Patents Issued in February 8, 2018
-
Publication number: 20180039497Abstract: An apparatus and method are described for performing a bit reversal and permutation on mask values. For example, a processor is described to execute an instruction to perform the operations of: reading a plurality of mask bits stored in a source mask register, the mask bits associated with vector data elements of a vector register; and performing a bit reversal operation to copy each mask bit from a source mask register to a destination mask register, wherein the bit reversal operation causes bits from the source mask register to be reversed within the destination mask register resulting in a symmetric, mirror image of the original bit arrangement.Type: ApplicationFiled: October 16, 2017Publication date: February 8, 2018Inventors: Elmoustapha OULD-AHMED-VALL, Robert VALENTINE
-
Publication number: 20180039498Abstract: A method for a delayed branch implementation by using a front end track table. The method includes receiving an incoming instruction sequence using a global front end, wherein the instruction sequence includes at least one branch, creating a delayed branch in response to receiving the one branch, and sing a front end track table to track both the delayed branch the one branch.Type: ApplicationFiled: October 13, 2017Publication date: February 8, 2018Inventor: Mohammad ABDALLAH
-
Publication number: 20180039499Abstract: Processing of an instruction fetch from an instruction cache is provided, which includes: determining whether the next instruction fetch is from a same address page as a last instruction fetch from the instruction cache; and based, at least in part, on determining that the next instruction fetch is from the same address page, suppressing for the next instruction fetch an instruction address translation table access, and comparing for an address match results of an instruction directory access for the next instruction fetch with buffered results of a most-recent, instruction address translation table access for a prior instruction fetch from the instruction cache.Type: ApplicationFiled: October 17, 2017Publication date: February 8, 2018Inventors: Michael K. GSCHWIND, Valentina SALAPURA
-
Publication number: 20180039500Abstract: A system to update firmware includes one of a number of clients and a server. The server includes a remote login module, an image scanning module, a comparing module, and a firmware updating module. The remote login module remotely logs in the client through SOL. The image scanning module obtains running images of running interface of the client at a preset speed in a preset period. The comparing module compares each running image to a preset PXE interface to determine whether the running image is consistent with the preset PXE interface. When the running image is consistent, the firmware updating module loads operating system image and firmware program image to RAM of the client and controls the client to run the operating system image and the firmware program image to update the firmware of the client. A firmware updating method is also disclosed.Type: ApplicationFiled: August 25, 2016Publication date: February 8, 2018Inventors: SHENG-CHUNG PAN, YEN-HSUAN CHEN, CHIA-LUNG CHIANG
-
Publication number: 20180039501Abstract: A system provides cloud-based identity and access management. The system provides a user interface (“UI”) to a tenant of an identity-management service. The system enables diagnostics functionality for the tenant based on a user input received via the UI, where the diagnostics functionality allows for a user in the tenant to configure and receive diagnostics reports related to the identity-management service. The system then receives a request for the identity-management service, accesses a microservice based on the request, performs the identity-management service by the microservice, collects and records diagnostics information during the performing of the identity-management service, and displays the diagnostics information to the user via the UI.Type: ApplicationFiled: July 12, 2017Publication date: February 8, 2018Inventors: Vikrant JAIN, Ashish GUPTA, Gary P. COLE, Vadim LANDER
-
Publication number: 20180039502Abstract: Systems, methods, and computer program products to perform an operation comprising receiving, by a first device, metadata describing a first action of a plurality of actions performed on a second device, identifying a target object of the first action based on the metadata describing the first action, and outputting, by the first device: a sequence of images depicting performance of the first action on the second device, a textual instruction specifying how to perform the first action on the first device proximate to the target object, and an audio instruction specifying how to perform the first action on the first device.Type: ApplicationFiled: August 2, 2016Publication date: February 8, 2018Inventor: Alok K. SINGH
-
Publication number: 20180039503Abstract: There is provided a setup configuration method which includes a setup step where a platform is provided for setup configuration of at least one peripheral device coupled to a computer, a processing step where output signals are generated based on the setup configuration using the platform and a sharing step where the generated output signals are communicated for setup configuration of corresponding at least one peripheral device coupled to an electronic device. Setup configuration of the corresponding at least one peripheral device can be based on received output signals via at least one of manual setup and automatic setup.Type: ApplicationFiled: August 2, 2017Publication date: February 8, 2018Applicant: Creative Technology LtdInventor: Yee Shian LEE
