Abstract: Embodiments described herein provide a method for an error logging mechanism operated with controller area network (CAN) buses within an Ethernet network. A first interrupt request indicative of a first error condition that occurs at the first CAN bus is received at an Ethernet bridge and from a first CAN controller connected to a first CAN bus. In response to the first interrupt request, the first interrupt request is serviced by retrieving, from a first error register at the first CAN controller, information relating to the first error condition. The information relating to the first error condition is encapsulated in a first frame in compliance with a layer 2 transport protocol for time-sensitive applications. The encapsulated first frame is then sent, via an Ethernet switch, to an error logging device installed at a location remote to the first CAN bus.
Type:
Grant
Filed:
February 20, 2018
Date of Patent:
November 10, 2020
Assignee:
Marvell Asia Pte, Ltd.
Inventors:
Biing Long Shu, Dehuan Meng, Hugh Walsh, Fei Wu
Abstract: In one embodiment, the present disclosure pertains to testing. In one embodiment, software tests are performed on a first software server. Tests may be repeated a plurality of times to check for consistent failures or passes. Test results are sent to a second software server. The test results are stored in one or more databases on the second software server, where particular test results are associated with one or more fields specifying whether the test was passed and whether the test was failed. Tests that were both passed and failed may be deemed “flaky” tests. The second software server may generate a query to retrieve test results from the database that both passed and failed at least one test (flaky tests). Flaky tests may be quickly retrieved and processed.
Abstract: Example redundant array of independent disks (RAID) storage systems and methods provide rebuild of logical data groups in priority order. Storage devices are configured as a storage array for storing logical data groups distributed among the storage devices. The logical data groups are written in a configuration of RAID stripes in the storage devices. A logical group index includes a logical group map for each logical data group and identifies corresponding logical blocks. When a storage device fails, the rebuild queue is ordered based on the priority of the logical data groups and rebuild to the replacement storage device is completed in the priority order.
Abstract: Systems and methods are disclosed for monitoring models monitoring Internet-connected devices. Systems and methods include receiving, from an Internet-connected devices monitoring system, training data, the Internet-connected devices monitoring system being configured to predict future maintenance needs and/or failures of at least one Internet-connected device. Systems and methods further include receiving, from the Internet-connected devices monitoring system, production data associated with the at least one Internet-connected device, and determining that a data distance metric between the training data and the production data exceeds a first predetermined risk threshold. Systems and methods further include determining a risk level to be associated with the Internet-connected devices monitoring model based on the determination that the data distance metric exceeds the first predetermined risk threshold.
Abstract: A processing device receives a request to recreate an application from a particular point in time. The processing device determines a set of hierarchical tags in a data store of hierarchical tags, the set of hierarchical tags describes a computing environment hosting the application from the particular point in time. The processing device copies, from the data store, a snapshot associated with a source data tag of the set of hierarchical tags. The processing device recreates the computing environment hosting the application from the particular point in time in a replication environment using the set of hierarchical tags and the snapshot.
Abstract: A storage system periodically replicates data to another storage system for data backup and protection. The storage system is configured to detect an irregularity potentially causing a fault in the storage system. Such a detected irregularity may a component failure in a storage device, a temperature change in a storage device, etc. In response to the detected irregularity, the storage system increases a replication rate of data to the backup storage system.
Type:
Grant
Filed:
July 17, 2017
Date of Patent:
September 22, 2020
Assignee:
SEAGATE TECHNOLOGY LLC
Inventors:
Stephen S. Huh, Ian Davies, Douglas William Dewey
Abstract: Systems and methods are disclosed for monitoring features of a computing device of a distributed computing system using a self-monitoring module. The self-monitoring module can include multiple feature-specific monitoring modules and one or more parent nodes for the feature-specific monitoring modules. A feature-specific monitoring module can identify or detect a fault status change, such as a fault condition or fault resolution, for one or more features. Based on the identified fault conditions or fault resolutions, the feature-specific monitoring module can determine an internal status and communicate an updated status to a parent node.
