Patents Issued in December 21, 2017
-
Publication number: 20170364390Abstract: Methods, computer program products, and systems are presented. The methods include, for instance: automatically discovering enablement state variables respectively corresponding to products present in a computer system; processing the enablement state variables and associated values and making a separate file for disabled products; and make available the file for disabled products as inputs to subsequent system administration jobs.Type: ApplicationFiled: June 17, 2016Publication date: December 21, 2017Inventors: Donald J. BLAND, John BOUZAKIS, Keith J. MILLER, Marna L. WALLE
-
Publication number: 20170364391Abstract: Methods determine a capacity-forecast model based on historical capacity metric data and historical business metric data. The capacity-forecast model may be to estimate capacity requirements with respect to changes in demand for the data center customer's application program. The capacity-forecast model provides an analytical “what-if” approach to reallocating data center resources in order to satisfy projected business level expectations of a data center customer and calculate estimated capacities for different business scenarios.Type: ApplicationFiled: June 16, 2016Publication date: December 21, 2017Applicant: VMware, Inc.Inventors: Arnak Poghosyan, Ashot Nshan Harutyunyan, Naira Movses Grigoryan, Khachatur Nazaryan, Ruzan Hovhannisyan
-
Publication number: 20170364392Abstract: Techniques disclosed herein provide an approach for assigning resource consumers to available resources. In one embodiment, components of a distributed scheduler are organized into a hierarchy, such as a tree. A placement request received at a root scheduler of the hierarchy is propagated down the hierarchy, either to all children or to randomly selected subsets of children of each scheduler in the hierarchy. Leaf schedulers in the hierarchy that receive the request each propagate back up a score indicating the amount of free resources in its corresponding resource bucket. Branch schedulers then compare scores that they receive, and each further propagate one of the received scores, such as the highest score, based on the comparison, until the root scheduler is reached. The root scheduler makes an additional comparison and returns one of the resource buckets in response to the received placement request.Type: ApplicationFiled: June 20, 2016Publication date: December 21, 2017Inventors: Vadim SPIVAK, Amar PADMANABHAN, Anfernee Yongkun GUI, Badhri SAMPATHKUMAR, Luca CASTELLANO, Maithem MUNSHED, Michi MUTSUZAKI, Vui Chiap LAM
-
Publication number: 20170364393Abstract: The described technology is directed towards an asynchronous dispatcher including control logic that manages a queue set, including to dequeue and execute work items from the queue on behalf of application code executing in a program. The dispatcher yields control to the program to allow the program and application code to be responsive with respect to user interface operations.Type: ApplicationFiled: August 31, 2017Publication date: December 21, 2017Inventors: Patrick Finnigan, Nathan J. E. Furtwangler, Brendan Joseph Clark, Brandon C. Furtwangler
-
Publication number: 20170364394Abstract: First and second machines include first and second memories, respectively, and are accessible to a shared memory. The first machine executes copying data stored in the first memory allocated to the virtual machine to the shared memory, and translates a physical address for the virtual machine to access to the data, from an address of the first memory to an address of the shared memory. When copying of all data in the first memory to the shared memory completes and the first machine changes over control of the virtual machine from the first machine to the second machine, the second machine executes copying the data stored in the shared memory to the second memory allocated to the virtual machine, and translates a physical address for the virtual machine to access the data, from an address of the shared memory to an address of the second memory.Type: ApplicationFiled: June 6, 2017Publication date: December 21, 2017Applicant: FUJITSU LIMITEDInventor: TOMOYA FUJITA
-
Publication number: 20170364395Abstract: Disclosed are platforms for communicating among one or more otherwise independent systems involved in controlling functions of buildings or other sites having switchable optical devices deployed therein. Such independent systems include a window control system and one or more other independent systems such as systems that control residential home products (e.g., thermostats, smoke alarms, etc.), HVAC systems, security systems, lighting control systems, and the like. Together the systems control and/or monitor multiple features and/or products, including switchable windows and other infrastructure of a 103 site, which may be a commercial, residential, or public site.Type: ApplicationFiled: December 8, 2015Publication date: December 21, 2017Applicant: View, Inc.Inventors: Dhairya Shrivastava, Stephen Clark Brown, Ronald F. Cadet
-
Publication number: 20170364396Abstract: Embodiments are provided for managing operation of an electronic device based on the connection(s) of hardware module(s) to the electronic drive via a support housing. According to certain aspects, the electronic device may detect when a hardware module connects to the support housing. The electronic device may identify a function associated with the hardware module, where the function may be a built-in function of the hardware module itself or of the electronic device. The electronic device may accordingly activate the identified function.Type: ApplicationFiled: September 1, 2017Publication date: December 21, 2017