-
Publication number: 20180039504Abstract: An application execution apparatus that is capable of preventing display of an incomplete image. A virtual machine controls an installed application. A reference unit refers to attribute information showing whether an application draws a background of an image when the application draws the image. And a setting unit sets so that the virtual machine draws the background when it is not set that the application draws the background of the image to the attribute information.Type: ApplicationFiled: July 24, 2017Publication date: February 8, 2018Inventor: Masao Akuzawa
-
Publication number: 20180039505Abstract: When determining that a first Virtual Machine (VM) migrates from the first xTR, the first xTR determines whether a second VM is connected to an interface of the first xTR to which the first VM is connected before the first VM migrates. If yes, the first xTR sends a free Address Resolution Protocol (ARP) packet through the interface of the first xTR, and sends an Endpoint Identifier (EID) address of the second VM and a Routing Locator (RLOC) address of the first xTR to a second xTR. A source address and destination address of the free ARP are the EID address of the first VM, and the second xTR is an xTR to which the first VM migrates from the first xTR.Type: ApplicationFiled: February 4, 2016Publication date: February 8, 2018Inventor: Changwang Lin
-
Publication number: 20180039506Abstract: A system for providing dynamic code deployment and versioning is provided. The system may be configured to receive a first request to execute a newer program code on a virtual compute system, determine, based on the first request, that the newer program code is a newer version of an older program code loaded onto an existing container on a virtual machine instance on the virtual compute system, initiate a download of the newer program code onto a second container on the same virtual machine instance, and causing the first request to be processed with the older program code in the existing container.Type: ApplicationFiled: July 24, 2017Publication date: February 8, 2018Inventors: Timothy Allen Wagner, Sean Philip Reque, Derek Steven Manwaring, Xin Zhao, Dylan Chandler Thomas
-
Publication number: 20180039507Abstract: A system and method for operating an agent. A policy may be generated based on an analysis of a code segment of an agent, analysis of the execution and/or installation of an agent. An interaction with the agent may be intercepted. The interaction may be analyzed according to the policy. A machine for performing an operation related to the interaction may be selected. A proxy on the selected machine may perform the operation and return a result to the agent. In some embodiments, a request to perform a task may be intercepted. A first portion of the task may be performed by an agent and a second portion of the task may be performed by a proxy.Type: ApplicationFiled: August 23, 2017Publication date: February 8, 2018Applicant: INTIGUA, INC.Inventors: Tomer LEVY, Shimon Hason
-
Publication number: 20180039508Abstract: The disclosure relates to systems and methods for defining a processor safety privilege level for controlling a distributed memory access protection system. More specifically, a safety hypervisor function for accessing a bus in a computer processing system includes a module, such as a Computer Processing Unit (CPU) or a Direct Memory Access (DMA) for accessing a system memory and a memory unit for storing a safety code, such as a Processor Status Word (PSW) or a configuration register (DMA (REG)). The module allocates the safety code to a processing transaction and the safety code is visible upon access of the bus by the module.Type: ApplicationFiled: October 16, 2017Publication date: February 8, 2018Inventors: Simon Brewerton, Glenn Farrall, Neil Hastie, Frank Hellwig, Richard Knight, Antonio Vilela
-
Publication number: 20180039509Abstract: Systems, methods, and software described herein provide for enhancements to large scale data processing architectures. In one implementation, a service architecture for large scale data processing includes a host computing system, and a virtual machine executing on the host computing system. The service architecture further includes a plurality of application containers executing on the virtual machine, wherein each of the application containers comprises a large scale processing node running one or more java virtual machines.Type: ApplicationFiled: October 19, 2017Publication date: February 8, 2018Inventors: Thomas Phelan, Joel Baxter, Michael J. Moretti, Gunaseelan Lakshminarayanan
-
Publication number: 20180039510Abstract: The machine implemented method for operating at least one electronic system comprises detecting a pattern of use of plural control parameters in a path through a graph of operational context switches to reach a target operational context; storing a representation of the pattern in association with an indicator identifying the target operational context; responsive to detecting at least one of a request for a switch of operation from a source operational context to the target operational context, a trapping on a resource access, and a detection of a breakpoint, retrieving the representation in accordance with the indicator identifying the target operational context; and responsive to the retrieving, applying at least one control parameter to said at least one electronic system to match the pattern.Type: ApplicationFiled: July 18, 2017Publication date: February 8, 2018Inventors: Milosch Meriac, Alessandro Angelino
