Patents Issued in August 17, 2017
  • Publication number: 20170235595
    Abstract: In one embodiment, a system includes a cluster of host machines implementing a virtualization environment. Each host machine a hypervisor, a user virtual machine (UVM), a connection manager, an I/O controller, and a virtual disk. The virtual environment may include storage devices and may be accessible by all of the I/O controllers. A management module of the virtualization environment may display a graphical user interface that includes an alert rule configuration interface, which may be operable to configure one or more alert policies each associated with an operating status of a component of the virtualization environment. The management module may receive inputs associated with the alert policies. The management module may update the alert policies in accordance with the inputs.
    Type: Application
    Filed: February 3, 2017
    Publication date: August 17, 2017
    Inventors: Deepak Vankadaru, Himanshu Shukla, Karthik Mysore Guruprasad, Ting Suk Lee
  • Publication number: 20170235596
    Abstract: Particular embodiments provide a system comprising a cluster of host machines for managing communication connections in a virtualization environment. Implementing a virtualization environment, each of the host machines may comprise a hypervisor, a user virtual machine (UVM), and an I/O controller. A virtual disk may include a plurality of storage devices, wherein the I/O controllers conduct I/O transactions with the virtual disk based on I/O requests received from the UVMs. A management module may implement a monitoring policy of rules associated with an operating status of components of the virtualization environment. The management module may receive data associated with the operating status of the components. In response to determining that the data associated with the operating status satisfies one or more rules in the monitoring policy, the management module may initiate an alert and also display a graphical user interface that includes a root cause analysis of the alert.
    Type: Application
    Filed: February 3, 2017
    Publication date: August 17, 2017
    Inventors: Deepak Vankadaru, Hector Guillermo Cuellar Rios, Rajesh P. Bhatt, Ribao Wei, Rohit Girme, Venkata Vamsi Krishna Kothuri
  • Publication number: 20170235597
    Abstract: A method includes a processor for determining a life cycle of a first performance of a task flow for a telecommunication service order, determining that a performance of a first task within the first performance of the task flow has exceeded a threshold processing time, and determining that there is a problem with a first centralized system component in response to determining that the performance of the first task within the first performance of the task flow has exceeded the threshold processing time. The method may further include identifying the centralized system component for servicing when it is determined that there is a problem with the centralized system component.
    Type: Application
    Filed: May 1, 2017
    Publication date: August 17, 2017
    Inventors: Arun Kandappan, Joseph Schutte, Mark Welch, Kevin White
  • Publication number: 20170235598
    Abstract: A method for identifying an application causing a temperature rise of a terminal, and a terminal are provided. The method includes: obtaining a value range of temperature of a current component of the terminal during operation of a current application; calculating a ratio of a difference between the value range and a normal value range of the temperature of the current component when the terminal is in an idle state in the environment to the normal value range; and if the ratio is greater than a preset threshold, determining that the current application is the application causing the temperature rise of the terminal. The method accurately identifies the APP causing the temperature rise, so that the user may be reminded to process the APP when the APP causing the temperature rise of the terminal is determined, so as to reduce the effect on the terminal of the APP.
    Type: Application
    Filed: August 14, 2015
    Publication date: August 17, 2017
    Inventors: Haiying Yang, Jialin Xiong, Kangzong Zhang
  • Publication number: 20170235599
    Abstract: A computer-implemented method includes receiving, from a natural language interface system, a natural language task specification, and converting the natural language task specification into a domain independent data flow graph. The data flow graph includes substeps. The method further includes: presenting the data flow graph via the natural language interface system as a natural language program; interactively refining the natural language program; and correspondingly modifying the data flow graph. The computer-implemented method further includes, for each substep: selecting one or more candidate APIs from an API library, based on the substep; interactively narrowing the one or more candidate APIs to at least one selected API; implementing the substep by specifying one or more calls to the at least one selected API to yield a substep implementation; and appending the substep implementation to a result program. A corresponding computer program product and computer system are also disclosed.
    Type: Application
    Filed: February 12, 2016
    Publication date: August 17, 2017
    Inventors: Dinesh Raghu, Nishant Sinha
  • Publication number: 20170235600
    Abstract: A server and method for processing data records are provided. The server includes an operating system running on a dedicated processor core, a memory storage facility, a first application process thread running on a first dedicated core and a second application process thread running on a second dedicated core. The dedicated cores are in communication with the memory storage facility and configured to run threads autonomously. The method involves scheduling non-deterministic threads, initiating an application process, storing data, and running process threads autonomously from the operating system.
