Patents Issued in March 16, 2017
-
Publication number: 20170075721Abstract: The technology disclosed relates to providing strong ordering in multi-stage processing of near real-time (NRT) data streams. In particular, it relates to maintaining current batch-stage information for a batch at a grid-scheduler in communication with a grid-coordinator that controls dispatch of batch-units to the physical threads for a batch-stage. This includes operating a computing grid, and queuing data from the NRT data streams as batches in pipelines for processing over multiple stages in the computing grid.Type: ApplicationFiled: December 31, 2015Publication date: March 16, 2017Applicant: salesforce.com, inc.Inventors: Elden Gregory Bishop, Jeffrey Chao
-
Publication number: 20170075722Abstract: One or more processors determine that a user is attempting to execute an unscheduled computing task and estimate the time for execution. One or more processors determine that a computing task is scheduled to execute along with the unscheduled computing task. One or more processors warn the user that the computing task is scheduled to execute along with the unscheduled computing task. One or more processors estimate one or both of: a utilization of processing and a memory consumption for the computing tasks and determine whether a threshold will be exceeded. If the threshold will be exceeded, one or more processors warn the user.Type: ApplicationFiled: December 2, 2016Publication date: March 16, 2017Inventor: Sunil Verma
-
Publication number: 20170075723Abstract: One or more processors determine that a user is attempting to execute an unscheduled computing task and estimate the time for execution. One or more processors determine that a computing task is scheduled to execute along with the unscheduled computing task. One or more processors warn the user that the computing task is scheduled to execute along with the unscheduled computing task. One or more processors estimate one or both of: a utilization of processing and a memory consumption for the computing tasks and determine whether a threshold will be exceeded. If the threshold will be exceeded, one or more processors warn the user.Type: ApplicationFiled: December 2, 2016Publication date: March 16, 2017Inventor: Sunil Verma
-
Publication number: 20170075724Abstract: Task patterns may exist in completed tasks within a task handling system. A task pattern may comprise task data and metadata and an action that the task handling system uses to complete the task. A task pattern may be identified and compared with task patterns in a database. If the identified task pattern matches a task in the database, a task pattern count for the task in the database can be incremented. If this incrementing results in the task pattern count exceeding a threshold, then the system can search for and identify other active tasks that match the task pattern. The appropriate action for the task pattern can be applied to each of the matched active tasks and each of the active tasks can then be closed.Type: ApplicationFiled: September 10, 2015Publication date: March 16, 2017Inventors: Alexander T. Bentley, Jonathan Limburn, Albert Maier, Scott Schumacher
-
Publication number: 20170075725Abstract: Task patterns may exist in completed tasks within a task handling system. A task pattern may comprise task data and metadata and an action that the task handling system uses to complete the task. A task pattern may be identified and compared with task patterns in a database. If the identified task pattern matches a task in the database, a task pattern count for the task in the database can be incremented. If this incrementing results in the task pattern count exceeding a threshold, then the system can search for and identify other active tasks that match the task pattern. The appropriate action for the task pattern can be applied to each of the matched active tasks and each of the active tasks can then be closed.Type: ApplicationFiled: October 26, 2016Publication date: March 16, 2017Inventors: Alexander T. Bentley, Jonathan Limburn, Albert Maier, Scott Schumacher
-
Publication number: 20170075726Abstract: Techniques for tracking large numbers of moving objects in an event processing system are provided. An input event stream can be received, where the events in the input event stream represent the movement of a plurality of geometries or objects. The input event stream can then be partitioned among a number of processing nodes of the event processing system, thereby enabling parallel processing of one or more continuous queries for tracking the objects. The partitioning can be performed such that each processing node is configured to track objects in a predefined spatial region, and the spatial regions for at least two nodes overlap. This overlapping window enables a single node to find, e.g., all of the objects within a particular distance of a target object, even if the target object is in the process of moving from the region of that node to the overlapping region of another node.Type: ApplicationFiled: November 23, 2016Publication date: March 16, 2017Applicant: Oracle International CorporationInventors: Hoyong Park, Eric Hsiao, Andy Piper
-
