Embodiments of the invention relate generally to computers having a single or multiple Central Processing Units (CPU) or processors. Embodiments of the invention relate more particularly to a method and device for booting such a system directly from a storage device.
The background description provided herein is for the purpose of generally presenting the context of the disclosure of the invention. Work of the presently named inventors, to the extent the work is described in this background section, as well as aspects of the description that may not otherwise qualify as prior art at the time of filing, are neither expressly nor impliedly admitted as prior art against this present disclosure of the invention.
An embedded system refers to an apparatus that is made up of a single or multiple controller chips interconnected to each other on a printed circuit board. A controller chip can have one or more central processing unit (CPU) that enables the controller chip to interpret and execute code. When an embedded system has more than one processor, the embedded system is already called a multiprocessor system. The term embedded system will be used to refer to a single CPU or a multiprocessor system in this disclosure.
A conventional embedded system contains a nonvolatile memory which is used to store firmware that is read and executed by a CPU to initialize the embedded system. The nonvolatile memory can be a read-only memory (ROM), one-time programmable memory (OTP), programmable read only memory (PROM), electrically erasable PROM (EEPROM), or a flash PROM (FPROM). The nonvolatile memory can be internal (on-chip) or external (off-chip) to the controller chip. The firmware stored in the nonvolatile memory can be a boot code loader, a basic input/output system (BIOS), an operating system (OS), or an application firmware. The boot code loader is a small code executed by a CPU to do minimum initialization of the system. After initialization, the boot code loader copies the BIOS or OS or application firmware from a mass storage device external to the embedded system to the random access memory (RAM) of the system. When the BIOS or OS or application firmware is already loaded in the RAM, the CPU reads and executes the BIOS or OS or application firmware to do exhaustive initialization and diagnostics before proceeding to normal system operation. A mass storage device can be a rotating disk drive or a solid-state drive (SSD) which is made up of FPROM devices. Though nonvolatile memory size can be reduced due to a small boot code loader, the boot code loader does not have the ability to self-check an integrity of the boot code loader.
In an invention described in US Patent Application Publication number US 2005/0120146 A1, which was published on 2 Jun. 2005, now U.S. Pat. No. 7,103,684, which was issued on 5 Sep. 2006, an embedded system in
Embodiments of the invention described in this disclosure make use of a minimum amount of non-volatile memory in order to boot an embedded system. Reduction in size of the nonvolatile memory brings about an advantage in terms of cost and complexity. An embodiment of the invention also allows the system to verify the integrity of data and code used in the boot process.
In some cases, the configuration registers of an embedded system may need to be initialized even before any of the CPU (processor) of the system is brought out of reset to begin execution of the system firmware. Embodiments of the invention presented in this disclosure will also address this issue of pre-initialization.
An embodiment of the invention provides a mechanism for booting up a system using a minimum amount of nonvolatile memory. This method also enables the embedded system to initialize all configuration registers even before any of the CPUs (processors) of the system is brought out of reset. The embedded system comprises multiple controller chips or a single controller chip. The embedded system can have a single or multiple central processing units (processors).
An embodiment of the invention comprises at least one Central Processing Unit (CPU) (or processor) which reads and executes firmware; a random access memory (RAM) which is used to temporarily store firmware; a memory controller which provides an interface to the RAM; a Reset Controller which maintains the reset states of all the devices of the embedded system; a Power-On Reset Sequencer which controls the overall boot process of the embedded system; a nonvolatile memory (e.g., ROM) and nonvolatile memory controller used to store data used by the Power-On Reset (POR) Sequencer in the boot process; at least one direct memory access (DMA) controller which initiates and tracks data transfers; a storage device controller which provides an interface to the storage device; a CPU bus which interconnects the devices of the system; and a storage device which is used to store system firmware; a debug interface used to pre-program the nonvolatile memory, and a storage device with data and code.
An embodiment of the invention describes the structure of the Power-On Reset (POR) Sequencer and the operation of the POR sequencer. The POR Sequencer makes use of a POR Sequencer Descriptor which is a preassembled descriptor that is stored in a nonvolatile memory of the system. The POR Sequencer descriptor contains register information and direct memory access (DMA) controller descriptors. The register information are read and used by the POR Sequencer to update the configuration registers of the system. The DMA descriptors are loaded by the POR Sequencer to the DMA controllers of the system. The POR Sequencer facilitates the boot process and takes care of verifying the integrity of loaded data and code in the RAM.
The POR Sequencer Descriptor in an embodiment of the invention is not limited to a single data structure. A linked-list of data structures is presented to increase the amount of register information and DMA descriptors available for processing by the POR Sequencer.
An embodiment of the invention also provides a method of copying a POR Sequencer Descriptor from nonvolatile memory to the RAM and verifying an integrity of the POR Sequencer Descriptor; a method of initializing the configuration registers by the POR Sequencer; a method of copying the system firmware from the storage device to the RAM; and a method of releasing the CPUs (processors) of the system from reset.
Initially, a nonvolatile memory of the system and storage device contain nothing. When the system is powered up, no boot process occurs but the debug interface and a CPU (processor) are released from reset. The system integrator loads a program to the RAM via the debug interface. The program contains code to burn the POR Sequencer Descriptor in nonvolatile memory and to save a copy of the System Firmware in the storage device.
The method of copying a POR Sequencer Descriptor from nonvolatile memory to RAM starts when the supply voltage of the system becomes stable after power-up. Then the Reset Controller, the POR Sequencer, the CPU Bus, the memory controllers, the DMA controllers, and the storage device controllers are released from reset. Then the POR Sequencer detects the presence of the POR Sequencer Descriptor in the nonvolatile memory. If the POR Sequencer Descriptor is not detected, then the debug interface and a CPU (processor) of the system are released from reset. If the POR Sequencer Descriptor is detected, then the POR Sequencer copies the POR Sequencer Descriptor from nonvolatile memory to RAM. This operation ends after the verification of the copied POR Sequencer Descriptor to the RAM is completed without error.
The method of initializing the configuration registers of the system starts when the first register information of the POR Sequencer Descriptor is read. Then the register indicated by the register information is updated with a new set of configuration. This sequence is repeated until the last register information of the POR Sequencer Descriptor is read and processed. Then the operation proceeds to the processing of the DMA descriptor. The type of the DMA descriptor is identified by the POR Sequencer. If the DMA descriptor points to another set of register information then the DMA transfer will update the register information and DMA descriptor spaces of the current POR Sequence Descriptor in the RAM. If the DMA descriptor points to a system firmware fragment, then this operation is ended and the sequence proceeds to the next method.
The next method is an operation where the system firmware stored in the external storage device is copied to the RAM of the embedded system. The system firmware can be a boot code loader, a BIOS, an operating system, or a plain application firmware. This operation starts when the POR Sequencer identifies that the DMA descriptor points to a system firmware fragment. The POR Sequencer loads the DMA or DMAs with the DMA Descriptors that will copy the system firmware fragments to the RAM. The POR Sequencer waits for completion signals from all DMA controllers that have been loaded with DMA descriptors before proceeding in the process flow. If the last DMA descriptor of the current POR Sequencer Descriptor points to another set of DMA Descriptors then another set of system firmware fragments are copied from the storage devices to the RAM. If the last DMA descriptor of the current POR Sequencer Descriptor points to the last system firmware fragment, then this operation ends. The storage device refers to a single storage device or a plurality of storage devices of the same type.