-
Publication number: 20170364397Abstract: A computer-readable storage medium encodes computer executable instructions that, when executed by at least one processor, associate plural applications. That associating method includes receiving an application programming interface associated with each of the plural applications. The method also includes unifying the received application programming interface associated with each of the plural applications, and classifying the application programming interface associated with each of the plural applications. The plural applications are classified into one or more categories. Further, the method includes associating the application programming interfaces based upon the classifying and a pre-determined set of rules.Type: ApplicationFiled: August 14, 2017Publication date: December 21, 2017Inventors: Vaibhav PANDEY, Siddharth PURI
-
Publication number: 20170364398Abstract: A method of handling requests between contexts in a processing system includes, in a current context of a source processing system element (PSE): executing a send-and rendezvous instruction that specifies a destination PSE, a queue address in the destination PSE, a set of source registers, and a set of receive registers; and sending a send-and-rendezvous message (SRM) to the destination PSE, wherein the SRM includes an address of the destination PSE, a destination queue address, a source PSE address, and an identifier of the current context in the source PSE.Type: ApplicationFiled: August 1, 2017Publication date: December 21, 2017Inventors: Peter J. WILSON, BRIAN C. KAHNE
-
Publication number: 20170364399Abstract: Systems and methods are disclosed for performing rate matching when using general polar codes. In one embodiment, a method of generating a codeword includes receiving bits at a polar encoder and encoding the bits using polar encoder kernels. The polar encoder kernels include a first kernel and a second kernel. The first kernel receives a set of input q-ary symbols and modifies the set of input q-ary symbols according to a first kernel generator matrix to produce a set of output q-ary symbols. The second kernel receives a set of input l-ary symbols, where l does not equal q, and modifies the set of input l-ary symbols according to a second kernel generator matrix to produce a set of output l-ary symbols. For example, the first kernel may be a binary kernel and the second kernel may be a Reed-Solomon (RS) based kernel.Type: ApplicationFiled: May 29, 2017Publication date: December 21, 2017Applicant: HUAWEI TECHNOLOGIES CO., LTD.Inventors: WUXIAN SHI, YIQUN GE, NAN CHENG, RAN ZHANG
-
Publication number: 20170364400Abstract: An indication is received. The indication is of an address in a first page in virtual memory used by an application with a static memory corruption. A loadable kernel module will monitor the address. Access to the first page in virtual memory is changed from read/write access to read only access. A second page in virtual memory is created with read/write access. Whether a page fault occurs on the first page in virtual memory during the execution of the application with the static memory corruption is determined.Type: ApplicationFiled: June 15, 2016Publication date: December 21, 2017Inventors: Jia He, Zhong Li
-
Publication number: 20170364401Abstract: A communications link between a computing device and an external device is monitored. A driver for the communications link is executed on the computing device. The driver is configured to monitor data traffic over the communications link. Data indicative of the monitored data traffic is received from the driver. The data is sent to an analysis function configured to identify a condition of the communications link based on accumulated data indicative of the data traffic. Data indicative of an identified condition of the communications link is received from the analytics function. An indication of the identified condition is rendered on a display device of the computing device.Type: ApplicationFiled: June 15, 2016Publication date: December 21, 2017Inventors: Wei Huang, Pengxiang Zhao, Bin Wang, Dejun Zhang, Robert Zhu, Xuejun Chen, Ying N. Chin, Satyendra Bahadur
-
Publication number: 20170364402Abstract: A log entry identifies an error in the computer or other system. Another log entry identifies a symptom associated with the system error. The symptom occurs in timeframe prior to the system error and a variable score is determined for the symptom according to the timeframe, the consistency with which the symptom appears along with the error, and the frequency with which the symptom occurs throughout the system log. A new occurrence of the symptom is identified. Whether the symptom's variable score exceeds a threshold value for the symptom is determined. In response to determining that the symptom's variable score exceeds the threshold value, an alert indicating that the associated system error is probable is displayed.Type: ApplicationFiled: June 21, 2016Publication date: December 21, 2017Inventors: Wei Liang Chua, Tien Hiong Lee, Konstantin Levinski, Weng Sing Tang
-
Publication number: 20170364403Abstract: Systems, products and methods for enabling symptom verification. Verifying a symptom may include eliminating repeated symptom definitions or eliminating symptoms having low accuracy. A computer system enables verification of a symptom including a rule for detecting a set of events related to a given problem. The computer system includes a symptom database which stores the symptom, a specimen database which stores a specimen including a set of events detected according to a rule of a certain symptom, and an analysis unit which analyzes the specimen stored in the specimen database using a new symptom in order to determine whether to add the new symptom to the symptom database. The present disclosure also includes a method and a computer program for enabling verification of a symptom including a rule for detecting a set of events related to a given problem.Type: ApplicationFiled: December 1, 2016Publication date: December 21, 2017Inventors: Nozomu Aoyama, Toshimichi Arima, Yukihiro Murakami, Tadashi Tsumura