-
Publication number: 20180039511Abstract: A datacenter, a communication apparatus, a communication method, and a communication control method in a communication system are provided that can enhance the versatility of a datacenter and a virtual network constructed therein. A communication system includes: a communication facility owned by at least one network operator; and a datacenter connected to the communication facility over a network, wherein the datacenter includes: a first virtual network that implements mobile communication functions by using the communication facility; a second virtual network that provides a cloud service; and a communication means, wherein the communication means includes: a reception means for receiving traffic from the communication facility; and a distributing means for distributing the received traffic to either the first virtual network or the second virtual network.Type: ApplicationFiled: March 3, 2016Publication date: February 8, 2018Applicant: NEC CORPORATIONInventors: Shintaro NAKANO, Hideo HASEGAWA, Satoru ISHII
-
Publication number: 20180039512Abstract: A system and method for automated continuous task triggering is provided. The system may provide automated continuous task triggering by monitoring a data source and a data output, retrieving a task criteria from a criteria database, and executing a task in response to the task criteria being met. The task criteria may comprise a set of instructions to execute the task on the data source and the data output. The system may also recalibrate the task criteria based on the executing of the task to generate a recalibrated task criteria.Type: ApplicationFiled: August 8, 2016Publication date: February 8, 2018Applicant: AMERICAN EXPRESS TRAVEL RELATED SERVICES COMPANY, INC.Inventors: Rares Ioan Almasan, Rebecca Henry
-
Publication number: 20180039513Abstract: In an event-based data management system, an event having an associated identifier is received. A mapping operation is performed using the identifier to map the event to a selected one of a plurality of topic partitions. Queues for each of the plurality of topic partitions are managed. The queues for each of the plurality of topic partitions are managed independently of each other. The event is allocated to the selected topic partition based on the mapping operation. The event is placed into the queue for the selected topic partition. A batch of events is sent from the queue for the selected topic partition in response to one or more thresholds being reached.Type: ApplicationFiled: August 2, 2016Publication date: February 8, 2018Inventor: Yingwu Zhao
-
Publication number: 20180039514Abstract: Methods, apparatus, systems and articles of manufacture to facilitate efficient scheduling of digital tasks in a system are disclosed. Periodic and aperiodic tasks may be identified, an initial minimum required duration may be determined based on the periodic and aperiodic tasks, a finish-to-activate duration of the aperiodic task may be determined, a final minimum required duration may be determined based on the initial minimum required duration and the finish-to-activate duration, a time budget may be adjusted to be the final minimum required duration, and the aperiodic task may be activated within the time budget based on the finish-to-activate duration.Type: ApplicationFiled: August 5, 2016Publication date: February 8, 2018Inventors: Hongwei LIAO, Panagiotis MANOLIOS, Terrell Michael BRACE, Gregory Reed SYKES, Kevin J. JONES, Kit Yan SIU
-
Publication number: 20180039515Abstract: Methods herein may include receiving a request to initiate an allocation and transmitting a request for information relating to the allocation, including a quantity and an identification of institutions associated with first and second parties. Methods may also include consolidating the information with information received from other parties into consolidated information. Methods may also include determining from the consolidated information a first aggregate which includes all quantities to be sent to the institution associated with the second party in the consolidated information, and a second aggregate which includes all quantities to be received from the institution associated with the first party in the consolidated information. Methods may also include creating an additive instruction based on the first aggregate, and a subtractive instruction based on the second aggregate.Type: ApplicationFiled: June 27, 2017Publication date: February 8, 2018Applicant: The Western Union CompanyInventors: Kim Crea, Jennifer Grimes, Marilyn Bethke
-