Publication number: 20170075727Abstract: Disclosed aspects manage a shared pool of configurable computing resources. A set of scaling factor data is monitored. The set of scaling factor data is related to a workload on a configuration of the shared pool of configurable computing resources. A set of workload resource data associated with the workload is ascertained. Using the set of scaling factor data and the set of workload resource data, a triggering event is detected. In response to detecting the triggering event, a configuration action (with respect to the configuration of the shared pool of configurable computing resources) is performed.Type: ApplicationFiled: September 13, 2015Publication date: March 16, 2017Inventors: Joseph W. Cropper, Jeffrey W. Tenner
-
Publication number: 20170075728Abstract: Disclosed aspects manage a shared pool of configurable computing resources. A set of scaling factor data is monitored. The set of scaling factor data is related to a workload on a configuration of the shared pool of configurable computing resources. A set of workload resource data associated with the workload is ascertained. Using the set of scaling factor data and the set of workload resource data, a triggering event is detected. In response to detecting the triggering event, a configuration action (with respect to the configuration of the shared pool of configurable computing resources) is performed.Type: ApplicationFiled: September 27, 2015Publication date: March 16, 2017Inventors: Joseph W. Cropper, Jeffrey W. Tenner
-
Publication number: 20170075729Abstract: At least one guest system, for example, a virtual machine, is connected to a host system, which includes a system resource such as system machine memory. Each guest system includes a guest operating system (OS). A resource requesting mechanism, preferably a driver, is installed within each guest OS and communicates with a resource scheduler included within the host system. If the host system needs any one the guest systems to relinquish some of the system resource it currently is allocated, then the resource scheduler instructs the driver within that guest system's OS to reserve more of the resource, using the guest OS's own, native resource allocation mechanisms. The driver thus frees this resource for use by the host, since the driver does not itself actually need the requested amount of the resource. The driver in each guest OS thus acts as a hollow “balloon” to “inflate” or “deflate,” that is, reserve more or less of the system resource via the corresponding guest OS.Type: ApplicationFiled: September 23, 2016Publication date: March 16, 2017Inventor: Carl A. WALDSPURGER
-
Publication number: 20170075730Abstract: A method and an apparatus for a parallel computing program calling APIs (application programming interfaces) in a host processor to perform a data processing task in parallel among compute units are described. The compute units are coupled to the host processor including central processing units (CPUs) and graphic processing units (GPUs). A program object corresponding to a source code for the data processing task is generated in a memory coupled to the host processor according to the API calls. Executable codes for the compute units are generated from the program object according to the API calls to be loaded for concurrent execution among the compute units to perform the data processing task.Type: ApplicationFiled: September 26, 2016Publication date: March 16, 2017Inventors: Aaftab Munshi, Nathaniel Begeman
-
Publication number: 20170075731Abstract: The estimation of a computing capacity of a machine. The computing capacity is estimated by iteratively adding and removing calibrated computer processes on the machine, and performing a sum of computing loads of processes that execute on the machine. In order to characterize the ability of a machine to run in parallel a number of processes having a defined computing load, the processes are associated to a condition of success.Type: ApplicationFiled: September 10, 2016Publication date: March 16, 2017Inventors: Eric Le Bars, Arnaud Mahe, Christophe Berthelot, David Henry
-
Publication number: 20170075732Abstract: A technique making it possible to perform flexible virtual machine control is provided. A server according to the present invention is characterized by including: a first means capable of operating a plurality of network functions executed by a network node on a plurality of virtual machines corresponding respectively to the network functions; and a second means capable of forwarding a received signal to a virtual machine that operates a network function corresponding to the received signal, wherein the first means is capable of controlling a resource to allocate to the virtual machine corresponding to the network function, depending on a type of the network function.Type: ApplicationFiled: March 3, 2015Publication date: March 16, 2017Applicant: NEC CorporationInventors: Nobuhiko ITOH, Ippei AKIYOSHI
-
Publication number: 20170075733Abstract: A method and device for controlling a frequency of a processor of a computing device are disclosed. The method includes receiving requests to process tasks on a processor of the computing device, classifying each of the tasks as either a new workload group or an historic workload group, and monitoring a load placed on the processor due to each of the workload groups. And the frequency of the processor is controlled based upon a total workload on the processor and a contribution of each of the workload groups to the total workload.Type: ApplicationFiled: August 18, 2016Publication date: March 16, 2017Inventor: Saravana Krishnan Kannan
-
