Patents Issued in November 30, 2017
-
Publication number: 20170344267Abstract: A method, non-transitory computer readable medium, and device that assists with identifying failure of a storage disk includes obtaining performance data and a threshold value associated with each of the obtained performance data for a plurality of storage disks. Next, the obtained performance data is compared with the corresponding threshold value associated with each of the obtained performance data to determine for one or more initial failures in the plurality of storage disks. Next, one or more operational test cases are executed on each of the determined one or more initial failures in the plurality of storage disks to determine for one or more false positives in the determined one or more initial failures in the plurality of storage disks. A notification is sent based on the determination of the one or more false positives.Type: ApplicationFiled: May 27, 2016Publication date: November 30, 2017Inventors: Douglas Coatney, Rebecca Kekelishvili, Varsha Ingle
-
Publication number: 20170344268Abstract: A system according to one embodiment includes a processor and logic integrated with and/or executable by the processor. The logic is configured to cause the processor to store hierarchically-organized global configuration information for each node and each tape library resource in a storage cluster to at least one memory accessible by each node of the storage cluster. The storage cluster includes at least one tape library. Also, the logic is configured to cause the processor to migrate data to and/or recall data from a tape cartridge pool within a tape library, using the hierarchically-organized global configuration information and via a node which has access to the tape cartridge pool, in response to receiving a migration and/or recall request at any node of the storage cluster. Other systems, methods, and computer program products for management of data and resources in a tiered data storage system are described in more embodiments.Type: ApplicationFiled: August 21, 2017Publication date: November 30, 2017Inventors: Atsushi Abe, Takashi Ashida, Mathias Bjoerkqvist, Tohru Hasegawa, Takeshi Ishimoto, Hiroshi Itagaki, Martin Petermann, Slavisa Sarafijanovic, Thomas D. Weigold
-
Publication number: 20170344269Abstract: A storage system includes a first storage apparatus configured to execute, when first data stored in a first physical address of the first storage apparatus corresponding to a first logical address is identical with second data stored in a second physical address of the first storage apparatus corresponding to a second logical address, a first redundancy removal processing for erasing the second data and correlating both of the first logical address and the second logical address with the first physical address, and a control apparatus being configured to specify a first read frequency for the first logical address, specify a second read frequency for the second logical address, and execute, when a total value of the first read frequency and the second read frequency is greater than a first value, a transmission of the first data from the first storage apparatus to the second storage apparatus.Type: ApplicationFiled: April 24, 2017Publication date: November 30, 2017Applicant: FUJITSU LIMITEDInventor: Tatsuo Kumano
-
Publication number: 20170344270Abstract: A computer system has a virtualization software that supports execution of a virtual machine in which a container is run. A method of managing allocation of storage resources to the container includes the steps of monitoring a virtual socket, detecting, based on the monitoring, a request from a plug-in of the container to create a data volume, upon detecting the request, retrieving a storage resource limit that has been set for the first virtual machine and determining if creation of the data volume causes the storage resource limit to be exceeded, and communicating the request to the virtualization software to cause the virtualization software to create the data volume if the limit is determined to be not exceeded and returning an error if the limit is determined to be exceeded.Type: ApplicationFiled: May 30, 2017Publication date: November 30, 2017Inventors: Mark STERIN, Andrew STONE, Prashant DHAMDHERE, Ritesh H. SHUKLA, Govindan Thirumal THIRUVENGADA
-
Publication number: 20170344271Abstract: A method includes, in a tape apparatus system, receiving a request to write a file from a host, and, in response to the request, dividing sequentially received data of the file into two or more segments. Each of the two or more segments have a predetermined size. The method further includes sequentially writing a series of the two or more segments onto one or more tapes, and determining the predetermined size based on a capacity use efficiency of a plurality of other tapes and a time to copy when a spanning file, written by spanning on the one or more tapes, is copied to the plurality of other tapes. A corresponding computer program product and computer system are also disclosed.Type: ApplicationFiled: August 3, 2017Publication date: November 30, 2017Inventors: Tohru Hasegawa, Masayuki Iwanaga, Yutaka Oishi
-
Publication number: 20170344272Abstract: A computer program product includes a computer readable storage medium having program instructions executable by a tape drive to cause the tape drive to perform a method comprising: receiving, at the tape drive, a request for a write operation to be performed in the tape drive; determining, by the tape drive, an expected transaction size of a next write operation; comparing, by the tape drive, the expected transaction size of the next write operation to each of a first transaction size threshold and a second transaction size threshold in response to receiving the request; determining, by the tape drive, an optimum a write procedure based at least in part on the comparison; and invoking, by the tape drive, the optimum write procedure in response to determining the optimum write procedure.Type: ApplicationFiled: August 18, 2017Publication date: November 30, 2017Inventors: James M. Karp, Takashi Katagiri, Yuhko Mori, Yutaka Oishi
