Abstract: A method of detecting a network hang and restoring an application that communicates on a connection giving rise to the network hang. A user experience may be improved by providing the user with an option to restore the hung application without losing unsaved data or state information. The network hang may be detected when the user tries to terminate the application. The method may include determining whether the network hang is recoverable, which may involve diagnosing a type of the hang. If recoverable, a network connection reset mechanism may be triggered by instructing a network stack of the computer to terminate the network connection.
Type:
Application
Filed:
March 24, 2011
Publication date:
September 1, 2011
Applicant:
Microsoft Corporation
Inventors:
Paul L. Li, Andrew J. Lagattuta, Matt Eason, Baskar Sridharan, Abdelsalam Heddaya, Stephan Doll
Abstract: According to one embodiment, a semiconductor memory device includes semiconductor memory chips in which data requested to be written. The data has one or more pieces of first data in a predetermined unit. The device includes a write controller that writes the first data and redundancy information calculated by using a predetermined number of pieces of the first data and used for correcting an error in the predetermined number of pieces of the first data into different semiconductor memory chips; and a storage unit that stores identification information and region specifying information so as to be associated with each other. The identification information associates the first data and the redundancy information, and the region specifying information specifies a plurality of storage regions in the semiconductor memory chips to which the pieces of the first data and the redundancy information associated with each other are written.
Abstract: A storage apparatus for storing data includes a plurality of physical media provided with storage areas to store data, a storage group determining unit configured to determine, upon detecting a request to write new data to a virtual volume to be accessed, a storage group from which to allocate storage area by selecting a storage group from among a plurality of storage groups made up of the plurality of physical media, wherein the selected storage group is other than any storage groups that include a physical medium where a failure has occurred, and a storage area allocator configured to allocate storage area on the physical media existing within the storage group that was determined by the storage group determining unit to the virtual volume, the size of the storage area corresponds to the data size of the new data.
Abstract: There is provided a method of processing at least one data message using a computing device having at least a processor, a memory, a display device and an input device, the method including: retrieving from the memory and providing on the display device a number of operation icons each representing at least one operation to be performed on data; enabling a user of the computing device to select and arrange at least some of the operation icons on the display device using the input device; enabling the user to arrange graphical links between the selected operation icons to define the flow of data between the selected operation icons, wherein the selected operation icons and the graphical links together form a graphical representation of a process to be performed on the data message; enabling the user to specify at least one of the operation icons in the graphical representation as a transaction boundary node; defining at least one transaction region extending over part or all or the graphical representation
Abstract: A semiconductor device includes an internal circuit configured to perform a specified operation in response to a predetermined command; a normal data input/output section configured to input/output a normal data synchronized with a center of a source clock, in response to data input/output commands; and a data recovery information signal input/output block configured to receive and store a data recovery information signal synchronized with an edge of the source clock and having a predetermined pattern, in response to either a command of the data input/output commands or the predetermined command upon entry to a data recovery operating mode, and to output the data recovery information signal after the passage of a predetermined time period.
Abstract: Storing, retrieving, transmitting and receiving data (20) by a) separating the data into a plurality of data subsets (A, B); b) generating parity data (P) from the plurality of data subsets (A, B) such that any one or more of the plurality of data subsets may be recreated from the remaining data subsets and the parity data (P). Steps a and b may be repeated on any one or more each of the plurality of data subsets and parity data providing further data subsets and further parity data; and d) storing each of the further data subsets and further parity data in separate storage locations (380) or transmitting the further data subsets and further parity data.
Abstract: In one embodiment, the present invention includes a method for selecting a first transaction execution mode to begin a first transaction in a unbounded transactional memory (UTM) system having a plurality of transaction execution modes. These transaction execution modes include hardware modes to execute within a cache memory of a processor, a hardware assisted mode to execute using transactional hardware of the processor and a software buffer, and a software transactional memory (STM) mode to execute without the transactional hardware. The first transaction execution mode can be selected to be a highest performant of the hardware modes if no pending transaction is executing in the STM mode, otherwise a lower performant mode can be selected. Other embodiments are described and claimed.
