Patents Issued in November 2, 2017
  • Publication number: 20170315831
    Abstract: The invention discloses a system for implementing script operation in preset embedded system, applied to the intelligent robot. The system comprises: a virtual machine, for script explaining and script execution; a thread pool, which is applied to instance storage of the virtual machine associated with the script task; a management unit, which is applied to connecting the thread pool with the virtual machine; a global table, connected with the thread pool, which is applied to storing identifying information of the thread, corresponding to the script task interrupted due to dispatching the management unit; a matching unit, which is connecting the management unit with the global table. The application of the global table has solved the problem of context in human-robot interaction.
    Type: Application
    Filed: June 12, 2015
    Publication date: November 2, 2017
    Inventor: Jiaqi Shi
  • Publication number: 20170315832
    Abstract: Techniques are disclosed relating to enabling virtual machines to access data on a physical recording medium. In one embodiment, a computing system provides a logical address space for a storage device to an allocation agent that is executable to allocate the logical address space to a plurality of virtual machines having access to the storage device. In such an embodiment, the logical address space is larger than a physical address space of the storage device. The computing system may then process a storage request from one of the plurality of virtual machines. In some embodiments, the allocation agent is a hypervisor executing on the computing system. In some embodiments, the computing system tracks utilizations of the storage device by the plurality of virtual machines, and based on the utilizations, enforces a quality of service level associated with one or more of the plurality of virtual machines.
    Type: Application
    Filed: July 13, 2017
    Publication date: November 2, 2017
    Inventors: Neil Carson, Nisha Talagala, Mark Brinicombe, Robert Wipfel, Anirudh Badam, David Nellans
  • Publication number: 20170315833
    Abstract: Session reliability for a redirected mass storage device can be improved by delaying a device removal process when a redirected mass storage device is disconnected. Whenever a session employed to redirect a mass storage device is disconnected, the agent on the server can send a device removal notification to a virtual disk enumerator. Rather than immediately initiating the device removal process, the virtual disk enumerator can pause I/O requests pertaining to the mass storage device and wait a specified amount of time to allow the mass storage device to be reconnected. If the mass storage device is reconnected during the specified amount of time, the paused I/O requests can be resumed. Otherwise, the device removal process can be commenced after the specified amount of time has elapsed.
    Type: Application
    Filed: May 2, 2016
    Publication date: November 2, 2017
    Inventor: Gokul Thiruchengode Vajravel
  • Publication number: 20170315834
    Abstract: Managing system clocks of virtual machines. A host system clock value of a host system clock of a host system is obtained, and a virtual machine system clock value of a system clock of a virtual machine managed by the host system is determined. The determining of the virtual machine system clock value includes using the host system clock value and a system clock adjustment value. The system clock of the virtual machine is adjusted using the virtual machine system clock value.
    Type: Application
    Filed: June 28, 2016
    Publication date: November 2, 2017
    Inventors: Ivan Mikhaylov, Ivan Mironov, Petr Petrov
  • Publication number: 20170315835
    Abstract: Measures, including methods, systems and computer-readable storage mediums, for use in configuring virtual machines on a host device including a plurality of processing cores. A first virtual machine is configured to run on a subset of cores of the plurality. The first virtual machine is of a first type. A second virtual machine is configured to run on any of the cores in the plurality. The second virtual machine is of a second, different type. The first virtual machine is configured to have a first priority which is higher than a second priority of the second virtual machine such that processing resources are available to the first virtual machine when required by the first virtual machine instead of being available to the second virtual machine.
    Type: Application
    Filed: April 27, 2017
    Publication date: November 2, 2017
    Inventors: Calum Sutherland LOUDON, Peter Louis WHITE
  • Publication number: 20170315836
    Abstract: The present disclosure relates to a method for monitoring virtual machines in a data center, to a computer program for executing the method, to a monitoring control unit for monitoring virtual machines in a data center, as well as to a data center comprising the monitoring control unit.
    Type: Application
    Filed: November 21, 2014
    Publication date: November 2, 2017
    Inventors: Alexander Langer, Bengt-Dirk Heye, Daniela Ionita, Tomas Muehlhoff, Oliver Speks
  • Publication number: 20170315837
    Abstract: Automated approval of a non-compliance of a modified configuration of a computer system includes performing a compliance check by a compliance management system. The modified configuration results from deploying a pre-approved modification pattern by a package management system modifying an initial configuration of the computer system. The modification pattern is provided by a software package that specifies at least one modification to be applied to the initial configuration and at least one compliance exception pre-approval specifying pre-approved non-compliances of modifications with compliance rules. Responsive to detecting a non-compliance, the non-compliance is compared with the pre-approved non-compliances. In response to determining that the detected non-compliances are not matching any pre-approved non-compliances, a compliance exception approval is requested. The detected non-compliance is approved in response to receiving the compliance exception approval for the detected non-compliances.