Publication number: 20170075734Abstract: Methods, devices, systems, and non-transitory process-readable storage media for a multi-processor computing device to schedule multi-versioned tasks on a plurality of processing units. An embodiment method may include processor-executable operations for enqueuing a specialized version of a multi-versioned task in a task queue for each of the plurality of processing units, wherein each specialized version is configured to be executed by a different processing unit of the plurality of processing units, providing ownership over the multi-versioned task to a first processing unit when the first processing unit is available to immediately execute a corresponding specialized version of the multi-versioned task, and discarding other specialized versions of the multi-versioned task in response to providing ownership over the multi-versioned task to the first processing unit. Various operations of the method may be performed via a runtime functionality.Type: ApplicationFiled: September 14, 2015Publication date: March 16, 2017Inventor: Arun Raman
-
Publication number: 20170075735Abstract: Computer-implemented methods and systems are provided for writing events to a data store. An application server generates events, the data store that stores the events, and a temporary events file storage system (TEFSS) temporarily stores groups of events as events files. When events are unable to be written directly to the data store, an indirect events writer is invoked that includes event capture threads each being configured to generate a particular events file, and write it to the TEFSS. Each events file includes a plurality of events flushed from an in-memory buffer service. An events file uploader service reads the events file(s) from the TEFSS, and then writes the events from each of the events files to the data store.Type: ApplicationFiled: December 21, 2015Publication date: March 16, 2017Applicant: salesforce.com, inc.Inventors: Aakash Pradeep, Adam Torman, Alex Warshavsky, Samarpan Jain
-
Publication number: 20170075736Abstract: A node managing unit (11) selects, for an event associated with a sub-context of a specific context, an event distributing unit of a plurality of event distributing units (12, 13), which distributes events towards queues for the specific context. The selected event distributing unit selects a queue for the sub-context, which is associated with a rule engine unit of a plurality of rule engines units (17, 19), which comprises a rule execution unit associated with the specific context. A rule managing unit of the rule engine unit, which receives the event from the selected queue for the sub-context, selects the rule execution unit of the plurality of rule execution units, which is associated with the specific context, and delivers, to the selected rule execution unit, a particular rule of a rule set associated with the rule execution unit, within the associated sub-context.Type: ApplicationFiled: March 7, 2014Publication date: March 16, 2017Inventors: Nuno Alexandre BORGES, Andre Goncalo FIGUEIRA, Ivo RODRIGUES, Joao MARTINS, Joao SILVA TEIXEIRA, Nuno MEIRA, Sergio Afonso ABREAU, Vasco CARVALHO, Luis MARREIROS, Rui Pedro ALVES DA CUNHA
-
Publication number: 20170075737Abstract: A method of displaying notifications and an electronic device adapted thereto are provided. The method includes receiving at least one communication event or message from at least one external device; obtaining identification information which is stored in the memory or is obtained from the at least one external device or at least one external device; identifying a user who sent the received, at least one communication event or message, by using the obtained identification information; creating or extracting notice information, based on at least part of the received, at least one communication event or message; linking the notice information to the identified user; and displaying and overlaying a notice, grouping information regarding the identified user and the notice information, on other objects displayed on the screen of the display.Type: ApplicationFiled: September 16, 2016Publication date: March 16, 2017Inventors: Youngri KIM, Jina LEE, Eunsun KIM, Kwangha JEON, Minhwa HONG, Yoojin HONG, Jeonghyun PANG
-
Publication number: 20170075738Abstract: Technologies are presented that allow application events to be recorded and replayed in a reliable and deterministic manner. A computing system may include a memory and a processor communicatively coupled with the memory. The processor may execute application logic of an application, record events associated with the application based on invocation of functions associated with the events, and store the recorded events in the memory for future playback. Recorded events may include, for example, user interactions, timing events, network downloads, callbacks, web worker tasks, etc. The recording of the events may include recording top-level functions of each event according to their order, and recording associated data including function parameters and/or return values. The recorded events may be replayed in order using the recorded associated data while suppressing non-recorded events.Type: ApplicationFiled: May 14, 2014Publication date: March 16, 2017Applicant: Intel CorporationInventors: Junchao Han, Junyong Ding, Yongnian Le, Kangyuan Shu
-