The last operation is the release of the CPUs (processors) of the embedded system from reset. When the system has a single CPU (processor), after the system firmware is loaded in the RAM, the POR Sequencer configures the reset controller to release the CPU from reset. Then the CPU starts reading and executing the system firmware. In a multi-CPU (multi-processor) system, a CPU (processor) is released from reset. Then, the CPU reads and executes the system firmware in the RAM. The system firmware will have instructions to sequence the release of the other CPUs from reset either one at a time or simultaneously.
In an embodiment of the invention, In an embodiment of the invention, an apparatus comprises an embedded system comprising: a processor configured to execute firmware; a random access memory (RAM) configured to store firmware and a multi-port memory controller configured to interface with the RAM; a power-on reset (POR) sequencer configured to control a boot process of the embedded system; a nonvolatile memory configured to store data used by the POR sequencer in the boot process and a nonvolatile memory controller configured to interface with the nonvolatile memory; a direct memory access (DMA) controller configured initiate and track data transfers; and a configuration and status register (CSR) controller configured to access modules in the embedded system.
In another embodiment of the invention, a method comprises: booting up an embedded system using a minimum amount of nonvolatile memory, including accessing modules in the embedded system.
In yet another embodiment of the invention, an article of manufacture, comprises: a non-transient computer-readable medium having stored thereon instructions that permit a method comprising: booting up an embedded system using a minimum amount of nonvolatile memory, including accessing modules in the embedded system.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention, as claimed.
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate one (several) embodiment(s) of the invention and together with the description, serve to explain the principles of the invention.
Non-limiting and non-exhaustive embodiments of the present invention are described with reference to the following figures, wherein like reference numerals refer to like parts throughout the various views unless otherwise specified.
It is to be noted, however, that the appended drawings illustrate only typical embodiments of this invention and are therefore not to be considered limiting of its scope, for the present invention may admit to other equally effective embodiments.
In the following detailed description, for purposes of explanation, numerous specific details are set forth to provide a thorough understanding of the various embodiments of the present invention. Those of ordinary skill in the art will realize that these various embodiments of the present invention are illustrative only and are not intended to be limiting in any way. Other embodiments of the present invention will readily suggest themselves to such skilled persons having the benefit of this disclosure.
In addition, for clarity purposes, not all of the routine features of the embodiments described herein are shown or described. One of ordinary skill in the art would readily appreciate that in the development of any such actual implementation, numerous implementation-specific decisions may be required to achieve specific design objectives. These design objectives will vary from one implementation to another and from one developer to another. Moreover, it will be appreciated that such a development effort might be complex and time-consuming, but would nevertheless be a routine engineering undertaking for those of ordinary skill in the art having the benefit of this disclosure. The various embodiments disclosed herein are not intended to limit the scope and spirit of the herein disclosure.
Exemplary embodiments for carrying out the principles of the present invention are described herein with reference to the drawings. However, the present invention is not limited to the specifically described and illustrated embodiments. A person skilled in the art will appreciate that many other embodiments are possible without deviating from the basic concept of the invention. Therefore, the principles of the present invention extend to any work that falls within the scope of the appended claims.
As used herein, the terms “a” and “an” herein do not denote a limitation of quantity, but rather denote the presence of at least one of the referenced items.
In the following description and in the claims, the terms “include” and “comprise” are used in an open-ended fashion, and thus should be interpreted to mean “include, but not limited to . . . ”. Also, the term “couple” (or “coupled”) is intended to mean either an indirect or direct electrical connection. Accordingly, if one device is coupled to another device, then that connection may be through a direct electrical connection, or through an indirect electrical connection via other devices and/or other connections.
Embodiments of the invention relate to a method and device for booting up a system from a storage device. Embodiments of the invention also relate to a method for enabling a system to initialize all configuration registers even before any of the CPUs (processors) of the system is brought out of reset.
The storage device controller 204 controls the storage device 209 or devices 209 connected to the storage device controller 204. A storage device 209 or a plurality of storage devices 209 are connected to the storage device controller 204 via an IO (input/output) bus 210 for the case of interface standards such as IDE/ATA, Serial ATA, SCSI/SAS, PCI/PCI-X, USB, Firewire, Bluetooth, Fibre Channel and PCI Express. For a solid-state drive, a flash bus is used to connect to the storage device controller 204 which also called a flash controller 204. The reset controller 206 handles the reset states of all the devices (as shown in
One DMA controller 203 or a plurality of DMA controllers 203 initiates and tracks data transfers. The storage device controller 204 provides an interface to the storage device 209. The storage device 209 is used to store system firmware 211 or a fragment of the system firmware 211. When the POR sequencer descriptor exceeds the space of the nonvolatile memory 215, the descriptor is divided into fragments 212, 213 and distributed across the nonvolatile memory 215 and storage devices 209.
The multi-port memory controller 205 interfaces the RAM 208 to the CPU bus 202 and to the POR sequencer 207. The POR sequencer 207 processes the POR sequencer descriptor which contains information to initialize configuration registers of the embedded system 200 and DMA descriptors used to fetch other POR sequencer descriptor fragments 213 and the system firmware 211. The POR sequencer 207 takes care of loading the system firmware 211 to the RAM 208 and verifying an integrity of the system firmware 211. After the system firmware 211 has been loaded in the RAM 208 and the configuration registers of the embedded system 200 are pre-initialized, the POR sequencer 207 sequences the release of the CPUs 201 from their reset states.
The nonvolatile memory 215 with the nonvolatile memory controller 214 is used to store the head of the POR sequencer descriptor 212 that is used by the POR sequencer 207 in the boot process. Initially, the nonvolatile memory 215 of the embedded system 200 and storage devices 209 that are attached to the embedded system 200 are empty. When the system 200 is powered up, the boot process exits to emulation mode since there are no POR sequencer descriptor to process and no system firmware 211 to load and execute in memory. The system integrator which writes program for the embedded system 200 loads a firmware to the RAM 208 of the system 200 via the debug interface 216. The firmware loaded in the RAM 208 has a routine that writes the POR sequencer descriptor and system firmware 211 to the nonvolatile memory 215 and storage devices 209 attached to the system 200. After the POR sequencer descriptor and system firmware 211 has been written to the nonvolatile memory 215 and storage devices 209, the next time the system 200 is powered up, the system 200 does not exit to emulation mode and instead the system 200 continues with the boot process until all CPUs 201 of the system 200 are released from their reset states. The firmware stored in the nonvolatile memory 215 can be a boot code loader, a BIOS, an OS, and/or an application firmware.
The operations of the embedded system 200A in
1. Power is supplied to a chip that includes the embedded system 200A.
2. Clock and Reset Controller 206 or CrCORE (which is implemented by the system 200A) waits for a crystal oscillator in the system 200A to stabilize.
3. CrCORE releases the nonvolatile memory controller 214, CPU bus 202, CSR bus 217, CSR controller 218, and multi-port memory controller 205 from the reset state.
4. POR sequencer 207 waits for above modules (nonvolatile memory controller 214, CPU bus 202, CSR bus 217, CSR controller 218, and multi-port memory controller 205) to be ready.
