Patents Issued in October 20, 2016
  • Publication number: 20160306699
    Abstract: A method includes generating a data matrix from the data, wherein the data matrix includes a plurality of columns and a plurality of rows. The method further includes generating a chunkset data matrix from one or more rows of the data matrix. The method further includes matrix multiplying the chunkset data matrix by an encoding matrix to produce a chunkset slice matrix, wherein a row of the chunkset slice matrix corresponds to an encoded data slice and wherein the plurality of rows of the chunkset slice matrix corresponds to a set of encoded data slices, wherein a decode threshold number of encoded data slices of the set of encoded data slices is needed to recover the data grouping associated with the one or more rows of the data matrix.
    Type: Application
    Filed: June 27, 2016
    Publication date: October 20, 2016
    Inventors: Jason K. Resch, Greg Dhuse
  • Publication number: 20160306700
    Abstract: Aspects extend to methods, systems, and computer program products for reassigning service functionality between acceleration components. Reassigning service functionality can be used to recover service acceleration for a service. Service acceleration can exhibit operate improperly caused by performance degradation at an acceleration component. A role at the acceleration component having degrade performance can be assigned to another acceleration component to restore service acceleration for the service.
    Type: Application
    Filed: June 26, 2015
    Publication date: October 20, 2016
    Inventors: Stephen F. Heil, Sitaram V. Lanka, Adrian M. Caulfield, Eric S. Chung, Andrew R. Putnam, Douglas C. Burger, Yi Xiao
  • Publication number: 20160306701
    Abstract: Aspects extend to methods, systems, and computer program products for locally restoring functionality at acceleration components. A role can be locally restored at an acceleration component when an error is self-detected at the acceleration component (e.g., by local monitoring logic). Locally restoring a role can include resetting internal state (application logic) of the acceleration component providing the role. Self-detection of errors and local restoration of a role is less resource intensive and more efficient than using external components (e.g., high-level services) to restore functionality at an acceleration component and/or to reset an entire graph. Monitoring logic at multiple acceleration components can locally reset roles in parallel to restore legitimate behavior of a graph.
    Type: Application
    Filed: June 26, 2015
    Publication date: October 20, 2016
    Inventors: Stephen F. Heil, Sitaram V. Lanka, Adrian M. Caulfield, Eric S. Chung, Andrew R. Putnam, Douglas C. Burger, Yi Xiao
  • Publication number: 20160306702
    Abstract: A computer recovery circuit for a computer includes a detection circuit and a recovery control circuit. The detection circuit includes a first control terminal and a first output terminal. The recovery control circuit includes a second control terminal and a second output terminal. The detection circuit is configured to detect a working status of the computer. The first control terminal is configured to receive the first voltage signal of a first voltage level when the computer malfunctions. The first output terminal is configured to output a control signal of a first voltage level to the second output terminal. The second output terminal outputs a recovery signal having a first voltage level to the south bridge chip, thereby causing the computer to restart.
    Type: Application
    Filed: April 24, 2015
    Publication date: October 20, 2016
    Inventors: JIE MIN, CHUN-SHENG CHEN
  • Publication number: 20160306703
    Abstract: A system for processing data includes a data storage device and a processor. The data storage device stores a set of data. The processor is configured to divide the set of data in the data storage system into a set of segments; compute a set of fingerprints, wherein the set of fingerprints comprises a fingerprint for each segment of the set of segments; store the set of fingerprints in a new snapshot; identify a second set of fingerprints in the new snapshot that are not already in a fingerprint index; cause a second set of segments associated with the second set of fingerprints to be stored in a backup data storage system; and cause the second set of fingerprints to be added to the fingerprint index.
    Type: Application
    Filed: June 24, 2016
    Publication date: October 20, 2016
    Inventor: R. Hugo Patterson
  • Publication number: 20160306704
    Abstract: Techniques for archiving data, including methods, systems, and apparatus, including machine-readable media storing executable instructions. In some implementations, an apparatus includes one or more processors, a battery, a non-volatile data storage device, and machine-readable media including executable instructions for performing data archiving operations. In some implementations, communication with a source device is established. An identifier for the source device is received. A user interface may be provided to receive user input requesting data from the source device. The data from the source device may be received by the apparatus and stored at the particular storage area assigned to the source device.
