Patents Issued in March 2, 2017
  • Publication number: 20170060677
    Abstract: Embodiments described herein include a computing system that permits partial writes into a memory element—e.g., a register on a processor. For example, the data to be written into the memory element may be spread across multiple sources. The register may receive data from two different sources at different times and perform two separate partial write commands to store the data. Embodiments herein generate an ECC value for each of the partial writes. That is, when storing the data of the first partial write, the computing system generates a first ECC value for the data in the first partial write and stores this value in the memory element. Later, when performing the second partial write, the computing system generates a second ECC value for this data which is also stored in the memory element.
    Type: Application
    Filed: September 29, 2015
    Publication date: March 2, 2017
    Inventors: Dhivya JEGANATHAN, Dung Q. NGUYEN, Jose A. PAREDES, David R. TERRY, Brian W. THOMPTO
  • Publication number: 20170060678
    Abstract: Embodiments described herein include a computing system that permits partial writes into a memory element—e.g., a register on a processor. For example, the data to be written into the memory element may be spread across multiple sources. The register may receive data from two different sources at different times and perform two separate partial write commands to store the data. Embodiments herein generate an ECC value for each of the partial writes. That is, when storing the data of the first partial write, the computing system generates a first ECC value for the data in the first partial write and stores this value in the memory element. Later, when performing the second partial write, the computing system generates a second ECC value for this data which is also stored in the memory element.
    Type: Application
    Filed: September 1, 2015
    Publication date: March 2, 2017
    Inventors: Dhivya JEGANATHAN, Dung Q. NGUYEN, Jose A. PAREDES, David R. TERRY, Brian W. THOMPTO
  • Publication number: 20170060679
    Abstract: Embodiments described herein include a computing system that permits partial writes into a memory element—e.g., a register on a processor. For example, the data to be written into the memory element may be spread across multiple sources. The register may receive data from two different sources at different times and perform two separate partial write commands to store the data. Embodiments herein generate an ECC value for each of the partial writes. That is, when storing the data of the first partial write, the computing system generates a first ECC value for the data in the first partial write and stores this value in the memory element. Later, when performing the second partial write, the computing system generates a second ECC value for this data which is also stored in the memory element.
    Type: Application
    Filed: September 1, 2015
    Publication date: March 2, 2017
    Inventors: Dhivya JEGANATHAN, Dung Q. NGUYEN, Jose A. PAREDES, David R. TERRY, Brian W. THOMPTO
  • Publication number: 20170060680
    Abstract: A check bit read mode enables a memory device to provide internal check bits to an associated host. A memory controller of a memory subsystem can generate one or more read commands for memory devices of the memory subsystem. The read command can include address location information. The memory devices include memory arrays with memory locations addressable with the address location information. The memory locations have associated data and internal check bits, where the check bits are generated internally by the memory for error correction. If the memory device is configured for check bit read mode, in response to the read command, it sends the internal check bits associated with the identified address location. If the memory device is not configured check bit read mode, it returns the data in response to the read command without exposing the internal check bits.
    Type: Application
    Filed: December 26, 2015
    Publication date: March 2, 2017
    Inventors: John B. Halbert, Kuljit S. Bains
  • Publication number: 20170060681
    Abstract: An error check and scrub (ECS) mode enables a memory device to perform error checking and correction (ECC) and count errors. An associated memory controller triggers the ECS mode with a trigger sent to the memory device. The memory device includes multiple addressable memory locations, which can be organized in segments such as wordlines. The memory locations store data and have associated ECC information. In the ECS mode, the memory device reads one or more memory locations and performs ECC for the one or more memory locations based on the ECC information. The memory device counts error information including a segment count indicating a number of segments having at least a threshold number of errors, and a maximum count indicating a maximum number of errors in any segment.
    Type: Application
    Filed: December 26, 2015
    Publication date: March 2, 2017
    Inventors: John B. Halbert, Kuljit S. Bains
  • Publication number: 20170060682
    Abstract: A memory device includes a semiconductor memory unit, a controller circuit configured to communicate with a host through a serial interface, store write data to be written into a page of the semiconductor memory unit in a data buffer, and an error-correcting code (ECC) circuit configured to generate an error correction code from the write data if the ECC circuit is enabled. The controller circuit writes the error correction code with the write data into the page if the ECC circuit is enabled. A maximum column address of the page which is accessible from the host changes depending on whether or not the ECC circuit is enabled.