5. POR sequencer 207 commands the nonvolatile memory controller 214 through (via) sideband signal 220 to start searching for a bootstrap code loader stored in the nonvolatile memory 215.
6. Nonvolatile memory controller 214 searches for the latest instance/copy of the strap configuration and bootstrap code loader, wherein the latest instance or latest copy of the strap configuration and bootstrap code loader are stored in the nonvolatile memory 215.
7. Nonvolatile memory controller 214 maps the system address 0x0000 to this latest copy of the strap configuration and bootstrap loader.
8. Nonvolatile memory controller 214 informs the POR sequencer 207, through sideband signal 220 that the bootstrap code loader is ready.
9. This sideband signal 220 causes the clock and reset controller 206 to release the master CPU 201 (e.g., CPU (0) 201) from reset (i.e., reset state).
10. Master CPU (0) 201 reads the bootstrap code from nonvolatile memory 215.
11. Reading of bootstrap code by the master CPU (0) 201 also causes the nonvolatile memory controller 214 to check for data errors in the bootstrap code.
12. As part of the bootstrap code, CPU (0) 201 configures the clock sources 221 in the embedded system 200A via CSR access across the CSR bus 217.
13. CPU (0) 201 waits for the ready status of the clock sources 221.
14. CPU (0) 201 then releases from reset other modules (or elements) that are necessary for system firmware transfer, wherein these other modules or elements comprise the storage device controller 204, system bus 219, and multiport memory controller 205.
15. CPU (0) 201 instructs the DMA controller 203 to move firmware from the storage device 209 to the RAM 209 via the system bus 219. The DMA controller 203 can be one or more in number and can vary in number as noted, for example, the dot symbols 252. For example, there can be a single DMA controller (0) 203 in the embedded system 200A or there can be an m+1 number of DMA controllers 203 in the embedded system 200A, wherein m is an integer.
16. CPU (0) 201 releases remaining modules from reset state.
17. CPU (0) 201 remaps the system address 0x0000 from the nonvolatile memory 215 to the RAM 208.
18. The system firmware then starts running in the embedded system 200A.
Additional definitions in the embedded system 200A also includes the following.
The Clock and reset controller 206 handles the reset states of all the devices in the embedded system 200A and controls the clock sources used in the chip that includes the embedded system 200A.
The CSR bus 217 comprises a bus primarily used by the CPU(s) 201 to access the configuration and status registers of modules in the chip that includes the embedded system 200A.
The CSR (configuration and status register) controller 218 provides an interface for the CPU(s) 201 to access the configuration and status registers of modules in the chip that includes the embedded system 200A. These modules comprises the nonvolatile memory controller 214, CPU bus 202, CSR bus 217, storage device controller, and multi-port memory controller 205
The System bus 219 comprises a bus connecting the storage device controller 204 to the multiport memory controller 205.
The Sideband signals 220 comprises exclusive signals between the POR sequencer 207 and the nonvolatile memory controller 214.
The clock sources 221 produces clocking signals, usually, for example, phase-locked loops (PLL) signals. The clock sources 221 can be an m+1 number of clock sources 221 in the embedded system 200A as noted by, for example, the dot symbols 254, or the embedded system 200A comprises a single clock source (0) 221.
Other elements in the embedded system 200A such as, for example, the I/O bus 210, system firmware fragments 211, debug interface 216, and POR sequence descriptor fragments 212 and 213 were similarly described above with reference to the embedded system 200 in
The POR sequencer 300 transfers the POR sequencer descriptor from the nonvolatile memory or from the storage device to the RAM 311 before the POR sequencer descriptor is processed. When the POR sequencer descriptor is already loaded in the RAM 311, the POR sequencer state machine reads a part of the descriptor from RAM to parse and interpret. Depending on the content of the part of the POR sequencer descriptor, the POR sequencer state machine decides whether to get another part of the descriptor from RAM, transfer data from RAM to a device mapped on the CPU bus 304, or to write data that the POR sequencer state machine generated to the RAM or to a device mapped on the CPU bus 304. Through the use of POR sequencer state machine 301, memory controller port interface 302, and bus master interface 303 the POR sequencer 300 is able to do the following tasks: transfer of DMA controller descriptor to the DMA controller's configuration register space, activation of the DMA controller, initialization of configuration registers, and copy of data from storage device or nonvolatile memory to the RAM.
The multi-port memory controller 308 has several port interfaces. Port 1 interface 307 provides devices on the CPU bus 304 access to the RAM 311. Port 2 interface provides the POR sequencer 300 access to the RAM 311. The data path multiplexers 309 route the read and write requests from the POR sequencer 300 and the CPU bus 304 to the RAM 311. The controller 310 manages how the data path multiplexers 309 behave in response to the read and write requests received from the POR sequencer 300 and CPU bus 304.
When the POR sequencer descriptor does not fit in the nonvolatile memory of the system, the descriptor is divided into fragments and distributed across the nonvolatile memory and storage devices attached to the system.
DMA controller descriptors 406 are not only used to fetch POR sequencer descriptor fragments 501, 502. They are also used to transfer system firmware 211 from the storage device to the RAM 208. In
The POR sequencer 207 then reads the DMA descriptor control information 404 from RAM 208 in block 804. If the DMA descriptor 406 points to the last system firmware fragment, the POR sequencer 207 waits for all busy DMA controllers to complete their transfers in block 809. The POR sequencer 207 then verifies the integrity of the copied system firmware in block 811. If the system firmware is error free then the sequence completes. If an error is found, an error handling routine will be executed in block 813. In block 805, if the DMA controller descriptor 406 does not point to the last system firmware fragment, which means there are succeeding system firmware fragments, then the POR sequencer 207 proceeds to block 806 to check if the said DMA controller descriptor 406 was the last descriptor of the current POR sequencer descriptor. If it is the last DMA controller descriptor 406 of the current frame, then POR sequencer 207 waits for all the busy DMA controllers to complete their transfers in block 810. The process is repeated starting from block 801 for the next POR sequencer descriptor which will be used to fetch the next system firmware fragment 211.
In block 806, if the DMA controller descriptor 406 of the current POR sequencer descriptor is not the last one, then the availability of a DMA controller 203 is determined in block 807. If there is no available DMA controller, meaning, all the DMA controllers 203 are busy, then the POR sequencer 207 waits for a DMA controller 203 to complete the transfer performed by DMA controller 203 in block 808 before proceeding to process the next DMA controller descriptor 406. When a DMA controller becomes available the process goes back to block 801.
Foregoing described embodiments of the invention are provided as illustrations and descriptions. They are not intended to limit the invention to precise form described. In particular, it is contemplated that functional implementation of invention described herein may be implemented equivalently in hardware, software, firmware, and/or other available functional components or building blocks, and that networks may be wired, wireless, or a combination of wired and wireless.
It is also within the scope of the present invention to implement a program or code that can be stored in a non-transient machine-readable (or non-transient computer-readable medium) having stored thereon instructions that permit a method (or that permit a computer) to perform any of the inventive techniques described above, or a program or code that can be stored in an article of manufacture that includes a non-transient computer readable medium on which computer-readable instructions for carrying out embodiments of the inventive techniques are stored. Other variations and modifications of the above-described embodiments and methods are possible in light of the teaching discussed herein.
