Patents Issued in April 13, 2017
-
Publication number: 20170102966Abstract: A task-based sub-application surfaces only controls that are needed to perform a task, from a plurality of different forms in a parent application. A sub-application system runs the sub-application by executing navigation logic and maintaining a separate navigation stack, so that the user can perform a task without the computer system needing to surface entire forms where only a small subset of the controls on those forms are needed to perform the task.Type: ApplicationFiled: May 24, 2016Publication date: April 13, 2017Inventors: Daniel Dallala, Hao Zhou, Tobin James Zerba, Mesganaw G. Anteneh, Indrojit N. Deb, Nirav Shah, Elizabeth Rose Steinke, Shashi Ranjan, Bharath Swaminathan, Richard L. Dickinson, Monisha Rochlani, Tong Gao, Jianjun Wang, Zhi Jun Zhao
-
Publication number: 20170102967Abstract: An embodiment includes a method includes designating a portion of a plurality of processing cores as an input/output (I/O) core and compiling a program source code to produce compiled program source code, including identifying an I/O operation region of the program source code, determining a number of I/O operations for the I/O operation region, and determining a number of system resources and system resource types for the I/O operation region. The method also includes executing the program source code using the plurality of processing cores, including scheduling the I/O operation region of the program source code on the I/O core of the plurality of processing cores.Type: ApplicationFiled: December 21, 2016Publication date: April 13, 2017Inventors: Chen Tian, Handong Ye, Ziang Hu
-
Publication number: 20170102968Abstract: The invention relates to a time-triggered computer system (800) that involves [i] a Main Processor (801) that has been designed to run one or more tasks according to one or more predetermined task schedules, only one of which, the “active task schedule”, will be active at any point in time; [ii] a Monitor Processor (802) that has been designed to determine whether the Main Processor (801) is about to execute a task that is not in accordance with the active task schedule; [iii] a Communication Link (803) for passing information about future task executions between the Main Processor (801) and the Monitor Processor (802); and [iv] a Control Mechanism (comprising a System Control output (805), and/or a Communication Link B (806), and/or a Reset Link (807)) by means of which the Monitor Processor can halt or reset the Main Processor and take other corrective actions involving devices to which the computer system is connected, if the Monitor Processor determines that the Main Processor is about to execute a task tType: ApplicationFiled: March 16, 2015Publication date: April 13, 2017Inventor: Michael Joseph Pont
-
Publication number: 20170102969Abstract: A system according to certain aspects improves the process of managing jobs and allocating resources to those jobs. The system can include a job manager that processes and generates resource allocation requests for a plurality of jobs and a resource allocator that allocates computing resources for the plurality of jobs based on the resource allocation requests. The process of allocating resources may involve locking one or more resource objects before allocating the computing resources for the plurality of jobs and unlocking the locked resource objects after the computing resources have been allocated for the plurality of jobs.Type: ApplicationFiled: December 22, 2016Publication date: April 13, 2017Inventors: Jaidev Oppath KOCHUNNI, Chong LIU, Hemant MISHRA
-
Publication number: 20170102970Abstract: Methods and computer systems execute biometric operations in parallel. The performance of a biometric operation includes receiving a job request to perform the biometric operation. The job request includes input data, identifies a database to be used in the performance of the biometric operation, and specifies a function to be performed. The biometric operation is restructured as one or more tasks. A number of entries in the database is assigned to each of the one or more tasks. An independent worker process is generated for each different core of the multi-core processor. Each task of the one or more tasks is assigned to one of the worker processes. Results produced by each worker process assigned one of the one or more tasks are collected. A result of the biometric operation based on the collected results is reported.Type: ApplicationFiled: May 18, 2015Publication date: April 13, 2017Inventors: Steven KOLK, Louis Scott HILLS
-
Publication number: 20170102971Abstract: The methods and apparatus can assign processing core workloads to processing cores from a heterogeneous instruction set architectures (ISA) pool of available processing cores based on processing core metric results. For example, the method and apparatus can obtain processing core metric results for one or more processing cores, such as processing cores within general purpose processors, from a heterogeneous ISA pool of available processing cores. The method and apparatus can also obtain one or more processing core workloads, such as software applications or software processes, from a pool of available processing core workloads to be assigned. The method and apparatus can then assign one or more processing core workloads that have higher priority than others from the pool of available processing core workloads to a processing core from the heterogeneous ISA pool of available processing cores based on its processing core metric result.Type: ApplicationFiled: October 12, 2015Publication date: April 13, 2017Applicant: ADVANCED MICRO DEVICES, INC.Inventor: Sergey Blagodurov
-