    Type: Application
    Filed: March 4, 2016
    Publication date: March 2, 2017
    Inventors: Shunsuke KODERA, Toshihiko KITAZUME, Kenichirou KADA, Nobuhiro TSUJI, Shinya TAKEDA, Tetsuya IWATA, Yoshio FURUYAMA, Hirosuke NARAI
  • Publication number: 20170060683
    Abstract: Systems and methods which implement one or more data organization techniques that facilitate efficient access to source data stored by a storage system are disclosed. Data organization techniques implemented according to embodiments are adapted to optimize (e.g., maximize) input/output efficiency and/or (e.g., minimize) storage overhead, while maintaining mean time to data loss, repair efficiency, and/or traffic efficiency. Data organization techniques as may be implemented by embodiments include blob based organization techniques, grouped symbols organization techniques, data ordering organization techniques, and combinations thereof.
    Type: Application
    Filed: November 30, 2015
    Publication date: March 2, 2017
    Inventors: Michael George Luby, Thomas Joseph Richardson
  • Publication number: 20170060684
    Abstract: A method for execution by a dispersed storage and task (DST) processing unit that includes a processor includes receiving a data object for storage in the DSN via a network. Available storage unit data is generated, indicating a subset of a plurality of storage units of the DSN that corresponds to a plurality of available storage units. A shortened encoding matrix is generated based on an original encoding matrix and the available storage unit data. A size of the shortened encoding matrix is based on a number of storage units in the plurality of available storage units. A plurality of encoded slices is generated, each for transmission to one of the plurality of available storage units via the network, by performing an encoding function on the shortened encoding matrix and the data obj ect.
    Type: Application
    Filed: July 27, 2016
    Publication date: March 2, 2017
    Inventor: Jason K. Resch
  • Publication number: 20170060685
    Abstract: A computing device includes an interface configured to interface and communicate with a dispersed storage network (DSN), a memory that stores operational instructions, and a processing module operably coupled to the interface and to the memory such that the processing module, when operable within the computing device based on the operational instructions, is configured to perform various operations. For example, the computing device determines storage unit (SU)-based write transfer rates and/or a DSN-based write transfer rate for a write request of encoded data slices (EDSs) to the SUs within the DSN. Then, the computing device processes the SU-based write transfer rates and/or DSN-based write transfer rate to determine characteristics of the various SUs as well as operation of the DSN. The computing device then selectively modifies parameters (e.g., write request time interval) and/or issues additional write request(s) for some or all of the EDSs based on such characteristics.
    Type: Application
    Filed: August 26, 2016
    Publication date: March 2, 2017
    Inventor: Jason K. Resch
  • Publication number: 20170060686
    Abstract: A computing device includes an interface configured to interface and communicate with a dispersed storage network (DSN), a memory that stores operational instructions, and a processing module operably coupled to the interface and memory such that the processing module, when operable within the computing device based on the operational instructions, is configured to perform various operations. For example, the computing device generates and transmits a read request for a set of encoded data slices (EDSs) of a data object to primary storage units (SUs). The data object is stored within primary and secondary SUs. The computing device then receives at least the read threshold number of EDSs from the plurality of primary SUs. The primary SUs operate selectively to provide the at least the read threshold number of EDSs to the computing device either from memory of primary SU(s) or from secondary SU(s).
    Type: Application
    Filed: August 26, 2016
    Publication date: March 2, 2017
    Inventor: Jason K. Resch
  • Publication number: 20170060687
    Abstract: Techniques described and suggested herein include systems and methods for precomputing regeneration information for data archives (“archives”) that have been processed and stored using redundancy coding techniques. For example, regeneration information, such as redundancy code-related matrices (such as inverted matrices based on, e.g., a generator matrix for the selected redundancy code) corresponding to subsets of the shards, is computed for each subset and, in some embodiments, stored for use in the event that one or more shards becomes unavailable, e.g., so as to more efficiently and/or quickly regenerate a replacement shard.
    Type: Application
    Filed: November 14, 2016
    Publication date: March 2, 2017
    Inventors: Paul David Franklin, Bryan James Donlan, Colin Laird Lazier, Claire Elizabeth Suver
  • Publication number: 20170060688
    Abstract: A method includes identifying an independent data object of a plurality of independent data objects for retrieval from dispersed storage network (DSN) memory. The method further includes determining a mapping of the plurality of independent data objects into a data matrix, wherein the mapping is in accordance with the dispersed storage error encoding function. The method further includes identifying, based on the mapping, an encoded data slice of the set of encoded data slices corresponding to the independent data object. The method further includes sending a retrieval request to a storage unit of the DSN memory regarding the encoded data slice. When the encoded data slice is received, the method further includes decoding the encoding data slice in accordance with the dispersed storage error encoding function and the mapping to reproduce the independent data object.