-
Publication number: 20170364404Abstract: Various embodiments of the present disclosure generally relate to a fault processing method, system and computer program product. Specifically, the method may comprise determining a plurality of devices to be detected and corresponding device attributes. The method may also comprise performing a first fault detection for the plurality of devices based on the device attributes, the first fault detection being based on a first fault diagnosis rule that is generic for the plurality of devices. Besides, the method may also comprise: in response to a first device in the plurality of devices being determined to have a fault in the first fault detection, performing a first fault processing to the first device, the first fault processing being based on a first fault processing rule that is generic for the plurality of devices.Type: ApplicationFiled: June 21, 2017Publication date: December 21, 2017Inventors: Lifeng Yang, Xinlei Xu, Ruiyong Jia, Liam Xiongcheng Li, Jibing Dong, Geng Han
-
Publication number: 20170364405Abstract: Embodiments of the present disclosure provide an information processing method and apparatus. The method comprises: sending a first message to a first equipment, wherein the first message is used for requesting user data of a user equipment; receiving a second message sent by the first equipment according to the first message, wherein the second message carries the user data of the user equipment and a network access failure transmission indication; and when determining a network access failure of the user equipment, sending a network access failure cause value of the user equipment to a storing user subscribed information entity or a failure cause processing entity according to the network access failure transmission indication. The information processing method and apparatus provided by the embodiments of the present disclosure may be used for achieving a failure diagnosis of the user equipment.Type: ApplicationFiled: August 30, 2017Publication date: December 21, 2017Inventors: Yan LI, Wenfu WU, Kai WEI
-
Publication number: 20170364406Abstract: A security patch tool includes a retrieval engine, a parser, and a reporting engine. The retrieval engine retrieves, from a first database, a log indicating a plurality of patches that have been applied and whether each patch of the plurality of patches was applied successfully. The parser determines, based on the log, a second plurality of patches of the plurality of patches that were not applied successfully and determines, based on the log, an error code for each patch of the second plurality of patches. The retrieval engine further retrieves, from a second database, a remedy for each error code for each patch of the second plurality of patches. The reporting engine generates a report indicating the plurality of patches, the error code for each patch of the second plurality of patches, and the remedy for each error code for each path of the second plurality of patches.Type: ApplicationFiled: June 20, 2016Publication date: December 21, 2017Inventors: Vivek Kumar, Hitendra Kumar, Amit Kumar, Scott M. Bolduc
-
Publication number: 20170364407Abstract: According to one embodiment, a memory system includes: a first memory cell area where a first memory cell is provided; a second memory cell area where a second memory cell is provided; an ECC circuit which corrects an error of data stored by the first memory cell; and a control circuit which replaces the first memory cell with the second memory cell if the number of times an error is successfully corrected in the first memory cell reaches a first value.Type: ApplicationFiled: August 31, 2017Publication date: December 21, 2017Applicant: TOSHIBA MEMORY CORPORATIONInventors: Yoshiaki OSADA, Katsuhiko HOYA
-
Publication number: 20170364408Abstract: A memory device includes content banks configured to store content data and parity banks configured to store parity data for reconstructing the content data. In response to receiving, in a first clock cycle, a first request requesting a first operation to be performed in a first content bank and a second request requesting to write new content data to the first content bank, the memory device performs the first operation in the first content bank, and writes the new content data to a second content bank. The second content bank is selected from a subset of content banks defined by content banks that correspond with parity banks different from parity banks that correspond with the first content bank. The memory device updates, based on the new content data written to the second content bank, parity data in the parity banks that correspond with the second content bank.Type: ApplicationFiled: August 31, 2017Publication date: December 21, 2017Inventors: Roi SHERMAN, Dror BROMBERG
-
Publication number: 20170364409Abstract: In one embodiment, a device receives a router advertisement message after a power outage event in a network. The device joins the network, in response to receiving the router advertisement message. The device sends a power restoration notification message via the network. The device selectively delays a disconnected node from joining the network.Type: ApplicationFiled: September 6, 2017Publication date: December 21, 2017Inventors: Jonathan W. Hui, Jean-Philippe Vasseur, Wei Hong