Publication number: 20170102972Abstract: An approach to creating a canonical representation of a JavaScript API. Objects associated with the JavaScript API are instantiated, creating entry points for analysis. A list of discovered objects is created based on parsing a document object model associated with the JavaScript API. The objects are instrumented and statically analyzed, creating an infrastructure associated with the JavaScript API. The infrastructure is updated based on analyzing the objects while the interface is being used and the objects are executing. A canonical representation, based on the updated infrastructure, is generated for further operations.Type: ApplicationFiled: December 22, 2016Publication date: April 13, 2017Inventors: Yoav Ben-Yair, Gil Fuchs, Itai Gordon, Oren Paikowsky
-
Publication number: 20170102973Abstract: Apparatus for enabling application-level direct control of multiple facilities are disclosed herein. In one embodiment, a processor comprising a plurality of facilities comprised of hardware units that run independently from the processor; and, a register configured to store status information and control information associated with the plurality of facilities. The processor is configured to perform an operation that includes reading, by operation of an application-level handler, the register, determining an order of priority for events in the register based on the status information and control information of the multiple facilities, and processing the events in the order of priority such that an application can directly control the multiple facilities simultaneously.Type: ApplicationFiled: October 7, 2015Publication date: April 13, 2017Inventors: Giles R. FRAZIER, Michael Karl GSCHWIND
-
Publication number: 20170102974Abstract: In accordance with embodiments of the present disclosure, an information handling system may include a processor and a management controller communicatively coupled to the processor for out-of-band management of the information handling system. The management controller may be configured to receive an event relating to an information handling resource of the information handling system and communicate a command to the information handling resource for applying a customized indicator code behavior to a visual indicator associated with the information handling resource.Type: ApplicationFiled: October 7, 2015Publication date: April 13, 2017Inventors: Dinesh Kunnathur Ragupathi, Arun Muthaiyan, Kala Sampathkumar, Yogesh Prabhakar Kulkarni, Abhijeet R. Singh
-
Publication number: 20170102975Abstract: The described embodiments include a computing device that executes a broker application. The broker application performs a mediated data exchange to exchange data between a first sandboxed application and a second application. For example, the broker application can import data from the second application into the first sandboxed application. As another example, the broker application can export data from the first sandboxed application into the second application.Type: ApplicationFiled: October 14, 2016Publication date: April 13, 2017Applicant: Apple Inc.Inventors: David Rahardja, Toby C. Paterson, Anthony D'Auria
-
Publication number: 20170102976Abstract: An OS API mapping computer operates to identify a set of OS APIs of a first OS version not present in a second OS version. OS APIs of the second OS version are identified that satisfy a defined rule for compatibility with the set of OS APIs of the first OS version not present in the second OS version. An OS APIs replacement list is generated that maps individual ones of the set of OS APIs of the first OS version, to corresponding ones of the OS APIs of the second OS version that satisfy the defined rule. A set is identified of OS APIs of an application that are in the OS APIs replacement list among the set of OS APIs of the first OS version. A plugin is generated based on the OS APIs of the second OS version mapped to the set of application OS APIs.Type: ApplicationFiled: October 8, 2015Publication date: April 13, 2017Applicant: CA, INC.Inventors: Vikrant NANDAKUMAR, Naveen Harry MICHAEL, Madhusudhan GANDA, Hemanth Kumar PINNINTI
-
Publication number: 20170102977Abstract: Counting status circuits are electrically coupled to corresponding status elements. The status elements selectably store a bit status of a bit line coupled to a memory array. The bit status can indicate one of at least pass and fail. The counting status circuits are electrically coupled to each other in a sequential order. Control logic causes processing of the counting status circuits in the sequential order to determine a total of the memory elements that store the bit status. The total number of memory elements that store the bit status indicate the number of error bits or non-error bits, which can help determine whether there are too many errors to be fixed by error correction codes.Type: ApplicationFiled: December 22, 2016Publication date: April 13, 2017Applicant: MACRONIX INTERNATIONAL CO., LTD.Inventors: YIH-SHAN YANG, SHOU-NAN HUNG, CHUN-HSIUNG HUNG, YAO-JEN KUO, MENG-FAN CHANG
-
Publication number: 20170102978Abstract: The present disclosure describes methods, systems, and computer program products for detecting anomalies in an Internet-of-Things (IoT) network. One computer-implemented method includes receiving, by operation of a computer system, a dataset of a plurality of data records, each of the plurality of data records comprising a plurality of features and a target variable, the plurality of features and target variable including information of a manufacturing environment; identifying a set of normal data records from the dataset based on the target variable; identifying inter-feature correlations by performing correlation analysis on the set of normal data records; and detecting anomaly based on the inter-feature correlations for predictive maintenance.Type: ApplicationFiled: October 7, 2015Publication date: April 13, 2017Inventors: Paul Pallath, Rouzbeh Razavi