    Type: Application
    Filed: May 8, 2014
    Publication date: August 17, 2017
    Inventors: Tudor MOROSAN, Gregory A. ALLEN
  • Publication number: 20170235601
    Abstract: The following relates generally to computer system efficiency improvements. Broadly, systems and methods are disclosed that improve efficiency in a cluster of nodes by efficient processing of tasks among nodes in the cluster of nodes. Assignment of tasks to compute nodes may be based on learned CPU capabilities and I/O bandwidth capabilities of the compute nodes in the cluster.
    Type: Application
    Filed: May 2, 2017
    Publication date: August 17, 2017
    Applicant: Palo Alto Research Center Incorporated
    Inventors: Shekhar Gupta, Christian Fritz, Johan de Kleer
  • Publication number: 20170235602
    Abstract: A resource scheduling method and a related resource scheduling apparatus to improve data input/output (IO) efficiency, where the method includes determining a current task queue, where the current task queue includes a plurality of to-be-executed application tasks, determining, for data blocks on a disk to be accessed by the application tasks, a quantity of times that each data block is to be accessed by the application tasks, determining a hotspot data block according to the quantity of times that each data block is to be accessed by the application tasks, and sending a move-in instruction to a local node of the hotspot data block, where the move-in instruction instructs to move the hotspot data block into a memory such that the hotspot data block can be accessed in the memory.
    Type: Application
    Filed: May 2, 2017
    Publication date: August 17, 2017
    Inventors: Jia Li, Jie Liu, Lifei Dang, Lingzhi Mao
  • Publication number: 20170235603
    Abstract: For distributed processing using forecasted location-based IoT device clusters, at a central IoT device, a data source that is to be used and a duration for processing a workload is determined. A set of IoT devices operating within a threshold distance from the data source at a first time is selected. A first subset of the IoT devices is selected to form a cluster of IoT devices where each IoT device satisfies a clustering condition. A second subset of the first subset is selected to form a sub-cluster of IoT devices where a forecasted travel path of a member IoT device in the second subset keeps the member within the threshold distance from the data source for the duration. A lightweight application is configured at a first IoT device in the second subset which enables the first IoT device to participate in the sub-cluster and process the workload.
    Type: Application
    Filed: February 11, 2016
    Publication date: August 17, 2017
    Applicant: International Business Machines Corporation
    Inventors: AARON K. BAUGHMAN, Thomas Benjamin Harrison, Brian M. O'Connell, Herbert D. Pearthree
  • Publication number: 20170235604
    Abstract: For distributed processing using clustering of interdependent Internet of Things (IoT) devices, at a central device, a data source to be used for processing a workload is determined. A set is selected of devices operating within a threshold distance from the data source at a first time. A first subset of the set of devices is selected. Each device in the first subset satisfies a clustering condition. A first device in the subset is instructed to configure a lightweight application to participate in the cluster and process the workload. The processing of the workload is halted on a second device, where the first device has a processing dependency on the second device in processing the workload. A preserved current state of processing the workload is transferred from the first device to a third device. The processing of the workload is continued using the second device and the third device.
    Type: Application
    Filed: February 11, 2016
    Publication date: August 17, 2017
    Applicant: International Business Machines Corporation
    Inventors: Aaron K. Baughman, Thomas Benjamin Harrison, Brian M. O'Connell, Herbert D. Pearthree
  • Publication number: 20170235605
    Abstract: Systems, apparatuses, and methods for scheduling the processing of job requests on a data processing platform that utilizes multiple processing elements. In one embodiment, each job request includes a set of attributes that are used to determine scheduling and handling. Such attributes may include job type, priority, priority time, dependency list, and fail on dependency failure flag. In one embodiment, job requests are started in an order determined by the job request attributes of priority and priority time. If a job request has an unresolved dependency, the job request may be removed from the ordered list. Thus, a lower-priority job request may overtake a higher priority job if the higher-priority job has unfinished dependent job requests. Rules for interacting with job requests having these attributes may be customized according to user needs and desires.
    Type: Application
    Filed: May 5, 2015
    Publication date: August 17, 2017
    Inventors: Jakub Chaloupka, Wei (Michelle) Xue, Ivan Omar Parra
  • Publication number: 20170235606
    Abstract: Systems, apparatuses, and methods for preventing the use of a shared resource (such as a database) by a user or group of users from causing other users to experience unsatisfactory or unreliable access to that resource or to related, impacted resources (such as a communications network or processor). In some embodiments, the invention is directed to systems, apparatuses, and methods that may be implemented in a multi-tenant system in order to prevent a single user or the users associated with an account from degrading the system performance experienced by other users, either by intentional or inadvertant misuse of a shared database, and to prevent an overload condition from causing the system or database to fail abruptly.