    Type: Application
    Filed: June 27, 2016
    Publication date: October 20, 2016
    Inventor: June B. Smith
  • Publication number: 20160306705
    Abstract: According to an aspect, a method for triggering creation of a checkpoint in a computer system includes executing a task in a processing node and determining whether it is time to read a monitor associated with a metric of the task. The monitor is read to determine a value of the metric based on determining that it is time to read the monitor. A threshold for triggering creation of the checkpoint is determined based on the metric. A monitoring block size is determined for the checkpoint. A checkpoint interval is determined based on the monitoring block size, a checkpoint bandwidth, and a failure rate of the computer system. Based on determining that the value of the metric has crossed the threshold and the checkpoint interval has elapsed, the checkpoint including state data of the task is created to enable restarting execution of the task upon a restart operation.
    Type: Application
    Filed: June 28, 2016
    Publication date: October 20, 2016
    Inventor: Chen-Yong Cher
  • Publication number: 20160306706
    Abstract: According to certain aspects, a method can include, at a first time, performing an incremental backup of first data associated with a virtual machine (VM) residing on a source client computing device from the source client computing device to one or more secondary storage devices to create a backup copy of the VM, where the VM is associated with a hypervisor of a first type; receiving an instruction to restore the first data associated with the VM from the one or more secondary storage devices; retrieving the first data from the one or more secondary storage devices; and applying the first data to second data associated with a replicated VM running on the destination client computing device, where the replicated VM is a replicated version of the VM, and where the second data corresponds to data of the VM at a time before the first time.
    Type: Application
    Filed: June 29, 2016
    Publication date: October 20, 2016
    Inventors: Rahul S. Pawar, Henry Wallace Dornemann
  • Publication number: 20160306707
    Abstract: According to certain aspects, a method can include receiving, in response to an indication that a data storage database is being restored to a second time before a first time such that the data storage database comprises a plurality of first archive file identifiers associated at the second time, a first instruction from a data storage computer, where the first instruction instructs a media agent to stop scheduled secondary storage operations associated with a deduplication database, and where the deduplication database comprises a plurality of second archive file identifiers; determining at least one second archive file identifier in the plurality of second archive file identifiers that does not correlate with any first archive identifier in the plurality of first archive file identifiers; and, for each of the at least one second archive identifier, instructing the deduplication database to prune an entry associated with the respective second archive file identifier.
    Type: Application
    Filed: June 29, 2016
    Publication date: October 20, 2016
    Inventors: Manoj Kumar Vijayan, Ganesh Haridas, Deepak Raghunath Attarde
  • Publication number: 20160306708
    Abstract: Content-aware systems and methods for improving de-duplication, or single instancing, in storage operations. In certain examples, backup agents on client devices parse application-specific data to identify data objects that are candidates for de-duplication. The backup agents can then insert markers or other indictors in the data that identify the location(s) of the particular data objects. Such markers can, in turn, assist a de-duplication manager to perform object-based de-duplication and increase the likelihood that like blocks within the data are identified and single instanced. In other examples, the agents can further determine if a data object of one file type can or should be single-instanced with a data object of a different file type. Such processing of data on the client side can provide for more efficient storage and back-end processing.
    Type: Application
    Filed: June 30, 2016
    Publication date: October 20, 2016
    Inventors: Anand PRAHLAD, Manoj Kumar VIJAYAN, Rajiv KOTTOMTHARAYIL, Parag GOKHALE
  • Publication number: 20160306709
    Abstract: Techniques are disclosed for backup and restore in a distributed database utilizing consistent database snapshots. In particular, a distributed database system configured in accordance with an embodiment of the present disclosure includes a plurality of interconnected database nodes that collectively define a database having no single point of failure and that can be “viewed” by a SQL client as a single, logical database. In the course of executing such transactions, the distributed database system enables clients to declare snapshots that, when the transaction is committed, cause the distributed database system to logically freeze a consistent and complete copy of the state of the database at the point in time the transaction completed. Such snapshots enable clients to execute so-called “point-in-time” queries against those past states to return a result set that is essentially a reconstructed version of the database “as of” a particular point in time.
    Type: Application
    Filed: April 16, 2015
    Publication date: October 20, 2016
    Applicant: NUODB, INC.
    Inventor: Ross R. Shaull
  • Publication number: 20160306710
    Abstract: The present invention provides a method and system for recovering a virtual network. The method may include obtaining a snapshot of the virtual network; and in a preset mode, reading configuration information of the virtual network from the snapshot. Further, based on the configuration information, one or more virtual network devices may be created and corresponding configuration parameters to the one or more created virtual network devices may be distributed. Based on the snapshot, the one or more created virtual network devices may be connected to virtual machines and a physical network.