The above description of illustrated embodiments of the invention, including what is described in the Abstract, is not intended to be exhaustive or to limit the invention to the precise forms disclosed. While specific embodiments of, and examples for, the invention are described herein for illustrative purposes, various equivalent modifications are possible within the scope of the invention, as those skilled in the relevant art will recognize.
These modifications can be made to the invention in light of the above detailed description. The terms used in the following claims should not be construed to limit the invention to the specific embodiments disclosed in the specification and the claims. Rather, the scope of the invention is to be determined entirely by the following claims, which are to be construed in accordance with established doctrines of claim interpretation.
This application claims the benefit of and priority to U.S. Provisional Application 61/980,564, filed 16 Apr. 2014 and is a Continuation-in-Part (CIP) of U.S. patent application Ser. No. 14/217,365 which claims benefit of and priority to U.S. Provisional Application 61/801,952, filed 15 Mar. 2013. The above Applications are hereby fully incorporated herein by reference. This application is a continuation in part of U.S. application Ser. No. 14/217,365 which claims the benefit of and priority to U.S. Provisional Application 61/801,952, filed 15 Mar. 2013. This U.S. Provisional Application 61/801,952 and U.S. application Ser. No. 14/217,365 are hereby fully incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
4402040 | Evett | Aug 1983 | A |
4403283 | Myntti et al. | Sep 1983 | A |
4752871 | Sparks | Jun 1988 | A |
4967344 | Scavezze et al. | Oct 1990 | A |
5111058 | Martin | May 1992 | A |
5222046 | Kreifels et al. | Jun 1993 | A |
5297148 | Harari et al. | Mar 1994 | A |
5339404 | Vandling, III | Aug 1994 | A |
5341339 | Wells | Aug 1994 | A |
5371709 | Fisher et al. | Dec 1994 | A |
5379401 | Robinson et al. | Jan 1995 | A |
5388083 | Assar et al. | Feb 1995 | A |
5396468 | Harari et al. | Mar 1995 | A |
5406529 | Asano | Apr 1995 | A |
5432748 | Hsu et al. | Jul 1995 | A |
5448577 | Wells et al. | Sep 1995 | A |
5459850 | Clay et al. | Oct 1995 | A |
5479638 | Assar et al. | Dec 1995 | A |
5485595 | Assar et al. | Jan 1996 | A |
5488711 | Hewitt et al. | Jan 1996 | A |
5500826 | Hsu et al. | Mar 1996 | A |
5509134 | Fandrich et al. | Apr 1996 | A |
5513138 | Manabe et al. | Apr 1996 | A |
5524231 | Brown | Jun 1996 | A |
5530828 | Kaki et al. | Jun 1996 | A |
5535328 | Harari et al. | Jul 1996 | A |
5535356 | Kim et al. | Jul 1996 | A |
5542042 | Manson | Jul 1996 | A |
5542082 | Solhjell | Jul 1996 | A |
5548741 | Watanabe | Aug 1996 | A |
5559956 | Sukegawa | Sep 1996 | A |
5568423 | Jou et al. | Oct 1996 | A |
5568439 | Harari | Oct 1996 | A |
5572466 | Sukegawa | Nov 1996 | A |
5594883 | Pricer | Jan 1997 | A |
5602987 | Harari et al. | Feb 1997 | A |
5603001 | Sukegawa et al. | Feb 1997 | A |
5606529 | Honma et al. | Feb 1997 | A |
5606532 | Lambrache et al. | Feb 1997 | A |
5619470 | Fukumoto | Apr 1997 | A |
5627783 | Miyauchi | May 1997 | A |
5640349 | Kakinuma et al. | Jun 1997 | A |
5644784 | Peek | Jul 1997 | A |
5682509 | Kabenjian | Oct 1997 | A |
5737742 | Achiwa et al. | Apr 1998 | A |
5765023 | Leger et al. | Jun 1998 | A |
5787466 | Berliner | Jul 1998 | A |
5796182 | Martin | Aug 1998 | A |
5799200 | Brant et al. | Aug 1998 | A |
5802554 | Caceres et al. | Sep 1998 | A |
5818029 | Thomson | Oct 1998 | A |
5819307 | Iwamoto et al. | Oct 1998 | A |
5822251 | Bruce et al. | Oct 1998 | A |
5864653 | Tavallaei et al. | Jan 1999 | A |
5870627 | O'Toole et al. | Feb 1999 | A |
5875351 | Riley | Feb 1999 | A |
5881264 | Kurosawa | Mar 1999 | A |
5918033 | Heeb et al. | Jun 1999 | A |
5933849 | Srbljic et al. | Aug 1999 | A |
5943421 | Grabon | Aug 1999 | A |
5956743 | Bruce et al. | Sep 1999 | A |
5978866 | Nain | Nov 1999 | A |
5987621 | Duso | Nov 1999 | A |
6000006 | Bruce et al. | Dec 1999 | A |
6014709 | Gulick et al. | Jan 2000 | A |
6098119 | Surugucchi et al. | Aug 2000 | A |
6128303 | Bergantino | Oct 2000 | A |
6138200 | Ogilvie | Oct 2000 | A |
6138247 | McKay et al. | Oct 2000 | A |
6151641 | Herbert | Nov 2000 | A |
6215875 | Nohda | Apr 2001 | B1 |
6230269 | Spies et al. | May 2001 | B1 |
6298071 | Taylor et al. | Oct 2001 | B1 |
6341342 | Thompson et al. | Jan 2002 | B1 |
6363441 | Beniz et al. | Mar 2002 | B1 |
6363444 | Platko et al. | Mar 2002 | B1 |
6397267 | Chong, Jr. | May 2002 | B1 |
6404772 | Beach et al. | Jun 2002 | B1 |
6452602 | Morein | Sep 2002 | B1 |
6496939 | Portman et al. | Dec 2002 | B2 |
6526506 | Lewis | Feb 2003 | B1 |
6529416 | Bruce et al. | Mar 2003 | B2 |
6557095 | Henstrom | Apr 2003 | B1 |
6574142 | Gelke | Jun 2003 | B2 |
6601126 | Zaidi et al. | Jul 2003 | B1 |
6678754 | Soulier | Jan 2004 | B1 |
6728840 | Shatil et al. | Apr 2004 | B1 |
6744635 | Portman et al. | Jun 2004 | B2 |
6785746 | Mahmoud et al. | Aug 2004 | B1 |
6757845 | Bruce | Dec 2004 | B2 |
6857076 | Klein | Feb 2005 | B1 |
6901499 | Aasheim et al. | May 2005 | B2 |
6922391 | King et al. | Jul 2005 | B1 |