Publication number: 20170075739Abstract: A method and an apparatus for determining a usage level of a memory device to notify a running application to perform memory reduction operations selected based on the memory usage level are described. An application calls APIs (Application Programming Interface) integrated with the application codes in the system to perform memory reduction operations. A memory usage level is determined according to a memory usage status received from the kernel of a system. A running application is associated with application priorities ranking multiple running applications statically or dynamically. Selecting memory reduction operations and notifying a running application are based on application priorities. Alternatively, a running application may determine a mode of operation to directly reduce memory usage in response to a notification for reducing memory usage without using API calls to other software.Type: ApplicationFiled: November 28, 2016Publication date: March 16, 2017Inventors: Matthew G. Watson, James Michael Magee
-
Publication number: 20170075740Abstract: Systems, methods, and devices for managing predetermined functions on a mobile device within a moving vehicle, the mobile device having an operating system (OS) that includes an event API installed therein that is configured for two-way communication with an external control device, the control device being installed within the vehicle and further configured to communicate with a software application installed and running in memory resident on the mobile device. In response to initiation of a predetermined function on the mobile device, a notification message is transmitted by the event API to the control device. The control device then communicates with the software application to determine a desired action for the mobile device to take with respect to the predetermined function. The control device then instructs the mobile device on the action to take on the predetermined function by transmitting an action message to the event API.Type: ApplicationFiled: June 23, 2016Publication date: March 16, 2017Applicant: obdEdge, LLCInventors: Joseph E. Breaux, Chad A. Kennedy, Michael W. Lynn
-
Publication number: 20170075741Abstract: A method of prioritizing data for recovery in a distributed storage system includes, for each stripe of a file having chunks, determining whether the stripe comprises high-availability chunks or low-availability chunks and determining an effective redundancy value for each stripe. The effective redundancy value is based on the chunks and any system domains associated with the corresponding stripe. The distributed storage system has a system hierarchy including system domains. Chunks of a stripe associated with a system domain in an active state are accessible, whereas chunks of a stripe associated with a system domain in an inactive state are inaccessible. The method also includes reconstructing substantially immediately inaccessible, high-availability chunks having an effective redundancy value less than a threshold effective redundancy value and reconstructing the inaccessible low-availability and other inaccessible high-availability chunks, after a threshold period of time.Type: ApplicationFiled: November 22, 2016Publication date: March 16, 2017Applicant: Google Inc.Inventors: Steven Robert Schirripa, Christian Eric Schrock, Robert Cypher, Sean Quinlan
-
Publication number: 20170075742Abstract: A method for maintaining a file system of a computer system is disclosed. An operating system is loaded to the computer system when the computer system is booted, such that the file system of the computer system is monitored in real time after the computer system is booted. When occurrence of an error in the file system is detected, a number of times the error has occurred is accumulated. When the number of times the error has occurred reaches a predetermined threshold, a notification message is generated and displayed on an electronic apparatus. Accordingly, a manager of the computer system may be notified immediately when the occurrence of the error in the file system is detected.Type: ApplicationFiled: November 2, 2016Publication date: March 16, 2017Inventors: Chung-Cheng Li, Chien-Kuan Yeh, Shih-Hsien Liu
-
Publication number: 20170075743Abstract: In one embodiment, a method includes receiving at a location related failure identification device, failure data for a plurality of components within a system, mapping at the device, the failure data to location data comprising a location of each of the components within the system, identifying at the device, location related failures based on the mapping, and outputting from the device, information on the location related failures. An apparatus and logic are also disclosed herein.Type: ApplicationFiled: September 10, 2015Publication date: March 16, 2017Applicant: CISCO TECHNOLOGY, INC.Inventors: Min Zhu, Jingming Li
-
Publication number: 20170075744Abstract: Methods and arrangements for identifying root causes of system failures in a distributed system said method including: utilizing at least one processor to execute computer code that performs the steps of: recording, in a storage device, collected machine state data, wherein the collected machine state data are added to historical machine state data; creating, based on the historical machine state data, a healthy map model; detecting at least one failed machine state in the distributed system; comparing the failed machine state against the healthy map model; identifying, based on the comparison, at least one root cause of the failed machine state; and displaying, on a display device, a ranked list comprising the at least one root cause. Other variants and embodiments are broadly contemplated herein.Type: ApplicationFiled: September 11, 2015Publication date: March 16, 2017Inventors: Prasad Manikarao Deshpande, Animesh Nandi, Suriya Subramanian
-