    Type: Application
    Filed: April 12, 2016
    Publication date: October 20, 2016
    Inventors: HUANGFENG WANG, JIAN LEI
  • Publication number: 20160306711
    Abstract: A system and method for communicating, browsing, verifying and routing data in storage operation systems using network attached storage devices is provided. In some embodiments, the system may include a management module and a media management component connected to the management server, which interoperate with network attached storage devices to provide the communicating, browsing, verifying and routing functions.
    Type: Application
    Filed: June 28, 2016
    Publication date: October 20, 2016
    Inventors: Duncan LITTLEFIELD, Ho-chi CHEN, Rajiv KOTTOMTHARAYIL
  • Publication number: 20160306712
    Abstract: An illustrative approach to managing snapshots streamlines how and when snapshots are generated in a storage management system, such that fewer snapshots may be generated without diminishing the scope of data protection. A novel unified-snapshot storage policy may govern snapshots for any number of subclients. A unified-snapshot job based on the unified-snapshot storage policy enables the illustrative storage management system to automatically discover relevant components and generate at most one snapshot per target logical unit number (“LUN”) in a storage array. Each snapshot may comprise the data of any number of subclients and/or clients in the storage management system. Accordingly, one unified-snapshot job may yield a minimum but sufficient number of snapshots comprising data of all subclients associated with the governing unified-snapshot storage policy. An enhanced storage manager may manage the unified-snapshot jobs.
    Type: Application
    Filed: June 28, 2016
    Publication date: October 20, 2016
    Inventors: Vimal Kumar NALLATHAMBI, Manoj Kumar VIJAYAN
  • Publication number: 20160306713
    Abstract: The logging of tasks associated with multiple transactions in the context in which the computing system is capable of having multiple of the transactions active at a given time, and thus in which the order of completion of the transactions is not guaranteed to be the same as the order of initiation of the transactions. A sequence of transaction segment records is added to the log. Each transaction segment record comprises a transaction identifier range that does not overlap with the transaction identifier range in any of the sequence of transaction segment records including the transaction identifier range of any neighboring transaction segment record in the sequence of transaction segment records. Each transaction segment record also includes a log entry identifier range extending from the first task of the first of the transactions to be initiated to the last task of the last transaction to complete.
    Type: Application
    Filed: April 14, 2015
    Publication date: October 20, 2016
    Inventors: Cristian Diaconu, Rogerio Ramos, Raghavendra Thallam Kodandaramaih, Christian Damianidis, Arkadi Brjazovski, Daniel Vasquez Lopez
  • Publication number: 20160306714
    Abstract: Higher-order operators are subject to checkpointing as well as recovery. The state of a higher-order operator, comprising an outer subscription and one or more inner subscriptions, is captured and subsequently utilized to recover the operator. In one instance, a data representation of code that can produce an inner subscription is saved. In other instance, an outer subscription is decoupled from inner subscriptions of a higher-order operator.
    Type: Application
    Filed: April 17, 2015
    Publication date: October 20, 2016
    Inventors: Bart De Smet, Tihomir T. Tarnavski, Eric Rozell, Alex Clemmer
  • Publication number: 20160306715
    Abstract: A data storage system protects virtual machines using block-level backup operations and restores the data at a file level. The system accesses the virtual machine file information from the file allocation table of the host system underlying the virtualization layer. A file index associates this virtual machine file information with the related protected blocks in a secondary storage device during the block-level backup. Using the file index, the system can identify the specific blocks in the secondary storage device associated with a selected restore file. As a result, file level granularity for restore operations is possible for virtual machine data protected by block-level backup operations without restoring more than the selected file blocks from the block-level backup data.
    Type: Application
    Filed: June 29, 2016
    Publication date: October 20, 2016
    Inventors: Paramasivam Kumarasamy, Rahul S. Pawar, Amit Mitkar, Satish Chandra Kilaru
  • Publication number: 20160306716
    Abstract: The present invention relates to a method for performing an image level copy of an information store. The present invention comprises performing a snapshot of an information store that indexes the contents of the information store, retrieving data associated with the contents of the information store from a file allocation table, copying the contents of the information store to a storage device based on the snapshot, and associating the retrieved data with the copied contents to provide file system information for the copied contents.
    Type: Application
    Filed: June 29, 2016
    Publication date: October 20, 2016
    Inventors: Anand PRAHLAD, David NGO, Prakash VARADHARAJAN, Rahul S. PAWAR, Avinash KUMAR
  • Publication number: 20160306717
    Abstract: Embodiments of the present disclosure disclose a method, an apparatus and a computer program product for failing back block objects in batch by performing failback operations in batch to part of block objects of one or more of existing file systems; determining a delay time required for performing failback operations in a next batch based on the recorded number of block objects that have been failed back in last batches; and performing the failback operations in the next batch to remaining block objects after the delay time.