-
Publication number: 20170364410Abstract: Methods, devices and systems to make compressed backup copies of in-use compressed database indices are described. In general, an “oldest” time at which index pages in working memory had been updated is identified. Compressed index pages may be directly copied without the need to bring them into working memory or uncompressing them. The identified “oldest” time is then associated with the compressed backup copy. In some embodiments, an entire compressed backup copy may be associated with a single point in time (e.g., the identified “oldest” time). In other embodiments, a compressed backup copy may be associated with multiple points in time (e.g., one time for each portion of the compressed index that is being backed-up). Compressed indices copied in accordance with the invention may be used during restore operations to reconstruct database indices using the identified “oldest” time and database log files.Type: ApplicationFiled: August 18, 2017Publication date: December 21, 2017Inventors: Thomas G. Price, Richard W. Cline
-
Publication number: 20170364411Abstract: The present disclosure provides persistent storage for a master copy using operation numbers. A master copy can include a B-tree with references to corresponding data. When provisioning a slave copy, the master copy sends a point-in-time copy of the B-tree to the slave copy, which stores a copy of the B-tree, allocates the necessary space, and updates the references of the B-tree to point to a local storage before the data is transferred. When writing the data to persistent storage, a snapshot created on the master copy is an operation that is replicated to the slave copy. The snapshot is generated using a volume view that includes changes to chunks of data of the master copy since a previous snapshot, as determined using the operation number for the previous snapshot. Data (and metadata) for the snapshot is written to persistent storage while new I/O operations are processed.Type: ApplicationFiled: September 1, 2017Publication date: December 21, 2017Inventors: Jianhua Fan, Benjamin Arthur Hawks, Norbert Paul Kusters, Nachiappan Arumugam, Danny Wei, John Luther Guthrie, II
-
Publication number: 20170364412Abstract: A system, method, and apparatus for secure live virtual machine guest based snapshot recovery. A virtual machine sends a request to access a snapshot of a first virtual disk of the virtual machine including a snapshot identifier. A hypervisor selects the snapshot using the snapshot identifier and creates a second virtual disk using the snapshot. The hypervisor then maps the second virtual disk to the virtual machine and notifies the virtual machine that the snapshot on the second virtual disk is accessible. The virtual machine accesses the snapshot on the second virtual disk including retrieving snapshot data from the second virtual disk without reverting a current virtual machine instance on the first virtual disk to the snapshot on the second virtual disk.Type: ApplicationFiled: August 14, 2017Publication date: December 21, 2017Inventor: Michael Tsirkin
-
Publication number: 20170364413Abstract: A data center for data backup and replication, including a pool of multiple storage units for storing a journal of I/O write commands issued at respective times, wherein the journal spans a history window of a pre-specified time length, and a journal manager for dynamically allocating more storage units for storing the journal as the journal size increases, and for dynamically releasing storage units as the journal size decreases.Type: ApplicationFiled: August 30, 2017Publication date: December 21, 2017Inventors: Tomer Ben-Or, Gil Barash, Chen Burshan, Yair Kuszpet
-
Publication number: 20170364414Abstract: Disclosed are systems, methods and computer program products for data deduplication during a backup using at least two LSM trees. An example method includes calculating, for a first data block, a first hash value associated with the first data block and determining a reduced hash value based on the first hash value. The method includes determining whether the first data block contains data duplicative of an existing data block in a prior backup based on whether the reduced hash value occurs in a first log-structured merge (LSM) tree. If so, the method includes comparing the first hash value to one or more hash values in a second LSM tree to identify a matching hash value, and writing a first segment identifier (ID) corresponding to the matching hash value in an archive, the first segment ID referencing the existing data block in a segment store.Type: ApplicationFiled: June 16, 2017Publication date: December 21, 2017Inventors: Vitaly Pogosyan, Kirill Korotaev, Serguei Beloussov, Stanislav Protasov, Mark Shmulevich
-
Publication number: 20170364415Abstract: Backup schedule optimization is provided. Backup environment data is identified. Data describing a first backup schedule is identified. Performance metric data that includes data for a data storage array of computer data storage device(s) of a backup server is collected. Data describing backup log(s) that associated with jobs backed up to the data storage array and respectively executed during backup window(s) is received. A target average I/O rate is determined based on the performance metric data of the data storage array. A second backup schedule is generated based on the target average I/O rate, average I/O rate(s) of the data storage array, the backup environment data, and the data describing one or more backup logs. A start time of a job is scheduled in the second backup schedule for a different time in a backup window compared to a start time of the job in the first backup schedule.Type: ApplicationFiled: June 21, 2016Publication date: December 21, 2017Inventors: Marci D. Formato, Bernhard J. Klingenberg, Steven M. Reps, Kurt A. Rybczyk, Lisa A. Shepard