Type:
Grant
Filed:
January 31, 2018
Date of Patent:
September 15, 2020
Assignee:
Splunk Inc.
Inventors:
Amritpal Singh Bath, Bharath Kishore Reddy Aleti, Octavio Enrique Di Sciullo, Tingjin Xu, Jason Andrew Beyers, Kartheek Babu Kolla, Chaithra Nataraj, Clara Elizabeth Lee
Abstract: The present disclosure relates to system(s) and method(s) for assisting a user to resolve a hardware issue and a software issue. The system identifies, a target cluster, associated with a new ticket received from the user, from the set of clusters. Further, the system recommends one or more runbook scripts, from a runbook repository, associated with the new ticket. The system further identifies a new runbook script, corresponding to the new ticket, from a set of external repositories. Further, the system executes at least one of the one or more runbook scripts or the new runbook script, associated with the new ticket. The system further generates a document based on the execution of the one or more runbook scripts or the new runbook script, thereby assisting the user to resolve a target issue.
Abstract: Multi-port data storage device capabilities can be provided by a remote host connected to a diskgroup that has a first single port data storage device and a second single port data storage device. Initialization of a first logical volume and a second logical volume in each single port data storage device allows a data access request to be serviced from the remote host with the first logical volume of the first single port data storage device. Data virtualized from the first logical volume of the first single port data storage device to the second volume of the second single port data storage device allows accessing the second volume of the second single port data storage device in response to a request to a data request to the first volume of the first single port data storage device.
Abstract: A method may include generating, for a concurrent application, an execution trace that includes operations, extracting actor pairs from the execution trace, assigning each of the operations to an actor pair, and generating vector clocks for the operations. Each vector clock may include a clock value for each of the actor pairs.
Type:
Grant
Filed:
June 13, 2018
Date of Patent:
July 21, 2020
Assignee:
Oracle International Corporation
Inventors:
Nicholas John Allen, Yang Zhao, Cristina Nicole Cifuentes, Nathan Robert Albert Keynes
Abstract: Embodiments for disaster recovery in a disaggregated computing system. A memory is allocated at a secondary, disaster recovery site for data received from a primary site. A degree of resiliency is defined for respective workloads associated with the data at the primary site to specify how critical each respective workload is to execute in case of disaster, and the data is replicated to the allocated memory at the disaster recovery site according to the degree of resiliency.
Type:
Grant
Filed:
May 31, 2018
Date of Patent:
July 21, 2020
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventors:
Valentina Salapura, John A. Bivens, Min Li, Ruchi Mahindru, Eugen Schenfeld
Abstract: Aspects of the disclosure relate to management node failover systems and methods. The system includes two management devices and a detection and reversal device. Each of the two management devices has a processor and a non-volatile memory storing computer executable code. The two management devices function respectively as an active node and a passive node. The detection and reversal device monitors status of the active node. When the active node fails, the detection and reversal device sends an activation signal to the passive node. The passive node, in response to receiving the active signal, switches from the passive node to the active node.
Abstract: Described herein are a method and apparatus for memory vulnerability prediction. A memory vulnerability predictor predicts the reliability of a memory region when it is first accessed, based on past program history. The memory vulnerability predictor uses a table to store reliability predictions and predicts reliability needs of a new memory region. A memory management module uses the reliability information to make decisions, (such as to guide memory placement policies in a heterogeneous memory system).
Abstract: A system and method that automatically detects anomalies in a cloud service system on an ongoing basis and which can be used to trigger live migration of cloud services includes a cloud server system configured to provide a plurality of virtualized cloud services through processes running over a set of virtual machines hosted on the cloud server system, and a processor which receives data related to the operations of the virtual machines and determines whether any of the virtual machines are exhibiting anomalous behavior. The processor applies a Kalman Filter to make predictions on the future state and covariance of the virtual machines and then calculates the log likelihood of the predicted values. If the predicted values deemed to be very unlikely, then the processor signals that an anomaly has occurred.