    Type: Application
    Filed: July 14, 2017
    Publication date: November 2, 2017
    Inventors: BOAS BETZLER, ANDREAS KUEHMICHEL, VOLKER NACHTWEY, KLAUS-THOMAS SCHLEICHER
  • Publication number: 20170315838
    Abstract: The present subject matter relates to migrating a virtual machine (VM) from a source server to a destination server. The migration involves computation of a suitability score for each particular server in the plurality of candidate servers. The suitability score for a server indicates the suitability of the server to host the VM. In an example implementation, the suitability score for a server is computed based on satisfaction of at least one criterion for operation of the VM by the server.
    Type: Application
    Filed: January 6, 2017
    Publication date: November 2, 2017
    Inventors: Murali Nidugala, Kalapriya Kannan, Hariharan Krishna
  • Publication number: 20170315839
    Abstract: A method and device for processing virtual machine migration, the method includes that: migration information of at least one virtual machine is acquired; a migration path for migrating each of the at least one virtual machine is determined according to the acquired migration information; and each of the at least one virtual machine is migrated and gathered onto a host corresponding to the migration path according to the determined migration path.
    Type: Application
    Filed: July 2, 2015
    Publication date: November 2, 2017
    Inventor: Maopeng ZHANG
  • Publication number: 20170315840
    Abstract: Some embodiments provide a method for distributing packets processed at multiple sockets across a team of network interface controllers (NICs) in a processing system. The method of some embodiments uses existing distribution (or selection) algorithms for distributing traffic across NICs of a NIC team (across several sockets), but augments the method to prioritize local NICs over remote NICs. When active NICs local to a socket associated with a packet are available, the method of some embodiments uses the selection algorithm to select from an array of the active local NICs. When active NICs local to the socket are not available, the method of some embodiments uses the selection algorithm to select from an array of the active NICs of other NICs on the NIC team.
    Type: Application
    Filed: April 29, 2016
    Publication date: November 2, 2017
    Inventors: Jia Yu, Yong Wang, Ronghua Zhang
  • Publication number: 20170315841
    Abstract: A computer-implemented method for complex event processing among a plurality of servers, the plurality of servers processing, in parallel, a complex event, the method including: receiving a plurality of input events to the plurality of servers, the plurality of servers having a plurality of parallelization window lengths specifying an allocation amount available to receive input events, and processing the plurality of input events, the processing includes obtaining a state of each of the plurality of servers when a processing server of the plurality of servers has received a number of input events corresponding to a parallelization window length of the processing server, the state indicating a window length remainder of each of the plurality of servers, calculating a whole window length remainder based on the states, and updating the parallelization window length of at least one the plurality of servers based on the whole window length remainder.
    Type: Application
    Filed: April 26, 2017
    Publication date: November 2, 2017
    Applicant: FUJITSU LIMITED
    Inventors: Kenji KOBAYASHI, Masazumi Matsubara
  • Publication number: 20170315842
    Abstract: In one implementation, a system for resource consuming tasks scheduling includes a metrics engine to identify a plurality of metrics based on a task to be scheduled, a utilization engine to generate a compiled representation of combined resource values over a period of time, wherein the combined resource values are based on a combination of the plurality of metrics;, an identification engine to identify common lows of resource utilization for the plurality of metrics based on the generated representation, and a schedule engine to schedule the task for a time that corresponds to the identified common lows of resource utilization.
    Type: Application
    Filed: October 30, 2014
    Publication date: November 2, 2017
    Inventors: Marina Lyan, Pavel Danichev, Elad Kadosh
  • Publication number: 20170315843
    Abstract: A method begins by a processing module of a dispersed storage and task (DST) execution unit receiving a data request for execution by the DST execution unit, the data request including an execution deadline. The method continues with the processing module comparing the execution deadline to a current time. When the execution deadline compares unfavorably to the current time the method continues with the processing module generating an error response. When the execution deadline compares favorably to the current time the method continues with the processing module determining a priority level based on the deadline and executing the data request in accordance with the priority level.