Publication number: 20170075745Abstract: A facility for responding to the crash of a computing system subsystem is described. The facility detects a crash of the subsystem. In response to this detecting, the facility provides diagnostic information representing state of the peripheral subsystem to a crash analysis service, and restarts the subsystem without restarting the computing system.Type: ApplicationFiled: September 16, 2015Publication date: March 16, 2017Inventors: Bin Wang, Pengxiang Zhao, Dejun Zhang, Robert Yu Zhu, Ying Chin, Satyendra Bahadur
-
Publication number: 20170075746Abstract: The present invention provides an information processing device that outputs information including the data transmission relationship between elements constituting an information processing system, the information indicating the state of the information processing system. The information processing device includes a graphing means for generating a relationship graph based on an event log indicating the behavior of each of a plurality of processes operating in the system, the relationship graph having the processes as the vertices thereof and having the data transmission relationship between the vertices as the sides thereof; and a graph output means for outputting the generated relationship graph.Type: ApplicationFiled: March 18, 2015Publication date: March 16, 2017Applicant: NEC CorporationInventors: Takashi NOMURA, Koji KIDA, Junpei KAMIMURA, Yoshiaki SAKAE, Etsuko KATSUDA, Kazuhiko ISOYAMA, Kentaro YAMASAKI, Yuji KOBAYASHI
-
Publication number: 20170075747Abstract: A control server includes a memory that stores therein configuration information on a system that operates in each of data centers. The control server specifies, from the information stored in the memory, a data center having configuration information on the system that meets a condition under which a failure occurs. Thereafter, the control server transmits failure information relating to the failure to a notification destination of the specified data center that meets the condition under which a failure occurs.Type: ApplicationFiled: August 26, 2016Publication date: March 16, 2017Applicant: FUJITSU LIMITEDInventors: Tadahiro KAGEYAMA, Koyo Miyagi, Hideki Sakurai, Masanori Kimura, Kei Ohishi
-
Publication number: 20170075748Abstract: Apparatus and methods for remotely monitoring a plurality of distributed devices is provided. The apparatus and methods determine logging conditions which define a state of a device at which recording of the state of the device should begin prior to an event, in order to identify a sequences of actions which occur at the devices prior to the event.Type: ApplicationFiled: September 8, 2016Publication date: March 16, 2017Inventors: James Crosby, Marcus Chang
-
Publication number: 20170075749Abstract: A method is disclosed that estimates causal relationships between events based on heterogeneous monitoring data. The monitoring data consists in transaction tracing data, describing the execution performance of individual transactions, resource utilization measurements of infrastructure entities like processes or operating systems and network utilization measurement data. A topology model of the monitored environment describing its entities and the communication activities of these entities is incrementally created. The location of occurred events in the topology model is determined. The topology model is used in conjunction with a domain specific causality propagation knowledge base to calculate the possibility of causal relationships between events. Different causality determination mechanisms, based on the type of involved events are used to create graphs of causal related events.Type: ApplicationFiled: September 14, 2016Publication date: March 16, 2017Inventors: Ernst AMBICHL, Helmut SPIEGL, Otmar ERTL, Herwig MOSER
-
Publication number: 20170075750Abstract: A method of and system for managing spaces in memory of a storage facility is disclosed. The method and system includes storing first and second identifiers in first and second spaces in memory in response to allocating the second space for a set of data. The first identifier is stored in a first field within the first space. The first space has a pointer in a second field. The pointer in the second field indicates an address of the second space. The second identifier is stored within a portion of the second space. In response to an error event, the first and second identifiers may be captured. A determination is made as to whether the pointer is directed to the set of data. The determination is based on a comparison of the first identifier and the second identifier.Type: ApplicationFiled: November 14, 2016Publication date: March 16, 2017Inventors: Douglas W. Dewey, Kevin S. Goldsmith
-
Publication number: 20170075751Abstract: A method of firmware dump collection from a primary dump adapter is provided. The method includes identifying a primary system dump device and a secondary system dump device. An operating system (OS) dump coordinator writes non-disruptive state data to the primary system dump device, and writes disruptive state data to the secondary system dump device. Non-disruptive state data is requested from a hardware device adapter that is connected to the non-primary system dump device. Disruptive state data is requested from the hardware device adapter that is connected to the primary system dump device. The non-disruptive state data is written to the primary system dump device. Disruptive state data is written to the secondary system dump device.Type: ApplicationFiled: December 2, 2016Publication date: March 16, 2017Inventors: Marcus B. Grande, Brian W. Hart