    Type: Application
    Filed: November 18, 2015
    Publication date: August 17, 2017
    Inventors: John Cherniavsky, Sean Fay, Xi (Scott) Liu, Theodore Ray Rice
  • Publication number: 20170235607
    Abstract: A method for operating a semiconductor device includes obtaining task structure information of a task processed in a multiprocessor system. The multiprocessor system includes a plurality of nodes, each comprising one or more processing units and a memory directly connected to the processing units. The plurality of nodes include a local node to which an input/output (I/O) device is directly connected and a remote node having no direct connection to the I/O device. The method further includes evaluating the task structure information to determine whether the task is an I/O intensive task and assigning the task to the local node if the task is evaluated to be the I/O intensive task.
    Type: Application
    Filed: November 1, 2016
    Publication date: August 17, 2017
    Inventors: JUNG-HI MIN, KWANG-HYUN LA
  • Publication number: 20170235608
    Abstract: The disclosed embodiments provide a method, apparatus, and system for obtaining user ratings and/or feedback for a software application. During operation, for each of a plurality of jobs executed by a computing system component, wherein each job includes an execution of a corresponding job definition: the system retrieves metadata about the job from the computing system component and calculates an inefficiency metric for the job based on the metadata, wherein a higher inefficiency metric corresponds to a more inefficient job. Next, the system ranks the plurality of jobs based on each job's inefficiency metric and selects one or more top-ranked jobs from the ranking. The system then selects one or more job definitions corresponding to the one or more top-ranked jobs. Next, the system sends optimization requests to users associated with the selected job definitions.
    Type: Application
    Filed: February 16, 2016
    Publication date: August 17, 2017
    Applicant: LinkedIn Corporation
    Inventors: Zhenyun Zhuang, Christopher M. Coleman, Angela Andong Deng, Cuong H. Tran, Hans G. Granqvist, Haricharan K. Ramachandra, Badrinath K. Sridharan
  • Publication number: 20170235609
    Abstract: A distributed computing system for automatic constraint-based data resource arrangement, comprising a plurality of computing components being communicatively coupled to each other, each computing component comprising the following data resources: data storage media for storing client-related digital information, a data processor for processing said client-related digital information, and a network communications interface for communicating said client-related digital information; and a constraint engine for automatically determining alternate arrangements of said data resource assignments, said constraint engine comprising a constraint processor and a constraint database, said constraint database for receiving and storing changeable digital constraint parameters indicative of permissible operational constraints on said data resources, wherein said alternate arrangements comply with at least a first set of said changeable digital constraint parameters; wherein said data resource assignments are reassigned from
    Type: Application
    Filed: February 13, 2017
    Publication date: August 17, 2017
    Inventors: Jacob Taylor Wires, Andrew Warfield
  • Publication number: 20170235610
    Abstract: Embodiments enable distributed data processing with automatic caching at multiple system levels by accessing a master queue of data processing work comprising a plurality of data processing jobs stored in a long term memory cache; selecting at least one of the plurality of data processing jobs from the master queue of data processing work; pushing the selected data processing jobs to an interface layer including (i) accessing the selected data processing jobs from the long term memory cache; and (ii) saving the selected data processing jobs in an interface layer cache of data processing work; and pushing at least a portion of the selected data processing jobs to a memory cache of a first user system for minimizing latency in user data processing of the pushed data processing jobs.
    Type: Application
    Filed: February 12, 2016
    Publication date: August 17, 2017
    Inventors: Shawn Cart Gunsolley, Erin Cassell, Siva Shankar Potla, Adam Nathaniel Desautels, Jeffrey Scott Poore, Marshall Bright Thompson
  • Publication number: 20170235611
    Abstract: Embodiments are directed towards push signaling to run jobs on available servers. Users may provide jobs or job instructions to a job control node. Job control node may determine one or more available job target nodes from among a plurality of managed nodes associated with the job control node. The job target nodes may be determined based on information included in the provided job instructions. If there are available job target nodes, the job control node may provide the job instructions to each available job target node. Further, the job control node may receive communications from one or more available job target nodes that indicates that the job target node is prepared and ready to execute the received job instructions. Next, the job control node may issue a job start command that triggers the prepared job target nodes to begin executing the provided job instructions.
    Type: Application
    Filed: February 27, 2017
    Publication date: August 17, 2017
    Inventors: Mark Andrew Anderson, Christopher James Brown, Kevin Allen Smith, John Braden Keiser
  • Publication number: 20170235612
    Abstract: Embodiments disclose techniques for migrating a logical partition from a source computing system with an inactive I/O server to another target computing system. In one embodiment, a computing system collects and stores the resource configuration of the logical partition, upon detecting a change in a resource configuration of a logical partition on the source computing system. Once the computing system detects that a I/O server on the source computing system is inactive for a migration of the logical partition, the computing system uses the collected resource configuration to configure the logical partition on the target computing system.