Type:
Application
Filed:
December 15, 2009
Publication date:
June 16, 2011
Inventors:
Jan Gray, Martin Taillefer, Yossi Levanoni, Ali-Reza Adl-Tabatabai, Dave Detlefs, Vinod Grover, Mike Magruder, Matt Tolton, Bratin Saha, Gad Sheaffer, Vadim Bassin
Abstract: Systems and methods for importing data from data sources over a network while correcting and transforming the data are described. A data migration server receives data from various data sources. The data migration server repairs and transforms the received data before transmitting the data to a new data server. In some embodiments, the data migration server repairs data before formatting the data, and in other embodiments, the data migration server formats data before repairing the data. The data migration server also verifies the accuracy of the data, either by comparing the data against data requested and received from third-party servers or in reference to other data from the data sources.
Type:
Application
Filed:
December 14, 2009
Publication date:
June 16, 2011
Inventors:
Klaus Schauser, Fredrik Valeur, Jerry Zheng, Tushar Ranka, Donald Tognazzini
Abstract: Methods and systems are disclosed to generate a data map for a data storage device. A data map may be generated by scanning, during a power-on initialization process, data units of data stored on a data storage medium of a data storage device. The scanning may start from a selected data unit and proceed through the data units in an order opposite to a write order to identify a first data unit that is not fully erased. Also. an error recovery status of the first data unit may be determined based on an error correction code. A likely erased status of the first data unit may be assigned when the determined error recovery status is unrecoverable.
Type:
Application
Filed:
December 3, 2009
Publication date:
June 9, 2011
Applicant:
SEAGATE TECHNOLOGY LLC
Inventors:
Jonathan W. Haines, Brett A. Cook, Gabriel Ibarra, Peter Vasiliev
Abstract: Disclosed herein is a method and apparatus for downloading files using both digital broadcasting and Internet-based transmission. In the method, a file is divided into uniformly sized blocks and transmitting the blocks via digital broadcasting. In a case where blocks which failed to be received are present and retransmission of the blocks is required, if a specific block requiring retransmission must be retransmitted to a number of receivers which are equal to or greater than a predetermined number of receivers from among a total number of receivers, the specific block is retransmitted via digital broadcasting, whereas if the specific block must be retransmitted to a number of receivers which are less than the predetermined number of receivers, the specific block is retransmitted over an Internet.
Type:
Application
Filed:
May 6, 2010
Publication date:
May 19, 2011
Applicant:
SEOUL BROADCASTING SYSTEM CO., LTD.
Inventors:
Sunghwan KIM, Sangjin KIM, Jaehun CHA, Hakjoo LEE
Abstract: A read retry method performed in a hard disk drive, the read retry method may include performing a read operation; and ignoring a read error flag generated when a read error is generated, and continuing to perform the read operation.
Abstract: An ultrasonic diagnostic method and system are provided. The ultrasonic diagnostic method includes performing booting of a system using a kernel, after a Basic Input/Output System (BIOS) is executed and an error is not recorded in a memory; recording an error in the memory when the error occurs in executing an ultrasonic diagnostic program; transmitting the recorded error to a server via a network; and receiving, from the server, a recovery file used to restore the ultrasonic diagnostic program, and restoring the ultrasonic diagnostic program using the received recovery file.
Abstract: A method for automatically testing a business intelligence artifact includes receiving business metric data from a business intelligence system, creating a business intelligence artifact derived from the received business metric data, executing the business intelligence artifact to generate a business intelligence output populated with information related to the business metric data, creating at least one test case for the business intelligence artifact, the test case having at least one assertion associated with the business intelligence output to verify the proper functioning of the business intelligence artifact, testing, with an automated agent interfaced with the business intelligence system, the business intelligence artifact for errors by determining whether the output generated by the current version of the business intelligence artifact satisfies the conditions of the assertion after execution of the business intelligence artifact; and if errors are detected, correcting the errors to create a subsequ
Abstract: Aspects of the subject matter described herein relate to database connectivity behavior. In aspects, an entity seeking to access data that is replicated via instances of a database follows a plan. The plan provides information as to which instance(s) the entity is to attempt to access the data from. The plan may include connection data that indicates parameters the entity is to use in connecting to the instance(s). The plan may also indicate one or more other instances from which the entity may attempt to access the data if the client is not able to access the data from initial instance(s).