-
Publication number: 20170075752Abstract: A method of firmware dump collection from a primary dump adapter is provided. The method includes identifying a primary system dump device and a secondary system dump device. An operating system (OS) dump coordinator writes non-disruptive state data to the primary system dump device, and writes disruptive state data to the secondary system dump device. Non-disruptive state data is requested from a hardware device adapter that is connected to the non-primary system dump device. Disruptive state data is requested from the hardware device adapter that is connected to the primary system dump device. The non-disruptive state data is written to the primary system dump device. Disruptive state data is written to the secondary system dump device.Type: ApplicationFiled: December 2, 2016Publication date: March 16, 2017Inventors: Marcus B. Grande, Brian W. Hart
-
Publication number: 20170075753Abstract: A method of distributing data in a distributed storage system includes receiving a file and dividing the received file into chunks. The chunks are data-chunks and non-data chunks. The method further includes grouping chunks into a group and determining a distribution of the chunks of the group among storage devices of the distributed storage system based on a maintenance hierarchy of the distributed storage system. The maintenance hierarchy includes hierarchical maintenance levels and maintenance domains. Each maintenance domain has an active state or an inactive state; and each storage device is associated with at least one maintenance domain. The method also includes distributing the chunks of the group to the storage devices based on the determined distribution. The chunks of the group are distributed across multiple maintenance domains to maintain an ability to reconstruct chunks of the group when a maintenance domain is in the inactive state.Type: ApplicationFiled: November 3, 2016Publication date: March 16, 2017Applicant: Google Inc.Inventors: Robert Cypher, Sean Quinlan, Steven Robert Schirripa, Lidor Carmi, Christian Eric Schrock
-
Publication number: 20170075754Abstract: A cyclic redundancy check (CRC) device configured to support parallel calculation of a CRC value for a data frame comprises a plurality of CRC processing units each configured to accept one of a plurality of data segments of the data frame of a variable size that can be unknown to the CRC device beforehand and generate one of plurality of partial CRC values in parallel with rest of the CRC processing units over multiple clock cycles/iterations. The CRC device further comprises an integration component configured to integrate the plurality of partial CRC values from the plurality of CRC processing units into one final CRC value for the data frame, wherein the final CRC value is attached to the data frame for error checking during storage or transmission of the data frame.Type: ApplicationFiled: September 10, 2015Publication date: March 16, 2017Inventor: Weihuang Wang
-
Publication number: 20170075755Abstract: A data storage system includes: a processing circuit arranged to receive a data bytes from a host; a calculating circuit arranged to generate a cyclic redundancy check code according to a logical block address, and combine the cyclic redundancy check code and the data bytes to be a data sector; and an encoding circuit arranged to encode the data sector to generate an error checking and correcting code, and combine the data sector and the error checking and correcting code to be a storing data.Type: ApplicationFiled: September 9, 2016Publication date: March 16, 2017Inventors: Tsung-Chieh Yang, Sheng-I Hsu
-
Publication number: 20170075756Abstract: A cache memory system has a nonvolatile memory which includes a first region and a second region, the first region storing readable and writable data, the second region storing an ECC for correcting an error of the data in the first region, an error corrector which generates the ECC and carries out an error correction of the data in the first region with the ECC, error rate determination circuitry which determines an error rate of the data in the first region, and region size adjustment circuitry which adjusts a size of the second region inside the nonvolatile memory based on the error rate.Type: ApplicationFiled: September 12, 2016Publication date: March 16, 2017Inventors: Hiroki NOGUCHI, Shinobu FUJITA
-
Publication number: 20170075757Abstract: A memory cell array includes memory cells that are formed in vertical channels extended in a vertical direction with respect to a substrate. The vertical channels are arranged in a zig-zag manner in parallel to the first direction. A read-write circuit is connected to the memory cells via bit lines. An address decoder decodes an address to provide decoded address signals to the read-write circuit. The memory cells include outer cells and inner cells. A distance between one of the outer cells and a common source node is smaller than a distance between one of the inner cells and the common source node. Data of the memory cells are distributed among ECC sectors and a data input-output order of the memory cells is arranged such that each ECC sector has substantially the same number of the outer cells and the inner cells. Each ECC sector corresponds to an ECC operation unit.Type: ApplicationFiled: March 4, 2016Publication date: March 16, 2017Inventors: JAE-WOO IM, SANG-HYUN JOO
-