    Type: Application
    Filed: February 12, 2016
    Publication date: August 17, 2017
    Inventors: Ping CHEN, Hariganesh MURALIDHARAN, Anu P. SHAW, Vasu VALLABHANENI
  • Publication number: 20170235613
    Abstract: A processing device determines that utilization of a resource that is executing a workload meets a utilization threshold. The resource is part of multiple resources in a cluster. The processing device determines that no other resource of the cluster has available capacity for a transfer of a workload or a portion of a workload from the resource to the other resource, and determines a change to implement in a physical configuration of the cluster in view of no other resource having available capacity. The processing device sends a message over a network to implement the change, without user interaction, to the physical configuration of the cluster. The change includes adding a new physical resources to the cluster.
    Type: Application
    Filed: February 16, 2016
    Publication date: August 17, 2017
    Inventors: Ladislav Smola, Greg D. Blomquist
  • Publication number: 20170235614
    Abstract: Technology related to virtualizing sensors is disclosed. In one example of the disclosed technology, a method can be used to allocate resources of a computing system. The method can include enumerating hardware sensors and software modules that are capable of interacting with one another. A topology can be negotiated that is compatible with capabilities of the enumerated hardware sensors and software modules. A first request can be received from a first requestor to configure at least one of the enumerated hardware sensors and software modules. The at least one of the enumerated hardware sensors and software modules can be configured in response to the received first request.
    Type: Application
    Filed: August 12, 2016
    Publication date: August 17, 2017
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Sang Choe, Sathyanarayanan Karivaradaswamy, Mei Wilson, Fabin Shen, Yin Li
  • Publication number: 20170235615
    Abstract: This disclosure describes, generally, methods and systems for implementing memory overcommit of virtual machines. The method includes establishing a plurality of virtual machines on a physical machine, broadcasting, from each of the plurality of virtual machines to a central scheduler, resource usage requirements, and then based at least in part on the resource usage requirements broadcasted from each of the plurality of virtual machines, determining a resource requirements schedule for each of the plurality of virtual machines. The method further includes receiving at least one resource request from at least one of the plurality of virtual machines, based on the resource requirements schedule, un-assigning resources from at least one of the plurality of virtual machines, and assigning the un-assigned resources to the at least one of the plurality of virtual machines which initiated the resource request.
    Type: Application
    Filed: May 1, 2017
    Publication date: August 17, 2017
    Inventors: Hariprasad Nellitheertha Venkataraja, Vijay Srinivas Agneeswaran, Harish Chauhan, Sharad Lal
  • Publication number: 20170235616
    Abstract: For distributed processing using sampled clusters of location-based Internet of Things (IoT) devices, at a central device, a data source to be used for processing a workload is determined. A set is selected of devices operating within a threshold distance from the data source at a first time. A first subset including a first sample number of devices is selected from the set. A ratio is determined of a first amount of a computing resource needed to process the workload and a second amount of the computing resource available in the first subset to process the workload. From the set, to form a cluster, a second subset is selected of a size at least equal to a multiple of the ratio and the first sample number. Each device in the second subset satisfies a clustering condition. A lightweight application is configured at the first device to process the workload.
    Type: Application
    Filed: February 11, 2016
    Publication date: August 17, 2017
    Applicant: International Business Machines Corporation
    Inventors: Aaron K. Baughman, Thomas Benjamin Harrison, Brian M. O'Connell, Herbert D. Pearthree
  • Publication number: 20170235617
    Abstract: A multi-process interactive system is described. The system includes numerous processes running on a processing device. The processes include separable program execution contexts of application programs, such that each application program comprises at least one process. The system translates events of each process into data capsules. A data capsule includes an application-independent representation of event data of an event and state information of the process originating the content of the data capsule. The system transfers the data messages into pools or repositories. Each process operates as a recognizing process, where the recognizing process recognizes in the pools data capsules comprising content that corresponds to an interactive function of the recognizing process and/or an identification of the recognizing process. The recognizing process retrieves recognized data capsules from the pools and executes processing appropriate to contents of the recognized data capsules.
    Type: Application
    Filed: September 30, 2016
    Publication date: August 17, 2017
    Inventors: Kwindla Hultman KRAMER, John S. UNDERKOFFLER
  • Publication number: 20170235618
    Abstract: Embodiments of the present invention provide a method and system for a dynamic copy-and-paste operation on a graphical user interface. Initially, a first application having a set of content to copy is identified. An indication to copy a subset of content from the first application to a second application is received. The second application has a predefined category. A communication channel is established between the first and second applications. A portion of content to copy from the first application to the second application is determined. Finally, the copied content is displayed on the second application graphical user interface.