    Type: Application
    Filed: April 27, 2016
    Publication date: November 2, 2017
    Inventors: Greg R. Dhuse, Jason K. Resch
  • Publication number: 20170315844
    Abstract: A method for associating a network service (NS) with a virtualized network function (VNF), an apparatus, and a system such that a network manager (NM) can determine a relationship between an NS and a VNF, and maintain the NS. The method includes sending, by an NM, an NS instantiation request message to a network function virtualization orchestrator (NFVO), receiving an NS instantiation completion message from the NFVO, and determining a mapping relationship between a first NS and N VNFs according to information about the first NS and information about the N VNFs. The NS instantiation request message carries the information about the first NS, the NS instantiation completion message carries the information about the first NS and the information about the N VNFs, information about each VNF in the information about the N VNFs represents the VNF in the N VNFs forming the first NS, and N?1.
    Type: Application
    Filed: July 19, 2017
    Publication date: November 2, 2017
    Inventors: Li Ji, Lan Zou
  • Publication number: 20170315845
    Abstract: A plan including several groups of tasks is constructed for performing maintenance on a plurality of interrelated machines. A maintenance task in a first group is caused to execute within a window of time allocated for the maintenance. A determination is made that an estimated amount of time needed to execute a second group of tasks from the several groups is more than the remaining time in the window. In response to such a determination, the execution of the second group of tasks is omitted. The execution of a post-requisite task of the first group is completed. A maintenance task in the second group is executed during a second window of time allocated for the maintenance.
    Type: Application
    Filed: April 29, 2016
    Publication date: November 2, 2017
    Applicant: International Business Machines Corporation
    Inventors: Bradford A. Fisher, James K. MacKenzie, Dominic O'Toole
  • Publication number: 20170315846
    Abstract: Embodiments of the present invention provide a task scheduling method and apparatus on a heterogeneous multi-core reconfigurable computing platform. The method includes: when determining that a to-be-executed hardware task is in a ready state, adding the to-be-executed hardware task into a target hardware task queue corresponding to a function of the to-be-executed hardware task; reconfiguring, according to a priority of the to-be-executed hardware task and a usage status of multiple reconfigurable resource packages, at least one reconfigurable resource package in the multiple reconfigurable resource packages into a target intellectual property IP core that can execute the to-be-executed hardware task.
    Type: Application
    Filed: July 14, 2017
    Publication date: November 2, 2017
    Inventors: Chao Wang, Xi Li, Xuehai Zhou, Junneng Zhang, Peng Chen, Qi Guo
  • Publication number: 20170315847
    Abstract: According to an example, an instruction to run a kernel of an application on an apparatus having a first processing unit integrated with a second processing unit may be received. In addition, an application profile for the application at a runtime of the application kernel on the second processing unit may be created, in which the application profile identifies an affinity of the application kernel to be run on either the first processing unit or the second processing unit, and identifies a characterization of an input data set of the application. The application profile may also be stored in a data store.
    Type: Application
    Filed: October 31, 2014
    Publication date: November 2, 2017
    Inventors: Yuan Chen, Vanish Talwar, Naila Farooqui, Indrajit Roy
  • Publication number: 20170315848
    Abstract: Determining optimum values for Map Reduce parameters by identifying parameters that affect performance of a Map Reduce job, determining a relationship between each of the identified parameters and a maximization of resource utilization for a plurality of computing resources configured for executing the Map Reduce job, representing a workflow based upon supply-demand relationships among the plurality of computing resources, modeling an execution cost as a function of the plurality of identified parameters, formulating a non-linear programming problem to minimize the execution cost, reformulating the non-linear programming problem as a linear programming problem, and solving the linear programming problem to determine a combination of parameter values for the plurality of identified parameters that minimizes the execution cost for the Map Reduce job.
    Type: Application
    Filed: April 28, 2016
    Publication date: November 2, 2017
    Inventors: David S. Kung, Dung Phan, Jinjun Xiong
  • Publication number: 20170315849
    Abstract: Examples are disclosed that relate to event synthesis for application targets. One example provides a computing system including a logic machine and a storage machine holding instructions executable by the logic machine to, receive, via an accessibility tool, a user input of an invoke command, identify an application target for which the invoke command is intended, the target presented in a presentation framework, based at least in part on the application target, determine an event for the application target that is congruent with the application target and the invoke command, and synthesize the event. The instructions may be further executable to apply the event to the application target.
    Type: Application
    Filed: January 10, 2017
    Publication date: November 2, 2017
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Peter G. Salas, Bogdan Brinza, Rossen Atanassov
  • Publication number: 20170315850
    Abstract: For efficient data system error recovery, an error threshold is dynamically adjusted from a default error threshold to one of a plurality of error threshold values comprising at least high threshold values, medium threshold values, and low threshold values, for a particular error associated with an event object indicating a responsive action for handling the particular error in a data system. The responsive action to the event object comprises determining whether the error threshold needs to be adjusted for the particular error, and if it is determined the error threshold for the particular error does not need adjustment, the default error threshold is used.