Type:
Application
Filed:
October 8, 2009
Publication date:
April 14, 2011
Applicant:
Microsoft Corporation
Inventors:
Zlatko V. Michailov, David W. Olix, Matt A. Neerincx, Chadwin J. Mumford
Abstract: The method begins with a processing unit receiving an encoded slice for storage. The method continues with the processing unit determining whether to store the encoded slice in one of a first set of memory devices or in one of a second set of memory devices based on metadata associated with the encoded slice, wherein the first set of memory devices are continually active and the second set of memory devices are selectively active. The method continues with the processing unit stores the encoded slice in the one of the second set of memory devices when the encoded slice is to be stored in the one of the second set of memory devices. The method continues with the processing unit de-activating the one of the second set of memory devices, in accordance with a deactivation protocol, after storing the encoded slice.
Abstract: A method for writing and reading data in memory cells, comprising, when writing a data in a block of a first memory zone, a step consisting of writing in a second memory zone a temporary information structure metadata comprising a start flag, an identifier of the temporary information structure, an information about the location of the block in the first memory zone, and a final flag, and, after a power on of the first memory zone, searching for an anomaly in temporary information structures present in the second memory zone.
Abstract: An apparatus connected to a license management apparatus, storing license status data with license identifiers, via a network, and includes a part for receiving a request to acquire a license corresponding to a license identifier, a part for receiving designation of at least one electronic device for acquiring the license, a part for obtaining a license file corresponding to the license identifier from the license management apparatus, updating the license status data corresponding to the license identifier, and recording the license file to a storage part with the electronic device, a part for executing acquirement, and a part for executing re-execution in a case where the acquiring of the license by the electronic device is determined as a failure according to the result. The re-execution includes displaying the failure of the acquirement on a screen and re-executing the acquirement with the license file based on data input to the screen.
Abstract: A computer system, a control method thereof and a recording medium storing a computer program thereof are provided to recover a program efficiently and be resistant to viruses, worms, and user error. The control method of computer system receives a user's request for a recovery of a program which is installed in a first storage unit. A file system of a second storage unit is determined which stores therein a recovery program corresponding to the program for which the recovery is requested. The recovery program is read from the second storage unit with reference to the determined file system, and the program in the first storage unit is recovered by using the read recovery program.
Type:
Application
Filed:
July 29, 2010
Publication date:
March 3, 2011
Applicant:
Samsung Electronics Co., LTD.
Inventors:
Min-hyung LEE, Deok-rae KIM, Keon-young CHO, Seung-lee NAM
Abstract: The present disclosure is directed to a method for providing continuous data protection for a virtual volume (VV). The method may comprise conceptually dividing the VV into a plurality of same sized chunks; preserving contents of the VV at a specified time; creating a Point in Time (PiT) instance for the VV at the specified time, comprising: a PiT Temporary Virtual Volume (PTVV) for storing modifications to the VV subsequent to the specified time, wherein data stored in the PTVV is prohibited from been overwritten; a re-allocation table for providing read access to a most recent version of each of the plurality of chunks of the VV; and a Continuous Data Protection (CDP) log for providing read access to a historic version of a chunk stored in the PTVV; and updating the PiT instance when a chunk of the plurality of chunks of the VV is being modified.
Abstract: The present disclosure includes systems and techniques relating to solid state drive controllers. In some implementations, a device includes a buffer that holds a block of data corresponding to a command from a host. The command identifies the block of data and a logical sequence in which the identified block of data is to be transmitted. In response to the command, a data retriever included in the device retrieves the portions of the block of data from non-volatile memory units in a retrieval sequence that is different from the logical sequence. When the device receives multiple commands identifying multiple blocks of data, the device services the commands in parallel by retrieving portions of blocks of data identified by both commands.
Type:
Application
Filed:
July 23, 2010
Publication date:
February 17, 2011
Inventors:
Cheng Kuo Huang, Siu-Hung Fred Au, Lau Nguyen, Perry Neos
Abstract: The present invention relates to a clock and data recovery circuit (CDR), and in particular, to a CDR circuit in a full digital scheme which cancels the data-dependent jitter. A DDJ cancellation circuit according to the present invention efficiently cancels the data-dependent jitter, making it possible to configure the reliable clock and data recovery circuit in the serial link data communication through the channel of the predetermined bandwidth.
Abstract: A method, system and computer program for quality management of a plurality of documents associated with a data-processing operation of an organization is provided. The documents include several fields, the organization has employees, and the method comprises determination of error rates. Errors are reduced in the plurality of documents by focusing on critical fields. The occurrence of errors is predicted by determining a correlation between the errors and a set of attributes, which is updated. Reducing and predicting errors control the error rate. A method for measuring the quality of a plurality of documents is also provided. The measurement is based on the relative operational impact of the errors and the frequency of errors associated with each field.
