Microsoft Office Microsoft Word Project Management Microsoft Excel Transformer Engineering Customer Service Operations Management Continuous Improvement Team Building Team Leadership Project Engineering Project Planning Electrical Engineering Maintenance Management Preventive Maintenance Coaching Change Management Commissioning Electricity Powerpoint Reliability Mining Sap Plant Maintenance Process Improvement Power Systems Power Plants Switchgear Instrumentation Ms Project Troubleshooting Root Cause Analysis Power Distribution Inspection Supervisory Skills Refinery Electricians Manufacturing Process Engineering Factory Pumps Mineral Processing Plc Iso Epc Microsoft Project
Pradeep Kathail - Sunnyvale CA Carl Sutton - Palo Alto CA Andrew Valencia - Vashon WA
Assignee:
Cisco Technology, Inc. - San Jose CA
International Classification:
G06F 1200
US Classification:
707102, 707 10, 707 3, 707204
Abstract:
A method and system for verifying router configuration transactions carried out by a centralized information provider or database system. The centralized database provides verification registration and verification unregistration for various router subsystems associated with said database system. The centralized database and the subsystems registered for verification engage in a verification handler sequence to verify proposed router configuration transactions.
Subsystem Application Notification Method In A Centralized Router Database
A method and system for notifying router subsystems of configuration changes made to router configuration information which are maintained by a centralized information provider or database system. The centralized database provides registration and unregistration for notification of changes made to the router configuration information. The centralized database further provides router configuration change notifications to subsystems registered to receive such notifications.
A method of transmitting data from a source to a destination is described. A quality of service (QoS) tunnel is established between the source and the destination. Traffic from the source, and intended for the destination, will be sent via this tunnel. The traffic is manipulated by passing it through a performance enhancement proxy (PEP), in order to eliminate the “slow start” mechanism inherent to TCP traffic.
Method And Apparatus For Handling I/O Requests Utilizing Separate Programming Interfaces To Access Separate I/O Services
Holly N. Knight - La Honda CA Carl D. Sutton - Palo Alto CA Wayne N. Meretsky - Los Altos CA Alan B. Mimms - San Jose CA
Assignee:
Apple Computer, Inc. - Cupertino CA
International Classification:
G06F 940 G06F 1314
US Classification:
395892
Abstract:
A computer system handling multiple applications wherein groups of I/O services are accessible through separate application programming interfaces. Each application has multiple application programming interfaces by which to access different families of I/O services, such as I/O devices.
Run-Time Data Type Description Mechanism For Performance Information In An Extensible Computer System
A run-time data type extension mechanism describes the kinds of performance information collected within a registry located in a main memory of a computer. The data type extension mechanism comprises a base node of a multi-linked tree data structure having associated therewith a buffer portion for storing the collected performance information and a description portion for describing that information. Writer entities specify the contents of these latter portions, i. e. , the collected information and its description, at run time to provide an arrangement for dynamically extending the kinds of information collected at the registry.
Synchronization Mechanism For Providing Multiple Readers And Writers Access To Performance Information Of An Extensible Computer System
A synchronization arrangement provides writer and reader entities access to an information resource, such as a trace buffer, located in a registry of a computer. The arrangement comprises a counter upon which atomic increments are performed to allocate entries of the trace buffer for temporarily storing trace message fragments provided by the writer entities. The arrangement also comprises reassembly queues for temporarily storing the message fragments sequentially retrieved from the trace buffer by the reader entities.
Extensible Performance Statistics And Tracing Registration Architecture
Carl D. Sutton - Palo Alto CA Marianne Hsien-Ming Hsiung - Woodside CA
Assignee:
Apple Computer, Inc. - Cupertino CA
International Classification:
G06F 945
US Classification:
395704
Abstract:
A hierarchical registration architecture manages and organizes the collection of performance information, such as statistics and tracing, for an extensible operating system of a computer. The registration architecture, or registry, comprises a multi-linked tree data structure within a main memory for accessing the performance information. Writer entities register their intent to collect and store performance information in the registry by creating objects, via novel API calls, as nodes organized within the tree structure. Each object node of the registry is named according to a convention that identifies the type of performance data collected by that node. Each object node further represents a single data item having a single data type for collecting the performance and a reference to the actual storage location of its collected performance information. Information storage preferably occurs in globally-shared memory so that any software entity can access the information.
Method And Apparatus For Arbitrating Access To Selected Computer System Devices
Jonathan Sand - Boulder Creek CA Carl Sutton - Palo Alto CA Holly Knight - La Honda CA
Assignee:
Apple Computer, Inc. - Cupertino CA
International Classification:
G06F 1314
US Classification:
395293
Abstract:
A method and apparatus for arbitrating access to a selected device in a computer system comprises a routine for registering access rules for accessing the selected system device, a plurality of competing clients which may each request a connection to the selected device, and an arbitrator which uses the registered access rules to negotiate access to the requested connection on behalf of the competing clients.