-
Publication number: 20170102979Abstract: A software circuit breaker observes an amount of free memory available in an application server and a duration of a garbage collection process performed by the application server. The application server executes an agent comprising a plurality of processes for monitoring performance of the application server. Based on the amount of free memory and duration of the garbage collection process, the circuit breaker anticipates a likely crash of the application server. In response to anticipating the likely crash, the circuit breaker disables one or more processes of the agent.Type: ApplicationFiled: October 9, 2015Publication date: April 13, 2017Inventors: Sebastian Ramirez, Andrew Kent
-
Publication number: 20170102980Abstract: A self-adjusting calibrator is provided. The calibrator may include a calibrator datastore. The calibrator datastore may store assimilated performance data. The assimilated performance data may relate to a collection of configuration items. The calibrator datastore may also store performance metrics. The performance metrics may map historic error events in a system to a plurality of configuration items. The calibrator may also include an optimal value computation engine. The optimal value computation engine may be in communication with the calibrator datastore. The optimal value computation engine may determine an optimal threshold value for each configuration item in the collection of configuration items. The optimal threshold value may enable a receiver, which may be associated with calibrator datastore, to receive true error event information that occurred in the system. The optimal threshold value may also prevent the receiver from receiving false error event information that occurred in the system.Type: ApplicationFiled: October 12, 2015Publication date: April 13, 2017Inventors: Sasidhar Purushothaman, Srikarthik Gunasekaran, Tanvir Sharma
-
Publication number: 20170102981Abstract: In an approach for dynamically instrumenting a program at runtime, a processor identifies a sequence of memory related operations from an instruction stream, wherein the sequence includes at least a first memory related operation and a second memory related operation. A processor instruments the first memory related operation. A processor detects an error at the first memory related operation based on the instrumentation of the first memory related operation. A processor, responsive to detecting the error at the first memory related operation, instruments at least the second memory related operation.Type: ApplicationFiled: October 13, 2015Publication date: April 13, 2017Inventors: Cary L. Bates, John D. Rotramel
-
Publication number: 20170102982Abstract: A method for creating and using a fault model representative of a system, the fault model comprising one or more fault model components is provided. The method creates a reusable fault model component; associates one or more algorithms to the reusable fault model component, the one or more algorithms describing behavior of the reusable fault model component; incorporates the reusable fault model component and the one or more algorithms into the fault model; tunes the reusable fault model component, using available data associated with the fault model; and predicts occurrence of degradation of the system, based on the tuning.Type: ApplicationFiled: October 13, 2015Publication date: April 13, 2017Applicant: HONEYWELL INTERNATIONAL INC.Inventors: Raghupathy Kolandavelu, Tim Felke, MoghanaPriya Kesavan, Ramchandra Reddy K, Tim Mahoney
-
Publication number: 20170102983Abstract: Systems, products and methods for enabling symptom verification. Verifying a symptom may include eliminating repeated symptom definitions or eliminating symptoms having low accuracy. A computer system enables verification of a symptom including a rule for detecting a set of events related to a given problem. The computer system includes a symptom database which stores the symptom, a specimen database which stores a specimen including a set of events detected according to a rule of a certain symptom, and an analysis unit which analyzes the specimen stored in the specimen database using a new symptom in order to determine whether to add the new symptom to the symptom database. The present disclosure also includes a method and a computer program for enabling verification of a symptom including a rule for detecting a set of events related to a given problem.Type: ApplicationFiled: September 19, 2016Publication date: April 13, 2017Inventors: Nozomu Aoyama, Toshimichi Arima, Yukihiro Murakami, Tadashi Tsumura
-
Publication number: 20170102984Abstract: A fault diagnosis method for a big-data network system includes extracting fault information from historical data in the network system, to form training sample data, which is trained to obtain a deep sum product network model that can be used to perform fault diagnosis; and diagnosing a fault of the network system based on the deep sum product network model. The embodiments of the present application resolve a problem that it is difficult to diagnose a fault of a big-data network system.Type: ApplicationFiled: October 13, 2016Publication date: April 13, 2017Inventors: Xin Jiang, Hang Li
-