Abstract: A data scrubbing apparatus corrects disturb data errors occurring in an array of memory cells such as SMT MRAM cells. The data scrubbing apparatus receives an error indication that an error has occurred during a read operation of a grouping of memory cells within the array of memory cells. The data scrubbing apparatus may generate an address describing the location of the memory cells to be scrubbed. The data scrubbing apparatus then commands the array of memory cells to write back the corrected data. Based on a scrub threshold value, the data scrubbing apparatus writes the corrected data back after a specific number of errors. The data scrubbing apparatus may further suspend writing back during a writing of data. The data scrubbing apparatus provides a busy indicator externally during a write back of corrected data.
Abstract: A method, system, and article for resolving a silent error is disclosed. A primary program copy runs on a primary host, and a secondary program copy runs on a secondary host. The primary and secondary copies communicate to maintain synchronized execution. A third copy of the data is stored on a storage device as a write operations log and maintained in memory on the primary host while the program is running. The primary copy is synchronized with the secondary copy by computing a first checksum of data on the primary host in response to a read operation local to the primary host, computing a second checksum of data on the secondary host in response to a read operation local to the secondary host, and periodically communicating the first checksum to the secondary host, and resolving any discrepancies between the first and second checksum of data reflecting a silent data error.
Type:
Application
Filed:
June 18, 2009
Publication date:
December 23, 2010
Applicant:
INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventors:
Ahmed M. Bashir, Prasenjit Sarkar, Soumitra Sarkar, Mark J. Seaman, Dinesh K. Subhraveti, Victor S. Wen
Abstract: A status of connectivity between servers of different sites (locations) is used to infer whether a network or a server failure has occurred such that data between the servers can be routed more efficiently reducing unnecessary network traffic due to duplicate messages. Servers may be grouped based on location or other characteristics and connectivity status determined based on the communication status of individual servers and their respective groups.
Abstract: Apparatus and methods, such as those that read data from non-volatile integrated circuit memory devices, such as NAND flash. For example, disclosed techniques can be embodied in a device driver of an operating system. Errors are tracked during read operations. If sufficient errors are observed during read operations, the block is then retired when it is requested to be erased or a page of the block is to be written. One embodiment is a technique to recover data from uncorrectable errors. For example, a read mode can be changed to a more reliable read mode to attempt to recover data. One embodiment further returns data from the memory device regardless of whether the data was correctable by decoding of error correction code data or not.
Abstract: A set of file system data structure and file system recognition APIs are disclosed that may allow an operating system to identify a partition of a storage device as having a valid file system, even if the operating system does not know how to access the file system a priori. File systems implement these data structures in a standardized, known location within a partition on the storage device such that an operating system may use APIs or other functions to examine that known location for the presence of these data structures. Information on how to interpret the data structure may be obtained using a network or other source.
Type:
Application
Filed:
May 4, 2009
Publication date:
November 4, 2010
Applicant:
MICROSOFT CORPORATION
Inventors:
Matthew S. Garson, Ravinder S. Thind, Darwin Ou-Yang, Karan Mehra, Neal R. Christiansen
Abstract: The data processor having CPUs each capable of accessing memories enables the processing of a memory error according to the processing mode of the data processor. The CPUs have a memory, and each include a first storing unit capable of storing CPU-identifying information which enables identification of CPU having accessed the memory. At the time of occurrence of a soft error owing to access to the memory, the CPU, having the memory, stores the CPU-identifying information for identifying the CPU having accessed the corresponding memory in the first storing unit, and notifies the interrupt controller of occurrence of a soft error of the memory. After having received an interruption of the memory soft error from the interrupt controller, the CPU uses information stored in the first storing unit to identify the CPU having made the access, and performs the error processing.
Abstract: Methods, systems, and computer-readable media are disclosed for operating system-based application recovery. A particular method saves an application state of an application executing at a computer. When a failure of the application is detected, the operating system provides an option to initiate recovery of the application by reverting to the saved application state. When the option to initiate recovery is selected by a user of the computer, the operating system recovers the application by reverting to the saved application state.