-
Publication number: 20170364416Abstract: Systems and methods of transmitting data from one location to another location that can be used in a number of applications including, but not limited to, secure transmission of data from one location to another and secure data backup. In one embodiment, a data file is split into pieces and the pieces are placed randomly in a diverse mesh of online cloud storage providers. So all the data is not sitting in a single point of failure and with the entire file available for theft. Each piece of data is given a randomized numerical code that determines where the packet of data is stored. Also, the pieces of data can be encrypted.Type: ApplicationFiled: August 11, 2017Publication date: December 21, 2017Inventors: R. Daren Klum, Mark Hansen
-
Publication number: 20170364417Abstract: An approach for providing flexible durability operations for a data storage application can include requests to perform logging operations of data storage application having an indication of a durability mode to use for the logging operation. The logging operation can be initiated according to the indication of the durability mode and a callback indicating log write completion can be called according to the indication of the durability mode.Type: ApplicationFiled: June 15, 2016Publication date: December 21, 2017Inventor: Ivan Schreter
-
Publication number: 20170364418Abstract: A method may include copying transaction rollback data to a buffer in a first memory. The method may further include calculating a checksum for the transaction rollback data, and storing the calculated checksum and a checksum pointer in the first memory. The checksum pointer may refer to a last valid location in a transactional memory region of the second memory for which the checksum is calculated. The method may further include writing, to the transactional memory region, the transaction rollback data from the buffer and the checksum and the checksum pointer from the first memory, and performing at least part of the transaction by writing new transaction data to the heap. The transaction rollback data may be useable to restore the heap to a state prior to initiating the transaction if the transaction was incomplete, upon reconnecting the card computing device after determining that a card tear event has occurred.Type: ApplicationFiled: June 16, 2016Publication date: December 21, 2017Inventors: Mikhail Aleksandrovich Smirnov, Kari Okamoto, Johnny Le
-
Publication number: 20170364419Abstract: A method of site isolation protection includes the following steps. A set of clustered engines including a first engine at a first site and a second engine at a second site is provided. A Fiber Channel (FC) connection and an Ethernet connection between the first and the second sites are provided. Whether an Ethernet Heartbeat (EH) from one of the first engine and the second engine through the Ethernet connection exists is detected when the FC connection fails. One of the first engine and the second engine is shut down when the EH exists. Furthermore, a quorum service at a client site is provided in different IP domain to further protect site isolation from happening, while the FC connection and Ethernet Heartbeat connection failed at the same time.Type: ApplicationFiled: June 17, 2016Publication date: December 21, 2017Inventor: Horatio Lo
-
Publication number: 20170364420Abstract: Disclosed are an analyzing system for managing an information storage table and a control method thereof. That is, each of the physical basic regions, which are units of hashing an information storage position, is divided into a plurality of physical sub regions having same size. Then, a combination of virtual basic regions which satisfy a predetermined target value is checked from all configurable combinations and a hash value related with the combination of the virtual basic regions which satisfies the checked target value is stored in a predetermined region of a memory. Therefore, even though an information storage space required for every unit region is overloaded, when there is an extra information storage space in another region, the information storage space having an extra space is used to maximize efficiency of the information storage space.Type: ApplicationFiled: January 30, 2017Publication date: December 21, 2017Applicant: Korea University Research and Business FoundationInventors: Seon Wook Kim, Ho Kwon Kim, Jae Yung Jun, Young Sun Han
-
Publication number: 20170364421Abstract: A method, executed by a computer, includes pairing a first core with a second core to form a first core group, wherein each core of the group has a plurality of functional units, transferring instructions received by the first core to the second core for execution via a first inter-core communication bus, and executing the instructions on the second core. A computer system and computer program product corresponding to the above method are also disclosed herein.Type: ApplicationFiled: June 15, 2016Publication date: December 21, 2017Inventors: Manoj Dusanapudi, Prasanna Jayaraman, Rahul M. Rao
-