Publication number: 20180039516Abstract: Methods, computing systems and computer program products implement embodiments of the present invention that include defining, for a request processing system, a first homogeneous auto-scaling group including a first monitored resource, a first set of processing systems, a first minimum threshold, a first maximum threshold, and a first system configuration. Subsequent to defining the first homogeneous auto-scaling group, a second auto-scaling group is defined for the request processing system, the second auto-scaling group including a second monitored resource different from the first monitored resource, a second set of processing systems, a second minimum threshold, a second maximum threshold, and a second system configuration different from the first system configuration. In embodiments of the present invention, a load balancer for the request processing system manages the first and the second sets of processing systems as a single heterogeneous auto-scaling group.Type: ApplicationFiled: August 8, 2016Publication date: February 8, 2018Inventors: Ofer Biran, Dean Lorenz, Eran Raichstein, Avi Weit
-
Publication number: 20180039517Abstract: A load-distribution system includes: a first computer to: determine a common portion of conditions among different models, and store one or more models in each of third computers that determines a state of an event, by applying a model stored in a built-in memory; and a second computer to: specify, from the third computers, a first third computer that stores a first model of the models including the identical-common portion, which corresponds to an attribute included in event information which has been input, specify, from the third computers, a second third computer that store a second model including a common portion identical to a common portion included in the first model, decide which one of the first third computer and the second third computer is caused to perform determining the state, and cause the decided one of the third computers to perform the processing of determining the state.Type: ApplicationFiled: July 19, 2017Publication date: February 8, 2018Applicant: FUJITSU LIMITEDInventor: Yusuke KOYANAGI
-
Publication number: 20180039518Abstract: In an illustrative example, a system includes a resource and a first processor. The first processor is configured to access the resource based on a first physical address space and to generate a request for access to the resource. The request has a first format. The system further includes a second processor configured to access the resource based on a second physical address space. The system also includes a device coupled to the resource and to the first processor. The device is configured to receive the request, to generate a message having a second format based on the request, to send the message to the resource, and to provide a reply to the request to the first processor.Type: ApplicationFiled: August 2, 2016Publication date: February 8, 2018Inventors: Ramkumar Jayaseelan, Sadagopan Srinivasan, Thomas Andrew Hartin
-
Publication number: 20180039519Abstract: A method for managing processing load by an electronic device is described. The method includes determining to offload a task being executed on the electronic device. The method also includes communicating with a peer device. The method further includes determining that the peer device is capable of executing the task based on the communication. The method additionally includes offloading the task to the peer device. The method also includes receiving an output of the task. The output is generated while the peer device is executing the task.Type: ApplicationFiled: August 8, 2016Publication date: February 8, 2018Inventors: Akash Kumar, Ankit Maheshwari, Shruti Agrawal
-
Publication number: 20180039520Abstract: A method and job scheduling node (200) for scheduling data processing across a set of processing machines (202), each processing machine comprising at least one data processor. When receiving (2:2) a request for a data processing job, the job scheduling node (200) obtains (2:5) a current processor resource status of each processing machine, the processor resource status indicating at least current usage of each data processor in said processing machine. The job scheduling node (200) further selects (2:6) at least one vacant data processor in the set of processing machines based on the obtained processor resource status, for executing the data processing job, and dispatches (2:7) the data processing job to at least one processing machine (202a) where the at least one selected data processor is located.Type: ApplicationFiled: March 24, 2015Publication date: February 8, 2018Inventors: Yue Lu, Fetahi Wuhib
-
Publication number: 20180039521Abstract: A system, method, and computer program product are provided for implementing a protocol stack for handling memory access requests associated with one or more block devices. The method includes the steps of allocating a thread to process a task associated with a memory access request for a block device; and executing the thread to process the task, wherein the thread implements a state machine that manages calls to two or more layers of the protocol stack. A task dispatcher is implemented for managing the execution of tasks using at least one thread pool, the tasks managing the calls to the various layers of the protocol stack. The protocol stack may implement abstraction layers for virtual storage devices as well as the real block devices.Type: ApplicationFiled: August 3, 2016Publication date: February 8, 2018Inventor: Philip Andrew White
-