Publication number: 20170102985Abstract: A fault processing method, a related apparatus, and a computer. When it is determined that a computer crashes, a baseboard management controller in the computer can send a read request message to a processor in the computer, where the read request message is used for requesting reading of first error data recorded by the processor, receive a read response message returned by the processor, and obtain, according to the read response message, the first error data recorded by the processor. By means of the embodiments of the present invention, an operating system does not need to be used, acquisition of error data in a computer after the computer crashes is implemented using a baseboard management controller, and a problem in the prior art that error data in a computer cannot be acquired after a severe uncorrectable error occurring in the computer causes a system crash is resolved.Type: ApplicationFiled: December 20, 2016Publication date: April 13, 2017Applicant: HUAWEI TECHNOLOGIES CO.,LTD.Inventor: Gang Song
-
Publication number: 20170102986Abstract: Systems and methods are described herein for logging system events within an electronic machine using an event log structured as a collection of tree-like cause and effect graphs. An event to be logged may be received. A new event node may be created within the event log for the received event. One or more existing event nodes within the event log may be identified as having possibly caused the received event. One or more causal links may be created within the event log between the new event node and the one or more identified existing event nodes. The new event node may be stored as an unattached root node in response to not identifying an existing event node that may have caused the received event.Type: ApplicationFiled: December 20, 2016Publication date: April 13, 2017Inventors: Jay Kemper Johnston, David C. White, JR., Christopher Blayne Dreier
-
Publication number: 20170102987Abstract: In a disaster recovery context, device operation states can he automatically changed from their expected operating states for steady-state operation as soon as a disaster recovery event is triggered. Every operating device with a first expected operating state for steady-state operation may be automatically changed to a second expected operating state when a disaster recovery event is triggered. Every operating device with the second expected operating state for steady-state operation may be automatically changed to the first expected state when a disaster recovery event is triggered.Type: ApplicationFiled: October 7, 2015Publication date: April 13, 2017Applicant: UNISYS CORPORATIONInventor: James R. Malnati
-
Publication number: 20170102988Abstract: Apparatus and methods for learning and implementing rules for remediating system errors are provided. The method may include identifying a configuration item that is not in compliance with a configuration baseline. The method may also include tracking a workflow executed by a remote user in an attempt to remediate the configuration error. The method may additionally include monitoring the status of the configuration item. In the event the workflow brings the configuration item in compliance with the configuration baseline, the method may further include storing the workflow in a database.Type: ApplicationFiled: October 12, 2015Publication date: April 13, 2017Inventors: Sasidhar Purushothaman, Ketan J. Ghelani, Moinuddin Shaikh
-
Publication number: 20170102989Abstract: Error occurrence/recurrence rates from multiple users of a software system are monitored. In one embodiment, log error data and context data associated with a critical issue is provided to a server side repository. When it is detected that a threshold number of users of a software application are facing the same critical issue a community portal is updated with a facility for users to post their solutions, i.e., workarounds, and/or observations, and/or comments, associated with the specific critical issue/error. In one embodiment, the posted solutions are rated and/or monitored, and if the rating for a given solution receives a rating above a threshold rating value, then data suggesting the solution, and/or implementing the solution, is pushed to users who continue to encounter the same critical issue, in one embodiment, using an action message framework, until a permanent fix is applied.Type: ApplicationFiled: November 23, 2015Publication date: April 13, 2017Applicant: Intuit Inc.Inventors: Prabhakar Srinivas Kotikalapudi, Sunil Kumar Alachi, Vatsal Singh
-
Publication number: 20170102990Abstract: In an approach for dynamically instrumenting a program at runtime, a processor identifies a sequence of memory related operations from an instruction stream, wherein the sequence includes at least a first memory related operation and a second memory related operation. A processor instruments the first memory related operation. A processor detects an error at the first memory related operation based on the instrumentation of the first memory related operation. A processor, responsive to detecting the error at the first memory related operation, instruments at least the second memory related operation.Type: ApplicationFiled: June 15, 2016Publication date: April 13, 2017Inventors: Cary L. Bates, John D. Rotramel
-
Publication number: 20170102991Abstract: Systems and methods for internal copy-back with read-verify are described. In one embodiment, a storage device includes a controller to select a first single level cell (SLC) page of a plurality of SLC pages on the storage device to transfer to a triple level cell (TLC) page. The controller, in conjunction with an error correcting code (ECC) decoder, read-verifies the first SLC page. Read-verifying the first SLC page includes reading the first SLC page to an internal page buffer, decoding the first SLC page read into the internal page buffer, determining a number of errors contained in the first SLC page based at least in part on the decoding, and verifying whether the number of errors contained in the first SLC page satisfies an error threshold. The controller transfers the first SLC page to the TLC page according to a result of read-verifying the first SLC page.Type: ApplicationFiled: October 8, 2015Publication date: April 13, 2017Applicant: SEAGATE TECHNOLOGY LLCInventors: ERICH F. HARATSCH, ZHENGANG CHEN, STEPHEN HANNA, ABDELHAKIM ALHUSSIEN