    Type: Application
    Filed: February 16, 2016
    Publication date: August 17, 2017
    Inventors: Yu-Chun Lin, Joey H. Y. Tseng, Yu-Hsing Wu, Hsieh-Lung Yang
  • Publication number: 20170235619
    Abstract: Aspects of the present disclosure involve systems and methods that enable the dynamic execution of code library calls using external system data. A processing device processes unstructured data to generate structured data that optionally may be filtered. The processing device uses the structured data and one or more parameter groupings to execute various commands associated with a code library of an external system.
    Type: Application
    Filed: May 3, 2017
    Publication date: August 17, 2017
    Applicant: Oracle International Corporation
    Inventor: Robert Thomas Scrimo, JR.
  • Publication number: 20170235620
    Abstract: A system and method is disclosed which monitors factors in order to prevent impending component failure within a mechanical system, such as an aircraft. The monitoring system monitors the health and condition of system components, and utilizes proprietary algorithms to predict impending failures in monitored components before failure occurs. The system can shut down a component, send an alert, or adjust component thresholds as required.
    Type: Application
    Filed: February 16, 2016
    Publication date: August 17, 2017
    Applicant: Inflight Warning Systems, Inc.
    Inventors: Joseph Barclay, Brian Kirby
  • Publication number: 20170235621
    Abstract: A computer system may generate a lineage graph for a data processing system. The lineage graph may contain one or more nodes, and it may identify the flow of data through the data processing system. The computer system may determine that a first node in the lineage graph defunct. The computer system may then generate a report for the data processing system and provide the report to a user. The report may include an explanation of why the first node is defunct. The computer system may insert an indication that the first node is defunct into metadata for the first node. The indication may also include the explanation of why the first node is defunct.
    Type: Application
    Filed: February 16, 2016
    Publication date: August 17, 2017
    Inventors: Marc N. Haber, Boris Melamed, Gideon Sireling, Gidi Weber
  • Publication number: 20170235622
    Abstract: A method and information handling system configured to store, via a monitoring system data repository memory device, aggregate information handling system performance telemetry data crowd-sourced from a population of information handling systems and categorized into mapping classifications based on software application inventory and software application associations with drivers and libraries and to execute instructions, via an application processor, of an information handling system diagnostic platform in an intelligent configuration management system to obtain aggregate information handling system performance telemetry data for a performance characteristic of information handling systems having a first mapping classification corresponding to a client information handling system, and to construct, at the management information handling system, a performance characteristic baseline of operation across the aggregated telemetry data for one mapping classification and receive monitored telemetry data for the per
    Type: Application
    Filed: February 14, 2016
    Publication date: August 17, 2017
    Applicant: Dell Products, LP
    Inventors: Anantha K. Boyapalle, Michael S. Gatson, Marc R. Hammons, Danilo O. Tan, Nikhil M. Vichare
  • Publication number: 20170235623
    Abstract: Method and system are provided for event relationship analysis in fault management. The method includes: providing a history of a plurality of event instances relating to multiple events identified by event identifiers, where an event instance has one or more event occurrences referencing an event identifier, the history including the event occurrences and resolution event information; analyzing the event occurrences relating to each event identifier to identify a first occurrence(s) of an event instance; analyzing the resolution event information relating to each event identifier to identify any event resolution time for an event instance; comparing two event identifiers to obtain a relationship score between the two event identifiers, wherein the comparing is based on a combination of first occurrences of event instances relating to the two event identifiers and resolution times of the event instances; and creating a group of events that are related based on the relationship scores.
    Type: Application
    Filed: February 16, 2016
    Publication date: August 17, 2017
    Inventors: Anthony T. BREW, Jonathan I. SETTLE
  • Publication number: 20170235624
    Abstract: Technical solutions are described for analyzing a system dump. An example computer implemented method includes determining a fingerprint of the system dump, which identifies a model of the system and a type of the system dump. The method further includes receiving, from a first user device, a request to identify system dumps matching a set of system dump criteria and identifying the first user device based on the fingerprint of the system dump matching the set of system dump criteria specified, and sending access information of the system dump. The method also includes recording a query and its result as executed by the first user device against the system dump and sending, for receipt by a second user device, access information of the result of the query in the database, in response to the second user device requesting identification of system dumps matching said set of system dump criteria.