Publication number: 20180039522Abstract: Technologies are generally described for systems, devices and methods effective to process a composite task to be applied to an ontology. In some examples, the methods may include a processor receiving a composite task. The methods may include the processor transforming the composite task into a set of atomic tasks. The set of atomic tasks may include at least a first atomic task, a second atomic task, and a third atomic task. The methods may include the processor determining that the first atomic task is equivalent to the second atomic task based on the ontology. The methods may include the processor removing the second atomic task from the set of atomic tasks to generate a list of atomic tasks. The methods may include the processor applying the list of atomic tasks to the ontology.Type: ApplicationFiled: October 17, 2017Publication date: February 8, 2018Applicant: EMPIRE TECHNOLOGY DEVELOPMENT LLCInventor: Jun Fang
-
Publication number: 20180039523Abstract: An information processing system includes a first core, a second core having a processing speed that is slower than the first core, a first memory, a second memory having a slower response time than the first memory, and a management processor. The management processor is configured to determine a core for executing a task, cause program data for executing the task to be copied to the first memory and then cause the first core to execute the task using the program data in the first memory, when the first core is determined as the core for executing the task, and cause the program data for executing the task to be copied to the second memory and then cause the second core to execute the task using the program data in the second memory, when the second core is determined as the core for executing the task.Type: ApplicationFiled: February 21, 2017Publication date: February 8, 2018Inventors: Takayuki AKAMINE, Kenichiro YOSHII, Hiroshi YAO
-
Publication number: 20180039524Abstract: Using a metadata of a layer, a prediction factor including a level of participation of the layer in a set of container images is computed. Each container image includes a corresponding set of layers and is usable to configure a container in a container-based virtualized data processing environment. Using a set of levels of participation corresponding to a set of layers, and using a condition in a prediction algorithm, a subset of layers that have to be pre-provisioned at a node is predicted. The subset of layers is adjusted, to form an adjusted subset of layers, by looking ahead at a container requirement of a workload that is planned for processing at a future time. The adjusted subset of layers is caused to be provisioned on the node prior to the future time.Type: ApplicationFiled: August 3, 2016Publication date: February 8, 2018Applicant: International Business Machines CorporationInventors: Paolo Dettori, Andrew R. Low, Aaron J. Quirk, Seetharami R. Seelam Seelam, Michael J. Spreitzer, Malgorzata Steinder, Lin Sun
-
Publication number: 20180039525Abstract: A host system reallocates resources in a virtual computing environment by first receiving a request to reallocate a first quantity of a first resource type. Next, potential trade-off groups are evaluated and a trade-off group is selected based on the evaluation. The selected trade-off group includes a set of applications running in the virtual computing environment that can use one or more alternate resource types as a substitute for the first quantity of the first resource type. After the selection, the host system reallocates the first quantity of the first resource type from the trade-off group. This reallocation may be made from the trade-off group to either a first application running in the virtual computing environment or the host system itself. If the reallocation is to the host system, then the total quantity of the first resource type allocated to applications running in the virtual computing environment is thereby reduced.Type: ApplicationFiled: October 20, 2017Publication date: February 8, 2018Inventors: Gregory J. Boss, Seyyed Vahid Hashemian, Ton A. Ngo, Thomas K. Truong
-
Publication number: 20180039526Abstract: A method and a system are provided for auto-allocation of one or more tasks to one or more resources of an organization. The method includes receiving one or more requests from a requestor computing device associated with the organization over a communication network. The one or more requests may include at least one or more first attributes of the one or more tasks and one or more pre-defined constraints. The method further includes extracting one or more second attributes associated with the one or more resources based on at least the one or more first attributes of the one or more tasks. The method further includes determining an allocation of the one or more tasks to the one or more resources based on at least the one or more first attributes and the one or more second attributes, such that the one or more predefined constraints are satisfied.Type: ApplicationFiled: August 4, 2016Publication date: February 8, 2018Inventors: Ameer Mulla, Gurulingesh Raravi, Jagadeesh Chandra Bose Rantham Prabhakara, Avantika Gupta, Koustuv Dasgupta
-
Publication number: 20180039527Abstract: Systems and methods for migrating configuration changes to a target content management system. A migration statement based on a metadata definition language (“MDL”) may be generated with a first API and executed on a source system to generate new source system configurations. A second API may be sent from the source system to the target system and executed on the target system to apply the new source system configurations on the target system without disturbing operation of the target system.Type: ApplicationFiled: August 4, 2016Publication date: February 8, 2018Applicant: Veeva Systems Inc.Inventors: Peter Gassner, Igor Tsives, Jon Stone, Arvind Talari