-
Publication number: 20170344273Abstract: A computer program product for implementing write procedures using an estimated best setting in a first run, the computer program product comprising a computer readable storage medium having program instructions executable by a tape drive to cause the tape drive to perform a method comprising: receiving, at the tape drive, a request for a write operation to be performed in the tape drive; determining, by the tape drive, a capacity margin ratio of the tape drive; determining an optimum a write procedure based at least in part on the capacity margin ratio; and invoking the optimum write procedure in response to determining the optimum write procedure. The optimum write procedure is selected from the group consisting of: a backhitch write procedure, a same wrap backhitchless flush (SWBF) write procedure, and a recursively accumulating backhitchless flush (RABF) write procedure.Type: ApplicationFiled: August 18, 2017Publication date: November 30, 2017Inventors: James M. Karp, Takashi Katagiri, Yuhko Mori, Yutaka Oishi
-
Publication number: 20170344274Abstract: An application within a virtual machine is an iSCSI Initiator and is allowed to use as an iSCSI Target another virtual machine within the same hypervisor in order to make a persistent reservation for a virtual disk within a remotely-located storage platform. Any number of virtual machines within different hypervisors, and perhaps on different computers, use a local controller virtual machine to make a persistent reservation for the same virtual disk. The registration list and the current reservation holder data for an iSCSI persistent reservation for a particular virtual disk are held on a storage node of the storage platform rather than within a single virtual machine of a remote computer. A metadata module on the storage platform handles the incoming requests. A coordinator module within the storage platform uses a lock mechanism to guarantee that the reserve, release, preempt and clear commands are handled properly.Type: ApplicationFiled: May 24, 2016Publication date: November 30, 2017Inventors: Avinash LAKSHMAN, Abhijith SHENOY
-
Publication number: 20170344275Abstract: Memory modules, systems, memory controllers and associated methods are disclosed. In one embodiment, a memory module includes a module substrate having first and second memory devices. Buffer circuitry disposed on the substrate couples to the first and second memory devices via respective first and second secondary interfaces. The buffer circuitry includes a primary signaling interface for coupling to a group of signaling links associated with a memory controller. The primary signaling interface operates at a primary signaling rate and the first and second secondary data interfaces operate at a secondary signaling rate. During a first mode of operation, the primary interface signaling rate is at least twice the secondary signaling rate. A first time interval associated with a transfer of first column data via the first secondary interface temporally overlaps a second time interval involving second column data transferred via the second secondary interface.Type: ApplicationFiled: December 18, 2015Publication date: November 30, 2017Applicant: Rambus Inc.Inventors: Frederick A. WARE, Ely TSERN
-
Publication number: 20170344276Abstract: A system includes a read/write module and a caching module. The read/write module is configured to access a first portion of a recording surface of a rotating storage device. Data is stored on the first portion of the recording surface of the rotating storage device at a first density. The caching module is configured to cache data on a second portion of the recording surface of the rotating storage device at a second density. The second portion of the recording surface of the rotating storage device is separate from the first portion of the recording surface of the rotating storage device. The second density is less than the first density.Type: ApplicationFiled: August 14, 2017Publication date: November 30, 2017Inventor: Sehat Sutardja
-
Publication number: 20170344277Abstract: Apparatus for communications includes a CPU, a system memory, and a network interface controller (NIC), which is configured to receive incoming data packets from a network, to post the received data packets in a designated queue for delivery to the CPU. The NIC issues interrupts to the CPU in response to the incoming data packets at a rate determined, for the designated queue, in accordance with an interrupt moderation parameter that is set for the queue. During each of a succession of monitoring periods, the CPU measures for the designated queue a current throughput of the incoming data packets and a current rate of interrupts, makes a comparison between the current measured throughput and rate of interrupts to the throughput and rate of interrupts that were measured during a preceding period in the succession, and selects and applies an update to the interrupt moderation parameter responsively to the comparison.Type: ApplicationFiled: May 24, 2017Publication date: November 30, 2017Inventors: Tal Gilboa, Gil Rockah, Achiad Shochat, Amir Ancel
-