Publication number: 20170075758Abstract: According to one embodiment, when a write request of first data is received, a controller selects one frame type from among a plurality of frame types including first and second frame types based on information including defective memory cell information of nonvolatile memory and generates a codeword including the first data and in correspondence with the selected frame type. In a case where the first frame type is selected, the controller generates a frame corresponding to the first frame type based on the information and the codeword and writes the generated frame corresponding to the first frame type into the nonvolatile memory.Type: ApplicationFiled: March 10, 2016Publication date: March 16, 2017Applicant: Kabushiki Kaisha ToshibaInventors: Riki SUZUKI, Toshikatsu HIDA
-
Publication number: 20170075759Abstract: According to one embodiment, a memory system includes: a memory cell arrange array capable of storing data in units of pages; a first latch which stores data in units of pages; a second latch which stores data in units of pages; a third latch which stores data in units of pages; and an ECC circuit which performs error correction processing for the data in the memory cell array in units of sectors smaller than pages. The memory system reads a first sector from the memory cell array in a first time, or reads the first sector from the third latch in a second time shorter than the first time. The ECC circuit determines whether or not the first sector contains an error.Type: ApplicationFiled: March 14, 2016Publication date: March 16, 2017Applicant: KABUSHIKI KAISHA TOSHIBAInventor: Takahiro OTSUKA
-
Publication number: 20170075760Abstract: A state indicating value is encoded with a one-hot or one-cold encoding and each bit of the state indicating value is stored in a different portion of a storage element. Parity values are determined for each portion of the storage element and stored to a parity storage element. This allows errors caused by single event upsets or multi-bit upsets to be detected and corrected, with lower hardware cost compared to alternative approaches.Type: ApplicationFiled: September 11, 2015Publication date: March 16, 2017Inventors: Emre ÖZER, Balaji VENU
-
Publication number: 20170075761Abstract: In some examples, a multi-node system may access physical storage divided into extents and further arranged into extent groups that may be allocated on demand as thin provisioned storage in response to write requests. Protection class instances are set with specified data protection capabilities. Each instance acts as a logical unit having a distinct addressable block storage space from the extent groups allocated thereto. The extents in an extent group to be allocated to a given protection class instance may vary depending on the protection class capabilities. Management information for the extents, extent groups, and protection classes may be stored in mirrored devices separate from the write data stored in the extents for providing redundant protection to the management information and for increasing the availability of write data in the event of a failure that may cause data loss at one or more locations in the system.Type: ApplicationFiled: December 9, 2014Publication date: March 16, 2017Inventors: Charles C. BENNETT, JR., Nathan W. CLARK, Kevin Canuette GRIMALDI
-
Publication number: 20170075762Abstract: A computing device includes an interface configured to interface and communicate with a dispersed storage network (DSN), a memory that stores operational instructions, and a processing module operably coupled to the interface and memory such that the processing module, when operable within the computing device based on the operational instructions, is configured to perform various operations. The computing device detects a failed memory device (e.g., of a storage unit (SU) that stores at least one encoded data slice (EDS). The computing device then determines a DSN address range associated with at least some EDSs associated with a data object stored within the failed memory device and transmits the DSN address range to another computing device within the DSN to instruct restriction within the DSN of a memory access request for an EDSs associated with the data object that is stored within the failed memory device.Type: ApplicationFiled: November 28, 2016Publication date: March 16, 2017Inventors: Dustin M. Hendrickson, Manish Motwani
-
Publication number: 20170075763Abstract: A method includes a computing device determining dispersed storage error encoded parameters for dispersed storage error encoding a data object. The method further includes the computing device dividing the dispersed storage error encoding into a plurality of encoding tasks. The method further includes allocating, by the computing device, the encoding tasks to a plurality of central processing units (CPUs) available to the computing device. The method further includes dispersed storage error encoding, by the CPUs, the data segments into the plurality of sets of encoded data slices in accordance with the encoding tasks. The method further includes sending, by the computing device, the plurality of sets of encoded data slices to storage units of the DSN for storage therein.Type: ApplicationFiled: November 28, 2016Publication date: March 16, 2017Inventors: Andrew D. Baptist, Greg R. Dhuse, Jason K. Resch, Ilya Volvovski
-