-
Publication number: 20180039528Abstract: Examples may include a basic input/output system (BIOS) for a computing platform communicating with a controller for a non-volatile dual in-line memory module (NVDIMM). Communication between the BIOS and the controller may include a request for the controller to scan and identify error locations in non-volatile memory at the NVDIMM. The non-volatile memory may be capable of providing persistent memory for the NVDIMM.Type: ApplicationFiled: August 28, 2017Publication date: February 8, 2018Applicant: Intel CorporationInventors: Mohan J. Kumar, Murugasamy K. Nachimuthu, Camille C. Raad
-
Publication number: 20180039529Abstract: A method and system for determining root-causes of incidences using machine-generated textual data. The method comprises receiving machine-generated textual data from at least one data source; classifying the received machine-generated textual data into at least one statistical metric; processing the statistical metric to recognize a plurality of incidence patterns; correlating the plurality of incidence patterns to identify at least a root-cause of an incidence that occurred in a monitored environment; and generating an alert indicating at least the identified root-cause.Type: ApplicationFiled: April 27, 2017Publication date: February 8, 2018Applicant: Loom Systems LTD.Inventors: Yaron LEHMANN, Gabby MENAHEM, Dror MANN
-
Publication number: 20180039530Abstract: Techniques are disclosed for monitoring operation of and/or interaction with a website to detect events (“frustration events”). In at least one embodiment, a detection system is disclosed that can monitor a website for the same or unrelated interaction and operation to detect events that affect the performance of a website, while contributing to the frustration of user interaction with the website. The detection system can monitor interaction with and/or operation of one or more documents of a website. Interactions with a website, operations of the website, or a combination thereof, may be assessed with respect to a threshold defining an event. One or more criteria (e.g., a time period) of the event may be assessed for the interactions and operations. Event data may be generated for the event(s) that occur, and the event data may be sent to a host system to adjust operation of the website.Type: ApplicationFiled: August 8, 2017Publication date: February 8, 2018Applicant: Quantum Metric, LLCInventors: Mario Luciano Ciabarra, Jr., Joseph Eric Pastuer
-
Publication number: 20180039531Abstract: Techniques for performing redundant multi-threading (“RMT”) include the use of an RMT compare instruction by two program instances (“work-items”). The RMT compare instruction specifies a value from each work-item to be compared. Upon executing the RMT compare instructions, the work-items transmit the values to a hardware comparator unit. The hardware comparator unit compares the received values and performs an error action if the values do not match. The error action may include sending an error code in a return value back to the work-items that requested the comparison or emitting a trap signal. Optionally, the work-items also send addresses for comparison to the comparator unit. If the addresses and values match, then the comparator stores the value at the specified address. If either or both of the values or the addresses do not match, then the comparator performs an error action.Type: ApplicationFiled: August 8, 2016Publication date: February 8, 2018Applicant: Advanced Micro Devices, Inc.Inventors: Daniel I. Lowell, Manish Gupta
-
Publication number: 20180039532Abstract: A semiconductor system may include a first semiconductor device and a second semiconductor device. The first semiconductor device may output an external strobe signal and external data. The second semiconductor device may extract error information from the external data in synchronization with the external strobe signal during a write operation and outputs the external data and the error information through input/output (I/O) lines during the write operation. The second semiconductor device may correct errors of internal data with the error information loaded on the I/O lines to output the corrected internal data as the external data during a read operation.Type: ApplicationFiled: October 17, 2017Publication date: February 8, 2018Applicant: SK hynix Inc.Inventors: Chang Hyun KIM, Min Chang KIM, Do Yun LEE, Jae Jin LEE, Hun Sam JUNG
-
Publication number: 20180039533Abstract: A computer-implemented method according to one embodiment includes receiving a first plurality of events occurring during a current time period, determining whether a number of the first plurality of events exceeds a threshold for the current time period, determining whether a predetermined issue is identified by comparing the first plurality of events to a second plurality of events occurring during an historical time period, in response to a determination that the number of the first plurality of events exceeds the threshold for the current time period, and resolving the predetermined issue, in response to a determination that the predetermined issue is identified.Type: ApplicationFiled: August 2, 2016Publication date: February 8, 2018Inventor: Raul Estrada, Jr.