Publication number: 20170364422Abstract: Examples provide a pooled memory heartbeat for virtual machine hosts. A virtual controller creates a pooled memory heartbeat file system in a shared memory partition of a pooled memory. An agent running on each host in a plurality of virtual machine hosts updates a heartbeat file at an update time interval to lock the heartbeat file. The lock indicates the heartbeat status for a given host is active. A master agent accesses the shared memory partition to check the heartbeat status of each host in the pooled memory file system. The heartbeat status is used to determine whether a host that has lost pooled memory access, is network isolated, or failed. If the pooled memory heartbeat status for a given host indicates the host is a failed host, the set of virtual machines running on the given host are respawned on another healthier host.Type: ApplicationFiled: October 27, 2016Publication date: December 21, 2017Inventors: Jinto Antony, Hariharan Jeyaraman Ganesan, Saju Chengat, Madhusudhanan Gangadharan
-
Publication number: 20170364423Abstract: Embodiments of the present disclosure provide a method and apparatus for failover. In an embodiment is provided a method implemented at a first node in a cluster comprising a plurality of heterogeneous nodes. The method comprises: determining whether an application at a second node in the cluster is failed; and in response to determining that the application is failed, causing migration of data and services associated with the application from the second node to a third node in the cluster, the migration involving at least one node heterogeneous to the second node in the cluster. The present disclosure further provides a method implemented at the third node in the cluster and corresponding devices and computer program products.Type: ApplicationFiled: June 20, 2017Publication date: December 21, 2017Inventors: Peter Hailin Peng, Colin Yong Zou, Peng Wu
-
Publication number: 20170364424Abstract: An apparatus includes a first hardware assist device having at least one transmitter, at least one receiver, and a timer. The at least one transmitter is configured to transmit at least one first signal to a second hardware assist device of a redundant second apparatus. The at least one first signal indicates that the apparatus is functional. The at least one receiver is configured to receive at least one second signal from the second hardware assist device. The at least one second signal indicates that the second apparatus is functional. The timer is configured to control a driver to block transmission of the at least one first signal in response to a fault associated with the apparatus. The apparatus also includes at least one processing device configured to perform one or more actions in response to a loss of the at least one second signal from the second apparatus.Type: ApplicationFiled: May 15, 2017Publication date: December 21, 2017Inventors: Norman R. Swanson, Joseph P. Felix, Raj Bandekar, Michael D. Carney, Zhi Yang
-
Publication number: 20170364425Abstract: A checkpointing method in a network device fault tolerant system using virtual machines. In one embodiment, the network device has an input port, an output port, an active virtual machine and a standby virtual machine, a network application on the active virtual machine which manipulates data present on the input port and transmits the manipulated data from the output port; a checkpoint engine on the active virtual machine; and an interface agent, on the active virtual machine, having callable functions to move data from the input port to the output port. The method includes the steps of determining, by the checkpoint engine, that a checkpoint is required; requesting by the checkpoint engine that the interface agent quiescent itself; returning, by the interface agent to the network application, an indicator that no packets are available regardless of whether or not packets are arriving at the input port.Type: ApplicationFiled: June 19, 2017Publication date: December 21, 2017Applicant: STRATUS TECHNOLOGIES BERMUDA LTD.Inventors: Steven Michael Haid, Lei Cao, Aaron Tyrone Smith
-
Publication number: 20170364426Abstract: Provided are a computer program product, system, and method for managing health conditions to determine when to restart replication after a swap triggered by a storage health event. A determination is made of a health condition with respect to access to a first storage that triggers a swap operation. The swap operation redirects host Input/Output (I/O) requests to data from a first server to a second server in response to determining the health condition. After the swap operation the I/O requests are directed to the second server and a second storage. The second server is instructed to mirror data in the second storage to the first server to store in the first storage in response to determining that the health condition is resolved.Type: ApplicationFiled: June 20, 2016Publication date: December 21, 2017Inventors: David R. Blea, Gregory E. McBride, Carol S. Mellgren, Tabor R. Powelson, William J. Rooney
-
Publication number: 20170364427Abstract: Provided are a computer program product, system, and method for after swapping from a first storage to a second storage, mirroring data from the second storage to the first storage for data in the first storage that experienced data errors. A swap operation redirects host Input/Output (I/O) requests to data from the first server to the second server in response to a health condition at the first server. A determination is made of data errors with respect to data in the first storage that experienced data errors. The second server is instructed to mirror data in the second storage to the first server including data for the data in the first storage that experienced the data errors to store in the first storage in response to determining that the first server is available for the data mirroring operations.Type: ApplicationFiled: June 20, 2016Publication date: December 21, 2017Inventors: David R. Blea, Gregory E. McBride, Carol S. Mellgren, Tabor R. Powelson, William J. Rooney