    Type: Application
    Filed: July 14, 2017
    Publication date: November 2, 2017
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Herve G.P. ANDRE, Larry JUAREZ, Brian A. RINALDI, Todd C. SORENSON, Liang H. WU
  • Publication number: 20170315851
    Abstract: A method includes transmitting, by a controller of a storage device, a first bit on a data line. The method further includes responsive to transmitting the first bit on the data line, determining, by the controller, a line level of the data line. The method further includes responsive to determining the line level of the data line, determining, by the controller, whether the line level of the data line corresponds to the first bit and responsive to determining that the line level of the data line does not correspond to the first bit, determining, by the controller, that a collision has occurred on the data line.
    Type: Application
    Filed: April 27, 2016
    Publication date: November 2, 2017
    Inventors: Mark Robert Hicks, George Christopher Sneed
  • Publication number: 20170315852
    Abstract: Techniques are provided for executing a software product that includes a plurality of machine instructions and that is associated with a measured usage pricing model. The executing of the software product includes tracking the usage of one or more computing resources for executing the software product in accordance with the associated measured pricing model. The executing also includes, for each of multiple sets of machine instructions, determining whether the set is associated with a token indicating that the set is a set of diagnostic machine instructions related to the executing of the software product. For each of those multiple sets of machine instructions, the executing of the software product further includes, responsive to a determination that the set of machine instructions is associated with the token, not tracking the usage of the one or more computing resources during execution of that set of diagnostic machine instructions.
    Type: Application
    Filed: April 28, 2016
    Publication date: November 2, 2017
    Inventors: Edward A. Addison, William J. Bulfin, Andre C. Clark, Suzanne L. DeMarrais, Peggy A. DeVal, Scott W. McClure, Andrew Wright
  • Publication number: 20170315853
    Abstract: Techniques are provided for executing, by one or more first processors, one or more software products associated with a measured usage pricing model. An indication is received, during the execution of the software products, to execute a set of diagnostic machine instructions related to the execution of the software products. Responsive to that received indication, the one or more first processors initiate execution, by one or more distinct second processors, of the set of diagnostic machine instructions. The initiating of the execution by the distinct second processors of that set of diagnostic machine instructions is based at least in part on such execution not being associated with the measured usage pricing model.
    Type: Application
    Filed: April 28, 2016
    Publication date: November 2, 2017
    Inventors: Edward A. Addison, William J. Bulfin, Andre C. Clark, Suzanne L. DeMarrais, Peggy A. DeVal, Scott W. McClure, Andrew Wright
  • Publication number: 20170315854
    Abstract: The present disclosure is related to devices, systems, and methods for determining errors from logs. An example device can include instructions to analyze a log of a log source, determine an error in the log, the error resulting from a user action with respect to the log source, and provide a portion of the log associated with the error to a user interface.
    Type: Application
    Filed: April 29, 2016
    Publication date: November 2, 2017
    Applicant: VMware, Inc.
    Inventors: Vardan Movsisyan, Hovhannes Bolibekyan
  • Publication number: 20170315855
    Abstract: A method, system and computer program product, the method comprising: obtaining transition probabilities, each transition probability associated with transition of a home appliance between states; receiving sensor readings indicating behavior of the home appliance; identifying by the processor a transition event occurring in the sensor readings; determining by the processor a source cluster and a destination cluster associated with the transition event; determining by the processor a duration indicator associated with the transition event; determining by the processor a transition probability by looking up in the transition probabilities, a probability associated with the duration indicator, the source cluster and the destination cluster; comparing by the processor the transition probability to a threshold; and responsive to the transition probability exceeding a threshold, providing an indication of abnormal behavior of the home appliance to a user.
    Type: Application
    Filed: May 2, 2016
    Publication date: November 2, 2017
    Inventors: Christoph DOBLANDER, Hans-Arno JACOBSEN
  • Publication number: 20170315856
    Abstract: A system is provided for clustering events. A first engine receives message data from a managed infrastructure that includes managed infrastructure physical hardware which supports the flow and processing of information. A second engine determines common characteristics of events and produces clusters of events relating to the failure of errors in the managed infrastructure. Membership in a cluster indicates a common factor of the events that is a failure or an actionable problem in the physical hardware managed infrastructure directed to supporting the flow and processing of information. Events are produced that relate to the managed infrastructure while converting the events into words and subsets used to group the events that relate to failures or errors in the managed infrastructure, including the managed infrastructure physical hardware. A situation room is provided with a collaborative interface (UI) for decomposing events from managed infrastructures.
