ config file according to a schema provided by the cloud service provider to form a delta file and then merging the delta file with an internal, full version of the config file. The full config file is then used to initialize and instantiate objects upon a restart of the cloud provider's services.

AUTOMATIC PARALLELISM TUNING FOR APPLY PROCESSES

Granted: January 29, 2015
Application Number: 20150033232
Techniques are provided for automatic parallelism tuning. At least one batch of change records is assigned to one or more apply processes in a set of active apply processes. A first throughput value is periodically determined based on a number of processed change records in a first time interval. An increment adjustment is periodically performed, including adding an additional apply process, determining a second throughput value, and removing the additional apply process from the set of…