Publication number: 20170344278Abstract: A memory controller may be provided. The memory controller may include a wear-leveler may be configured to determine whether execution of a swapping operation is required based on reception of a write command for a stack region.Type: ApplicationFiled: April 21, 2017Publication date: November 30, 2017Applicant: SK hynix Inc.Inventors: Do-Sun HONG, Jung Hyun KWON, Donggun KIM, Yong Ju KIM, Sungeun LEE, Jae Sun LEE, Sang Gu JO, JINGZHE XU
-
Publication number: 20170344279Abstract: Systems and methods for saving critical data upon power loss are described. In one embodiment, the systems and methods include performing a write operation to a first track of a storage drive, monitoring a voltage level of a storage drive to detect power loss on the storage drive while performing the write operation, identifying a track ID of a second track adjacent to the first track upon detecting power loss on the storage drive, and storing the identified track ID in a non-volatile memory on the storage drive.Type: ApplicationFiled: May 25, 2016Publication date: November 30, 2017Applicant: SEAGATE TECHNOLOGY LLCInventors: Jin Quan Shen, Yong Peng Chng, Thein Than Zaw, Robertus Hartono
-
Publication number: 20170344280Abstract: Provided are a computer program product, system, and method in accordance with one embodiment of the present description, in which selected memory resources targeted for secure data cleaning. For example, memory resources which may be targeted for secure data cleaning may include a specific volume (or portion of a volume) of data storage which has been selected for secure erasure of any residual data which may remain on the targeted storage volume before the volume is released for use by others. Other examples of memory resources which may be targeted for secure data cleaning in accordance with the present description may include one or more buffers located in switches or other storage area network components which provide data paths between hosts and storage controllers or storage control units. Other aspects of targeted secure data overwriting in accordance with the present description are described.Type: ApplicationFiled: May 25, 2016Publication date: November 30, 2017Inventors: Matthew G. Borlick, Kurt A. Lovrien, Karl A. Nielsen
-
Publication number: 20170344281Abstract: A method, device, and non-transitory computer readable medium for minoring data, comprising, selecting, based on a plurality of data attributes, a portion of local data in a local storage device for minoring to a remote storage device and copying the selected portion of the local data to at least one cache memory of the remote storage device. Next a determination of when a failover event has occurred in the local storage device is made, wherein the failover event comprises an event in which the local data in the local storage device is inaccessible to a client computing device when the client computing device attempts to access the local data from the local storage device. A copy of the local data from the cache memory in the remote storage device is retrieved when the failover event is determined to have occurred.Type: ApplicationFiled: May 27, 2016Publication date: November 30, 2017Inventors: Brian Naylor, Manish Bhuwania, Snehal Kamble, Joseph Brown, Satish Cherbrolu, Michael Noeth, Sally Wahba
-
Publication number: 20170344282Abstract: A method, non-transitory computer readable medium and storage server computing device that determines when a generated storage operation corresponds with one of a set of predefined storage operations. The storage operation is executed and a result of the execution of the storage operation is withheld from a file system, when the determining indicates that the storage operation corresponds with one of the set of predefined storage operations. A determination is made when a consistency point operation has completed. The result of the execution of the storage operation is presented to the file system, when the determining indicates that a consistency point operation has completed. This technology reduces the number of storage operations that are required to be journaled to maintain consistency of a file system, thereby reducing the runtime resources required to facilitate the journaling and replay resource required to replay the storage operations in a journal following a recovery.Type: ApplicationFiled: May 27, 2016Publication date: November 30, 2017Inventors: Ram Kesavan, Ananthan Subramanian, Hiroshi Ishii, Abdul Basit, Joseph Brown, JR., Rohit Singh
-
Publication number: 20170344283Abstract: Technology for an apparatus is described. The apparatus can receive a command to copy data. The command can indicate a first address, a second address and an offset value. The apparatus can determine a first non-uniform memory access (NUMA) domain ID for the first address and a second NUMA domain ID for the second address. The apparatus can identify a first computing node with memory that corresponds to the first NUMA domain ID and a second computing node with memory that corresponds to the second NUMA domain ID. The apparatus can generate an instruction for copying data in a first memory range of the first computing node to a second memory range of the second computing node. The first memory range can be defined by the first address and the offset value and the second memory range can be defined by the second address and the offset value.Type: ApplicationFiled: May 27, 2016Publication date: November 30, 2017Applicant: Intel CorporationInventors: Francesc Guim Bernat, Alejandro Duran Gonzalez, Karthik Kumar, Thomas Willhalm, Raj K. Ramanujan
-