    Type: Application
    Filed: April 21, 2017
    Publication date: November 2, 2017
    Inventors: Philip Tee, Robert Duncan Harper, Charles Mike Silvey
  • Publication number: 20170315857
    Abstract: A method and system are disclosed for providing integrated circuit chip cards (e.g. transaction cards) pursuant to an order placed by or on behalf of a card issuer wherein a testing data file is provided in conjunction with prepersonalization data encoding for use in conjunction with subsequent testing of the accuracy of the encoded prepersonalization data. Such testing may be completed prior to personalization data encoding to facilitate the identification of prepersonalization data encoding errors, thereby further facilitating remedial action and reduction of production disruptions.
    Type: Application
    Filed: December 16, 2016
    Publication date: November 2, 2017
    Applicant: CPI Card Group - Colorado, Inc.
    Inventor: Barry Mosteller
  • Publication number: 20170315858
    Abstract: In one aspect, a method for metric payloads ingestion and playback is disclosed. The method includes receiving time series of metric payloads for a plurality of performance metrics indicating performance of a node or machine and storing the received time series of metric payloads in a payload tracking table of a database. The storing includes storing the received time series of metric payloads in different layers and partitioned regions of the payload tracking table. The layers represent time ranges corresponding to time points when the time series of metric payloads are received. The partitioned regions are assigned to received certain ones of the received time series of metric payloads. The method includes replaying the stored time series of metric payloads from a select one or more of the partitioned region or layer or both.
    Type: Application
    Filed: April 29, 2016
    Publication date: November 2, 2017
    Applicant: AppDynamics, LLC
    Inventor: Gautam Borah
  • Publication number: 20170315859
    Abstract: Techniques for a recovery environment for a virtual machine are described herein. Generally, a recovery environment provides a secure environment in which a damaged virtual machine can undergo repair procedures without compromising the security of the damaged virtual machine. In at least some implementations, a recovery environment represents an instance of a virtual machine that is executed to wrap a damaged virtual machine to enable the damaged virtual machine to be repaired.
    Type: Application
    Filed: March 2, 2017
    Publication date: November 2, 2017
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Allen Marshall, Kevin M. Broas, Christopher Warner McCarron, David A. Hepkin, Mathew John
  • Publication number: 20170315860
    Abstract: A device, system, and/or method includes an internal circuit configured to perform at least one function, an input-output terminal set and a repair circuit. The input-output terminal set includes a plurality of normal input-output terminals connected to an external device via a plurality of normal signal paths and at least one repair input-output terminal selectively connected to the external device via at least one repair signal path. The repair circuit repairs at least one failed signal path included in the normal signal paths based on a mode signal and fail information signal, where the mode signal represents whether to use the repair signal path and the fail information signal represents fail information on the normal signal paths. Using the repair circuit, various systems adopting different repair schemes may be repaired and cost of designing and manufacturing the various systems may be reduced.
    Type: Application
    Filed: July 14, 2017
    Publication date: November 2, 2017
    Applicant: Samsung Electronics Co., Ltd.
    Inventors: Sang-Hoon SHIN, Hae-Suk LEE, Han-Vit JUNG, Kyo-Min SOHN
  • Publication number: 20170315861
    Abstract: A PCI host bridge (PHB) includes a warm reset mode and a full reset mode. When a fatal error occurs, the type of fatal error is determined, a reset mode corresponding to that type of fatal error is determined, and a reset corresponding to the reset mode is performed. A full reset clears the error registers, status registers and configuration registers, which then requires the configuration registers to be reconfigured before the PHB can be reinitialized. A warm reset clears the error registers and status registers, but does not clear the configuration registers. A warm reset thus does not require the time to write to the configuration registers, and the PHB can be reinitialized using the existing configuration data in the configuration registers while link training is done in parallel. When initialization of the PHB after a warm reset is not successful, a full reset is performed.
    Type: Application
    Filed: July 18, 2017
    Publication date: November 2, 2017
    Inventors: Jesse P. Arroyo, Rama K. Hazari, Sakethan R. Kotta, Kumaraswamy Sripathy
  • Publication number: 20170315862
    Abstract: In one embodiment, a method includes reading a codeword stored to a memory, computing a syndrome word based on a product of the codeword and a parity check matrix derived from a linear block code, setting a flag to a first value indicating that the codeword includes no errors in response to a first determination requiring that the syndrome word is an all-zero vector, setting the flag to a second value indicating that the codeword includes exactly one single-bit error in response to a second determination requiring that the syndrome word equals a column of the parity check matrix, setting the flag to a third value indicating that the codeword includes an odd number of multiple bit errors in response to a third determination, and setting the flag to a fourth value indicating that the codeword includes an even number of multiple bit errors in response to a fourth determination.