-
Publication number: 20180039534Abstract: A method for data redistribution of a job data in a first datanode (DN) to at least one additional DN in a Massively Parallel Processing (MPP) Database (DB) is provided. The method includes recording a snapshot of the job data, creating a first data portion in the first DN and a redistribution data portion in the first DN, collecting changes to a job data copy stored in a temporary table, and initiating transfer of the redistribution data portion to the at least one additional DN.Type: ApplicationFiled: August 3, 2016Publication date: February 8, 2018Applicant: Futurewei Technologies, Inc.Inventors: Le CAI, QingQing ZHOU, Yang SUN
-
Publication number: 20180039535Abstract: The present disclosure includes apparatuses and methods for proactive corrective actions in memory based on a probabilistic data structure. A number of embodiments include a memory, and circuitry configured to input information associated with a subset of data stored in the memory into a probabilistic data structure and proactively determine, at least partially using the probabilistic data structure, whether to take a corrective action on the subset of data stored in the memory.Type: ApplicationFiled: August 5, 2016Publication date: February 8, 2018Inventors: Saeed Sharifi Tehrani, Sivagnanam Parthasarathy
-
Publication number: 20180039536Abstract: A computer-implemented method, according to one embodiment, includes: detecting at least one read of a logical page straddled across codewords, storing an indication of a number of detected reads of the straddled logical page, and relocating the straddled logical page to a different physical location in response to the number of detected reads of the straddled logical page. When relocated, the logical page is written to the different physical location in a non-straddled manner. Other systems, methods, and computer program products are described in additional embodiments.Type: ApplicationFiled: October 19, 2017Publication date: February 8, 2018Inventors: Charles J. Camp, Timothy J. Fisher, Nikolas Ioannou, Thomas Parnell, Roman A. Pletka, Sasa Tomic
-
Publication number: 20180039537Abstract: Systems and methods for correcting data errors in memory caused by high-temperature processing of the memory are provided. An integrated circuit (IC) die including a memory is formed. Addresses of memory locations that are susceptible to data loss when subjected to elevated temperatures are determined. Bits of data are written to the memory, where the bits of data include a set of bits written to the memory locations. The set of bits are written to a storage device of the IC die that is not susceptible to data loss when subjected to the elevated temperatures. At least one of the bits stored at the addresses is overwritten after subjecting the IC die to an elevated temperature. The at least one of the bits is overwritten based on the set of bits written to the storage device.Type: ApplicationFiled: August 4, 2016Publication date: February 8, 2018Inventors: YU-DER CHIH, Ching-Huang Wang, Yi-Chun Shih, Meng-Chun Shih, C.Y. Wang
-
Publication number: 20180039538Abstract: A device includes a memory device and a controller. The controller is configured to receive data to be stored in the non-volatile memory and to store a first copy of the data and a second copy of the data to a volatile memory. The controller is configured, in response to detecting a bit error corresponding to the first copy of the data prior to storage of the first copy of the data to the non-volatile memory, to perform an error detection operation that includes comparing first redundancy data corresponding to the first copy of the data to second redundancy data corresponding to the second copy of the data.Type: ApplicationFiled: August 5, 2016Publication date: February 8, 2018Inventors: GUY FREIKORN, JUDAH GAMLIEL HAHN
-
Publication number: 20180039539Abstract: A method for extending the lifetime of a resistive change memory includes generating data and hash candidates by shuffling bit positions of write data with the hash candidates in response to a write request for the resistive change memory, calculating Hamming distances of the generated data and hash candidates from stored data and a stored hash, matching stuck data at a predetermined bit in the resistive change memory with the generated data and hash candidates when the stuck data is at the predetermined bit, and excluding mismatched data and hash candidates that are mismatched with the stuck data among the generated data and hash candidates, finding a data and hash candidate with the shortest Hamming distance among the matched data and hash candidates, and choosing the found data and hash candidate as an encoded data and hash, and storing the encoded data and hash in the resistive change memory.Type: ApplicationFiled: July 3, 2017Publication date: February 8, 2018Inventors: Seon Wook KIM, Miseon HAN, Hokyoon LEE, IL PARK
-
Publication number: 20180039540Abstract: A memory system having an error correction codes (ECC) self-checking function is disclosed. The memory system includes: an ECC encoder, used to convert input information bits into a codeword; a memory, coupled to the ECC encoder, the memory being used to store the codeword; and an ECC decoder, coupled to the memory and the ECC encoder, the ECC decoder being used to generate a syndrome of the codeword; wherein when the memory system is operated in an on-line self-checking mode and the codeword is fed into the memory from the ECC encoder, the codeword is as well fed into the ECC decoder from the ECC encoder to generate the syndrome.Type: ApplicationFiled: August 2, 2016Publication date: February 8, 2018Inventor: Shih-Lien Linus LU
-