-
Publication number: 20170102992Abstract: A memory system includes a memory module that supports error detection and correction (EDC) in a manner that relieves a memory controller or processor of some or all of the computational burden associated with EDC. Individual EDC components perform EDC functions on subsets of the data, and share data between themselves using relatively short, fast interconnections.Type: ApplicationFiled: September 1, 2016Publication date: April 13, 2017Inventors: Frederick A. Ware, Scott C. Best
-
Publication number: 20170102993Abstract: A data storage device includes a controller and a non-volatile memory coupled to the controller. The controller is configured to generate first parity information based on first data and to generate second parity information based on second data. The non-volatile memory is configured to store the first data and the second data. The data storage device also includes a buffer configured to store the first parity information. The controller is further configured to generate joint parity information associated with the first data and the second data in response to a combined data size of the first data and the second data satisfying a threshold.Type: ApplicationFiled: October 8, 2015Publication date: April 13, 2017Inventors: XINDE HU, CHRISTOPHER JOHN PETTI, ERAN SHARON, IDAN ALROD, ARIEL NAVON
-
Publication number: 20170102994Abstract: A system includes a first nonvolatile memory array, a second nonvolatile memory array, and a memory controller. The memory controller is configured to write an indicator bit to the second nonvolatile memory array, determine whether the indicator bit is valid in response to a power up of the system after a high-temperature event, a received command after a high-temperature event, a predetermined number of power ups, or a power up or received command after each of a predetermined number of high-temperature events, and write data stored in the second nonvolatile memory array to the first nonvolatile memory array when the indicator bit is valid.Type: ApplicationFiled: December 23, 2016Publication date: April 13, 2017Inventors: Chuen-Der LIEN, Ming-Huei SHIEH, Chi-Shun LIN
-
Publication number: 20170102995Abstract: Systems and methods are disclosed for providing operating system independent error control in computing devices. One embodiment is a method comprising: defining with a reliability, availability and serviceability (RAS) controller a first memory region for correctable errors and a second memory region for uncorrectable errors; receiving an error indication at the RAS controller; determining with the RAS controller whether the received error indication is a correctable error; and in response to the determination, if the received error indication is a correctable error, writing with the RAS controller information about the correctable error to the first memory region, and if the received error indication is an uncorrectable error, writing with the RAS controller information about the uncorrectable error to the second memory region and sending an interrupt request from the RAS controller to an operating system executing on a processor.Type: ApplicationFiled: October 9, 2015Publication date: April 13, 2017Inventors: MOHIT GUPTA, HARB ABDULHAMID, ZHIXIONG ZHANG
-
Publication number: 20170102996Abstract: A redundant array of inexpensive disks (RAID) controller of a RAID storage system that includes one or more storage devices includes an error correction code (ECC) result manager configured to manage information of ECC result indicators when a data chunk that includes one or more ECC data units having an uncorrectable ECC error is read from among a plurality of data chunks dispersively stored in the one or more storage devices, each of the plurality of data chunks including a plurality of ECC data units, the ECC result indicators respectively indicating whether the plurality of ECC data units included in the plurality of data chunks has an uncorrectable ECC error; and an uncorrectable error counter configured to calculate a number of ECC result indicators indicating an uncorrectable ECC error among ECC result indicators corresponding to ECC data units having a same order in each of the plurality pluralit.y of data chunks.Type: ApplicationFiled: October 7, 2016Publication date: April 13, 2017Applicant: Samsung Electronics Co., Ltd.Inventors: Geunyeong YU, Junjin KONG, Beom Kyu SHIN, Myungkyu LEE, Jiyoup KIM, Dongmin SHIN
-
Publication number: 20170102997Abstract: An apparatus for detection, remediation and inference rule development for multi-layer information technology IT structures is provided. Certain embodiments of the apparatus may include an event generator. The event generator may monitor for, retrieve, and pool error events and performance events from alerting sources. The alerting sources may provide event information from one more of multiple layers. The apparatus may also include an event parser that provides a system status. The apparatus may include an analytics engine that detects patterns and relationships in the retrieved error events, performance events and system status, and models event hierarchies based on the detected patterns and relationships. The analytics engine may invoke auto-remediation processes in response to pre-determined error events. In some embodiments, the engine may detect a pre-determined number of resource-related events.Type: ApplicationFiled: October 12, 2015Publication date: April 13, 2017Inventors: Sasidhar Purushothaman, Hari Mantena, Arun Jagadeeshwaran