6970446 | Krischar et al. | Nov 2005 | B2 |
6970890 | Bruce et al. | Nov 2005 | B1 |
6973546 | Johnson | Dec 2005 | B2 |
6980795 | Hermann et al. | Dec 2005 | B1 |
7103684 | Chen et al. | Sep 2006 | B2 |
7174438 | Homma et al. | Feb 2007 | B2 |
7194766 | Noehring et al. | Mar 2007 | B2 |
7283629 | Kaler et al. | Oct 2007 | B2 |
7305548 | Pierce et al. | Dec 2007 | B2 |
7372962 | Fujimoto et al. | Jun 2008 | B2 |
7386662 | Kekre et al. | Jun 2008 | B1 |
7412631 | Uddenberg et al. | Aug 2008 | B2 |
7415549 | Vemula et al. | Aug 2008 | B2 |
7424553 | Borrelli et al. | Sep 2008 | B1 |
7430650 | Ross | Sep 2008 | B1 |
7474926 | Carr et al. | Jan 2009 | B1 |
7478186 | Onufryk et al. | Jan 2009 | B1 |
7490177 | Kao | Feb 2009 | B2 |
7496699 | Pope et al. | Feb 2009 | B2 |
7500063 | Zohar et al. | Mar 2009 | B2 |
7506098 | Arcedera et al. | Mar 2009 | B2 |
7613876 | Bruce et al. | Nov 2009 | B2 |
7620748 | Bruce et al. | Nov 2009 | B1 |
7620749 | Biran et al. | Nov 2009 | B2 |
7636801 | Kekre et al. | Dec 2009 | B1 |
7660941 | Lee et al. | Feb 2010 | B2 |
7668925 | Liao et al. | Feb 2010 | B1 |
7676640 | Chow | Mar 2010 | B2 |
7681188 | Tirumalai et al. | Mar 2010 | B1 |
7716389 | Bruce et al. | May 2010 | B1 |
7719287 | Marks et al. | May 2010 | B2 |
7729370 | Orcine et al. | Jun 2010 | B1 |
7743202 | Tsai et al. | Jun 2010 | B2 |
7765359 | Kang et al. | Jul 2010 | B2 |
7877639 | Hoang | Jan 2011 | B2 |
7913073 | Choi | Mar 2011 | B2 |
7921237 | Holland et al. | Apr 2011 | B1 |
7934052 | Prins et al. | Apr 2011 | B2 |
7958295 | Liao et al. | Jun 2011 | B1 |
7979614 | Yang | Jul 2011 | B1 |
7996581 | Bond et al. | Aug 2011 | B2 |
8010740 | Arcedera et al. | Oct 2011 | B2 |
8032700 | Bruce et al. | Oct 2011 | B2 |
8156279 | Tanaka et al. | Apr 2012 | B2 |
8156320 | Borras | Apr 2012 | B2 |
8161223 | Chamseddine et al. | Apr 2012 | B1 |
8165301 | Bruce et al. | Apr 2012 | B1 |
8200879 | Falik et al. | Jun 2012 | B1 |
8219719 | Parry et al. | Jul 2012 | B1 |
8225022 | Caulkins | Jul 2012 | B2 |
8341300 | Karamcheti | Dec 2012 | B1 |
8341311 | Szewerenko et al. | Dec 2012 | B1 |
8447908 | Bruce et al. | May 2013 | B2 |
8489914 | Cagno | Jul 2013 | B2 |
8560804 | Bruce et al. | Oct 2013 | B2 |
8583868 | Belluomini et al. | Nov 2013 | B2 |
8677042 | Gupta et al. | Mar 2014 | B2 |
8713417 | Jo | Apr 2014 | B2 |
8762609 | Lam et al. | Jun 2014 | B1 |
8788725 | Bruce et al. | Jul 2014 | B2 |
8832371 | Uehara et al. | Sep 2014 | B2 |
8856392 | Myrah et al. | Oct 2014 | B2 |
8959307 | Bruce et al. | Feb 2015 | B1 |
9043669 | Bruce et al. | May 2015 | B1 |
9099187 | Bruce et al. | Aug 2015 | B2 |
9135190 | Bruce et al. | Sep 2015 | B1 |
9158661 | Blaine et al. | Oct 2015 | B2 |
9201790 | Keeler | Dec 2015 | B2 |
9400617 | Ponce et al. | Jul 2016 | B2 |
20020011607 | Gelke et al. | Jan 2002 | A1 |
20020013880 | Gappisch et al. | Jan 2002 | A1 |
20020044486 | Chan et al. | Apr 2002 | A1 |
20020073324 | Hsu et al. | Jun 2002 | A1 |
20020083262 | Fukuzumi | Jun 2002 | A1 |
20020083264 | Coulson | Jun 2002 | A1 |
20020141244 | Bruce et al. | Oct 2002 | A1 |
20030023817 | Rowlands et al. | Jan 2003 | A1 |
20030065836 | Pecone | Apr 2003 | A1 |
20030097248 | Terashima et al. | May 2003 | A1 |
20030120864 | Lee et al. | Jun 2003 | A1 |
20030126451 | Gorobets | Jul 2003 | A1 |
20030131201 | Khare et al. | Jul 2003 | A1 |
20030161355 | Falcomato et al. | Aug 2003 | A1 |
20030163624 | Matsui et al. | Aug 2003 | A1 |
20030163647 | Cameron et al. | Aug 2003 | A1 |
20030163649 | Kapur et al. | Aug 2003 | A1 |
20030182576 | Morlang et al. | Sep 2003 | A1 |
20030188100 | Solomon et al. | Oct 2003 | A1 |
20030204675 | Dover et al. | Oct 2003 | A1 |
20030217202 | Zilberman et al. | Nov 2003 | A1 |
20030223585 | Tardo et al. | Dec 2003 | A1 |
20040073721 | Goff et al. | Apr 2004 | A1 |
20040078632 | Infante et al. | Apr 2004 | A1 |
20040128553 | Buer et al. | Jul 2004 | A1 |
20040215868 | Solomon et al. | Oct 2004 | A1 |
20050050245 | Miller et al. | Mar 2005 | A1 |
20050055481 | Chou et al. | Mar 2005 | A1 |
20050078016 | Neff | Apr 2005 | A1 |
20050097368 | Peinado et al. | May 2005 | A1 |
20050120146 | Chen et al. | Jun 2005 | A1 |
20050210149 | Kimball | Sep 2005 | A1 |
20050210159 | Voorhees et al. | Sep 2005 | A1 |
20050226407 | Kasuya et al. | Oct 2005 | A1 |
20050240707 | Hayashi et al. | Oct 2005 | A1 |
20050243610 | Guha et al. | Nov 2005 | A1 |
20050289361 | Sutardja | Dec 2005 | A1 |
20060004957 | Hand, III et al. | Jan 2006 | A1 |
20060026329 | Yu | Feb 2006 | A1 |
20060031450 | Unrau et al. | Feb 2006 | A1 |
20060039406 | Day et al. | Feb 2006 | A1 |
20060064520 | Anand et al. | Mar 2006 | A1 |
20060095709 | Achiwa | May 2006 | A1 |
20060112251 | Karr et al. | May 2006 | A1 |
20060129876 | Uemura | Jun 2006 | A1 |
20060173970 | Pope et al. | Aug 2006 | A1 |
20070019573 | Nishimura | Jan 2007 | A1 |
20070028040 | Sinclair | Feb 2007 | A1 |
20070058478 | Murayama | Mar 2007 | A1 |
20070073922 | Go et al. | Mar 2007 | A1 |
20070079017 | Brink et al. | Apr 2007 | A1 |
20070083680 | King et al. | Apr 2007 | A1 |
20070088864 | Foster | Apr 2007 | A1 |
20070093124 | Varney et al. | Apr 2007 | A1 |
20070094450 | VanderWiel | Apr 2007 | A1 |
20070096785 | Maeda | May 2007 | A1 |