Publication number: 20170344284Abstract: A storage device (220) is described. The storage device (220) may store data in a storage memory (445), and may have a host interface (420) to manage communications between the storage device (220) and a host machine (110, 115, 120, 125, 130). The storage device (220) may also include a translation layer (430) to translate addresses between the host machine (110, 115, 120, 125, 130) and the storage memory (445), and a storage interface (440) to access data from the storage memory (445). An in-storage monitoring engine (425) may determine characteristics (605, 610, 615) of the storage device (220), such as latency (605), bandwidth (610), and retention (615).Type: ApplicationFiled: August 1, 2016Publication date: November 30, 2017Inventors: Inseok Stephen CHOI, Yang Seok KI, Byoung Young AHN
-
Publication number: 20170344285Abstract: A Tenant-Aware Storage-Sharing Engine (TASTE) (225) is described. The TASTE (225) may include storage (510) for information about a set of available storage devices (705, 710) at a data center (105). A reception logic 505) may receive storage device requirements (415) from a tenant (145, 230). Selection logic (515) may then select a subset of the available storage devices (705, 710) that satisfies the storage device requirements 415) of the tenant (145, 230).Type: ApplicationFiled: August 3, 2016Publication date: November 30, 2017Inventors: Inseok Stephen CHOI, Yang Seok KI, Byoung Young AHN
-
Publication number: 20170344286Abstract: A solid state drive duplication apparatus having a plurality of duplication units, each of the duplication units including: a chain connection input port, a chain connection output port, a PCI-E interface, and a printed circuit board including an FPGA chip, wherein the duplication units are interconnected one another in a way that the chain connection output port of one unit of the duplication units is electrically connected with the chain connection input port of another unit of the duplication units; when in operation, a first unit of the duplication units outputs source data via the chain connection output port thereof, and each of other units of the duplication units uses the chain connection input port thereof to receive the source data and copy the source data into a solid state drive connected with the PCI-E interface thereof, and sends out the source data via the chain connection output port thereof.Type: ApplicationFiled: October 6, 2016Publication date: November 30, 2017Inventor: Hong-Chuan WANG
-
Publication number: 20170344287Abstract: A method of performing an atomic write command in a data storage device comprising a volatile memory and a plurality of non-volatile memory devices configured to store a plurality of physical pages. The method may comprise storing data in a plurality of logical pages (L-Pages), each associated with a logical address. A logical-to-physical address translation map may be maintained in the volatile memory, and may be configured to enable determination of a physical location, within one or more of the physical pages, of the data referenced by each logical address. The data specified by a received atomic write command may be stored one or more L-Pages. Updates to the entry or entries in the translation map associated with the L-Page(s) storing the data specified by the atomic write command may be deferred until all L-Pages storing data specified by the atomic write command have been written in a power-safe manner.Type: ApplicationFiled: March 14, 2017Publication date: November 30, 2017Inventors: Andrew J. Tomlin, Justin Jones, Rodney N. Mullendore
-
Publication number: 20170344288Abstract: A data storing method for a data storage device is provided. The data storage device includes a volatile memory and a non-volatile memory. The data storing method includes steps of: designating a data flush block, wherein the data flush block is the non-volatile memory without data buffering function; determining whether a sudden power-off event occurs; and when the sudden power-off event occurs, coping or moving first data stored in the volatile memory to the data flush block. A data storing method after a sudden power-off event occurs is also provided.Type: ApplicationFiled: March 30, 2017Publication date: November 30, 2017Inventor: Hsin-Hung Ho
-
Publication number: 20170344289Abstract: Provided are a system and a method for managing a container image. The container image managing system includes a remote storage configured to store and manage a container image, a container engine configured to mount a storage area of the container image stored in the remote storage and read the container image from the mounted storage area to generate a container, and a local storage configured to store a read-write layer of the generated container.Type: ApplicationFiled: May 24, 2017Publication date: November 30, 2017Applicant: SAMSUNG SDS CO., LTD.Inventor: Chan-Hun JEONG
-
Publication number: 20170344290Abstract: According to some aspects, a database system is provided. The database system may include at least one processor configured to execute a plurality of system components. The plurality of system components may include an interface component configured to receive a read commit command and provide a result, a snapshot component configured to generate a plurality of snapshots of data stored in a first data storage node of a plurality of data storage nodes and identify a committed snapshot representative of data that has been replicated on a majority of the plurality of data storage nodes, and a command processing component configured to read the committed snapshot responsive to receipt of the read commit command and generate the result.Type: ApplicationFiled: May 25, 2017Publication date: November 30, 2017Inventors: Eliot Horowitz, Andrew Michalski Schwerin, Mathias Benjamin Stearn, Eric Andrew Milkie
-