    Type: Application
    Filed: April 11, 2016
    Publication date: October 20, 2016
    Inventors: Jinwei Li, Gang Cao, Walter Lei Wang, Matt Zhu Zhang, Ren Ren
  • Publication number: 20160306718
    Abstract: Task specific diagnostic controls are provided to facilitate the debugging of certain types of abort conditions. The diagnostic controls may be set to cause transactions to be selectively aborted, allowing a transaction to drive its abort handler routine for testing purposes. The controls include, for instance, a transaction diagnostic scope and a transaction diagnostic control. The transaction diagnostic scope indicates when the transaction diagnostic control is to be applied, and the transaction diagnostic control indicates whether transactions are to selectively aborted.
    Type: Application
    Filed: June 24, 2016
    Publication date: October 20, 2016
    Inventors: Dan F. Greiner, Christian Jacobi, Timothy J. Slegel
  • Publication number: 20160306719
    Abstract: In an example embodiment, an instance of a first database and an instance of a first application in a first data center of a managed cloud are replicated to a second data center of the managed cloud. Then state information regarding the first application is stored in a network file system in the first data center. Interactions between a user and the first application are directed to the instance of the first application in the first data center. The state information is then updated based on the interactions, and any changes to the instance of the first database based on the interactions are replicated to the second data center. Then a disaster is detected in the first data center, and all interactions between the user and the first application are redirected to a second instance of the first application in the second data center caused by the replication of the instance of the first application in the first data center.
    Type: Application
    Filed: April 14, 2015
    Publication date: October 20, 2016
    Inventors: Karolin Laicher, Stephan Heusch
  • Publication number: 20160306720
    Abstract: An integrated fail-silence and fail-operational control system includes a primary controller controlling features of devices while operating under non-fault operating conditions. A secondary controller includes a fail detector/decider module monitoring faults in the primary controller. The fail detector/decider module determines whether the fault in the primary controller is associated with a fail-silence requirement or a fail-operational requirement. If the fail detector/decider module determines the fault is a fail-silence requirement, then the fail detector/decider module actuates a shutdown command to the primary controller to shut down a feature affected by the fault where the feature becomes non-operational. If the fail detector/decider module determines that the feature associated with the fault is a fail-operational requirement, then the fail detector/decider module signals the primary controller to relinquish controls of the feature to the secondary controller.
    Type: Application
    Filed: April 16, 2015
    Publication date: October 20, 2016
    Inventors: THOMAS E. FUHRMAN, SOHEIL SAMII
  • Publication number: 20160306721
    Abstract: Near clones for a set of targeted computing systems are provided by determining a highest common denominator set of components among the computing systems, producing a pseudo-clone configuration definition, and realizing one or more pseudo-clone computing systems as partially configured backups for the targeted computing systems. Upon a planned failover, actual failure, or quarantine action on a targeted computing system, a difference configuration is determined to complete the provisioning of the pseudo-clone system to serve as a replacement system for the failed or quarantined system. Failure predictions can be used to implement the pseudo-clone just prior to an expected first failure of any of the targeted systems. The system can also interface to an on-demand provisioning management system to effect automated workflows to realize pseudo-clones and replacement systems automatically, as needed.
    Type: Application
    Filed: June 22, 2016
    Publication date: October 20, 2016
    Inventors: Vijay Kumar Aggarwal, Craig Lawton, Christopher Andrew Peters, P.G. Ramachandran, Lorin Evan Ullmann, John Patrick Whitfield
  • Publication number: 20160306722
    Abstract: Embodiments of the present disclosure provide a system, a computer program product and a method for detecting and handling errors in a bus structure by obtaining error information from a plurality of hardware registers associated with a bus; in response to determining that a number of the errors in one or more hardware registers of the plurality of hardware registers exceeds a predetermined threshold, detecting performance of hardware devices corresponding to the one or more hardware registers; and in response to determining performance deterioration of one hardware device in the hardware devices corresponding to the one or more hardware registers, determining that an error occurs in the hardware device.