-
Publication number: 20170102998Abstract: An embodiment of the invention may include a method, computer program product and computer system for data recovery for use with a computing device. The embodiment may determine an amount of time to transfer a first file from a first location, on a first device, to a second location, on a second device. The embodiment may include receiving historical operational information associated with the first device and the second device. The embodiment may create a transfer model correlating the amount of time to transfer the first file with the historical operational information associated with each device. The embodiment may determine an estimated amount of time to transfer a second file based on the transfer model and a current operational information about each device. The embodiment may determine whether the estimated amount of time to transfer a second file is above a first threshold amount.Type: ApplicationFiled: October 12, 2015Publication date: April 13, 2017Inventors: Pankaj S. Bavishi, Smita J. Raut, Ramani R. Routray, Subhojit Roy, Yang Song
-
Publication number: 20170102999Abstract: A computer system receives event data associated with data records in a database, receives metadata corresponding to a digital media content file (e.g., a video, audio, or image file), compares the event data with the metadata, automatically identifies a matching event based on the comparison, and automatically tags the content file by modifying the metadata based on event data associated with the matching event. In one usage scenario, the digital media content file may be used as evidence in a criminal investigation. The event data may be provided in the form of a summary or snapshot of the database, which may include data records covering a limited period of time. The digital media content file can be recorded by any suitable digital media device, such as a video camera. The computer system may further include a dock configured to upload digital media content received from the digital media device.Type: ApplicationFiled: December 21, 2016Publication date: April 13, 2017Applicant: TASER International, Inc.Inventors: Glenn M. Hickman, Michael J. Bohlander, Manish Menghani, Alexander Mersereau, Patrick W. Smith, Andreas M. Olligschlaeger
-
Publication number: 20170103000Abstract: A method computer program product and computer system for generating a backup of a primary object in an object store system. The object store system comprising: a proxy layer comprising: a plurality of proxy nodes; a backup module; and a ring; a storage layer in communication with the plurality of proxy nodes and the backup module through the ring, the storage layer comprising a plurality of storage nodes, with each storage node having a plurality of servers for managing accounts, a plurality of containers, at least one backup container, and objects stored within the containers and the at least one backup container; and a backup database in communication with the backup module for storing associations between versions of backup copies of the primary objects, the primary copies of objects, the containers, and the at least one backup container.Type: ApplicationFiled: October 7, 2015Publication date: April 13, 2017Inventors: Ranganath Gorur Krishna Iyengar, Madhusudan K. Satyanarayana
-
Publication number: 20170103001Abstract: Embodiments of the present invention provide a data processing device and a data processing method. In the data processing device and the data processing method provided by the embodiments of the present invention, first data in a memory is written into a first non-volatile storage unit in a log file form, and a log file of the first data written into the first non-volatile storage unit is written into a second non-volatile storage unit. Because a data write speed of the first non-volatile storage unit is higher than a data write speed of the second non-volatile storage unit, fast backup of the data in the memory can be achieved, and when the data in the memory is lost in an abnormal situation, security of the data in the memory can be ensured.Type: ApplicationFiled: December 20, 2016Publication date: April 13, 2017Applicant: HUAWEI TECHNOLOGIES CO.,LTD.Inventors: Tianfu Jin, Nunu Ren, Mingjun Li
-
Publication number: 20170103002Abstract: A cyclic commit protocol is used to store relationships between transactions and is used by the technology to determine whether a transaction is committed or not. The protocol allows creation of a cycle of transactions which can be used to recover the state of a storage device after a host failure by identifying the last committed version of intention records as committed or uncommitted based on the data stored in the physical pages.Type: ApplicationFiled: December 20, 2016Publication date: April 13, 2017Inventors: Vijayan Prabhakaran, Lidong Zhou, Thomas Lee Rodeheffer
-
Publication number: 20170103003Abstract: A method for controlling a physical network security device and a physical network security device are provided. The physical network security device includes: a master virtual machine, a slave virtual machine and a physical network card; and the method includes: acquiring a running state of the master virtual machine and a running state of the slave virtual machine; controlling to switch a binding/unbinding between the master virtual machine and the physical network card and between the slave virtual machine and the physical network card if it is detected that a failure occurs on the master virtual machine; and controlling the slave virtual machine to work as a new master virtual machine and controlling the master virtual machine with the failure to work as a new slave virtual machine.Type: ApplicationFiled: September 20, 2016Publication date: April 13, 2017Inventor: Jian JIN
