17957742. MEMORY ACCESS ENGINE simplified abstract (ATI TECHNOLOGIES ULC)

From WikiPatents
Jump to navigation Jump to search

MEMORY ACCESS ENGINE

Organization Name

ATI TECHNOLOGIES ULC

Inventor(s)

Omar Fakhri Ahmed of Markham (CA)

Norman Vernon Douglas Stewart of Markham (CA)

Mihir Shaileshbhai Doctor of Santa Clara CA (US)

Jason Todd Arbaugh of Austin TX (US)

Milind Baburao Kamble of Austin TX (US)

Philip Ng of Markham (CA)

Xiaojian Liu of Markham (CA)

MEMORY ACCESS ENGINE - A simplified explanation of the abstract

This abstract first appeared for US patent application 17957742 titled 'MEMORY ACCESS ENGINE

Simplified Explanation

The abstract of the patent application describes a technique for servicing a memory request by obtaining permissions associated with a source and a destination, obtaining address translations, and executing operations for the request using the translations.

  • Obtaining permissions for a source and destination specified by the memory request.
  • Obtaining a first set of address translations for the memory request.
  • Executing operations for a first request using the first set of address translations.

Potential Applications

This technology could be applied in various fields such as computer hardware, data storage systems, and cloud computing services.

Problems Solved

This technology helps in efficiently servicing memory requests, ensuring data integrity, and improving overall system performance.

Benefits

The benefits of this technology include faster memory request processing, enhanced security through permission management, and optimized resource utilization.

Potential Commercial Applications

One potential commercial application of this technology could be in the development of high-performance computing systems for data-intensive applications.

Possible Prior Art

Prior art in this field may include existing memory management techniques, address translation methods, and permission-based access control systems.

Unanswered Questions

How does this technique compare to existing memory request servicing methods?

This article does not provide a direct comparison to existing methods, leaving the reader to wonder about the specific advantages of this new technique over traditional approaches.

What are the specific technical requirements for implementing this technique in a real-world system?

The article does not detail the specific hardware or software requirements needed to implement this technique, leaving readers curious about the practical aspects of its deployment.


Original Abstract Submitted

A technique for servicing a memory request is disclosed. The technique includes obtaining permissions associated with a source and a destination specified by the memory request, obtaining a first set of address translations for the memory request, and executing operations for a first request, using the first set of address translations.