    Type: Application
    Filed: April 13, 2016
    Publication date: October 20, 2016
    Inventors: Colin Yong Zou, Man Lv, Wenbo Wang, Long Wang
  • Publication number: 20160306723
    Abstract: A method of restoring user data in a modular solid-state drive including memory channels coupled to respective ones of non-volatile memory cards, the method including: upon physical replacement of a defunct memory card of the non-volatile memory cards with a new non-volatile memory card, and power on of the modular solid-state drive, retrieving a firmware segment and a system segment of the modular solid-state drive from unaffected memory channels of the memory channels not coupled to the new non-volatile memory card; rebuilding a firmware of the modular solid-state drive based on the retrieved firmware segment; rebuilding a data mapping table associated with the non-volatile memory cards based on the retrieved system segment; and restoring full integrity of the user data originally stored on the non-volatile memory cards based on the rebuilt data mapping table and data from the unaffected memory channels.
    Type: Application
    Filed: June 27, 2016
    Publication date: October 20, 2016
    Inventor: Guangming Lu
  • Publication number: 20160306724
    Abstract: An example test system includes a bus interface to connect to a bus of a computer system; and test instruments to perform one or more test operations on a UUT, where the test instruments connect to the bus interface to enable communication between the computer system and the test instruments via the bus interface. At least one test instrument includes: ports to which the UUT is connectable, with each of the ports interfacing to a corresponding peripheral bus supported by the at least one test instrument; circuits to connect the bus interface to the peripheral buses, with each circuit being configured to convert between a bus interface protocol run on the bus interface and a peripheral bus protocol run on a peripheral bus; and a switch to identify a target circuit of the circuits, with the switch to direct communications between the computer system and the target circuit.
    Type: Application
    Filed: April 16, 2015
    Publication date: October 20, 2016
    Inventors: Michael Thomas Fluet, Peter Hansen, Pavel Gilenberg
  • Publication number: 20160306725
    Abstract: A hierarchical fault detection and isolation system, method, and/or computer program product that facilitates fault detection and isolation in a complex networked system while reducing the computational complexity and false alarms is provided. The system, method, and/or computer program product utilizes a system level isolation and detection algorithm and a diagnostic tree to systematically isolate faulty sub-systems, components, etc. of the complex networked system.
    Type: Application
    Filed: April 15, 2015
    Publication date: October 20, 2016
    Inventors: James Z. Hare, Shalabh Gupta, Nayeff A. Najjar, Paul M. D'Orlando, Rhonda Dawn Walthall
  • Publication number: 20160306726
    Abstract: The subject matter described herein relates to methods, systems, and computer readable media for emulating network devices with different clocks. One method includes steps occurring in a network equipment test device. The steps include generating or obtaining timing information. The steps further include obtaining clock modification information. The steps further include emulating a plurality of different clocks using the timing information and the clock modification information. The method further includes emulating at least one network device that transmits test packets to a device under test using the different clocks.
    Type: Application
    Filed: April 16, 2015
    Publication date: October 20, 2016
    Inventor: Alon Regev
  • Publication number: 20160306727
    Abstract: An operation management apparatus for discerning a bottleneck of a system in an execution environment of a migration-destination without operating the system in the execution environment of the migration-destination is provided. The operation management apparatus (100) includes a correlation model storage unit (112) and a prediction model generation unit (105). The correlation model storage unit (112) stores a correlation model (260) indicating a correlation for each pair of one or more metrics in a state of executing a predetermined program processing in a first processing system. The prediction model generation unit (105) generates, by correcting the correlation model (260) of the first processing system using benchmark performances acquired in a state of executing a predetermined benchmark processing in the first processing system and a second processing system, a prediction model (370) of a correlation model in a state of executing the predetermined program processing in the second processing system.
    Type: Application
    Filed: November 14, 2013
    Publication date: October 20, 2016
    Inventor: Kiyoshi Kato
  • Publication number: 20160306728
    Abstract: Disclosed aspects include a debugger evaluating an expression. The expression has a debug element. Using dynamic analysis, a set of state information related to the debug element is identified. The set of state information can be generated external to the debugger and used within the debugger subsequent to being generated. Utilizing the set of state information, a tolerance parameter is selected. The tolerance parameter is for a conditional breakpoint linked with the debug element. In response to selecting the tolerance parameter, a triggering event for the conditional breakpoint may be detected. Based on the tolerance parameter, it may be determined to disregard the triggering event. Subsequently, the triggering event can be disregarded. Altogether, aspects of the disclosure provide a methodology for debug management that may provide performance or efficiency benefits.