Publication number: 20170344291Abstract: A computer system has a virtualization software that supports execution of a virtual machine in which a container is run. A method of provisioning first and second data volumes for the container, wherein the first data volume is backed by storage device of a first type and the second data volume is backed by storage device of a second type, includes monitoring a designated virtual socket, detecting, based on monitoring, a first request from a plug-in of the container to create a first data volume having first storage requirements, upon detecting the first request, communicating the request to the virtualization software to create the first data volume, detecting, based on monitoring, a second request from a plug-in of the container to create a second data volume having second storage requirements, and upon detecting the second request, communicating the request to the virtualization software to create the second data volume.Type: ApplicationFiled: May 30, 2017Publication date: November 30, 2017Inventors: Mark STERIN, Govindan Thirumal THIRUVENGADA, Ritesh H. SHUKLA, Andrew STONE, Prashant DHAMDHERE
-
Publication number: 20170344292Abstract: A computer system has a virtualization software that supports execution of a virtual machine in which a container is run. A method of provisioning a data volume for the container in this computer system includes the steps of monitoring a designated virtual socket, detecting, based on the monitoring, a request from a plug-in of the container to create a data volume, and upon detecting the request, communicating the request to the virtualization software to cause the virtualization software to create the data volume.Type: ApplicationFiled: May 30, 2017Publication date: November 30, 2017Inventors: Mark STERIN, Govindan Thirumal THIRUVENGADA, Ritesh H. SHUKLA, Andrew STONE, Prashant DHAMDHERE
-
Publication number: 20170344293Abstract: A computer-implemented method includes receiving, by a storage controller from a first system, a fencing command that includes a parameter identifying a scope of an operation performed on a shared volume, utilizing a processor, setting, by the storage controller, a fencing indicator for at least a second system that is connected to the shared volume, utilizing the processor, where the fencing indicator limits access to the shared volume by the second system, sending, by the storage controller, a notification to the second system, utilizing the processor, where the notification includes the parameter and informs the second system that the access to the shared volume is limited, receiving, by the storage controller, an unfencing command from the second system, utilizing the processor, and resetting or removing the fencing indicator for the second system, utilizing the processor.Type: ApplicationFiled: August 21, 2017Publication date: November 30, 2017Inventors: John R. Paveza, Dale F. Riedy
-
Publication number: 20170344294Abstract: A remote secure drive access method includes receiving a first message from a second server. The message may be received by a baseboard management controller (BMC) of the first server via a PCIe switch from a second server coupled to the first server via an ExpEther connection. A payload of the message may include identification information identifying the second server. The first server may send an endpoint discover message and receive endpoint device information indicative of peripheral and/or endpoint resources of the second server, including a storage controller associated with a secure drive. Secure drive key information may be obtained from the payload of the first virtual message and sent to the second server to access the secure drive. The exchanged messages may comprise proprietary PCIe transaction layer packets enclosed within an Ethernet packet that includes an ExpEther frame within an Ethernet frame.Type: ApplicationFiled: May 27, 2016Publication date: November 30, 2017Applicant: Dell Products L.P.Inventors: Ragendra K. MISHRA, Sumanth VIDYADHARA, Chandrasekhar PUTHILLATHE
-
Publication number: 20170344295Abstract: A system and method is disclosed for fast secure destruction or erasure of data in a non-volatile memory. The method may include identifying a fast erase condition, such as an unauthorized access attempt, and then applying a fast erase process to a predetermined number of blocks of the non-volatile memory. The fast erase process may be implemented by applying an erase voltage for less than a full duration needed to place the blocks in a full erase state, but sufficient to make any data in those blocks unreadable. The system may include a non-volatile memory having a plurality of blocks and a controller configured to sequentially apply the erase voltage to a predetermined portion of the blocks for less than a time needed to fully erase those blocks such that the controller may rapidly make data unreadable without taking the full time to completely erase those blocks.Type: ApplicationFiled: May 31, 2016Publication date: November 30, 2017Applicant: SanDisk Technologies LLCInventors: Liron Sheffi, Yuval Kenan, Amir Shaharabany, Yacov Duzly
-
Publication number: 20170344296Abstract: A wireless communication device (UE) may include random access memory and associated software configured to selectively place different memory banks into either an active power on mode, retention mode, or power off mode. The selective placement of memory banks into different modes may be performed based on a variety of factors including software module voting information, a current power mode of the memory banks, one or more software program(s) and/or data currently stored on the memory banks, and a counter that counts an amount of time during which a memory bank is not accessed. The placement of memory banks into different modes may be controlled by a memory controller coupled to the memory banks.Type: ApplicationFiled: March 29, 2017Publication date: November 30, 2017Inventors: Li Su, Longda Xing