    Type: Application
    Filed: November 15, 2016
    Publication date: March 2, 2017
    Inventors: Jason K. Resch, Greg Dhuse, Andrew Baptist
  • Publication number: 20170060689
    Abstract: A method begins by determining whether at least one encoded data slice of a corresponding set of encoded data slices associated with a primary storage unit requires rebuilding and includes one or more excess encoded data slices of the set of encoded data slices stored in a secondary storage unit. The method continues by identifying the excess encoded data slices based on scan response messages from the secondary storage units. The method continues by assigning, for each data segment associated with at least one of an encoded data slice requiring rebuilding and an excess encoded data slice, a priority level in accordance with a prioritization scheme. The method continues by facilitating, for each data segment, rebuilding of the encoded data slices requiring rebuilding and deletion of excess encoded data slices requiring deletion in accordance with the assigned priority level of the data segment.
    Type: Application
    Filed: August 31, 2016
    Publication date: March 2, 2017
    Inventor: Jason K. Resch
  • Publication number: 20170060690
    Abstract: A method includes sending, in response to read operation, read requests regarding a read threshold number of encoded data slices of a set of encoded data slices to storage units, where the read threshold number is between a decode threshold number and a total number of encoded data slices of the set of encoded data slices. The method further includes sending status inquiries regarding a remaining number of encoded data slices of the set of encoded slices to other storage units, where the remaining number equals the total number minus the read threshold number. The method further includes receiving responses from the storage units regarding the read requests and the status inquires. The method further includes determining, based on the responses, that an encoded data slice of the set of encoded data slices requires rebuilding, and rebuilding the encoded data slice while processing the read operation.
    Type: Application
    Filed: November 15, 2016
    Publication date: March 2, 2017
    Inventors: Brennan James Trichardt, Jason K. Resch
  • Publication number: 20170060691
    Abstract: In some examples, a memory is configured to write multiple pages of an internal page size from a cache on the memory to a memory array on the memory in response to receiving a single precharge command when in a page emulation mode. When in the page emulation mode, the memory also reads multiple pages of the internal page size from the memory array and stores them in the cache in response to receiving a single activate command.
    Type: Application
    Filed: November 9, 2016
    Publication date: March 2, 2017
    Inventors: Syed M. Alam, Thomas Andre
  • Publication number: 20170060692
    Abstract: An electronic device able to re-initialize following a failed initialization has a processor, a first storage device, and a second storage device. The processor receives storage information stored at the first storage device and sets a plurality of storage parameters of the first storage device, according to the storage information, and re-initializing the first storage device based on the storage parameters. When the initialization fails, the processor adjusts the storage parameters of the first storage device and re-initializes the first storage device based on the adjusted storage parameters.
    Type: Application
    Filed: May 13, 2016
    Publication date: March 2, 2017
    Inventor: YI-SHENG HUANG
  • Publication number: 20170060693
    Abstract: An acquisition unit that acquires, based on a combination of failures in components of an information system, a correction subprocedure for identifying a cause of failure and correcting trouble and a reconstruction subprocedure for reconstructing the component; a generator that generates at least one candidate for a service restart procedure of the information system by connecting the correction and the reconstruction subprocedures based on a dependency relationship between the acquired correction and reconstruction subprocedures; an estimator that estimates required time of at least one candidate for the service restart procedure; and a selector that identifies the service restart procedure, of which required time satisfies desired restoration time from among the candidates for the service restart procedure and selects, from among the identified candidates for the service restart procedure that has the risk of exceeding the desired restoration time, the service restart procedure based on a high/low degree of
    Type: Application
    Filed: May 11, 2015
    Publication date: March 2, 2017
    Applicant: NEC Corporation
    Inventor: Kumiko TADANO
  • Publication number: 20170060694
    Abstract: Disclosed are systems, methods and computer program products for automatic data backup based on multi-factor environment monitoring. An example method includes monitoring an occurrence of one or more danger events; detecting when a danger event occurs or about to occur; determining a danger level of the detected danger event; determining an importance level of each of a plurality of backup data items; determining a backup time for performing backup of the backup data items based on the determined danger level of detected danger event; determining a backup order of the plurality of backup data items based on the determined importance level of the backup data items; selecting a backup storage for the backup data items and performing a backup of the plurality of backup data items to the selected backup storage.
    Type: Application
    Filed: August 24, 2016
    Publication date: March 2, 2017
    Inventors: Alexey Makhov, Stanislav Protasov, Serguei M. Beloussov, Andrey Polevoy
  • Publication number: 20170060695
    Abstract: A system and method for data replication for databases using an intermediary server, the intermediary server choosing the order in which databases are replicated, the utilities used for each of the steps in the data replication process, the timing of the replication, and/or the timing each step of the data replication process is performed.