    Type: Application
    Filed: April 27, 2016
    Publication date: November 2, 2017
    Inventors: Roy D. Cideciyan, Mark A. Lantz, Scott J. Schaffer
  • Publication number: 20170315863
    Abstract: Examples of techniques for hardware assisted data protection are disclosed. In one example implementation according to aspects of the present disclosure, a method may include receiving a read data record comprising at least one memory write, the read data record having an associated cyclic redundancy check (CRC). The method may further include calculating, by a hardware module, an expected CRC for the read data record. Additionally, the method may include comparing the expected CRC to a known CRC stored in a known CRC data store. Finally, the method may include authenticating the read data record when the expected CRC matches a corresponding known CRC.
    Type: Application
    Filed: May 5, 2016
    Publication date: November 2, 2017
    Inventors: David F. Craddock, Matthias Klein, Eric N. Lais, Peter G. Sutton, Harry M. Yudenfriend
  • Publication number: 20170315864
    Abstract: Examples of techniques for hardware assisted data protection are disclosed. In one example implementation according to aspects of the present disclosure, a method may include receiving a read data record comprising at least one memory write, the read data record having an associated cyclic redundancy check (CRC). The method may further include calculating, by a hardware module, an expected CRC for the read data record. Additionally, the method may include comparing the expected CRC to a known CRC stored in a known CRC data store. Finally, the method may include authenticating the read data record when the expected CRC matches a corresponding known CRC.
    Type: Application
    Filed: May 5, 2016
    Publication date: November 2, 2017
    Inventors: David F. Craddock, Matthias Klein, Eric N. Lais, Peter G. Sutton, Harry M. Yudenfriend
  • Publication number: 20170315865
    Abstract: Techniques for data deduplication in a data storage system include comparing a first attribute of a received data page to first attributes of one or more stored data pages. In response to the first attribute matching one of the first attributes, a second attribute of the received data page is compared to second attributes of the one or more data pages. In response to the second attribute of the received data page matching one of the second attributes, a fingerprint of the received data page is compared to fingerprints of the one or more data pages. In response to the fingerprint of the received data page matching one of the fingerprints, the received data page is discarded and replaced with a reference to the corresponding data page already stored in the storage system. In response to first attribute, the second attribute, or the fingerprint of the received data page not matching, the received data page is stored.
    Type: Application
    Filed: February 21, 2017
    Publication date: November 2, 2017
    Inventors: TIMOTHY J. FISHER, NIKOLAS IOANNOU, THOMAS PARNELL, ROMAN A. PLETKA, SASA TOMIC
  • Publication number: 20170315866
    Abstract: An apparatus may comprise a controller to retrieve data from a non-volatile memory, and an error correction module operable on the controller to read a memory cell of the non-volatile memory at a first set of sense conditions comprising a multiplicity of sense conditions. The error correction module may be further operable to set a first set of bits in an encoded output, the first set of bits comprising a logical state bit to indicate a logical state of the memory cell and one or more additional bits in the encoded output to indicate accuracy of the logical state bit based upon results of the read at the first set of sense conditions, the first set of sense conditions comprising a greater number than that of the first set of bits. Other embodiments are disclosed and claimed.
    Type: Application
    Filed: February 27, 2017
    Publication date: November 2, 2017
    Applicant: INTEL CORPORATION
    Inventors: MATTHEW GOLDMAN, WAYNE D. TRAN, ALIASGAR S. MADRASWALA, SUNGHO PARK
  • Publication number: 20170315867
    Abstract: A method for accessing a flash memory module is provided. The flash memory module is a 3D flash memory module including a plurality of flash memory chips, each flash memory chip includes a plurality of blocks, each block includes a plurality of pages, and the method includes: configuring the flash memory chips to set at least a first super block and at least a second super block of the flash memory chips; and allocating the second super block to store a plurality of temporary parities generated when data is written into the first super block.
    Type: Application
    Filed: April 25, 2017
    Publication date: November 2, 2017
    Inventors: Tsung-Chieh Yang, Hong-Jung Hsu
  • Publication number: 20170315868
    Abstract: A method for accessing a flash memory module is provided. The flash memory module is a 3D flash memory module including a plurality of flash memory chips, each flash memory chip includes a plurality of blocks, each block includes a plurality of pages, and the method includes: configuring the flash memory chips to set at least a first super block and at least a second super block of the flash memory chips; and allocating the second super block to store a plurality of temporary parities generated when data is written into the first super block.