    Type: Application
    Filed: February 17, 2016
    Publication date: August 17, 2017
    Inventors: Jesse L. Farinacci, Marc A. Martin
  • Publication number: 20170235625
    Abstract: Embodiments disclosed herein are related to determining patterns of related attributes in accessed or received data. Data that is associated with attributes that describe information corresponding to the data is accessed or received. The data is grouped into one or more subsets that include data having matching combinations of the attributes. For each of the subsets, attributes of the combination of attributes associated with the subset are iteratively removed to thereby increase the amount of data included in each subset. After iteratively removing the attributes, each subset is scored to determine one or more patterns related to the combination of attributes.
    Type: Application
    Filed: June 15, 2016
    Publication date: August 17, 2017
    Inventors: Roy B. Ofer, Adi Eldar, Yehezkel S. Resheff
  • Publication number: 20170235626
    Abstract: An exemplary method for detecting one or more anomalies in a system includes building a temporal causality graph describing functional relationship among local components in normal period; applying the causality graph as a propagation template to predict a system status by iteratively applying current system event signatures; and detecting the one or more anomalies of the system by examining related patterns on the template causality graph that specifies normal system behaviors. The system can aligning event patterns on the causality graph to determine an anomaly score.
    Type: Application
    Filed: November 15, 2016
    Publication date: August 17, 2017
    Inventors: Kai Zhang, Jianwu Xu, Hui Zhang, Guofei Jiang
  • Publication number: 20170235627
    Abstract: Provided are a computer program product, system, and method for dump data collection in accordance with one embodiment of the present description, in which a variable number of data dump components are selected from a set of data dump components. Each component contains a portion of an available dump data and has associated therewith a component collection time to collect the dump data associated with the component. A determination is made as to whether a total component collection time for the selection of data dump components exceeds a predetermined maximum. The dump data contained in the selection of data dump components is collected if the total component collection time for the selection of data dump components does not exceed the predetermined maximum. Other aspects of dump data collection management in accordance with the present description are described.
    Type: Application
    Filed: February 12, 2016
    Publication date: August 17, 2017
    Inventors: Louis A. Rasor, Juan J. Ruiz
  • Publication number: 20170235628
    Abstract: A workflow engine may be used to resolve service issues in a more expedient and effective manner. The workflow engine may select a troubleshooting flow to detect problems associated with a user device that uses communication services provided by a wireless telecommunication network. The workflow engine may determine alert notifications that are relevant to the troubleshooting operations. The workflow engine may make such a determination based on information from multiple data sources of the wireless telecommunication network. The workflow engine may further assign priority ratings to the alert notifications. Subsequently, a presentation layout may be assigned to the troubleshooting operations of the troubleshooting flow and the alert notifications by the workflow engine based on the priority ratings. The troubleshooting operation and the alert notifications are then provided for presentation on a computing device according to the presentation layout by the workflow engine.
    Type: Application
    Filed: February 16, 2016
    Publication date: August 17, 2017
    Inventors: Alex Nguyen, Jonathan Michael Soini, Timothy Adam Shelton
  • Publication number: 20170235629
    Abstract: Monitoring the health of a computer system and suggesting an order of repair when problems within the computer system have been identified. Problem(s) and problem entity(s) within the computer system are identified during monitoring. Relationship(s) of the problem entities with other entities in the computer system are identified. A relationship type for each of the identified relationship(s) is determined. A combination of the identified problem(s), the identified problem entity(s), and the determined relationship type(s) is analyzed to determine an order in which repairs of one or more user-visible entities of the computing system should occur in order to address the identified problem(s). An alert comprising the determined order of the repairs is then presented to a user.
    Type: Application
    Filed: February 16, 2016
    Publication date: August 17, 2017
    Inventors: Alexander Say Go, Donald MacGregor, Gregorio Maeso, Noah Aaron Cedar Davidson
  • Publication number: 20170235630
    Abstract: A user station for a bus system and a method for checking the correctness of a message, in which the user station includes a communication control unit for writing or reading at least one message for/from at least one further user station of the bus system, in which an exclusive, collision-free access by a user station to a bus line of the bus system is ensured at least intermittently, a checksum generator for generating a checksum for the message to detect bit errors in the message, and a configuration register for specifying the initialization value with which the checksum generator is to be preloaded to start the message, the initialization value being changeable as necessary even following a communication with the communication control unit.
    Type: Application
    Filed: August 4, 2015
    Publication date: August 17, 2017
    Inventors: Florian Hartwich, Arthur Mutter, Christian Horst
  • Publication number: 20170235631
    Abstract: One embodiment provides a method for storing data in a data storage system. The method comprises copying a data set into a buffer in a data storage center in response to receiving a write command for the data set; updating a content map; and sending to a second data storage center a parity write command for the data set. The method continues with copying the data set into a buffer in the second data storage center; updating a second content map; and sending to the first data storage center an acknowledgement indicating the parity write command is complete. Then in response to receiving the acknowledgement, updating the first content map; moving the data set to a storage unit in first data storage center; and acknowledging the data set is protected. Finally, releasing the data set from the first buffer; and updating the first map content.