    Type: Application
    Filed: August 31, 2015
    Publication date: March 2, 2017
    Inventors: Steve Clare, Liana Sanoyan, Jian Huang, Suresh Appavu, Sandip Das, Paul Kazakov, Prabhagaran Subramaniam, Mutharasan Nainar
  • Publication number: 20170060696
    Abstract: A system, a method, and a computer program product for adaptively management bandwidth of a deduplication system are disclosed. A bandwidth policy for replication of data from a first deduplication location to a second deduplication location is determined. The bandwidth policy allocates a predetermined bandwidth for the replication of data. The deduplication locations are communicatively coupled via a network. Using the determined bandwidth policy, data from the first deduplication location is replicated to the second deduplication location based on the allocated bandwidth.
    Type: Application
    Filed: August 19, 2015
    Publication date: March 2, 2017
    Applicant: EXAGRID SYSTEMS, INC.
    Inventors: James Wellnitz, Nathaniel W. Turner, Matthew B. Kirk, Charles Packard
  • Publication number: 20170060697
    Abstract: In accordance with embodiments of the present disclosure, an information handling system may include a primary persistent memory comprising a volatile memory for storing data and a non-volatile memory for receiving data transferred from the volatile memory in response to a power loss of the information handling system. The information handling system may also include an alternate persistent memory instructions embodied in non-transitory computer readable media, the instructions for causing a processor communicatively coupled to the primary persistent memory and the alternate persistent memory to, responsive to a vulnerability of a persistence of the primary persistent memory, transfer application data from the primary persistent memory to the alternate persistent memory.
    Type: Application
    Filed: August 24, 2015
    Publication date: March 2, 2017
    Inventors: Stuart Allen Berke, John Erven Jenne, Shane Michael Chiasson
  • Publication number: 20170060698
    Abstract: Techniques for improving storage journaling are disclosed. In some embodiments, the techniques may be realized as a method for improving storage journaling including recording to a journal a count of valid blocks in a first chunk of storage in flash memory, receiving a request to write a second chunk to the flash memory, determining, using a controller, whether the count of valid blocks in the first chunk is less than a specified threshold, and in the event the number of valid blocks in the first chunk is less than the specified threshold, writing the second chunk to a location of the first chunk of storage in the flash memory.
    Type: Application
    Filed: August 24, 2015
    Publication date: March 2, 2017
    Inventors: Daniel Peter NOÉ, Pulkit Ambikanandan MISRA
  • Publication number: 20170060699
    Abstract: Methods and systems for recovering data containers is provided. One method includes creating a first set of one or more incremental backups for a data container; associating by a processor the first set of one or more incremental backups with the first full backup of the data container; presenting the association of the first set of one or more incremental backups with the first full backup; and restoring the data container within a recovery time period associated with the data container.
    Type: Application
    Filed: August 27, 2015
    Publication date: March 2, 2017
    Applicant: NETAPP, INC.
    Inventors: Adolf Hohl, Kapil Arora
  • Publication number: 20170060700
    Abstract: Systems and methods which implement forward checking of data integrity are disclosed. A storage system of embodiments may, for example, comprise data integrity forward checking logic which is operable to perform forward checking of data integrity in real-time or near real-time to check that a number of node failures can be tolerated without loss of data. Embodiments may be utilized to provide assurance that a number of fragments needed for source data recovery will be available for the source objects most susceptible to failure when a certain number of additional fragments are lost, such as due to storage node failures.
    Type: Application
    Filed: November 30, 2015
    Publication date: March 2, 2017
    Inventors: Thomas Joseph Richardson, Michael George Luby, Mahdi Cheraghchi Bashi Astaneh, Lorenz Christoph Minder
  • Publication number: 20170060701
    Abstract: Resiliency in file replication scenarios via maintenance of multiple replication queues with differing susceptibility to various sources of data loss. A plurality of requests are received at a first file system location to write to one or more file system objects at the first file system location. Details about the plurality of requests are recorded in at least two replication queues which differ, at least in part, as to types of failures which will cause data loss. Responsive to detection of data loss in one of the replication queues, details about the plurality of requests are retrieved from another of the replication queues.
    Type: Application
    Filed: August 27, 2015
    Publication date: March 2, 2017
    Inventors: Abhishek S. Dave, Ajay Singh
  • Publication number: 20170060702
    Abstract: Resiliency in file replication scenarios via maintenance of multiple replication queues with differing susceptibility to various sources of data loss. A plurality of requests are received at a first file system location to write to one or more file system objects at the first file system location. Details about the plurality of requests are recorded in at least two replication queues which differ, at least in part, as to types of failures which will cause data loss. Responsive to detection of data loss in one of the replication queues, details about the plurality of requests are retrieved from another of the replication queues.