Type:
Grant
Filed:
August 21, 2018
Date of Patent:
June 16, 2020
Assignee:
United States of America as represented by Secretary of the Navy
Inventors:
Michael A. August, Mamadou H. Diallo, Dillon P. Glasser, Christopher T. Graves, Roger A. Hallman, Scott M. Slayback
Abstract: Implementations of the present solution disclose a method for triggering view switching in a blockchain without requiring a separate consensus to be executed by the backup nodes. The blockchain primary node receives a trigger that indicates a view switching condition. Then the primary node selects a successor node, and initiates a view switch, where the successor node will act as a new primary node in the next view. The new primary node can then initiate a consensus in the next view.
Abstract: Methods, systems and computer program products for root cause analysis using provenance data are provided herein. A computer-implemented method comprises computing a plurality of provenance paths for at least one of a plurality of data elements in a curation flow and a plurality of groups of data elements in the curation flow, analyzing the computed provenance paths to determine one or more errors in the curation flow, and outputting the one or more errors in the curation flow to at least one user. The analyzing comprises at least one of identifying which of the computed provenance paths are partial provenance paths, and identifying one or more output records associated with the curation flow, wherein the one or more output records comprise incorrectly curated data, and identifying the computed provenance paths that respectively correspond to the one or more output records comprising the incorrectly curated data.
Type:
Grant
Filed:
December 12, 2017
Date of Patent:
May 26, 2020
Assignee:
International Business Machines Corporation
Abstract: A memory system is disclosed, comprising a primary memory module, a secondary memory module, and a controller. The controller is configured to identify addresses in the primary memory module requiring correction, and is further configured to receive a memory access request identifying an address in the primary memory module. The controller is configured to determine whether the address is identified as requiring correction and, if it is not, to direct the memory access request to the primary memory module. If the address is identified as requiring correction, the controller is configured to direct the memory access request to the secondary memory module.
Abstract: A data storage device includes a nonvolatile memory device including a plurality of memory blocks each of which includes a plurality of regions; and a controller suitable for controlling the nonvolatile memory device, the controller comprising: a block designation unit suitable for performing a level 2 designation operation, by storing start data in a level 2 management block among the memory blocks, storing a location of the level 2 management block in a level 1 management block among the memory blocks, and storing integrity check data in the level 2 management block; and a recovery unit suitable for performing a recovery operation to the level 1 management block depending on a state of a current level 2 management block corresponding to a last location stored in the level 1 management block in the case where a sudden power-off occurs.
Abstract: A communication apparatus comprising: a plurality of communication processes, each performing communication process on a flow associated thereto; a plurality of network interfaces, each of the network interfaces adapted to be connected to a network; a dispatcher that receives a packet from the network interface and dispatches the packet to an associated communication process, based on a dispatch rule that defines association of a flow to a communication process to which the flow is dispatched; and a control unit that performs control to roll back each of the communication processes using saved image thereof.
Type:
Grant
Filed:
May 11, 2015
Date of Patent:
May 12, 2020
Assignee:
NEC Corporation
Inventors:
Takayuki Sasaki, Adrian Perrig, Srdjan Capkun, Claudio Soriente, Ramya Jayaram Masti, Jason Lee
Abstract: An apparatus and method are provided for generating and processing a trace stream indicative of execution of predicated vector memory access instructions by processing circuitry. An apparatus has an input interface to receive execution information from the processing circuitry indicative of operations performed by that processing circuitry when executing a sequence of instructions. The sequence includes at least one predicated vector memory access instruction executed to perform a memory transfer operation in order to transfer data values of a vector between a vector register and addresses accessed in memory. The vector comprises a plurality of lanes, where the number of lanes is dependent on the size of the data values represented within the vector, and predicate information referenced when executing the predicated vector memory access instruction is used to determine which lanes are subjected to the memory transfer operation.
Type:
Grant
Filed:
December 12, 2017
Date of Patent:
May 5, 2020
Assignee:
ARM Limited
Inventors:
François Christopher Jacques Botman, Thomas Christopher Grocutt, John Michael Horley