-
Publication number: 20170103004Abstract: An approach is provided in which a system selects a first processor as a master Time of Day (TOD) processor in a first TOD topology. The system then assigns a second processor as an alternate master TOD processor to a second TOD topology based upon determining that the second processor is on a different node than the first processor. The system configures to the first TOD topology and, when the system detects a TOD failure requiring a topology switch, the system re-configures to the second TOD topology.Type: ApplicationFiled: October 11, 2015Publication date: April 13, 2017Inventors: Manish Kumar Chowdhary, Deepak Kodihalli
-
Publication number: 20170103005Abstract: An approach is provided in which a system selects a first processor as a master Time of Day (TOD) processor in a first TOD topology. The system then assigns a second processor as an alternate master TOD processor to a second TOD topology based upon determining that the second processor is on a different node than the first processor. The system configures to the first TOD topology and, when the system detects a TOD failure requiring a topology switch, the system re-configures to the second TOD topology.Type: ApplicationFiled: November 2, 2015Publication date: April 13, 2017Inventors: Manish Kumar Chowdhary, Deepak Kodihalli
-
Publication number: 20170103006Abstract: An information handling system may include a processor and a first storage management console comprising a program of executable instructions embodied in non-transitory computer-readable media accessible to the processor, and configured to, when read and executed by the processor: (i) manage input/output between an application and a primary physical storage controller to perform input/output between the application and a storage resource communicatively coupled to primary physical storage container; (ii) asynchronously mirror application-consistent snapshots of data associated with the application from the primary physical storage controller to a storage virtual controller configured to emulate a physical storage controller such that the storage virtual controller stores the snapshots to remote storage geographically remote from the information handling system; (iii) store metadata associated with the application and data stored to the storage resource and the remote storage; and (iv) copy the metadata to a sType: ApplicationFiled: October 12, 2015Publication date: April 13, 2017Inventors: Gopakumar Ambat, Yask Sharma
-
Publication number: 20170103007Abstract: A novel diagnostics and verifiable input/output (DVIO) channel may reduce fixed diagnostic circuitry and allow standard input/output channels to be repurposed as diagnostics for specific deployments. The DVIO channel may include a digital input sub-channel and a digital output sub-channel, with each sub-channel including basic protection and diagnostic circuitry for performing basic diagnostics. The two sub-channels may be used independently of each other, and they may also be coupled together to create an enhanced digital input or digital output channel, which is capable of performing more advanced diagnostics such as output readback or test pulse generation, for example. Multiple DVIO channels may be coupled together to create a multiple-channel digital input or digital output with redundant signal paths. In this way the input/output resources may be configured to meet the specific needs of a given application, and minimize the test and diagnostic circuitry required in traditional implementations.Type: ApplicationFiled: October 8, 2015Publication date: April 13, 2017Inventor: Joseph E. Peck
-
Publication number: 20170103008Abstract: An approach for improving efficiency of cycle-reproducible debug in a multi-core environment is provided. The approach executes an exerciser image on one or more cores, wherein the exerciser image includes one or more different seeds. The approach determines a seed from the one or more different seeds that locates a fail-condition. Responsive to determining a seed from the one or more different seeds that locates the fail condition, the approach determines an upper bound and a lower bound of the fail-condition. The approach determines an exact cycle where the fail-condition occurs. The approach constructs a multi-cycle trace for the fail-condition.Type: ApplicationFiled: December 22, 2016Publication date: April 13, 2017Inventors: James N. Klazynski, Amir Nahir
-
Publication number: 20170103009Abstract: The technology described herein provides a mechanism to monitor a status of external devices on behalf of applications running on a computing device. In one aspect, a monitoring application running on a computing device receives monitoring requests from multiple applications on the computing device. Each monitoring request can provide device details for an external device to be monitored and specific relationship status that defines when a notification should be sent to the application associated with the monitoring request. When the current relationship status corresponds to the specific relationship status for a device matching the device details, then a notification can be sent to the application. The individual application does not need to actively monitor a device status and can remain in an inactive state while monitoring is ongoing.Type: ApplicationFiled: October 13, 2015Publication date: April 13, 2017Inventors: NIKET ASHOK SANGHVI, SAMUEL DAVID ADAMS, BENJAMIN SCOTT MCGREGOR