    Type: Application
    Filed: March 2, 2016
    Publication date: March 2, 2017
    Inventors: Abhishek S. Dave, Ajay Singh
  • Publication number: 20170060703
    Abstract: The recovery of one or more transactions in a computing system in which one or more persistent systems are coupled via a bus to one or more processors. As an example, the persistent system may serve as at least part of the main memory of the computing system. The transaction might implement multi-versioning in which a record is not updated in place. Rather, each record is represented as a sequence of one or more record versions, each version having a valid interval during which the record version is considered to properly represent the record.
    Type: Application
    Filed: November 9, 2016
    Publication date: March 2, 2017
    Inventors: Per-Ake Larson, Robert Patrick Fitzgerald, Cristian Diaconu, Michael James Zwilling
  • Publication number: 20170060704
    Abstract: A method and associated systems for synchronizing a disaster-recovery system of a database. A processor identifies transactions that affect data blocks of a database and records each change in a vector form. For each block, the processor determines a more efficient way to communicate changes made to the block by a subset of the identified transactions. If fewer resources are needed to communicate an updated image of the entire changed block than would be needed to instead communicate a related set of change vectors that identify changes made to the block by the subset of transactions, then the processor communicates the updated image to the disaster-recovery system. Otherwise, the processor instead communicates the related change vectors to the disaster-recovery system. The processor repeats these determinations and communications for each block of the database that was changed by an identified transaction.
    Type: Application
    Filed: November 10, 2016
    Publication date: March 2, 2017
    Inventors: Ramesh Chandra Pathak, Suryanarayana K. Rao
  • Publication number: 20170060705
    Abstract: One or more techniques and/or systems are provided for identifying configuration inconsistencies between storage virtual machines across storage clusters. For example, a first storage cluster and a second storage cluster may be configured according to a disaster recovery relationship where user data and configuration data of the first storage cluster are replicated to the second storage cluster so that the second storage cluster can takeover for the first storage cluster in the event a disaster occurs at the first storage cluster. Because replication of configuration data (e.g., a name and size of a volume, a backup policy, etc.) may fail for various reasons, configuration of the first storage cluster is compared to configuration of the second storage cluster to identify a configuration difference (e.g., a new size of the volume at the first storage cluster may have failed to be replicated to a replicated volume at the second storage cluster).
    Type: Application
    Filed: August 26, 2015
    Publication date: March 2, 2017
    Inventor: Harsha Sridhara
  • Publication number: 20170060706
    Abstract: According to one embodiment, a memory device saves data of a volatile memory to a first nonvolatile memory in response to an event of power loss. After recovery of power, based on management data indicating a relationship between an identifier of each of programs executed by a host system and address data of each of a plurality of regions of the volatile memory being used respectively by the programs, the memory device identifies a region of the first nonvolatile memory where the data of the region of the volatile memory being used by a first program of the programs before the power loss has been saved. The memory device restores the data stored in the identified region into a first region of the volatile memory newly allocated to the first program by the host system.
    Type: Application
    Filed: November 9, 2015
    Publication date: March 2, 2017
    Inventor: Tadaaki Kinoshita
  • Publication number: 20170060707
    Abstract: Restarting virtual machines is provided. Each server in a plurality of servers is monitored within a client virtual machine host environment via a network. In response to determining that a server failed in the plurality of servers within the client virtual machine host environment, a list of virtual machines that were executing in the failed server is retrieved. A set of virtual machine dependency groups for virtual machines in the list of virtual machines is retrieved based on properties corresponding to each respective virtual machine in the list of virtual machines. The set of virtual machine dependency groups is restarted in parallel on a failover server of an alternate virtual machine host environment via the network.
    Type: Application
    Filed: August 25, 2015
    Publication date: March 2, 2017
    Inventors: RICHARD E. HARPER, VALENTINA SALAPURA, MAHESH VISWANATHAN
  • Publication number: 20170060708
    Abstract: In one embodiment, a network interruption may be determined to have occurred at an active node of a communication system, wherein the active node may be facilitating a first communication dialog between a first end point and a second end point. In response to the network interruption, a stateful switchover can be initiated between the active node and a standby node of the communication system. A reroute message may be transmitted to the first end point and the second end point, wherein the reroute message can instruct the first end point and the second end point to cease use of the first communication dialog and begin use of a second communication dialog, wherein the second communication dialog may be facilitated by the standby node.