    Type: Application
    Filed: February 11, 2016
    Publication date: August 17, 2017
    Inventor: Steven R. Hetzler
  • Publication number: 20170235632
    Abstract: Embodiments of the present disclosure provide an approach for monitoring the health and predicting the failure of dynamic random-access memory (DRAM) devices with embedded error-correcting code (ECC). Additional registers are embedded on the DRAM device to store information about the DRAM, such as the number and location of soft errors detected by the device. When the DRAM device detects a soft error, it will update the information stored in the additional registers. A controller compares the information stored in the additional registers to associated thresholds. In some embodiments, after comparing the information to the associated thresholds, the controller may determine whether to schedule a repair action. In other embodiments, the controller may determine whether to alert the memory controller that the DRAM may be failing.
    Type: Application
    Filed: May 1, 2017
    Publication date: August 17, 2017
    Inventors: Michael B. Healy, Hillery C. Hunter, Charles A. Kilmer, Kyu-hyoun Kim, Warren E. Maule
  • Publication number: 20170235633
    Abstract: A data storage device according to example embodiments of inventive concepts includes a nonvolatile memory and a memory controller. In the nonvolatile memory, one read unit is configured to store a plurality of codewords. If a fail occurs in one or more codewords stored in the nonvolatile memory, the memory controller may search a read voltage of the nonvolatile memory using a correctable codeword. The data storage device according to example embodiments may predict an optimum read voltage level without performing a valley search operation.
    Type: Application
    Filed: January 25, 2017
    Publication date: August 17, 2017
    Inventor: Hyunkook PARK
  • Publication number: 20170235634
    Abstract: A semiconductor device may be provided. The semiconductor device may include an error correction control circuit and a signal storage circuit. The error correction control circuit may be configured to generates first to (P+1)th write parity signals from first to Mth write data signals based on a test mode signal and a read/write signal. Each of the first to (P+1)th write parity signals may be generated by performing a logical operation on at least two write data signals of the first to Mth write data signals. The signal storage circuit may be configured to store the first to Mth write data signals and the first to (P+1)th write parity signals based on the read/write signal.
    Type: Application
    Filed: June 7, 2016
    Publication date: August 17, 2017
    Inventor: Chang Hyun KIM
  • Publication number: 20170235635
    Abstract: A data processing method for a solid state storage device is provided. The solid state storage device includes a non-volatile memory having a least one data segment. The data segment includes multiple memory cells. The data processing method includes the following steps. Whether a data stored in the data segment is an invalid data is determined according to a predetermined condition. A voltage is applied to the data segment to obtain a number of the conducted memory cells under the voltage. The voltage corresponds to a preset value. Whether the data is the invalid data is determined by judging whether a relationship between the number of the conducted memory cells and the preset value satisfies the predetermined condition.
    Type: Application
    Filed: October 24, 2016
    Publication date: August 17, 2017
    Inventor: Po-Ching Lee
  • Publication number: 20170235636
    Abstract: A method for managing a solid state disk (SSD) storage device and accessing data of the SSD storage device in order to resolve problems of highly complex data management in an SDD and different service lives of NAND flash physical pages in a NAND flash physical block where, lengths of a user data area, primary metadata, and an error checking and correction (ECC) code in each storage unit of an SSD storage device are set to fixed values. As a result, a format of data stored in the storage unit is fixed, and the ECC code can also ensure consistency between data in the user data area and the primary metadata at a fixed code rate in order to ensure correctness and integrity of the data in the user data area and the primary metadata.
    Type: Application
    Filed: May 3, 2017
    Publication date: August 17, 2017
    Inventor: Guanfeng Zhou
  • Publication number: 20170235637
    Abstract: A memory device includes a memory array that includes a buffer data. The memory device also includes a memory controller. The memory controller includes an error correction code (ECC) component. The memory controller further receives a status command and an indication related to the quality of the data to analyze with the ECC component. Based on a status value, the memory controller utilizes one of a plurality of error correction techniques via the ECC component to correct an error (e.g., soft state, calibration, etc.).
    Type: Application
    Filed: May 1, 2017
    Publication date: August 17, 2017
    Inventors: Violante Moschiano, Walter Di Francesco, Luca De Santis, Giovanni Santin
  • Publication number: 20170235638
    Abstract: An example system for speculative execution event counter checkpointing and restoring may include a plurality of symmetric cores, at least one of the symmetric cores to simultaneously process a plurality of threads and to perform out-of-order instruction processing for the plurality of threads; at least one shared cache circuit to be shared among two or more the of symmetric cores. The system may further include a memory controller to couple the symmetric cores to a system memory and a data communication interface to couple one or more of the cores to input/output devices.