-
Publication number: 20170103010Abstract: Embodiments for debugging program code are provided. In response to a debug comparison request, (i) a first set of debugging operations are initiated on a first portion of program code that is selected from an original version of a program, and (ii) a second set of debugging operations are initiated on a second portion of program code that is selected from a revised version of the program. The second portion of program code corresponds to the first portion of program code. Execution of the first and second portions of program code is synchronized. The first and second set of debugging operations are stopped in response to determine that at least one of a first and a second stop condition exists based, at least in part, on a comparison of the results from executing one or more lines of corresponding code from the first and second portions of program code.Type: ApplicationFiled: October 13, 2015Publication date: April 13, 2017Inventors: Peng Chang, Chun Ling Li, ZhiGang Lin, Nan Shi, Xiao Feng Zhang
-
Publication number: 20170103011Abstract: An information processing apparatus includes a memory and a processor. The memory stores trace information including a string of location information which indicates locations of texts in a source code that correspond to instructions that have already been executed and which stores an execution order of the instructions. The processor detects a substring that appears a plurality of times from the string of location information included in the trace information and determines location information that belongs to a loop and an execution status of the loop. The processor associates, based on the location information that belongs to the loop, the execution status of the loop with the source code and displays the associated information.Type: ApplicationFiled: August 25, 2016Publication date: April 13, 2017Applicant: FUJITSU LIMITEDInventor: Keiichi IDA
-
Publication number: 20170103012Abstract: Methods, computing systems and computer program products implement embodiments of the present invention that include defining multiple data fabrication rules, each of the data fabrication rules including a fabrication time and a data operation. a simulation of a software application is initiated, the simulation including a sequence of simulation times, and upon detecting, during the simulation, one or more first given fabrication rules having respective fabrication times matching one or more first simulation times, fabricated data is generated in response to performing the respective data operation of each of the detected one or more first given fabrication rules. Upon detecting, during the simulation, a second given fabrication rule whose fabrication time matches a second simulation time subsequent to the one or more first simulation times, the data operation of the second given fabrication rule is performed on a subset of the fabricated data.Type: ApplicationFiled: October 13, 2015Publication date: April 13, 2017Inventors: Akram Bitar, Oleg Blinder, Ronen Levy, Tamer Salman
-
Publication number: 20170103013Abstract: A system and methods for automatically localizing faults for functional field failures that enables users to enter symptoms of a failure that occur during deployment of a given application along with the values of the input and configuration parameters in order to return locations in the source code that are likely to contain specific faults as well as show navigation paths from a suggested to the failure such that the code may be corrected.Type: ApplicationFiled: October 6, 2016Publication date: April 13, 2017Inventor: Mark Grechanik
-
Publication number: 20170103014Abstract: Application services run on a computing platform and consume platform services. Performance measurement units are defined for the application services. A number of relationships for consumption of resources are defined between one or more of the application services and one or more of the platform service. Performance tests are executed on an application service while consuming different capacities provided by one or more instances of consumed platform services. Results measuring performance of the application service during test executions are collected. Based on the collected results, scaling formulas are determined for each of the consumed platform services by the application service. A scaling formula defines a correspondence between a capacity provided by a first consumed platform service and measured performance of the application service.Type: ApplicationFiled: October 9, 2015Publication date: April 13, 2017Inventors: Michael Segler, Martin Steffke
-
Publication number: 20170103015Abstract: Embodiments of the present invention provide systems, methods, and computer storage media directed at automated testing of shell scripts and core functionality of a software application under test utilizing the same testing environment. In embodiments, a testing environment that is configured to perform automated testing of core functionality of a software application under test is provided with a test library that extends the testing capabilities of the testing environment to also perform automated testing of shell scripts of the software application under test. The core functionality can be encoded in a first programming language, while the shell scripts are encoded in a second programming language. Other embodiments may be described and/or claimed.Type: ApplicationFiled: October 13, 2015Publication date: April 13, 2017Inventors: Allaert Joachim David Bosschaert, Carsten Ziegeler, Michael Alexander Marth