-
Publication number: 20170344297Abstract: A computing system includes one or more processors and a system memory that stores computer executable instructions that can be executed by the processors. The system accesses from one or more memory requests a unique identifier. The unique identifier identifies a system entity that requests an allocation of memory resources. The system maps the unique identifier to a specific memory resource allocation. This specific memory resource allocation is attributable to the system entity. The specific memory resource allocation is associated with one or more memory policies that specify in what manner the specific memory resource allocation is to be allocated to the system entity. The system causes the allocation of the specific memory resource allocation to the system entity based on the one or more memory policies.Type: ApplicationFiled: May 26, 2016Publication date: November 30, 2017Inventors: Matthew John Woolman, Mehmet lyigun
-
Publication number: 20170344298Abstract: Memory management in a computer system may include allocating memory pages from a physical memory of the computer system to applications executing on the computer system. The memory pages may be associated with memory management tags. One or more memory pages may be identified for processing from the physical memory based on the memory management tags that the memory pages are associated with. The processed memory pages may then be designated as un-allocated memory pages for subsequent allocation to applications executing on the computing system.Type: ApplicationFiled: May 26, 2016Publication date: November 30, 2017Inventors: Chiao-Chuan Shih, Samdeep Nayak
-
Publication number: 20170344299Abstract: One embodiment describes an automation system including a sensor that determines operational parameters of the automation system; one or more actuators that perform control actions during operation of the automation system; and a control system communicatively coupled to the sensor and the one or more actuators. The control system includes memory that stores the operational parameters; determines occurrence of memory errors in data stored in the memory; determines error parameters that indicate characteristics of the memory errors; determines error-corrected data by correcting the memory errors based at least in part on the error parameters; adaptively adjusts a refresh rate used to refresh stored data in the memory based at least in part on the error parameters; and determines control commands instructing the one or more actuators to perform the control actions by processing the error-corrected data.Type: ApplicationFiled: May 24, 2016Publication date: November 30, 2017Inventor: Ivan Iliev Ivanov
-
Publication number: 20170344300Abstract: A memory management method includes: providing a hybrid memory comprising a first type memory and a second type memory; providing an inactive list and a read active list for recording in-used pages on the first type memory; providing a write active list for recording in-used pages on the second type memory; allocating a page from the first type memory according to a system request, and inserting the page into the inactive list accordingly; moving the page from the inactive list to the write active list or the read active list in response to two or more successive access operations on the page; and referring the page to a physical address on the second type memory when the page is in the write active list.Type: ApplicationFiled: December 6, 2016Publication date: November 30, 2017Inventors: Yu-Ming Chang, Yuan-Hao Chang, Hsiu-Chang Chen, Tei-Wei Kuo
-
Publication number: 20170344301Abstract: An operation method of a semiconductor memory device including a memory cell array and an internal processor configured to perform an internal processing operation includes receiving at the memory device a first mode indicator that indicates whether the memory device should operate in a processor mode or in a normal mode, receiving at the memory device processing information for the memory device, when the first mode indicator indicates that the memory device should operate in the processor mode, storing the processing information in a first memory cell region of the memory cell array, using the stored processing information to perform internal processing by the internal processor, and storing a result of the internal processing in the memory cell array.Type: ApplicationFiled: April 21, 2017Publication date: November 30, 2017Inventors: JE MIN RYU, REUM OH, HAK-SOO YU
-
Publication number: 20170344302Abstract: According to one embodiment, a data processing device is described including a non-volatile memory configured to store configuration data for the data processing device, a volatile memory and a control system configured to copy the configuration data from the non-volatile memory to a section of the volatile memory, block writing to the section of the volatile memory and to put the data processing device into a hibernation mode in which the non-volatile memory is inactive and the volatile memory is active.Type: ApplicationFiled: May 30, 2017Publication date: November 30, 2017Inventors: Peter Blicharski, Witold Gora, Leong Kee Chee
-
Publication number: 20170344303Abstract: A translation system can translate a request having multiple fields to a physical address using the fields as indexes to a multi-dimensional graph. A field or portion of a field can represent a location along an axis. When combined together, the fields can represent a point in n-space, where n is the number of axes. In some embodiments, a nearest neighbor calculation can be sufficient along an axis. Therefore, a point in n-space defined by the fields can be translated along an axis until a nearest neighbor entry is determined. When the entry is determined, the entry can be accessed to determine a correct response to the translation request.Type: ApplicationFiled: March 14, 2017Publication date: November 30, 2017Inventors: Radoslav DANILAK, Ladislav STEFFKO, Qi WU