-
Publication number: 20170364428Abstract: Examples provide a fault tolerant virtual machine (VM) using pooled memory. When fault tolerance is enabled for a VM, a primary VM is created on a first host in a server cluster. A secondary VM is created on a second host in the server cluster. Memory for the VMs is maintained on a shared partition in pooled memory. The pooled memory is accessible to all hosts in the cluster. The primary VM has read and write access to the VM memory in the pooled memory. The secondary VM has read-only access to the VM memory. If the second host fails, a new secondary VM is created on another host in the cluster. If the first host fails, the secondary VM becomes the new primary VM and a new secondary VM is created on another host in the cluster.Type: ApplicationFiled: October 13, 2016Publication date: December 21, 2017Inventors: HARIHARAN JEYARAMAN GANESAN, JINTO ANTONY, MADHUSUDHANAN GANGADHARAN, SAJU CHENGAT
-
Publication number: 20170364429Abstract: Systems, methods and computer program products assess processor performance metrics by monitoring probes constructed using instruction sequences. A first probe value can be determined from execution of a broad spectrum probe in an execution environment. In response to determining that the first probe value is not a first expected probe value, a targeted probe providing a second probe value directed to a subsystem of the execution environment, a feature of the subsystem, or a component of the execution environment is executed. In response to determining that the second probe value is not a second expected probe value, a differential between the second probe value and the second expected probe value can be used to determine that a bottleneck exists in at least one of the subsystem of the execution environment, the feature of the subsystem, or the component of the execution environment.Type: ApplicationFiled: August 14, 2017Publication date: December 21, 2017Inventors: Mark Robert Funk, Aaron Christoph Sawdey, Philip Lee Vitale
-
Publication number: 20170364430Abstract: A method and system for collecting statistics associated with multiple memory nodes to determine if a read-only page is read accessed in aggregate by multiple processing devices of the multiple memory nodes at or above a first threshold value. If so, the read-only page may be replicated to an additional memory node. If a determination is made that the read-only page is read accessed in aggregate by the multiple processing devices below the first threshold value, the read-only page may be de-replicated upon receipt of a write request associated with the read-only page.Type: ApplicationFiled: August 31, 2017Publication date: December 21, 2017Inventor: Avi Kivity
-
Publication number: 20170364431Abstract: A mechanism is provided for efficiently debugging software code. A set of modified log files associated with the software code is presented to a software debugging user. Responsive to receiving an indication from the software debugging user to tag a portion of a modified log file of the set of modified log files with a tag, the portion of the modified log file is tagged such that the tag of the portion of the modified log file is utilized in debugging the software code. The tag of the portion of the modified log file is propagated to a plurality of other software debugging users who are viewing the modified log file.Type: ApplicationFiled: June 17, 2016Publication date: December 21, 2017Inventors: Yves A. Beraldo dos Santos, Matthew H. Caughman, Charles J. Kastelic, Meagan M. Miller, Jesse K. Tannahill
-
Publication number: 20170364432Abstract: While the effectiveness of a model inspection method as a means for detecting software defects is known, large-scale software cannot be handled due to great amounts of calculation required for inspection. According to the present invention, after a model inspection problem of software is attributed to be a satisfiability determination problem, the problem is converted to a type that can be solved by a solver used for solving a notification optimization problem having constrained conditions, and the satisfiability is determined in a numerically analytical manner.Type: ApplicationFiled: January 30, 2015Publication date: December 21, 2017Applicant: Hitachi, Ltd.Inventor: Masataka NISHI
-
Publication number: 20170364433Abstract: Multi-data analysis based proactive defect detection and resolution may include analyzing operational data for an application to determine whether a functionality related to the application is below a predetermined threshold associated with the functionality related to the application, and based on the analysis, generating an indication to perform defect analysis related to the functionality related to the application. A sentiment analysis may be performed on consumer data related to the application to determine a sentiment of the consumer data related to the application, and a natural language processing (NLP) analysis may be performed on the consumer data related to the application to determine a function associated with a negative sentiment. Application code and process data related to the application may be analyzed to determine a defect associated with the application. Further, a code of the application may be modified to correct the defect associated with the application.Type: ApplicationFiled: September 6, 2017Publication date: December 21, 2017Applicant: Accenture Global Services LimitedInventors: Vikrant Shyamkant KAULGUD, Amitabh Saxena, Kapil Singi, Vibhu Saujanya Sharma
-