    Type: Application
    Filed: May 4, 2017
    Publication date: August 17, 2017
    Inventors: Laura A. Knauth, Ravi Rajwar, Peggy J. Irelan, Konrad K. Lai, Martin G. Dixon
  • Publication number: 20170235639
    Abstract: Methods and systems for a copy-offload operation are provided. A soft range lock is placed for a data container for generating a token for a copy-offload operation for copying the data container from a source location to a destination location, where presence of the soft range lock indicates that content of the data container has not changed during the copy-offload operation. A token for the copy-offload operation represents the content of data container and includes information regarding the soft range lock. The token with the soft range lock information is provided to the client that requests the copy-offload operation. If the soft range lock exists, then the data container is copied without using a point in time copy of the data container.
    Type: Application
    Filed: December 5, 2016
    Publication date: August 17, 2017
    Inventors: Saji Kumar VIJAYAKUMARI RAJENDRAN NAIR, John MENEGHINI, Arun Kumar RAJENDRAN, Frederick KNIGHT
  • Publication number: 20170235640
    Abstract: Disclosed herein are a network traffic recording apparatus and method. The network traffic recording apparatus includes a data partitioning unit for generating a single data block from original data corresponding to a certain unit and partitioning the single data block into preset units, a data integrity verification information generation unit for generating data integrity verification information for each data block, and a data redundancy elimination encoding unit for performing redundancy elimination on data, which is a target of redundancy elimination, for each data block.
    Type: Application
    Filed: November 23, 2016
    Publication date: August 17, 2017
    Inventors: Joo-Young LEE, Ik-Kyun KIM, Jong-Hyun KIM, Sun-Oh CHOI, Yang-Seo CHOI
  • Publication number: 20170235641
    Abstract: The present disclosure relates to maintaining file system consistency on a mounted storage device in a computing system during system runtime. In one embodiment, a method generally includes locking access to a file stored in a file system on the mounted storage volume and metadata associated with the file. A computing system determines one or more properties associated with the file and examines the metadata for inconsistencies between the metadata and the determined properties. Upon determining that the metadata and the determined properties are consistent, the computing system generates a backup copy of the file, commits the backup copy to a backup data repository, and unlocks access to the file.
    Type: Application
    Filed: February 17, 2016
    Publication date: August 17, 2017
    Inventors: Thomas ANCEL, Robert W. THOMPSON
  • Publication number: 20170235642
    Abstract: High speed backup of a target volume to a VHD format is disclosed. In various embodiments, a hint data indicating a last known file system extent associated with a previously-processed data zone is received. The hint data is used to determine a starting file system extent at which to begin processing file system extent data of the target volume to find file system extents associated with a VHD data zone that is currently being processed.
    Type: Application
    Filed: March 14, 2017
    Publication date: August 17, 2017
    Inventor: Kiran Kumar Madiraju Varadaraju
  • Publication number: 20170235643
    Abstract: A backup system comprises a tape backup storage storing a set of tape backup data, a snapshot backup storage storing a nearest snapshot, and a processor. The processor is configured to determine the nearest snapshot, wherein a snapshot time of the nearest snapshot is nearest in time to a backup time, and determine the set of tape backup data, wherein the set of tape backup data and the nearest snapshot enable recovery of a backup data.
    Type: Application
    Filed: April 28, 2017
    Publication date: August 17, 2017
    Inventors: Manuel Rodriques, John Rokicki
  • Publication number: 20170235644
    Abstract: One or more techniques and/or systems are provided for profiling a dataset. For example, a snapshot of a volume may be evaluated to identify a set of data characteristics, such as file and directory size information. A baseline dataset profile of a dataset of data within the volume may be constructed based upon the set of data characteristics. Histograms and graphs of directory counts and file counts may be constructed based upon the baseline dataset profile. An incremental dataset profile may be constructed for the dataset based upon an evaluation of the snapshot and a subsequent snapshot of the volume. Histograms and graphs of directories and files that are modified, created, and/or deleted may be constructed based upon the incremental dataset profile. Performance predictions, analytics, field diagnostics of performance issues, and/or scheduling of service execution may be implemented for a storage network hosting the volume based upon dataset profiles.
    Type: Application
    Filed: May 1, 2017
    Publication date: August 17, 2017
    Inventors: Krishna Murthy Chandraiah setty Narasingarayanapeta, Rakesh Bhargava M.R., Jose Mathew