    Type: Application
    Filed: August 25, 2015
    Publication date: March 2, 2017
    Inventors: Rajeev Narang, Mark L. Hendrickson, Somashekar S V, Subramanian Thamaraisamy
  • Publication number: 20170060709
    Abstract: Embodiments include method, systems and computer program products for redundantly storing product data for an electronic component on an external device. Aspects include determining that product data stored in a primary storage device is corrupted and determining whether the product data is available on the external device that is in communication with the electronic component. Based on a determination that the product data stored in the primary storage device is corrupted and that the product data is available on the external device, aspects include obtaining product data from the external device to continue operation of the electronic component.
    Type: Application
    Filed: August 24, 2015
    Publication date: March 2, 2017
    Inventors: CORVILLE O. ALLEN, LEE N. HELGESON, JENNY S. LI, PHILIP J. SANDERS
  • Publication number: 20170060710
    Abstract: One or more techniques and/or systems are provided for migrating a trust relationship. For example, a first storage cluster and a second storage cluster have a disaster recovery relationship where the second storage cluster provides failover client access to replicated data, replicated from the first storage cluster to the second storage cluster, in the event the first storage cluster fails. The first storage cluster may have a trust relationship with a third storage cluster, such that data is mirrored from a volume of the first storage cluster into a mirrored volume of the third storage cluster based upon the trust relationship. In the event the first storage cluster fails over to the second storage cluster due to a disaster at the first storage cluster, the trust relationship is migrated to be between the second storage cluster and the third storage cluster for non-disruptive mirroring of data to the mirrored volume.
    Type: Application
    Filed: August 28, 2015
    Publication date: March 2, 2017
    Inventors: Balaji Ramani, Harsha Sridhara, Rakshit Karnawat
  • Publication number: 20170060711
    Abstract: A plurality of storage nodes within a single chassis is provided. The plurality of storage nodes is configured to communicate together as a storage cluster. The plurality of storage nodes has a non-volatile solid-state storage for user data storage. The plurality of storage nodes is configured to distribute the user data and metadata associated with the user data throughout the plurality of storage nodes, with erasure coding of the user data. The plurality of storage nodes is configured to recover from failure of two of the plurality of storage nodes by applying the erasure coding to the user data from a remainder of the plurality of storage nodes. The plurality of storage nodes is configured to detect an error and engage in an error recovery via one of a processor of one of the plurality of storage nodes, a processor of the non-volatile solid state storage, or the flash memory.
    Type: Application
    Filed: November 14, 2016
    Publication date: March 2, 2017
    Inventors: John D. Davis, John Hayes, Hari Kannan, Nenad Miladinovic, Zhangxi Tan
  • Publication number: 20170060712
    Abstract: An information handling system includes a method for detecting a predictive failure indication for a predictive failure indicated physical disk of a disk group, determining an amount of used storage capacity of a lowest capacity physical disk of the disk group, and comparing a replacement storage capacity of a replacement physical disk to the used storage capacity. When the replacement storage capacity is greater than or equal to the used storage capacity even if the replacement storage capacity is less than a lowest storage capacity of the lowest capacity physical disk of the disk group, replacing the predictive failure indicated physical disk with the replacement physical disk.
    Type: Application
    Filed: November 10, 2016
    Publication date: March 2, 2017
    Inventors: Neeraj Joshi, Vishnu M. Karrotu, Kavi K. Chakkravarthy
  • Publication number: 20170060713
    Abstract: Systems and methods for device compatibility testing and reporting are disclosed. An exemplary method includes outputting, by a testing computer station, instructions for executing a plurality of certification tests on a device under test. The method includes receiving result indications and corresponding certification test identifiers corresponding to each of the plurality of certification tests, and generating, by the testing computer station, compressed test results for each of the plurality of certification tests. The method includes combining at least a portion of the compressed test results into a reduced data report. The method includes sending, by a computer network in communication with the testing computer station and a remote server, the reduced data report to the remote server.
    Type: Application
    Filed: August 25, 2016
    Publication date: March 2, 2017
    Inventor: Zhonglei Wang
  • Publication number: 20170060714
    Abstract: A HDD backboard includes a power detecting circuit and a first working circuit. The power detecting circuit is configured to determine whether a plurality of voltage rails of the HDD backboard are normal, so as to output a power detecting signal. The first working circuit is coupled with the power detecting circuit and configured to receive the power detecting signal and output an HDD backboard determining signal. The motherboard includes a second working circuit and a CPLD. The CPLD is configured to receive the HDD backboard determining signal The CPLD is configured to determine whether the HDD backboard is absent when the electronic device operates in a standby mode and determine whether the voltage rails are failed when the electronic device operates in a working mode.