Publication number: 20170364434Abstract: A method, executed by a computer, includes receiving test data corresponding to a first microservice and a second microservice, determining, using the test data, whether the first microservice can be split, determining, using the test data, whether the first and second microservices can be merged, responsive to determining that the first microservice can be split, issuing a recommendation to split the first microservice, and responsive to determining that the first and second microservices can be merged, issuing a recommendation to merge the first microservice and the second microservice. A computer system and computer program product corresponding to the above method are also disclosed herein.Type: ApplicationFiled: June 15, 2016Publication date: December 21, 2017Inventors: Sudheesh S. Kairali, Suresh Kodati
-
Publication number: 20170364435Abstract: A method, system and computer program product for analytically selecting which tests are to be executed in a continuous delivery process. An analytics processing system constructs a code dependency tree to analyze the tests that are affected by changes in code after a new build is generated. After analyzing the code dependency tree, the system eliminates those tests in the code dependency tree that do not depend on the changed code. The system then analyzes the historical execution records for those tests that have not been eliminated for execution to obtain an execution rate and a failure rate for those tests. A score is generated for each of the tests from the code dependency tree that were not eliminated for execution based on the historical execution rate and failure rate of the test. Tests that have a score that exceeds a threshold are included for execution.Type: ApplicationFiled: August 29, 2017Publication date: December 21, 2017Inventors: Geetha Adinarayan, Shaw-Ben S. Shi, Gandhi Sivakumar, Meng H. Tsai
-
Publication number: 20170364436Abstract: System and methods for providing plugin-based software verification are described. A method may include, upon receiving a first registration instruction containing a first harness plugin associated with a first automated software test, configuring, by a test harness lifecycle controller, a first test harness based on the first harness plugin to support the executing of the first automated software test, wherein the first automated software test is a software test executable by a computer without human intervention. The method may include, upon receiving a first execution instruction, executing, by a test execution engine instructed by the test harness lifecycle controller, the first software test in the first test harness. The method may further include, upon receiving a request for test results, transmitting, by the test harness lifecycle controller in response to the request, test results collected during the executing of the first automated software test.Type: ApplicationFiled: June 16, 2016Publication date: December 21, 2017Applicant: VMware, INC.Inventors: Georgi STAYKOV, Todor TODOROV, Mariya MITEVA
-
Publication number: 20170364437Abstract: Methods and systems for managing memory and stress to memory systems. A method for managing memory includes receiving from a software application memory retention requirements for application data. The memory retention requirements include storage duration length and/or criticality of data retention. The method also includes storing the application data in one of a plurality of memory regions in non-volatile memory based on the memory retention requirements and memory retention characteristics of the memory regions. Each memory region may have different memory retention characteristics.Type: ApplicationFiled: September 1, 2017Publication date: December 21, 2017
-
Publication number: 20170364438Abstract: Methods of operating a storage device include reading first data from a first storage location of a first memory of the storage device, storing the first data to a first storage location of a second memory of the storage device, compressing the first data and storing the compressed first data to a second storage location of the second memory, evaluating the compressed first data to determine if it is deemed compressible, storing the first data from the first storage location of the second memory to a different storage location of the first memory if the compressed first data was determined to not be compressible, and combining the compressed first data with additional compressed data and storing the combined compressed data to a different storage location of the first memory if the compressed first data was determined to be compressible.Type: ApplicationFiled: August 30, 2017Publication date: December 21, 2017Applicant: MICRON TECHNOLOGY, INC.Inventor: Dean Klein
-
Publication number: 20170364439Abstract: Examples of the present disclosure provide apparatuses and methods for determining a data storage layout. An example apparatus comprising a first address space of a memory array comprising a first number of memory cells coupled to a plurality of sense lines and to a first select line. The first address space is configured to store a logical representation of a first portion of a value. The example apparatus also comprising a second address space of the memory array comprising a second number of memory cells coupled to the plurality of sense lines and to a second select line. The second address space is configured to store a logical representation of a second portion of the value. The example apparatus also comprising sensing circuitry configured to receive the first value and perform a logical operation using the value without performing a sense line address access.Type: ApplicationFiled: August 31, 2017Publication date: December 21, 2017Inventors: Kyle B. Wheeler, Timothy P. Finkbeiner