Aaftab Munshi - Los Gatos CA, US Colin Sharp - San Jose CA, US
Assignee:
Micron Techology, Inc. - Boise ID
International Classification:
G06T 1500
US Classification:
345584
Abstract:
A method and system for providing surface texture in a graphics image rendered by a graphics processing system. Color values of a pixel having a normal vector normal to a surface in which the pixel is located are calculated based on a perturbed normal vector. The perturbed normal vector is displaced from the normal vector by a displacement equal to the sum of a first vector tangent to the surface at the location of the pixel scaled by a first scale factor and a first displacement value, and a second vector tangent to the surface at the location of the pixel and scaled by a second scale factor and a second displacement value, the second vector perpendicular to the first vector. The displacement values are representative of partial derivatives of a function defining a texture applied to the surface and the scale factors are used to scale the magnitude of the resulting perturbed normal. The color value for the pixel being rendered will be based on the perturbed normal vector instead of the normal vector.
A TCP/IP offload network interface device (NID) receives packets from a plurality of clients and generates, from the socket address of each such packet, a hash value. Each hash value identifies one of a plurality of hash buckets maintained on the NID. In a file server, certain socket address bits of the packets are low entropy bits in that they tend to be the same, regardless of which client sent the packet. Others of the socket address bits are high entropy bits. The hash function employed is such that the hash values resulting from the changing values of the high entropy bits are substantially evenly distributed among the plurality of hash buckets. In a fast-path, the NID uses a first hash function to identify TCBs on the NID. In a slow-path, the NID generates a second hash using a second hash function and a host stack uses the second hash.
Colin C. Sharp - Santa Cruz CA, US Clive M. Philbrick - San Jose CA, US Daryl D. Starr - Milpitas CA, US Stephen E. J. Blightman - San Jose CA, US
Assignee:
Alacritech, Inc. - San Jose CA
International Classification:
G06F 15/173 G06F 15/16 G06F 12/00 H04L 15/00
US Classification:
709250, 709238, 711108, 370463
Abstract:
A TCP/IP offload network interface device (NID) is integrated with a processing device that executes a stack. The TCP/IP offload NID can either be a full TCP/IP offload device or a partial TCP/IP offload device. Common types of packets are processed by the NID in a fast-path such that the stack is offloaded of TCP and IP protocol processing tasks. A hash is made from the packet header and is pushed onto a queue. The hash is later popped off the queue and is used to identify an associated TCB number from a hash table. A mechanism caches hash buckets in SRAM and stores other hash buckets in DRAM. An “IN SRAM CAM” is used to determine whether the TCB associated with the identified TCB number is cached in SRAM or whether it must be moved from DRAM into the SRAM cache. A lock table and a “lock table CAM” mechanism is disclosed that facilitates multiple processors working on the protocol processing of a single packet.
Transferring Control Of Tcp Connections Between Hierarchy Of Processing Mechanisms
Peter K. Craft - San Francisco CA, US Joseph L. Gervais - Fremont CA, US Colin C. Sharp - Half Moon Bay CA, US
Assignee:
Alacritech, Inc. - San Jose CA
International Classification:
G01R 31/08
US Classification:
370235, 370469
Abstract:
In one embodiment, a system for communicating over a network is disclosed, the system comprising: a processor running a protocol processing stack to control a TCP connection; a first offload engine that receives control of the TCP connection from the stack to perform a first task corresponding to the TCP connection; and a second offload engine that receives control of the TCP connection from the first offload engine to perform a second task corresponding to the TCP connection. For example, the first offload engine can be protocol software such as an intermediate driver that can handle tasks such as teaming and/or reassembly of out-of-order data segments. As another example, the second offload engine can be a network interface card that provides hardware that accelerates data transfer.
Network Interface Device With 10 Gb/S Full-Duplex Transfer Rate
Daryl Starr - Milpitas CA, US Clive Philbrick - San Jose CA, US Colin Sharp - Cardiff CA, US
International Classification:
G06F 3/00
US Classification:
710039000
Abstract:
A 10 Gb/s network interface device offloads TCP/IP datapath functions. Frames without IP datagrams are processed as with a non-offload NIC. Receive frames are filtered, then transferred to preallocated receive buffers within host memory. Outbound frames are retrieved from host memory, then transmitted. Frames with IP datagrams without TCP segments are transmitted without any protocol offload, but received frames are parsed and checked for protocol errors, including checksum accumulation for UDP segments. Receive frames without datagram errors are passed to the host and error frames are dumped. Frames with Tcp segments are parsed and error-checked. Hardware checking is performed for ownership of the socket state. TCP/IP frames which fail the ownership test are passed to the host system with a parsing summary. TCP/IP frames which pass the ownership test are processed by a finite state machine implemented by the CPU. TCP/IP frames for non-owned sockets are supported with checksum accumulation/insertion.
Multi-Core Compute Cache Coherency With A Release Consistency Memory Ordering Model
Tzung Ren Tzeng - San Jose CA, US Andrew Evan Gruber - Arlington MA, US Alexei V. Bourd - San Diego CA, US Colin Christopher Sharp - San Diego CA, US Eric Demers - San Diego CA, US
Assignee:
QUALCOMM Incorporated - San Diego CA
International Classification:
G06F 12/08
US Classification:
711122, 711141, 711146, 711135
Abstract:
A method includes storing, with a first programmable processor, shared variable data to cache lines of a first cache of the first processor. The method further includes executing, with the first programmable processor, a store-with-release operation, executing, with a second programmable processor, a load-with-acquire operation, and loading, with the second programmable processor, the value of the shared variable data from a cache of the second programmable processor.
Conteneo Mountain View, CA Jan 2012 to Jan 2014 Lead Front-end Engineer / Interaction DesignerConteneo San Francisco, CA Jan 2012 to Feb 2012 Web DeveloperSASS / Compass
Dec 2009 to Dec 2010 Freelance ClientSASS / Compass Riverside, CA Apr 2010 to Jun 2010 Web Design and Development InternSisson Design Group Ontario, CA Jan 2008 to Mar 2008 Graphic DesignerVertical Computer Solutions Chino, CA May 2007 to Nov 2007 Graphic Designer/Computer Tech
Education:
The Art Institute of California San Francisco, CA Dec 2011 Bachelor of Science in Design and Interactive Media
Flickr
Youtube
Shreeve Films 2010 DVD NOW AVAILABLE!
www.ShreeveFilms... This DVD contains more than 20 Digitally Remaster...
Category:
Autos & Vehicles
Uploaded:
17 Jan, 2011
Duration:
1m 15s
The Durutti Column - Thin Ice (detail)
Originally relesed as part of A Factory Sample released Dec. 1978 (wit...
Category:
Music
Uploaded:
02 May, 2008
Duration:
3m 29s
Sharp Bright & Tactical WebMagazine, A look a...
Aaron from Sharp Bright & Tactical (sharptactics.bl... takes a look a...
Category:
People & Blogs
Uploaded:
03 Feb, 2011
Duration:
13m 50s
Colin Firth - A Sharp Dressed Man
Colin Firth, who won Best Actor last week at the Venice Film festival,...
Category:
Entertainment
Uploaded:
28 Sep, 2009
Duration:
4m 30s
Fun With Fire Works
Christian colin and natalie have some left over fire works a can of ax...
Category:
Comedy
Uploaded:
27 Jun, 2009
Duration:
6m 5s
a roof over our heads
indoor skating with Brandon Nemire, Steve Healy, Junya, Colin Sharp, E...