Type:
Application
Filed:
March 2, 2009
Publication date:
September 2, 2010
Applicant:
Microsoft Corporation
Inventors:
Benny Schlesinger, Kfir Karmon, Hen Fitoussi, Liat Segal
Abstract: Various embodiments include fault tolerant memory apparatus, methods, and systems, including an apparatus comprising a memory device including a plurality of addressable memory locations, and a memory manager coupled to the memory device, the memory manager including a scheduling unit operable to detect a multi-bit error in data read from the memory device, and to retry the read operation in order to distinguish between an intermittent error and a persistent error.
Type:
Application
Filed:
March 29, 2007
Publication date:
July 22, 2010
Applicant:
Cray Inc.
Inventors:
Dennis C. Abts, Michael Higgins, Van L. Snyder
Abstract: A system and method of updating firmware and a method of creating firmware are provided. The system includes a firmware storage module having first firmware and second firmware. The first and second firmware each have image header file data, including a cyclic redundancy checksum (CRC) and an image header file creation time. The method of updating firmware includes determining whether the first and second firmware have an abnormality according to the CRC information. When an abnormality is present in the first or second firmware, the abnormality-stricken firmware is replaced with new firmware. When the abnormality is absent from the first and second firmware, the first firmware is compared with the second firmware in terms of the image header file creation time such that the firmware with the earlier creation time is replaced by the new firmware. Operable firmware is available even if the firmware updating operation fails.
Abstract: The present principles include methods and apparatus for repairing corrupted files systems of storage devices. In accordance with aspects of the present principles, a listing of sectors to which data is most recently written is retrieved upon interruption of writing operations on a storage medium. The listing is employed to implement a targeted search for sectors that are most likely to be corrupted. The sectors providing in the listing are examined and sectors including errors are identified. Thereafter, the errors are corrected.
Abstract: A flash memory system comprising temporary memory, writing apparatus for writing first logical data from the temporary memory into flash memory cells having at least two levels, thereby to generate a physical representation of the first logical data including known errors, reading apparatus for reading the physical representation from the cells, thereby to generate, and store in the temporary memory, second logical data which if read immediately is identical to the first logical data other than the known errors; and controlling apparatus controlling the writing apparatus and the reading apparatus and including known error ID apparatus operative to identify the known errors by comparing the first logical data to second logical data read immediately after the physical representation is generated, to store information characterizing the known errors and to use the information, when the second logical data is next read, to correct the known errors.
Abstract: A virtual computer system executes a virtual computer control program on a physical computer and thereby causes guest programs on the logical partitions, respectively. The virtual computer control program includes an error recovery module to periodically recover from an error in a cache memory, an error interruption handler module responsive to an interruption notice caused by an error which has occurred in the cache memory, to recover from an error in the cache memory, and an error data initialization module to recover from an error in the cache memory with shutdown or restart of one of the logical partitions as a momentum. And the virtual computer control program conducts recovery processing from an error in the cache memory.
Abstract: The systems and methods maintain varying protection levels of related objects, such as when nodes of a data structure are protected at the same or greater protection level as their children nodes. In one embodiment, the nodes store data to track protection levels of their children nodes.
Abstract: A data file on a storage media is processed during playback or execution to identify unreadable data. Replacement data corresponding to the unreadable data is obtained over a communications network, and the replacement data is used to playback or execute the data file as if the data file does not contain any unreadable data.
Abstract: The image reading apparatus continuously reads image data of a plurality of pages of a document, each page being added with identification information including specific information of the page and common information showing relationship with at least one precedent and one subsequent pages, that includes an image storage potion for storing image data of each page of the read document, an identification information extracting portion for extracting the identification information from the image data, a missing page detecting portion for detecting a page missed by failure of reading in the document based on identification information of each extracted page, and a display portion for prompting reading of the document by displaying the missing page, in which when an instruction of rereading is given and identification information of the missing page is extracted from image data read again, the image data is additionally stored in the image storage portion.
Abstract: A method and apparatus for controlling an uplink transmission power in a mobile station of a mobile communication system. The method includes transmitting uplink data in a first transmission interval, receiving a transmission power control information over a downlink control channel, and determining a transmission power of uplink data to be transmitted in a second transmission interval. The transmission power is determined based on the received transmission power control information and a transmission power of the uplink data transmitted in the first transmission interval. The first transmission interval and the second transmission interval are included in a same Hybrid Automatic Retransmission reQuest (HARQ) process.
Type:
Application
Filed:
April 28, 2009
Publication date:
August 27, 2009
Applicant:
SAMSUNG ELECTRONICS CO., LTD.