20070121499 | Pal et al. | May 2007 | A1 |
20070130439 | Andersson et al. | Jun 2007 | A1 |
20070159885 | Gorobets | Jul 2007 | A1 |
20070168754 | Zohar et al. | Jul 2007 | A1 |
20070174493 | Irish et al. | Jul 2007 | A1 |
20070180223 | Tanaka | Aug 2007 | A1 |
20070195957 | Arulambalam et al. | Aug 2007 | A1 |
20070288686 | Arcedera et al. | Dec 2007 | A1 |
20070288692 | Bruce et al. | Dec 2007 | A1 |
20070294572 | Kalwitz et al. | Dec 2007 | A1 |
20080005481 | Walker | Jan 2008 | A1 |
20080052456 | Ash et al. | Feb 2008 | A1 |
20080052585 | LaBerge et al. | Feb 2008 | A1 |
20080072031 | Choi | Mar 2008 | A1 |
20080104264 | Duerk et al. | May 2008 | A1 |
20080140724 | Flynn et al. | Jun 2008 | A1 |
20080147963 | Tsai et al. | Jun 2008 | A1 |
20080189466 | Hemmi | Aug 2008 | A1 |
20080195800 | Lee et al. | Aug 2008 | A1 |
20080218230 | Shim | Sep 2008 | A1 |
20080228959 | Wang | Sep 2008 | A1 |
20080276037 | Chang et al. | Nov 2008 | A1 |
20080301256 | McWilliams et al. | Dec 2008 | A1 |
20090028229 | Cagno et al. | Jan 2009 | A1 |
20090037565 | Andresen et al. | Feb 2009 | A1 |
20090055573 | Ito | Feb 2009 | A1 |
20090077306 | Arcedera et al. | Mar 2009 | A1 |
20090083022 | Bin Mohd Nordin | Mar 2009 | A1 |
20090094411 | Que | Apr 2009 | A1 |
20090132620 | Arakawa | May 2009 | A1 |
20090132752 | Poo et al. | May 2009 | A1 |
20090150643 | Jones et al. | Jun 2009 | A1 |
20090158085 | Kern et al. | Jun 2009 | A1 |
20090172250 | Allen et al. | Jul 2009 | A1 |
20090172261 | Prins et al. | Jul 2009 | A1 |
20090240873 | Yu et al. | Sep 2009 | A1 |
20100058045 | Borras | Mar 2010 | A1 |
20100095053 | Bruce et al. | Apr 2010 | A1 |
20100125695 | Wu et al. | May 2010 | A1 |
20100250806 | Devilla et al. | Sep 2010 | A1 |
20100268904 | Sheffield et al. | Oct 2010 | A1 |
20100299538 | Miller | Nov 2010 | A1 |
20100318706 | Kobayashi | Dec 2010 | A1 |
20110022778 | Schibilla et al. | Jan 2011 | A1 |
20110022783 | Moshayedi | Jan 2011 | A1 |
20110022801 | Flynn | Jan 2011 | A1 |
20110087833 | Jones | Apr 2011 | A1 |
20110093648 | Belluomini et al. | Apr 2011 | A1 |
20110113186 | Bruce et al. | May 2011 | A1 |
20110133826 | Jones et al. | Jun 2011 | A1 |
20110145479 | Talagala et al. | Jun 2011 | A1 |
20110161568 | Bruce et al. | Jun 2011 | A1 |
20110167204 | Estakhri et al. | Jul 2011 | A1 |
20110173383 | Gorobets | Jul 2011 | A1 |
20110197011 | Suzuki et al. | Aug 2011 | A1 |
20110202709 | Rychlik | Aug 2011 | A1 |
20110208901 | Kim et al. | Aug 2011 | A1 |
20110208914 | Winokur et al. | Aug 2011 | A1 |
20110219150 | Piccirillo et al. | Sep 2011 | A1 |
20110258405 | Asaki et al. | Oct 2011 | A1 |
20110264884 | Kim | Oct 2011 | A1 |
20110264949 | Ikeuchi et al. | Oct 2011 | A1 |
20110270979 | Schlansker et al. | Nov 2011 | A1 |
20120005405 | Wu et al. | Jan 2012 | A1 |
20120005410 | Ikeuchi | Jan 2012 | A1 |
20120017037 | Riddle et al. | Jan 2012 | A1 |
20120079352 | Frost et al. | Mar 2012 | A1 |
20120102263 | Aswadhati | Apr 2012 | A1 |
20120102268 | Smith et al. | Apr 2012 | A1 |
20120137050 | Wang et al. | May 2012 | A1 |
20120159029 | Krishnan et al. | Jun 2012 | A1 |
20120161568 | Umemoto et al. | Jun 2012 | A1 |
20120173795 | Schuette et al. | Jul 2012 | A1 |
20120215973 | Cagno et al. | Aug 2012 | A1 |
20120249302 | Szu | Oct 2012 | A1 |
20120260102 | Zaks et al. | Oct 2012 | A1 |
20120271967 | Hirschman | Oct 2012 | A1 |
20120303924 | Ross | Nov 2012 | A1 |
20120311197 | Larson et al. | Dec 2012 | A1 |
20120324277 | Weston-Lewis et al. | Dec 2012 | A1 |
20130010058 | Pomeroy | Jan 2013 | A1 |
20130019053 | Somanache et al. | Jan 2013 | A1 |
20130094312 | Jang et al. | Apr 2013 | A1 |
20130099838 | Kim et al. | Apr 2013 | A1 |
20130111135 | Bell, Jr. et al. | May 2013 | A1 |
20130206837 | Szu | Aug 2013 | A1 |
20130208546 | Kim et al. | Aug 2013 | A1 |
20130212337 | Maruyama | Aug 2013 | A1 |
20130212349 | Maruyama | Aug 2013 | A1 |
20130212425 | Blaine et al. | Aug 2013 | A1 |
20130246694 | Bruce et al. | Sep 2013 | A1 |
20130254435 | Shapiro et al. | Sep 2013 | A1 |
20130262750 | Yamasaki et al. | Oct 2013 | A1 |
20130282933 | Jokinen et al. | Oct 2013 | A1 |
20130304775 | Davis et al. | Nov 2013 | A1 |
20130339578 | Ohya et al. | Dec 2013 | A1 |
20130339582 | Olbrich et al. | Dec 2013 | A1 |
20130346672 | Sengupta et al. | Dec 2013 | A1 |
20140068177 | Raghavan | Mar 2014 | A1 |
20140095803 | Kim et al. | Apr 2014 | A1 |
20140104949 | Bruce et al. | Apr 2014 | A1 |
20140108869 | Brewerton et al. | Apr 2014 | A1 |
20140189203 | Suzuki et al. | Jul 2014 | A1 |
20140258788 | Maruyama | Sep 2014 | A1 |
20140285211 | Raffinan | Sep 2014 | A1 |
20140331034 | Ponce et al. | Nov 2014 | A1 |
20150006766 | Ponce et al. | Jan 2015 | A1 |
20150012690 | Bruce et al. | Jan 2015 | A1 |
20150032937 | Salessi | Jan 2015 | A1 |
20150032938 | Salessi | Jan 2015 | A1 |
20150067243 | Salessi et al. | Mar 2015 | A1 |
20150149697 | Salessi et al. | May 2015 | A1 |
20150149706 | Salessi et al. | May 2015 | A1 |
20150153962 | Salessi et al. | Jun 2015 | A1 |
20150169021 | Salessi et al. | Jun 2015 | A1 |
20150261456 | Alcantara et al. | Sep 2015 | A1 |
20150261475 | Alcantara et al. | Sep 2015 | A1 |
20150261797 | Alcantara et al. | Sep 2015 | A1 |