    Type: Application
    Filed: October 22, 2015
    Publication date: March 2, 2017
    Inventors: Ying-Xian HAN, Jian-Xin HUANG
  • Publication number: 20170060715
    Abstract: A distributed system and method for error handling testing of a target component in the distributed system uses a proxy gateway in the target component that can intercept communications to and from remote components of the distributed system. When a proxy mode of the proxy gateway in the target component is enabled, at least one of the communications at the proxy gateway is modified to introduce an error. When the proxy mode of the proxy gateway in the target component is disabled, the communications to and from the remote components of the distributed system are transmitted via the proxy gateway without modification.
    Type: Application
    Filed: August 31, 2015
    Publication date: March 2, 2017
    Applicant: VMware, Inc.
    Inventors: Ruopeng Ye, Victor Golosovker, Ilia Langouev, Aleksey Pershin, Bin Wang
  • Publication number: 20170060716
    Abstract: Embodiments relate to pre-silicon device testing using a persistent command table. An aspect includes receiving a value for a persistent command parameter from a user. Another aspect includes determining whether the value of the persistent command parameter is greater than zero. Another aspect includes based on determining whether the value of the persistent command parameter is greater than zero, selecting a number of commands equal to the value of the persistent command parameter from a regular command table of a driver of a device under test. Another aspect includes adding the selected commands to the persistent command table of the driver. Another aspect includes performing testing of the device under test via the driver using only commands that are in the persistent command table of the driver.
    Type: Application
    Filed: November 11, 2016
    Publication date: March 2, 2017
    Inventors: Dean G. Bair, Rebecca M. Gott, Edward J. Kaminski, JR., William J. Lewis, Chakrapani Rayadurgam
  • Publication number: 20170060717
    Abstract: The present disclosure relates to a method for managing performance of at least one instrumentation device deployed across one or more sites. The method comprises receiving instrument data from the at least one instrumentation device. The instrument data comprises data pertaining to performance of the at least one instrumentation device. The method further comprises validating the instrument data based on at least one of predefined range parameters, predefined error parameters, predefined policy parameters, and historical analysis parameters. The method further comprises determining at least one of calibration issues, maintenance issues, reliability of at least one of the instrumentation device, and quality of the instrument data based on validation of the instrument data and generating performance report based on the validation and the determination for managing the performance of the one or more instrumentation devices.
    Type: Application
    Filed: November 3, 2015
    Publication date: March 2, 2017
    Inventors: Dattaguru Basavapatna NANJUNDAIAH, Har Amrit Pal Singh DHILLON, Dinesh Kumar PATHAK, Atul KUMAR, Sudheer DALAVAYLA
  • Publication number: 20170060718
    Abstract: Methods and systems may provide for detecting an event external to a plurality of virtual machines running on one or more physical machines and determining that the event corresponds to one or more error conditions associated with at least one particular virtual machine in the plurality of virtual machines. Additionally, an alert may be generated in response to at least one of the one or more error conditions. In one example, detecting the event includes detecting an emulated device interrupt associated with the at least one particular virtual machine.
    Type: Application
    Filed: September 1, 2015
    Publication date: March 2, 2017
    Inventors: Dale M. Schultz, Radhika Sohoni, Esmond P. Walshe
  • Publication number: 20170060719
    Abstract: A status notification application displays a status of a peripheral device, and a bidirectional communication module operates as a service application and is capable of performing bidirectional communication with the peripheral device, and the status notification application issues a request to obtain a status of the peripheral device together with a name of the peripheral device to the bidirectional communication module, and the bidirectional communication module specifies a target peripheral device from which to obtain the status based on the name of the peripheral device, and transmits a request to obtain the status to the target peripheral device, and transmits to the status notification application the status sent back from the peripheral device in response to the request to obtain.
    Type: Application
    Filed: August 11, 2016
    Publication date: March 2, 2017
    Inventor: CHIE ITO
  • Publication number: 20170060720
    Abstract: The subject matter described herein relates to vendor-neutral testing and scoring of a system under test. One method for vendor-neutral scoring of a system under test includes generating a pre-testing snapshot of a system under test. The method further includes executing vendor-neutral testing of plural different subsystems of the system under test. The method further includes generating a vendor-neutral score based on the testing. The method further includes generating a post-testing snapshot of the system under test.