    Type: Application
    Filed: April 16, 2015
    Publication date: October 20, 2016
    Inventors: Cary L. Bates, Lee Helgeson, Justin K. King, Michelle A. Schlicht
  • Publication number: 20160306729
    Abstract: Disclosed aspects include a debugger evaluating an expression. The expression has a debug element. Using dynamic analysis, a set of state information related to the debug element is identified. The set of state information can be generated external to the debugger and used within the debugger subsequent to being generated. Utilizing the set of state information, a tolerance parameter is selected. The tolerance parameter is for a conditional breakpoint linked with the debug element. In response to selecting the tolerance parameter, a triggering event for the conditional breakpoint may be detected. Based on the tolerance parameter, it may be determined to disregard the triggering event. Subsequently, the triggering event can be disregarded. Altogether, aspects of the disclosure provide a methodology for debug management that may provide performance or efficiency benefits.
    Type: Application
    Filed: June 24, 2015
    Publication date: October 20, 2016
    Inventors: Cary L. Bates, Lee Helgeson, Justin K. King, Michelle A. Schlicht
  • Publication number: 20160306730
    Abstract: Embodiments of the present invention include apparatus, method, and program product for displaying in actual 3D space (i.e. not merely a 3D representation on a 2D surface) any type of diagram relating to software or integrated circuits that requires depth perception in order to be fully comprehended. The 3D space can be manipulated as desired, including but not limited to rotation, collapse/expand, and the ability of the user to enter the 3D space and view it from within the 3D space.
    Type: Application
    Filed: May 17, 2016
    Publication date: October 20, 2016
    Inventor: Richard Stanley Fencel
  • Publication number: 20160306731
    Abstract: A method includes receiving a program code at a processor. The method also includes generating, via the processor, a heap model corresponding to the program code. The method further includes detecting, via the processor, a linearizable data structure in the program code. The method also further includes modifying, via the processor, the heap model based on the detected linearizable data structure. The method also further includes analyzing, via the processor, the program code using the modified heap model.
    Type: Application
    Filed: June 9, 2015
    Publication date: October 20, 2016
    Inventors: Roee Hay, Omer Tripp
  • Publication number: 20160306732
    Abstract: A method and associated system for repairing a running script. A missed object is detected among one or more objects of the running script, the missed object being unrecognized from an original object of a previous running of the script. A change type of the detected missed object is determined. The script is repaired based on the change type.
    Type: Application
    Filed: June 24, 2016
    Publication date: October 20, 2016
    Inventors: Xue F. Gao, Chengen Guan, Xiao D. Zhang, Hai B. Zou
  • Publication number: 20160306733
    Abstract: A computer implemented method for identifying program flow in a computer program, executing in a debugger on at least one processor, subsequent to suspending execution of the computer program at a user breakpoint can include suspending execution of the computer program at a first user breakpoint, setting, by the debugger, one or more tracking breakpoints in one or more routines that can continue execution from the first user breakpoint, then resuming execution of the computer program. The method may be continued by suspending execution of the computer program at a second user breakpoint after processing by the at least one processor at least one instruction of the computer program. The method may further include determining whether to provide an indicator to indicate that at least one of the one or more tracking breakpoints was hit during the executing, and providing the indicator in response to determining to provide the indicator.
    Type: Application
    Filed: April 15, 2015
    Publication date: October 20, 2016
    Inventors: Cary L. Bates, Lee N. Helgeson, Justin K. King, Michelle A. Schlicht
  • Publication number: 20160306734
    Abstract: A computer implemented method for identifying program flow in a computer program, executing in a debugger on at least one processor, subsequent to suspending execution of the computer program at a user breakpoint can include suspending execution of the computer program at a first user breakpoint, setting, by the debugger, one or more tracking breakpoints in one or more routines that can continue execution from the first user breakpoint, then resuming execution of the computer program. The method may be continued by suspending execution of the computer program at a second user breakpoint after processing by the at least one processor at least one instruction of the computer program. The method may further include determining whether to provide an indicator to indicate that at least one of the one or more tracking breakpoints was hit during the executing, and providing the indicator in response to determining to provide the indicator.
    Type: Application
    Filed: June 10, 2015
    Publication date: October 20, 2016
    Inventors: Cary L. Bates, Lee N. Helgeson, Justin K. King, Michelle A. Schlicht
  • Publication number: 20160306735
    Abstract: A method for providing a plurality of customized remote environments for application performance testing is provided. The method may include identifying a plurality of client customizations associated with a client application. The method may also include identifying a plurality of client hardware configurations associated with the client application. The method may further include populating a plurality of upgraded versions of the client application. Additionally, the method may include provisioning at least one remote environment. The method may also include applying the plurality of client customizations of the client application to the plurality of upgraded versions of the at least one client application. The method may further include deploying the plurality of upgraded versions of the at least one client application on at least one environment, whereby the deployed plurality of upgraded versions has the applied identified plurality of client customizations of the at least one client application.