-
Publication number: 20170344304Abstract: A system and methods for in-storage on-demand data decompression. Compressed data are stored in a storage device connected to a host computer. When decompressed data are needed, the host computer sends a decompression command to the storage device indicating which data are to be decompressed, and instructing it how to decompress the data. The storage device decompresses the data and stores the decompressed data, making it available to the host.Type: ApplicationFiled: May 26, 2017Publication date: November 30, 2017Inventor: Vladimir Alves
-
Publication number: 20170344305Abstract: A storage device according to the present application includes a receiving unit and a control unit. The receiving unit receives a write request for writing a file with a specified directory name. The control unit writes the file in association with a directory of the specified directory name into a memory device, within a range up to an upper limit set for the number of files to be written in the memory device in association with each directory, in response to the write request received by the receiving unit.Type: ApplicationFiled: March 2, 2017Publication date: November 30, 2017Applicant: YAHOO JAPAN CORPORATIONInventor: Yasuharu GOTO
-
Publication number: 20170344306Abstract: The technology described herein allows processing nodes in a parallel processing environment to determine whether a data partition is being atomically processed. The processing nodes can maintain the atomic processing of data by checking for challenger nodes assigned to the same partition and checking whether the node is still the leader node for a partition at a given frequency and/or at key points during the data processing flow. When a processing node detects a challenger node, the node self-terminates. When a challenger node detects no other nodes assigned to its data partition, then it designates itself or confirms itself as the leader node and begins or continues processing data within the partition. A node can detect other nodes by checking a node log that each processing node updates upon completing a survey of its present status.Type: ApplicationFiled: May 27, 2016Publication date: November 30, 2017Inventors: AJESH GEORGE, DEBASHISH GHOSAL, ARTUR ZBIGNIEW GAWRONSKI
-
Publication number: 20170344307Abstract: According to one general aspect, an apparatus may include a memory, an erasure-based, non-volatile memory, and a processor. The memory may be configured to store a mapping table, wherein the mapping table indicates a rewriteable state of a plurality of memory addresses. The erasure-based, non-volatile memory may be configured to store information, at respective memory addresses, in an encoded format. The encoded format may include more bits than the unencoded version of the information and the encoded format may allow the information be over-written, at least once, without an intervening erase operation. The processor may be configured to perform garbage collection based, at least in part upon, the rewriteable state associated with the respective memory addresses.Type: ApplicationFiled: January 12, 2017Publication date: November 30, 2017Inventors: Narges SHAHIDI, Manu AWASTHI, Tameesh SURI, Vijay BALAKRISHNAN
-
Publication number: 20170344308Abstract: A computer-readable recording medium storing therein a data deletion determining program is disclosed. Deletion effect information indicating effect degrees due to deletions of a plurality of sets of output data is generated based on process contents, output data information, and an execution time. The plurality of sets of output data are generated over a course of a plurality of processes acquiring a final result acquired through a plurality of processes from subject data. The process contents are related to each of the plurality of processes. The output information is accumulated in a memory for the plurality of sets of the output data. The execution time is taken for one or more of the processes until generating the output data. The output data to be deleted from the memory is extracted based on respective sets of the deletion effect information for the plurality of the sets of the output data.Type: ApplicationFiled: May 19, 2017Publication date: November 30, 2017Applicant: FUJITSU LIMITEDInventors: Miho Murata, Nobutaka Imamura, Hidekazu TAKAHASHI
-
Publication number: 20170344309Abstract: In one form, a data processing system includes a memory channel having a plurality of ranks, and a data processor. The data processor is coupled to the memory channel and is adapted to access each of the plurality of ranks. In response to detecting a predetermined event, the data processor selects an active rank of the plurality of ranks and places other ranks besides the active rank in a low power state, wherein the other ranks include at least one rank with a pending request at a time of detection of the predetermined event. The data processor subsequently processes a memory access request to the active rank.Type: ApplicationFiled: May 28, 2016Publication date: November 30, 2017Applicant: Advanced Micro Devices, Inc.Inventors: Kedarnath Balakrishnan, Kevin M. Brandl, James R. Magro
-