Inventors:
Hwan-Joon KWON, Dong-Hee Kim, Youn-Sun Kim
Abstract: In order to maintain the integrity of data stored in a flash memory that are susceptible to being disturbed by operations in adjacent regions of the memory, disturb events cause the data to be read, corrected and re-written before becoming so corrupted that valid data cannot be recovered. The sometimes conflicting needs to maintain data integrity and system performance are balanced by deferring execution of some of the corrective action when the memory system has other high priority operations to perform. In a memory system utilizing very large units of erase, the corrective process is executed in a manner that is consistent with efficiently rewriting an amount of data much less than the capacity of a unit of erase.
Abstract: A flag which is set to the on state when a process of writing data as a data file into a storage area which is permitted to be written only once results in failure is previously set in a data memory of an IC card. When a flag of a to-be-written EF specified by a write binary command is set to the on state, a control element of the IC card compares received data to be written to the EF with data which is already written to the data storage area of the EF. Based on the comparison result, the control element of the IC card rewrites data in the storage area in which the compared data items do not coincide with each other into the received data.
Abstract: A storage system includes: an interface that connects the storage system to a higher-level device; a first storage unit that stores data which is transferred from the higher-level device through the interface; a second storage unit onto which data stored in the first storage unit is copied; a management table that manages the progress of the copy operation; a monitoring section that monitors the operating state of the first storage unit; a determination section that determines, in the case where the monitoring section detects occurrence of a failure in the first storage unit, that the access destination in the first storage unit specified by the higher-level device is accessible or not; and a selection section that selects the access destination specified by the higher-level device based on the determination result of the determination section and progress managed by the management table.
Abstract: One embodiment of the invention includes a memory RAS mode whereby a multi-channel memory controller utilizes both memory mirroring and memory sparing to form more complete memory redundancy loss protection.
Type:
Application
Filed:
December 21, 2007
Publication date:
June 25, 2009
Inventors:
Robert C. Swanson, Michael A. Rothman, Mallik Bulusu, Vincent J. Zimmer
Abstract: A method and software program for recovering data from corrupted flash media. In one aspect, the method employs a low-level access scheme that enables data to be recovered when high-level interfaces, such as file systems, are damaged. The type of flash media is determined, and a corresponding access scheme is employed. Depending on the type of damage to the media, a physical-to-logical table may be built and employed to sequentially access the flash media in search of indicia from which selectable file-types can be identified, or the media may be accessed using normal operating system commands. Once the file indicia are found, the location of corresponding file data is identified, whereupon the file data are read and stored. The software program employs an application program interface (API) comprising one or more sets of pass-through commands to enable low-level access to the flash media and to build the physical-to-logical table.
Abstract: The present invention provides systems and methods for logically organizing data for storage and recovery on a data storage medium using a multi-level format. The present invention also provides systems and methods for protecting data stored on data storage medium so that the data may be recovered without errors.
Type:
Application
Filed:
April 9, 2008
Publication date:
September 18, 2008
Applicant:
InPhase Technologies, Inc.
Inventors:
Tod R. EARHART, Mark Ayres, Will Loechel, Adrian Hill, Kenton Pharris, Kevin Curtis, William L. Wilson
Abstract: Disclosed is an apparatus for recovering data in the case of single or double failures of N partial data blocks generated by dividing the data where N is a natural number greater than 1. The apparatus recovers the data on the basis of a Galois field product computation table including first and second search key data, and products of the first and second search key data. The first search key data includes possible symbol values. The second search key data includes a weighting value set and an inversed weighting value set. The weighting value set includes weighting values each assigned to one of the N partial data blocks and different from each other, and is closed under addition in the Galois field. The inversed weighting value set includes multiplicative inverses of the weighting values included in the weighting value set.
Abstract: Mechanisms for adaptively entering and exiting recovery mode. When a message is received from a particular message transaction, the appropriate processing instance is loaded from persistent memory to system memory. The processing instance then determines from its own state information whether or not it is in recovery mode. This indication of recovery or normal mode may be set by a system-wide recovery detection module. If the processing instance determines that it is in normal mode, then the processing instance executes code appropriate for normal operation without needing to execute any recovery code at all. If, on the other hand, the processing instance determines that it is in recovery mode, then it executes recovery code. Once the recovery code has completed successfully, the processing instance may then cause its own normal mode.