    Type: Application
    Filed: August 27, 2015
    Publication date: March 2, 2017
    Inventor: Avinash Ramanath
  • Publication number: 20170060721
    Abstract: An aspect includes performance profiling of an application. A processor executes an instruction stream of the application including instructions that are dynamically grouped at run-time. The processor monitors for an event associated with sampled instructions. A sampled instruction is associated with other events that include instruction grouping information. A number of the instructions in a group that includes the sampled instruction is determined as a group size. The monitored event is tracked as separate events with respect to each of the sampled instruction and one or more other instructions of the group. Subsequent monitored events are tracked as the separate events for each of the instructions from additional groups having various group sizes formed from a sequence of the instructions. An execution count for the sequence of the instructions is generated based on accumulating the separate events over a period of time.
    Type: Application
    Filed: October 21, 2015
    Publication date: March 2, 2017
    Inventors: Moshe Klausner, Nitzan Peleg
  • Publication number: 20170060722
    Abstract: Testing execution of workloads in a computing system is provided. The testing includes: providing a definition of one or more workloads for each one of a plurality of users of the computing system, mapping each production computing machine of each test workload on a staging computing machine of a staging environment common to the users, mirroring the production computing machine, executing each work unit of each test workload on the corresponding staging computing machine, and determining a test result of an execution of each test workload according to an execution result of one or more executions of the work units of the test workload.
    Type: Application
    Filed: August 24, 2015
    Publication date: March 2, 2017
    Inventors: Arcangelo Di BALSAMO, Ziantoni FRANCESCA, Ilaria GORGA, Sandro PICCININI
  • Publication number: 20170060723
    Abstract: A method and apparatus of a device that updates rules for a plurality of entities in a simulation as the simulation is running is described. In an exemplary embodiment, the device receives configuration parameters for the simulation, where the configuration parameters include a plurality of rules that control the interactions of the plurality of entities in the simulation. In addition, the device performs the simulation for a first plurality of iterations. Furthermore, the device analyzes the simulation results to determine if there is an update for the plurality of rules. If there is an update for the plurality of rules, the device creates the rule update for the plurality of rules. The device additionally applies the rule update to the plurality of rules.
    Type: Application
    Filed: August 28, 2015
    Publication date: March 2, 2017
    Inventors: Carlos Edel OLGUIN ALVAREZ, Malte Sebastian TINNUS, Florencio German MAZZOLDI
  • Publication number: 20170060724
    Abstract: A technique for estimating a format of a log message (LM) according to the present invention includes creating a first directed graph structure by dividing a first LM by predetermined characters to define divided portions as nodes and arranging the nodes in order from the beginning of the first LM; creating a second directed graph structure by performing on a second LM the same processing as that performed on the first LM; comparing nodes in the first directed graph structure with nodes in the second directed graph structure to detect nodes other than nodes including a corresponding character string; adding to the first directed graph structure the node detected in the second directed graph structure among the detected nodes as a first branch node; and estimating the format, based on the first directed graph structure including the first branch node added thereto.
    Type: Application
    Filed: November 11, 2016
    Publication date: March 2, 2017
    Inventor: Masayoshi Mizutani
  • Publication number: 20170060725
    Abstract: An aspect includes performance profiling of an application. A processor executes an instruction stream of the application including instructions that are dynamically grouped at run-time. The processor monitors for an event associated with sampled instructions. A sampled instruction is associated with other events that include instruction grouping information. A number of the instructions in a group that includes the sampled instruction is determined as a group size. The monitored event is tracked as separate events with respect to each of the sampled instruction and one or more other instructions of the group. Subsequent monitored events are tracked as the separate events for each of the instructions from additional groups having various group sizes formed from a sequence of the instructions. An execution count for the sequence of the instructions is generated based on accumulating the separate events over a period of time.
    Type: Application
    Filed: August 31, 2015
    Publication date: March 2, 2017
    Inventors: Moshe Klausner, Nitzan Peleg
  • Publication number: 20170060726
    Abstract: A programming environment and a simple programming language that runs on Ethernet block-input/output (block-IO) devices and hosting servers. In some embodiments, the ARGEE™ system includes a web-based programming environment that compiles a GUI program into a bytecode program of a virtual machine; and the virtual machine that runs in the device firmware and executes the bytecode program representing the GUI program created by a user. There are many programming languages that provide a web-based programming environment. Some such languages apply to embedded devices. However, the ARGEE™ system, considered as a whole, is unique in that the programming environment is not hosted on the same embedded device it controls. The system reduces the FLASH-memory requirements of the device by hosting the environment on an external server. The system also facilitates a faster update cycle of the environment software, making it easier to distribute changes to customers when environment changes.
    Type: Application
    Filed: August 24, 2016
    Publication date: March 2, 2017
    Inventor: Roman Glistvain