Publication number: 20170344310Abstract: An algorithm execution method includes carrying out a first execution of the algorithm by a processing unit, sending at least one first result, which is to be written into a memory, to a memory management circuit, and storing said first result into a first area of the volatile memory. The method also includes carrying out a second execution of the algorithm by the processing unit, sending at least one second result, which is to be written into the memory, to the memory management circuit, and applying, by means of the memory management circuit, a different processing for the at least one second result in the second execution than was applied for the at least one first results in the first execution.Type: ApplicationFiled: October 21, 2016Publication date: November 30, 2017Inventors: Michael Peeters, Fabrice Marinet, Jean-Louis Modave, Fabrice Romain
-
Publication number: 20170344311Abstract: In a method of operating a memory device, a first write command, a first write address, and first write data are received by a first memory device through a channel. The first write command, received by the first memory device, is sensed by a controller. The controller is connected to the channel and controls a second memory device. The first memory device and the second memory device are different types of memory devices. When the first write command is sensed by the controller, a first write log is generated using the first write address and the first write data. The first write log is stored into a buffer.Type: ApplicationFiled: April 19, 2017Publication date: November 30, 2017Inventors: DOO-HWAN OH, YONG-JUN YU, IN-SU CHOI
-
Publication number: 20170344312Abstract: A storage system includes a plurality of storage media and a method of managing volumes of the storage system is applied thereto. The method includes receiving a volume management request and correlation information between the volumes, and allocating storage spaces of the storage media to the volumes based on the correlation information between the volumes. The correlation information indicates information of the volumes in which the allocated storage media are physically isolated from each other.Type: ApplicationFiled: March 3, 2017Publication date: November 30, 2017Inventor: JUNG-MIN SEO
-
Publication number: 20170344313Abstract: A storage system has a cluster structure in which a node is connected with a different node, the node having a volatile memory for storing first update data from a host and a first non-volatile memory for storing second copy data of second update data from the host to the different node, and having a copy management processing unit for storing first copy data of the first update data into a second non-volatile memory of the different node, and a storage service processing unit for transmitting, to the host, a response with respect to an update request of the first update data in response to the storage of the first copy data of the first update data by the copy management processing unit into the second non-volatile memory of the different node.Type: ApplicationFiled: January 23, 2015Publication date: November 30, 2017Inventors: Mitsuo HAYASAKA, Kazumasa MATSUBARA, Masanori TAKADA, Yoshihiro YOSHII
-
Publication number: 20170344314Abstract: In an example, a method of anticipating maintenance in a printing device includes determining an inertial reference signal of a printer carriage and measuring a current inertial signal of the printer carriage. The method includes cross-correlating the inertial reference signal with the current inertial signal and determining from the cross-correlating when the current inertial signal is not within a preset confidence interval of the inertial reference signal.Type: ApplicationFiled: January 13, 2015Publication date: November 30, 2017Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.Inventors: Xavier Vilajosana, Pere Tuset, Pol Fornos
-
Publication number: 20170344315Abstract: A method and apparatus for controlling a post-print processing system for producing printed products. The system comprises a plurality of replaceable individual devices which are arranged one after another in a row and/or parallel and are connected to a joint control unit for adapting the system to successively following different production orders. The method includes supplying the joint control unit with information relating to the type and position of the individual devices in the post-print processing system and activating the individual devices based on the information. The information relating to the position of the individual devices is determined in the post-print processing system based on the position of the individual devices in a first data processing network comprising a ring circuit. The individual devices send out a data telegram corresponding to the position of the respective individual devices via a second data processing network to the joint control unit.Type: ApplicationFiled: May 30, 2017Publication date: November 30, 2017Applicant: MUELLER MARTINI HOLDING AGInventors: Alexander STRUB, Andreas HESS, Christian SCHMID
-
Publication number: 20170344316Abstract: Systems and methods for managing print jobs associated with multiple customers. Customer-editable design templates for printed products and design software tools enabling creation by customers of custom print product designs are provided, via a network, to multiple customers operating corresponding electronic devices. Individual print jobs corresponding to custom print product designs created by multiple different customers via the electronic devices are received and automatically aggregated into an aggregate print job comprising individual print jobs from different customers. The aggregated individual print jobs in the aggregate print job are printed simultaneously on one or more units of a shared substrate when the aggregate print job is printed.Type: ApplicationFiled: May 9, 2017Publication date: November 30, 2017Applicant: Cimpress USA IncorporatedInventors: Robert Keane, Sebastien Coursol, Erik Robertson