Patents by Inventor Tim Silversides

Tim Silversides has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10719379
    Abstract: Examples include fault isolation in transaction logs. Some examples involve generation of a transaction log entry associated with a fault domain. The transaction log entry may comprise a transaction signature and a fault domain identifier. Based on the transaction signature, a domain sum may be computed. A determination may be made whether each transaction log entry associated with the fault domain is valid, and a valid domain sum may be computed for the fault domain based on the transaction signature of each valid transaction log entry associated with the fault domain. Based on a determination that the domain sum equals the valid domain sum, the fault domain may be recovered.
    Type: Grant
    Filed: February 26, 2016
    Date of Patent: July 21, 2020
    Assignee: Hewlett Packard Enterprise Development LP
    Inventor: Tim Silversides
  • Patent number: 10228995
    Abstract: Examples discussed herein are directed to last writers of datasets in storage array errors. In some examples, a dataset integrity error detection is recorded. The dataset integrity error may be in a write path of a storage array and the write path may include a first controller node and a second controller node of the storage array. A detector of the dataset integrity error may be determined. A last writer of the dataset in the write path prior to the dataset integrity error detection may also be determined. A processing location in the write path associated with the dataset integrity error may be determined.
    Type: Grant
    Filed: July 28, 2016
    Date of Patent: March 12, 2019
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Tim Silversides, Stuart McCool
  • Publication number: 20180322003
    Abstract: Examples include fault isolation in transaction logs. Some examples involve generation of a transaction log entry associated with a fault domain. The transaction log entry may comprise a transaction signature and a fault domain identifier. Based on the transaction signature, a domain sum may be computed. A determination may be made whether each transaction log entry associated with the fault domain is valid, and a valid domain sum may be computed for the fault domain based on the transaction signature of each valid transaction log entry associated with the fault domain. Based on a determination that the domain sum equals the valid domain sum, the fault domain may be recovered.
    Type: Application
    Filed: February 26, 2016
    Publication date: November 8, 2018
    Inventor: Tim Silversides
  • Publication number: 20180032397
    Abstract: Examples discussed herein are directed to last writers of datasets in storage array errors. In some examples, a dataset integrity error detection is recorded. The dataset integrity error may be in a write path of a storage array and the write path may include a first controller node and a second controller node of the storage array. A detector of the dataset integrity error may be determined. A last writer of the dataset in the write path prior to the dataset integrity error detection may also be determined. A processing location in the write path associated with the dataset integrity error may be determined.
    Type: Application
    Filed: July 28, 2016
    Publication date: February 1, 2018
    Inventors: TIM SILVERSIDES, Stuart McCool
  • Publication number: 20170060674
    Abstract: Examples relate to persistent checksum data validation. In some examples, it is determined if a storage array supports a persistent checksum capability. After determining that the storage array supports the persistent checksum capability, protection information is added to a data packet at an egress port, where the protection information includes a cyclic redundancy check (CRC), a serial number, and an offset. The data packet is sent with the protection information to the storage array, where the storage array uses the protection information to validate the data packet. A data response is received from the storage array, and then the protection information is used to validate the data response.
    Type: Application
    Filed: September 2, 2015
    Publication date: March 2, 2017
    Inventors: Siamak Nazari, Tim Silversides