    Type: Application
    Filed: April 25, 2017
    Publication date: November 2, 2017
    Inventors: Tsung-Chieh Yang, Hong-Jung Hsu
  • Publication number: 20170315869
    Abstract: Various implementations disclosed herein provide fault-tolerant enterprise object storage system that can store small objects. In various implementations, the fault-tolerant enterprise object storage system writes a small object into an aggregate object that is distributed across a plurality of storage entities. In some implementations, the small object is at least an order of magnitude smaller than the aggregate object, and the small object is within the same order of magnitude of a block unit addressable within each of the storage entities. In some implementations, based on the small object, the storage system updates the parity data associated with the aggregate object in response to writing the small object into the aggregate object. In various implementations, the storage system updates a processed data end offset indicator that indicates that the parity data for the aggregate object includes valid data up to and including the small object.
    Type: Application
    Filed: July 12, 2016
    Publication date: November 2, 2017
    Inventors: Vandana Shyam Rungta, Dana Marlow Henriksen, Mel J. Oyler, Kevin Wayne Kingdon
  • Publication number: 20170315870
    Abstract: A method, a device and a storage medium for cleaning a memory are provided. The method includes that: a preset level corresponding to a detected hang state is determined; a cleaning mode corresponding to the preset level is determined; and an application program running in a memory is cleaned according to the cleaning mode.
    Type: Application
    Filed: April 27, 2017
    Publication date: November 2, 2017
    Inventors: Xiaoliang ZHANG, Hao YAN, Ren LIU
  • Publication number: 20170315871
    Abstract: A computing device includes interfaces and communicates with a dispersed storage network (DSN) and issues write slice requests to a set of storage units (SUs) to store distributedly a set of encoded data slices (EDSs) associated with a data object. When at least a write threshold number of favorable write slice responses are received, the computing device identifies an EDS without write confirmation and an SU associated therewith. The computing device stores the EDS without write confirmation in a slice cache memory and, based on a determination to reissue a write slice request associated with the EDS without write confirmation, the computing device reissues the write slice request. When a favorable write slice response is received from the SU associated with the EDS without write confirmation, the computing device deletes the EDS of the at least the write threshold number of EDSs without write confirmation from the slice cache memory.
    Type: Application
    Filed: July 17, 2017
    Publication date: November 2, 2017
    Inventors: S. Christopher Gladwin, Asimuddin Kazi
  • Publication number: 20170315872
    Abstract: Exemplary embodiments relate to techniques that allow for file system support to be rapidly deployed for new or updated operating system distributions. In some embodiments, a management component is provided perform data management on file systems. When a data management operation on a file system is requested, an operation component searches in a predetermined location for a named module that implements certain types of operations. The operation component then calls these operations (including validate, build and deport operations for the file system) to implement data management procedures in the file system. Implementing support for a new operating system or file system does not require that the management entity be rebuilt. Upon release of a new operating system or file system, a new named module can be written and placed in the predetermined location where the operation module is configured to search.
    Type: Application
    Filed: April 28, 2016
    Publication date: November 2, 2017
    Inventors: Vasantha Prabhu, Nikhil Kaplingat, Girish Kumar
  • Publication number: 20170315873
    Abstract: Power loss in a client device is detected. In response to the detecting of the power loss, an electronic card is alerted that the power loss is about to occur, where the electronic card includes a volatile storage and a non-volatile storage. A transfer of data from the volatile storage to the non-volatile storage is triggered in response to the alert.
    Type: Application
    Filed: October 31, 2014
    Publication date: November 2, 2017
    Inventors: Byron A. ALCORN, Scott W. BRIGGS, Joel Pierre LEFEBVRE
  • Publication number: 20170315874
    Abstract: One or more techniques and/or computing devices are provided for moving a consistency group having a replication relation. For example, a first consistency group of storage objects (e.g., files, logical unit numbers (LUNs), etc.) within first storage may have a replication relationship with a second consistency group within second storage (e.g., the second consistency group is maintained as a synchronously replicated copy of the first consistency group). A volume copy operation, a single file move on demand command, a single file restore command, or other functionality is used to move the first consistency group from the first storage to third storage, such as for load balancing, to create a moved first consistency group within the third storage. A new replication relationship is established between the moved first consistency group and the second consistency group, and the moved first consistency group and the second consistency group are resynchronized.