Publication number: 20170075764Abstract: A system and method are provided for the recovery and restoration of software records of a database server to record iterations previous to the current state of the selected records. This action may be taken in order to overcome the consequences of database corruption. An event-time may be designated which is applied to select some or all of the earlier but most recent versions of each selected record. The system and method presented include a local target database for the purpose of recording software records to an archive, and may include a remote source database, from which records may be transmitted to the local target database. A restore command may be detected by the database server as sent from the remote source server, as received in an electronic message, as received via an electronics communications network, or as directly input.Type: ApplicationFiled: April 26, 2016Publication date: March 16, 2017Inventor: Richard Banister
-
Publication number: 20170075765Abstract: A hybrid backup and recovery management system for database versioning and virtualization with data transformation is disclosed. The hybrid backup and recovery management system includes at least one original storage device, at least one target storage device, a database managing sub-system, and a conversion module. The present invention takes advantages of fast speed of data transmitting in volume level format while let DBAs see the procedure and interface of backup and recovery are the same as what they are used to (file level format). Current database management system can be kept just with some modules plugged in. Fast backup and recovery can be achieved.Type: ApplicationFiled: September 14, 2015Publication date: March 16, 2017Applicant: ProphetStor Data Services, Inc.Inventor: Wen Shyen CHEN
-
Publication number: 20170075766Abstract: Systems, methods, and computer program products are provided for reducing the size of image level backups. An example method receives backup parameters identifying a physical or Virtual Machine (VM) to backup and at least one file system object to include in the backup. The method connects to production storage corresponding to the selected physical or virtual machine and obtains access to data stored in disk corresponding to the selected file system object(s). The method fetches file allocation table (FAT) blocks from the disk and parses contents of the FAT blocks to determine if the disk blocks correspond to the selected file system object(s). The method creates a backup disk image FAT comprising blocks corresponding to the selected file system object(s). The method creates a reconstructed disk image FAT blocks corresponding to the backup FAT and disk image data blocks belonging to the selected file system object(s) and all other disk image data blocks are saved as zero blocks.Type: ApplicationFiled: November 22, 2016Publication date: March 16, 2017Inventors: Ratmir TIMASHEV, Anton GOSTEV
-
Publication number: 20170075767Abstract: A database system may maintain a plurality of log records at a distributed storage system. Each of the plurality of log records may be associated with a respective change to a data page. The plurality of log records may be transformed (e.g., cropped, prune, reduce, fused, deleted, merged, added, etc.).Type: ApplicationFiled: November 21, 2016Publication date: March 16, 2017Applicant: Amazon Technologies, Inc.Inventors: PRADEEP JNANA MADHAVARAPU, NEAL FACHAN, ANURAG WINDLASS GUPTA, SAMUEL JAMES MCKELVIE
-
Publication number: 20170075768Abstract: The invention relates to a computer implemented method for creating a backup of data by a computer system. The creation of the backup comprises: assigning a first memory space in a main memory to data and loading the data into the first memory space; allocating a second memory space in the main memory for acting as container of one or more images of the data in the first memory space; creating the one or more images of the data in the first memory space; and storing the created one or more images in the second memory space and storing a respective copy of at least one of the one or more images in the one or more non-volatile storage media.Type: ApplicationFiled: November 28, 2016Publication date: March 16, 2017Inventors: Martin Oberhofer, Michail Tausch, Andreas Trinks, Andreas Uhl
-
Publication number: 20170075769Abstract: Provided are methods and apparatuses for providing contents via a network, in which original data of contents provided via a network can be traced, and contents that are modified according to performance of a contents receiving device is provided. Location information of original contents is added to metadata of contents provided via the network to thereby increase convenience of access to the original contents and modify attributes of contents that are provided, to be suitable for the performance of the contents receiving device.Type: ApplicationFiled: November 22, 2016Publication date: March 16, 2017Applicant: SAMSUNG ELECTRONICS CO., LTD.Inventors: Keum-koo LEE, Ju-yun SUNG, Sun-ae KIM, Hee-jeong CHOO, Ji-young KWAHK
-
Publication number: 20170075770Abstract: Methods, systems, and computer program products for restoring a backend after a backend disconnect. The method includes detecting a disconnect of a backend. The method further includes setting a flag and notifying a guest regarding the disconnect. The method further includes resetting a data structure accessed by the backend. The method further includes detecting (or initiating) or a reconnect of the backend. The method further includes sending the backend a state of the data structure.Type: ApplicationFiled: November 28, 2016Publication date: March 16, 2017Inventor: Michael Tsirkin