    Type: Application
    Filed: April 16, 2015
    Publication date: October 20, 2016
    Inventors: Darryl M. Adderly, Jonathan W. Jackson, Ajit Jariwala, Eric B. Libow
  • Publication number: 20160306736
    Abstract: An aspect includes a computer system with a widget hierarchical layout correlation parser to: receive widget objects and widget object methods; and generate, based on the widget objects and widget object methods and using a symbol table derived from semantic analysis, a multi-level tree-like widget layout structure including nodes respectively corresponding to the widget objects and relationships between the nodes, with: (i) the relationships between the nodes including relationship types including: siblings, parents, children and self, and (ii) a determination of relationships for each node determines any parent(s), sibling(s) and/or children within one level of the multi-level tree-like widget layout structure. For each given widget object, a resource string reference parser parses source code of the given widget object to: collect setMethods arguments for the given widget object, and trace back to a message key in a resource file associated with the given widget object according to the symbol table.
    Type: Application
    Filed: June 29, 2016
    Publication date: October 20, 2016
    Inventors: Gu Yi He, Hua Hong Wang, Qiang Wang, Chao Zheng, Si Qi Zhong, Xian Jun Zhu
  • Publication number: 20160306737
    Abstract: A test system for providing automatic testing of an application on a plurality of devices, the system including an input/output device for communicating with the plurality of devices, a processor and a memory that stores instructions which cause the processor to install an application on a device, monitor the device as it performs a series of steps, and record the results of the series of steps in a log.
    Type: Application
    Filed: April 20, 2016
    Publication date: October 20, 2016
    Inventors: Frederick Charles Neumeyer, Gabriel Anthony Aguilar, Gregory Allen Bryant
  • Publication number: 20160306738
    Abstract: A set of memory pages from a working set of a program process, such as at least some of the memory pages that have been modified, are compressed into a compressed store prior to being written to a page file, after which the memory pages can be repurposed by a memory manager. The memory commit charge for the memory pages compressed into the compressed store is borrowed from the program process by a compressed storage manager, reducing the memory commit charge of the compressed storage manager. Subsequent requests from the memory manager for memory pages that have been compressed into a compressed store are satisfied by accessing the compressed store memory pages (including retrieving the compressed store memory pages from the page file if written to the page file), decompressing the requested memory pages, and returning the requested memory pages to the memory manager.
    Type: Application
    Filed: April 14, 2015
    Publication date: October 20, 2016
    Inventors: Yevgeniy M. Bak, Mehmet Iyigun, Landy Wang, Arun U. Kishan
  • Publication number: 20160306739
    Abstract: Garbage collection of objects within the heap of a computing system, and movement of adjacent sets of live objects as a whole in order to perform compaction. The compaction may be performed even if there are adjacent sets of live objects that include one or more pinned objects that should not be moved by the garbage collector. The garbage collector uses gaps to include relocation information with respect to sets of adjacent objects of the same pinned status. Some gaps may be formulated by writing over the live objects themselves, in which case that written over data is saved off prior to formulating the gap. When compaction is performed, the saved off data is used to fully integrate the adjacent objects of the same pinned status in the process of compaction.
    Type: Application
    Filed: April 16, 2015
    Publication date: October 20, 2016
    Inventors: Maoni Zhang Stephens, Patrick Henri Dussud
  • Publication number: 20160306740
    Abstract: In one embodiment, an apparatus, such as a memory device, is disclosed. The apparatus includes multiple memory tiles and selection circuitry. Each memory tile has an array of storage components at intersections of a plurality of digit line conductors and a plurality of access line conductors. The selection circuitry includes line drivers that select a storage component of a memory tile based on a corresponding digit line conductor and a corresponding access line conductor to the storage component. The selection circuitry may select two or more storage components of a memory tile in a consecutive manner before selecting the storage components of a different memory tile.
    Type: Application
    Filed: June 27, 2016
    Publication date: October 20, 2016
    Inventors: Hernan A. Castro, Kerry Dean Tedrow, Jack Chinho Wu
  • Publication number: 20160306741
    Abstract: An on-chip memory in a many-core system is partitioned, and according to a frequency at which a processor core set in each on-chip partition accesses a virtual memory page in virtual memory space that is shared among multiple processes that belong to a same application program, data corresponding to the virtual memory page is moved to an on-chip memory partition in which a processor core set whose access frequency is high is located such that when the virtual memory page is subsequently accessed, a time delay caused by cross-partition access is reduced.