Publication number: 20180039541Abstract: A data storage device includes a memory device and a controller coupled to the memory device. The controller is configured, during execution of a relocation operation that includes storage of data to a memory buffer of an access device and retrieval of the data including data bits and first error correction code (ECC) parity bits from the memory buffer, to generate second ECC parity bits based on the data bits from the memory buffer and to compare the first ECC parity bits to the second ECC parity bits.Type: ApplicationFiled: August 5, 2016Publication date: February 8, 2018Inventors: JUDAH GAMLIEL HAHN, IGOR GENSHAFT, MARINA FRID
-
Publication number: 20180039542Abstract: A method includes determining whether to request retrieval of the data segment from at least one of redundant array of independent discs (RAID) memory and dispersed storage network (DSN) memory. The method further includes, when the computing device determines to request retrieval from the RAID memory, sending a read request to the RAID memory. When the retrieval of the data segment from the RAID memory was unsuccessful, the method further includes generating a set of read requests regarding a set of encoded data slices corresponding to the data segment. The method further includes sending the set of read requests to a set of storage units of the DSN memory. The method further includes receiving at least a decode threshold number of encoded data slices from at least some storage units. The method further includes decoding the at least the decode threshold number of encoded data slices to recover the data segment.Type: ApplicationFiled: August 16, 2016Publication date: February 8, 2018Inventors: Greg R. Dhuse, Gary W. Grube, Jason K. Resch
-
Publication number: 20180039543Abstract: Systems and methods providing for storing fragments for one or more source objects at storage nodes of multiple cluster instances comprising a cluster set are disclosed. Repair of the stored data is operated within cluster instances autonomously or semi-autonomously of other cluster instances of the cluster set according to embodiments. Embodiments may provide a storage process operable to generate fragments for a first source object to be stored in a storage system using a first encoding, wherein a different plurality of fragments of the generated fragments are stored at different cluster instances of a cluster set. A repair process may be enacted at each cluster instance of the cluster set, wherein a repair process enacted at a cluster instance is used to maintain the recoverability of the fragments of the first source object stored at that cluster instance using a second encoding.Type: ApplicationFiled: July 27, 2017Publication date: February 8, 2018Inventor: Michael George Luby
-
Publication number: 20180039544Abstract: A resource access management component arranged to manage access to resources within a processing system. The resource access management component comprises at least one resource access management device configurable to manage access to the resources by a plurality of interconnect-master devices of the processing system. The resource access management component further comprises at least one resource access configuration unit arranged to receive an indication when a fault has been detected in relation to an interconnect-master device of the processing system, and to reconfigure the resource access management device in response to receiving the indication that a fault has been detected in relation to the interconnect-master device.Type: ApplicationFiled: July 17, 2017Publication date: February 8, 2018Inventors: JAMES ANDREW COLLIER SCOBIE, David McMenamin
-
Publication number: 20180039545Abstract: A determination is made as to whether one of a system definition file data set and a catalog data set is unavailable for orderly restart of an information system. The system definition file data set provides resource definition information for the information system and the catalog data set provides resource state information for the information system. A determination is made that the other of the system definition file data set and the catalog data set is available. The unavailable one of the system definition file data set and the catalog data set is reconstructed by rebuilding the system resource definition and state information used by the unavailable one of the system definition file data set and the catalog data set using system resource information within the other available one of the system definition file data set and the catalog data set.Type: ApplicationFiled: October 19, 2017Publication date: February 8, 2018Inventors: Brian Johnson, Mark W. T. Todd, Andrew Wright
-
Publication number: 20180039546Abstract: A management controller may be configured to control connectivity among a host system processor, a primary ROM, and a recovery ROM in accordance with a plurality of modes of operation including at least a normal mode that occurs in response to absence of a corruption of the ROM code in which the management controller causes the host system processor to be communicatively coupled to the primary ROM and communicatively decoupled from the recovery ROM, such that the host system processor loads and executes the ROM code during boot of the host system, and a primary ROM recovery mode that occurs in response to presence of the corruption of the ROM code in which the management controller causes the host system processor to be coupled to the primary ROM and the recovery ROM, such that the host system processor loads and executes the recovery code during boot of the host system.Type: ApplicationFiled: August 4, 2016Publication date: February 8, 2018Applicant: Dell Products L.P.Inventors: Timothy M. LAMBERT, Johan RAHARDJO, Mukund P. KHATRI