20150370670 | Lu | Dec 2015 | A1 |
20150371684 | Mataya | Dec 2015 | A1 |
20150378932 | Souri et al. | Dec 2015 | A1 |
20160026402 | Alcantara et al. | Jan 2016 | A1 |
20160027521 | Lu | Jan 2016 | A1 |
20160041596 | Alcantara et al. | Feb 2016 | A1 |
Number | Date | Country |
---|---|---|
2005142859 | Jun 2005 | JP |
2005-309847 | Nov 2005 | JP |
489308 | Jun 2002 | TW |
200428219 | Dec 2004 | TW |
436689 | Dec 2005 | TW |
I420316 | Dec 2013 | TW |
WO 9406210 | Mar 1994 | WO |
WO 9838568 | Sep 1998 | WO |
Entry |
---|
Notice of allowance/allowability for U.S. Appl. No. 14/803,107 dated Mar. 28, 2016. |
Office Action for U.S. Appl. No. 14/217,334 dated Apr. 4, 2016. |
Notice of Allowance/Allowability for U.S. Appl. No. 13/890,229 dated Feb. 20, 2014. |
Office Action for U.S. Appl. No. 13/890,229 dated Oct. 8, 2013. |
Office Action for U.S. Appl. No. 12/876,113 dated Dec. 5, 2014. |
Notice of Allowance/Allowabilty for U.S. Appl. No. 12/876,113 dated Jun. 22, 2015. |
Office Action for U.S. Appl. No. 14/217,249 dated Apr. 23, 2015. |
Office Action for U.S. Appl. No. 14/217,467 dated Apr. 27, 2015. |
Office Action for U.S. Appl. No. 14/616,700 dated Apr. 30, 2015. |
Office Action for U.S. Appl. No. 14/217,436 dated Sep. 11, 2015. |
Robert Cooksey et al., A Stateless, Content-Directed Data Prefetching Mechanism, Copyright 2002 ACM. |
Office Action for U.S. Appl. No. 14/866,946 dated Jul. 27 2017. |
Office Action for U.S. Appl. No. 14/616,700 dated Jun. 2, 2017. |
Office Action for U.S. Appl. No. 15/268,533 dated Jun. 2, 2017 (issued by Examiner in this application). |
Office Action for U.S. Appl. No. 15/268,536 dated Apr. 27, 2017. |
Office Action for U.S. Appl. No. 15/368,598 dated May 19, 2017. |
Office Action for U.S. Appl. No. 13/475,878, dated Jun. 23, 2014. |
Office Action for U.S. Appl. No. 13/253,912 dated Jul. 16, 2014. |
Office Action for U.S. Appl. No. 12/876,113 dated Jul. 11, 2014. |
Office Action for U.S. Appl. No. 12/270,626 dated Feb. 3, 2012. |
Office Action for U.S. Appl. No. 12/270,626 dated Apr. 4, 2011. |
Office Action for U.S. Appl. No. 12/270,626 dated Mar. 15, 2013. |
Notice of Allowance/Allowability for U.S. Appl. No. 12/270,626 dated Oct. 3, 2014. |
Advisory Action for U.S. Appl. No. 12/876,113 dated Oct. 16, 2014. |
Office Action for U.S. Appl. No. 14/297,628 dated Jul. 17, 2015. |
Office Action for U.S. Appl. No. 13/475,878 dated Dec. 4, 2014. |
Office Action dated Dec. 5, 2014 for U.S. Appl. No. 14/038,684. |
Office Action dated Oct. 8, 2015 for U.S. Appl. No. 14/217,291. |
Office Action dated Oct. 5, 2015 for Taiwanese Application No. 103105076. |
Office Action dated Nov. 19, 2015 for U.S. Appl. No. 14/217,249. |
Office Action dated Nov. 18, 2015 for U.S. Appl. No. 14/217,467. |
Office Action dated Dec. 4, 2015 for U.S. Appl. No. 14/616,700. |
Office Action dated Jun. 4, 2015 for U.S. Appl. No. 14/215,414. |
Office Action for U.S. Appl. No. 14/217,291 dated Jun. 15, 2016. |
Final Office Action dated Nov. 19, 2015 for U.S. Appl. No. 14/217,249. |
Final Office Action dated Nov. 18, 2015 for U.S. Appl. No. 14/217,467. |
Office Action dated Nov. 25, 2015 for U.S. Appl. No. 14/217,041. |
Notice of allowance/allowability for U.S. Appl. No. 14/217,041 dated Apr. 11, 2016. |
Office Action for U.S. Appl. No. 14/215,414 dated May 20, 2016. |
Office Action for U.S. Appl. No. 14/616,700 dated May 20, 2016. |
Office Action for U.S. Appl. No. 14/689,019 dated May 20, 2016. |
Advisory Action for U.S. Appl. No. 14/217,316 dated May 19, 2016. |
Notice of allowance/allowability for U.S. Appl. No. 14/217,365 dated Oct. 18, 2016. |
Office Action dated Sep. 11, 2015 for U.S. Appl. No. 14/217,436. |
Office Action dated Sep. 24, 2015 for U.S. Appl. No. 14/217,334. |
Office Action dated Sep. 18, 2015 for Taiwanese Patent Application No. 102144165. |
Office Action dated Sep. 29, 2015 for U.S. Appl. No. 14/217,316. |
Office Action dated Sep. 28, 2015 for U.S. Appl. No. 14/689,045. |
Office Action dated Dec. 15, 2015 for U.S. Appl. No. 13/253,912. |
Office Action dated Dec. 17, 2015 for U.S. Appl. No. 14/214,216. |
Office Action dated Dec. 17, 2015 for U.S. Appl. No. 14/215,414. |
Office Action dated Dec. 17, 2015 for U.S. Appl. No. 14/803,107. |
Office Action dated Jan. 15, 2016 for U.S. Appl. No. 14/866,946. |
Office Action dated Jan. 11, 2016 for U.S. Appl. No. 14/217,399. |
Office Action dated Jan. 15, 2016 for U.S. Appl. No. 14/216,937. |
Notice of Allowance and Examiner-Initiated Interview Summary, dated Jan. 29, 2016 for U.S. Appl. No. 14/297,628. |
Office Action for U.S. Appl. No. 14/217,365 dated Feb. 18, 2016. |
Office Action for U.S. Appl. No. 14/217,365 dated Mar. 2, 2016. |
Office Action for U.S. Appl. No. 14/690,305 dated Feb. 25, 2016. |
Office Action for U.S. Appl. No. 14/217,436 dated Feb. 25, 2016. |
Office Action for U.S. Appl. No. 14/217,316 dated Feb. 26, 2016. |
Office Action for U.S. Appl. No. 14/215,414 dated Mar. 1, 2016. |
Office Action for U.S. Appl. No. 14/616,700 dated Mar. 8, 2016. |
Advisory Action for U.S. Appl. No. 14/217,334 dated Jun. 13, 2016. |
Office Action for U.S. Appl. No. 14/217,096 dated Jul. 12, 2016. |