    Type: Application
    Filed: June 29, 2016
    Publication date: October 20, 2016
    Inventors: KingTin Lam, Chit Ho Dominic Hung, Cho-Li Wang, Youliang Yan, Wangbin Zhu
  • Publication number: 20160306742
    Abstract: A processor includes a Level-2 (L2) cache, a first and second cluster of execution units, and a first and second data cache unit (DCU) communicatively coupled to the respective clusters of execution units and to the L2 cache. The DCUs each include a data cache and logic to receive a memory operation from an execution unit, respond to the memory operation with information from the data cache when the information is available in the data cache, and retrieve the information from the L2 cache when the information is unavailable in the data cache. The processor further includes logic to maintain contents of the data cache of the first DCU as equal to contents of the data cache of the second DCU at all clock cycles of operation of the processor.
    Type: Application
    Filed: December 23, 2013
    Publication date: October 20, 2016
    Inventors: Anton W. LECHENKO, Andrey EFIMOV, Sergey Y. SHISHLOV, Jayesh IYER, Boris A. BABAYAN
  • Publication number: 20160306743
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for pre-fetching content. One of the systems includes a pre-fetcher configured to perform operations including determining, for a virtual machine executing on a device and using a first virtual machine physical address associated with the virtual machine, a second virtual machine physical address for data to pre-fetch for the execution of the virtual machine on the device, determining, using the second virtual machine physical address and an address mapping that associates virtual machine physical addresses for the virtual machine with device physical addresses for the device, a device physical address for the data, and requesting the data from a memory using the device physical address.
    Type: Application
    Filed: April 14, 2015
    Publication date: October 20, 2016
    Inventors: Richard Yoo, Liqun Cheng, Parthasarathy Ranganathan, Rama Krishna Govindaraju
  • Publication number: 20160306744
    Abstract: A method for operating a device adapted to store information with high reliability includes determining a storage address for a data payload portion of a write request in accordance with a configuration of a communications interface coupled to the device, where the data payload is to be stored in mirroring groups of cache storage partitions of a plurality of cache storage modules. The method also includes generating a payload read request in accordance with the storage address, and prompting the communications interface to initiate the storing of the data payload, in parallel, in the mirroring groups in accordance with the payload read request.
    Type: Application
    Filed: April 16, 2015
    Publication date: October 20, 2016
    Inventors: Mark Allan Kampe, Cameron Bahar, Jinshui Liu, Wesley Shao, Huawei Liu
  • Publication number: 20160306745
    Abstract: This invention provides a cache system and method based on instruction read buffer (IRB). When applied to the field of processor, it is capable of filling instructions to the instruction read buffer which can be directly accessed by processor core and the processor core outputs instruction to the processor core for execution autonomously and achieve a high cache hit rate.
    Type: Application
    Filed: December 5, 2014
    Publication date: October 20, 2016
    Inventor: KENNETH CHENGHAO LIN
  • Publication number: 20160306746
    Abstract: A comparand that includes a virtual address is received. Upon determining a match of the comparand to a burst entry tag, a candidate matching translation data unit is selected. The selecting is from a plurality of translation data units associated with the burst entry tag, and is based at least in part on at least one bit of the virtual address. Content of the candidate matching translation data unit is compared to at least a portion of the comparand. Upon a match, a hit is generated.
    Type: Application
    Filed: September 25, 2015
    Publication date: October 20, 2016
    Inventors: Jason Edward PODAIMA, Paul Christopher John WIERCIENSKI, Alexander MIRETSKY
  • Publication number: 20160306747
    Abstract: A synchronization capability to synchronize updates to page tables by forcing updates in cached entries to be made visible in memory (i.e., in in-memory page table entries). A synchronization instruction is used that ensures after the instruction has completed that updates to the cached entries that occurred prior to the synchronization instruction are made visible in memory. Synchronization may be used to facilitate memory management operations, such as bulk operations used to change a large section of memory to read-only, operations to manage a free list of memory pages, and/or operations associated with terminating processes.
    Type: Application
    Filed: June 29, 2016
    Publication date: October 20, 2016
    Inventor: Michael K. Gschwind
  • Publication number: 20160306748
    Abstract: An apparatus and a method is provided that comprises at least one first processing unit configured to run at least one first computer program application capable of receiving and processing signals received from at least one interface or device connected to said first processing unit, at least one second processing unit configured to run at least a second computer program application capable of further processing at least some information processed in said first processing unit.
    Type: Application
    Filed: April 18, 2016
    Publication date: October 20, 2016
    Inventors: Erik Lindman, Jyrki Uusitalo, Timo Eriksson, Tomi Lehto, Tero Aurto