    Type: Application
    Filed: April 29, 2016
    Publication date: November 2, 2017
    Inventors: Pranab Patnaik, Nagender Somavarapu, Yuedong Mu, Rithin Kumar Shetty, Devang Kundanlal Shah
  • Publication number: 20170315875
    Abstract: A cloud storage gateway device can be used to deduplicate data across different namespaces while complying with SLOs that govern data of the different namespaces. A cloud storage gateway device can use multiple fingerprint indexes to comply with different SLOs. Each fingerprint index corresponds to a different SLO. Thus, the cloud storage gateway device deduplicates data against other data governed by a same SLO. Assuming an SLO aligns or indicates a cloud storage target, the cloud storage gateway device will deduplicate data against other data that will eventually migrate from the device to a same cloud storage target. The cloud storage gateway device ensures satisfaction of the governing SLO(s) from receipt of data, through deduplication, to the migration of the data to a cloud storage target.
    Type: Application
    Filed: April 29, 2016
    Publication date: November 2, 2017
    Inventors: Sudhindra Prasad Tirupati Nagaraj, Pramodh Pisupati, Gregory Thomas Taleck
  • Publication number: 20170315876
    Abstract: Disclosed in some examples are predictive storage techniques for use in a distributed data system. The predictive storage techniques may be used to manage locally stored elements of a shared data collection, such as the storage of files on nodes of the distributed data system that are limited in local storage space. The predictive storage techniques may achieve a balance between consumption of local resources and timely access of important elements in the shared data collection. For example, the predictive storage techniques may be used for keeping or pre-caching certain items of a collection that are determined as likely to be used in local storage for convenient access, and allowing access the remaining items on request over a network.
    Type: Application
    Filed: July 14, 2017
    Publication date: November 2, 2017
    Inventors: Matthew Dornquast, Brian Bispala, Samuel Schroeder, Christopher Gwinn, Justin Grammens, Thomas Lindquist, Peter Lindquist
  • Publication number: 20170315877
    Abstract: Various embodiments are generally directed an apparatus and method for performing a discovery operation to determine a system layout for a database and one or more files for a dataset stored in the database and performing a backup operation on the dataset to cause storage of a backup copy of each of the one or more files and collect metadata associated with the backup copy of each of the one or more files, the metadata to enable restoration of the one or more files.
    Type: Application
    Filed: April 28, 2016
    Publication date: November 2, 2017
    Inventors: Nikhil Kaplingat, Praveen Kumar, Deepa G, Shaswati Shee, Suman Ramachandra, Krishnan Chandrashekar, Lokesha Subbareddy, Vrishali Thorat
  • Publication number: 20170315878
    Abstract: A technique efficiently manages a snapshot and/or clone by a volume layer of a storage input/output (I/O) stack executing on one or more nodes of the cluster. According to the technique, an ownership attribute is included in metadata entries of a dense tree data structure for extents that eliminates otherwise needed reference count operations for the snapshots and reduces reference count operations for the clones. Illustratively, a copy of a parent dense tree level created by a copy-on-write (COW) operation is referred to as a “derived level”, whereas the existing level of the parent dense tree is referred to as a “source level”. The source level may be persistently linked to the derived level by keeping “level identifying key information” in a respective dense tree source level header. Moreover, two different types of dense tree derivations are defined: a derive relationship and a reverse-derive relationship.
    Type: Application
    Filed: April 29, 2016
    Publication date: November 2, 2017
    Inventors: Prahlad Purohit, Ling Zheng, Christopher Joseph Corsi
  • Publication number: 20170315879
    Abstract: An operating method of a storage device that includes a nonvolatile memory device and a controller configured to control the nonvolatile memory device, the method including: detecting, by the controller, a fault of the nonvolatile memory device or the controller, notifying, by the controller, a host device of the fault, notifying, by the controller, the host device of one or more recovery schemes for recovering the fault, and recovering, by the controller, the fault in response to a recovery scheme selected by the host device.
    Type: Application
    Filed: April 7, 2017
    Publication date: November 2, 2017
    Inventors: JI HYUNG PARK, HyunJung SHIN, ISAAC BAEK, JEONGUK KANG, MINSEOK KO
  • Publication number: 20170315880
    Abstract: A system includes reception, at a target database system, of a request to recover a backup created by a source database system into the target database system, where the request comprises a system identifier of the source database system, determination of a backup tool configuration file associated with the source database system based on the system identifier of the source database system, request of a recovery of the backup into the target database system using the backup tool configuration file, copying of a backup catalog of the source database system into a storage location associated with the target database system, and appending of a system change marker to the copied backup catalog, wherein the system change marker comprises the system identifier of the source database system.
    Type: Application
    Filed: July 19, 2017
    Publication date: November 2, 2017
    Inventors: Andre Schefe, Bernd Vorsprach, Henrik Hempelmann, Martin E. Brunzema, Robin Wissbrock, Torsten Strahl