Notice of Allowance for U.S. Appl. No. 14/217,399 dated Jul. 20, 2016 (Mailed in this current application). |
Office Action for U.S. Appl. No. 14/866,946 dated Jul. 29, 2016. |
Notice of Allowance for U.S. Appl. No. 14/217,334 dated Jul. 29, 2016. |
Office Action for U.S. Appl. No. 14/690,243 dated Aug. 11, 2016. |
Office Action for U.S. Appl. No. 14/690,370 dated Aug. 12, 2016. |
Office Action for U.S. Appl. No. 14/216,937 dated Aug. 15, 2016. |
Working Draft American National Standard Project T10/1601-D Information Technology Serial Attached SCSI—1.1 (SAS—1.1), Mar. 13, 2004 Revision 4. |
Notice of allowance/allowability for U.S. Appl. No. 13/253,912 dated Mar. 21, 2016. |
Office Action for U.S. Appl. No. 14/616,700 dated Oct. 20, 2016. |
USPTO Notice of Allowability & attachment(s) dated Jan. 2013 for U.S. Appl. No. 12/876,247. |
Office Action dated Sep. 14, 2012 for U.S. Appl. No. 12/876,247. |
Office Action dated Feb. 1, 2012 for U.S. Appl. No. 12/876,247. |
Notice of Allowance/Allowability dated Mar. 31, 2015 for U.S. Appl. No. 13/475,878. |
Office Action dated May 2015 for U.S. Appl. No. 13/253,912. |
Notice of Allowance for U.S. Appl. No. 14/215,414 dated Jan. 20, 2017. |
Advisory Action for U.S. Appl. No. 14/217,249 dated Jan. 26, 2017. |
Notice of Allowance for U.S. Appl. No. 14/687,700 dated Jan. 27, 2016. |
Office Action for U.S. Appl. No. 14/690,339 dated Feb. 3, 2017. |
Office Action for U.S. Appl. No. 14/616,700 dated Feb. 9, 2017. |
Notice of Allowance for U.S. Appl. No. 14/217,365 dated Feb. 10, 2017. |
Office Action for U.S. Appl. No. 14/690,305 dated Feb. 10, 2017. |
Office Action for U.S. Appl. No. 14/690,349 dated Feb. 8, 2017. |
Advisory Action for U.S. Appl. No. 14/689,019 dated Feb. 17, 2017. |
Office Action for U.S. Appl. No. 14/690,349 dated Feb. 27, 2017. |
National Science Fountation,Award Abstract #1548968, SBIR Phase I: SSD In-Situ Processing, http://www.nsf.gov/awardsearch/showAward?AWD_ID=1548968 printed on Feb. 13, 2016. |
Design-Reuse, NxGn Data Emerges from Stealth Mode to provide a paradigm shift in enterprise storage solution. |
http://www.design-reuse.com/news/35111/nxgn-data-intelligent-solutions.html, printed on Feb. 13, 2016. |
Office Action for U.S. Appl. No. 14/217,316 dated Aug. 25, 2016. |
Office Action for U.S. Appl. No. 14/690,305 dated Aug. 26, 2016. |
Advisory Action for U.S. Appl. No. 14/217,291 dated Sep. 9, 2016. |
Advisory Action for U.S. Appl. No. 14/689,045 dated Sep. 16, 2016. |
Notice of Allowance for U.S. Appl. No. 14/182,303 dated Sep. 12, 2016. |
Advisory Action for U.S. Appl. No. 14/690,114 dated Sep. 12, 2016. |
Notice of Allowance for U.S. Appl. No. 14/215,414 dated Sep. 23, 2016. |
Advisory Action for U.S. Appl. No. 14/866,946 dated Oct. 13, 2016. |
Office Action for U.S. Appl. No. 14/687,700 dated Sep. 26, 2016. |
Office Action for U.S. Appl. No. 15/170,768 dated Oct. 6, 2016. |
Office Action for U.S. Appl. No. 13/475,878 dated Jun. 23, 2014. |
Office Action for U.S. Appl. No. 12/876,113 dated Oct. 16, 2014. |
Notice of Allowance for U.S. Appl. No. 12/270,626 dated Oct. 3, 2014. |
Office Action for U.S. Appl. No. 12/270,626 dated May 23, 2014. |
Office Action for U.S. Appl. No. 12/270,626 dated Dec. 18, 2013. |
Office Action for U.S. Appl. No. 12/270,626 dated Aug. 23, 2012. |
Office Action for U.S. Appl. No. 12/876,113 dated Mar. 13, 2014. |
Advisory Action for U.S. Appl. No. 12/876,113 dated Sep. 6, 2013. |
Office Action for U.S. Appl. No. 12/876,113 dated May 14, 2013. |
Office Action for U.S. Appl. No. 12/876,113 dated Dec. 21, 2012. |
Security Comes to SNMP: The New SNMPv3 Proposed Internet Standard, The Internet Protocol Journal, vol. 1, No. 3, Dec. 1998. |
Notice of Allowability for U.S. Appl. No. 12/882,059 dated May 30, 2013. |
Notice of Allowability for U.S. Appl. No. 12/882,059 dated Feb. 14, 2013. |
Office Action for U.S. Appl. No. 12/882,059 dated May 11, 2012. |
Notice of Allowability for U.S. Appl. No. 14/038,684 dated Aug. 1, 2014. |
Office Action for U.S. Appl. No. 14/038,684 dated Mar. 17, 2014. |
Office Action for U.S. Appl. No. 14/217,249 dated Apr. 21, 2016. |
Notice of allowance/allowability for U.S. Appl. No. 14/217,467 dated Apr. 20, 2016. |
Notice of allowance/allowability for U.S. Appl. No. 14/214,216 dated Apr. 27, 2016. |
Notice of allowance/allowability for U.S. Appl. No. 14/217,436 dated May 6, 2016. |
Advisory Action for U.S. Appl. No. 14/690,305 dated Nov. 25, 2016. |
Notice of Allowance for U.S. Appl. No. 14/217,096 dated Dec. 5, 2016. |
Notice of Allowance for U.S. Appl. No. 14/217,161 dated Dec. 30, 2016. |
Office Action for U.S. Appl. No. 14/866,946 dated Jan. 5, 2017. |
Office Action for U.S. Appl. No. 14/688,209 dated Jan. 11, 2017. |
Amazon Route 53 Developer Guide API Version Apr. 1, 2013, copyright 2017 by Amazon Web Services. |
Host Bus Adapters (HBAs): What you need to know about networking workhorse by Alan Earls, Feb. 2003. |
Office Action for U.S. Appl. No. 14/690,243 dated Jan. 13, 2017. |
Office Action for U.S. Appl. No. 14/232,801 dated Jan. 19, 2017. |
Number | Date | Country | |
---|---|---|---|
61980564 | Apr 2014 | US | |
61801952 | Mar 2013 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 14217365 | Mar 2014 | US |
Child | 14684399 | US |