Patents Issued in February 15, 2018
  • Publication number: 20180046514
    Abstract: Disaggregated computing architectures, platforms, and systems are provided herein. In one example, a method of operating compute units is presented that includes forming compute units among a plurality of physical computing components comprising at least central processing units (CPUs), storage modules, and network interface modules coupled over a Peripheral Component Interconnect Express (PCIe) fabric configured to communicatively couple the plurality of physical computing components and isolate the compute unit in the clustered environment using logical partitioning within the PCIe fabric. The method also includes initiating a software component deployed to at least associated CPUs within the compute units, reporting telemetry to the management processor related to operation of the compute unit, and emulating operation of an Ethernet interface to an operating system of the associated CPU for transfer of communications comprising at least the telemetry to the management processor over the PCIe fabric.
    Type: Application
    Filed: August 11, 2017
    Publication date: February 15, 2018
    Applicant: Liqid Inc.
    Inventors: Jason Breakstone, Christopher R. Long, James Scott Cannata
  • Publication number: 20180046515
    Abstract: Provided are a device and method for allocating system resources. In one example, the method includes identifying resources that are available from a plurality of devices included in a system, allocating available resources of the plurality of devices to a plurality of components operating in the system, the allocating comprising reserving a set of resources from the plurality of devices in the system for each respective component, from among the plurality of components, based on operating requirements included in the metadata of the respective component, and managing the system based on the allocated resources. By allocating resources to components executing in the system, in advance, and preventing other components from consuming those resources, the system can operate with improved stability.
    Type: Application
    Filed: August 11, 2016
    Publication date: February 15, 2018
    Inventors: Daniel White SEXTON, Austars Raymond SCHNORE, JR., William David SMITH, II, Wesley Michael SKEFFINGTON, Joel Frederick MARKHAM
  • Publication number: 20180046516
    Abstract: A method of protecting software in a computer system includes defining a memory fractionation configuration for an application software program in the computer system, fractionating at least one page of the application software program into fractions according to the memory fractionation configuration, and running the application in such a manner that, at any particular point in time when the application is running, at least a first one of the fractions is stored in a manner that is not accessible from a user space or a kernel space of the computer system.
    Type: Application
    Filed: December 20, 2016
    Publication date: February 15, 2018
    Inventor: Joseph James Sharkey
  • Publication number: 20180046517
    Abstract: A computer-implemented technique is described herein for monitoring a web application that runs on plural computing machines provided by a network-accessible system. The technique involves determining a set of application instances that are assessed as healthy by the system, generating addresses for those application instances, and then testing the application instances in the set using their respective addresses. Overall, the technique can be considered to employ an “outside-in” strategy insofar as it interacts with the system from the vantage point of an end user.
    Type: Application
    Filed: August 15, 2016
    Publication date: February 15, 2018
    Inventors: Swapna Guddanti, Sapan Sarvaiya
  • Publication number: 20180046518
    Abstract: A system, method, and computer-readable storage medium configured to facilitate user purpose in a computing architecture.
    Type: Application
    Filed: August 10, 2017
    Publication date: February 15, 2018
    Applicant: Advanced Elemental Technologies, Inc.
    Inventors: Victor Henry SHEAR, Peter Robert WILLIAMS, Jaisook RHO, Timothy St. John REDMOND, James Jay HORNING
  • Publication number: 20180046519
    Abstract: A method includes creating a file directory entry in a directory file of a secure hierarchical file directory system for a file. The file directory entry includes a path name, an encryption access control list, and a source name. The file is encrypted with a key and the key is encrypted with each public key of user devices authorized to access the file. The encryption access control list includes identities of the set of user devices and the set of object content keys. The method further includes encrypting the directory file using a second key. The method further includes generating second object content keys based on the second key and public keys of second user devices authorized to access the directory file. The method further includes creating a next level directory file entry in a next higher directory file of the secure hierarchical file directory system for the directory file.
    Type: Application
    Filed: October 26, 2017
    Publication date: February 15, 2018
    Inventors: Wesley Leggette, Jason K. Resch
  • Publication number: 20180046520
    Abstract: A content of a social media data is analyzed. The social media data relates to a workload that is to be located on a node. A location corresponding to the social media data is computed. The social media data is regarded as originating from the location. A set of nodes is selected by computing a social distance objective function, the set of nodes includes the node. Each node in the set of nodes is located within a range of distances specified by the social distance objective function. A first subset of nodes is removed from the set of nodes, where the first subset of nodes fails to satisfy another objective function. In response to a second subset of nodes satisfying the social distance objective function and the other objective function, the node is selected from the second subset and the workload is deployed on the node.
    Type: Application
    Filed: August 15, 2016
    Publication date: February 15, 2018
    Applicant: International Business Machines Corporation
    Inventors: Aaron K. Baughman, John S. Cope, Michelle Welcks, Brian M. O'Connell
  • Publication number: 20180046521
    Abstract: A technique for shielding real-time workloads from operating system (OS) jitter due to expedited read-copy update (RCU) grace periods. In accordance with the disclosed technique, a kernel parameter is set to indicate that expedited RCU grace periods are to be suppressed. The kernel parameter is checked to see if it is set. A normal non-expedited RCU grace period is invoked in response to attempted invocation of an expedited RCU grace period if the check reveals that the kernel parameter is set.
    Type: Application
    Filed: February 5, 2017
    Publication date: February 15, 2018
    Inventor: Paul E. McKenney
  • Publication number: 20180046522
    Abstract: Particular embodiments described herein provide for an electronic device that can receive data from an operating system in an electronic device, where the data is related to hardware that is in communication with the electronic device through a multimodal interface and communicate the data and/or related data to a local policy manager, where the local policy manager is in communication with the multimodal interface. The multimodal interface can be configured to support power transfers, directionality, and multiple input/output (I/O) protocols on the same interface.
    Type: Application
    Filed: March 21, 2016
    Publication date: February 15, 2018
    Applicant: Intel Corporation
    Inventors: Peter S. Adamson, Nivedita Aggarwal, Karunakara Kotary, Abdul Rahman Ismail, Tin-Cheung Kung, David T. Hines, Chia-Hung Sophia Kuo, Ajay V. Bhatt, Karthi R. Vadivelu, Prashant Sethi
  • Publication number: 20180046523
    Abstract: A device for analyzing an event driven application may be provided. The device may include one or more processors. The one or more processors may be configured to execute, in a symbolic environment, an event of an enabled event set. Further, the one or more processors may be configured to update a persistent set and a visited event of the enabled event set via symbolic dynamic partial order reduction. The one or more processors may also be configured to discard each path constraint and event pair being read-write independent.
    Type: Application
    Filed: August 12, 2016
    Publication date: February 15, 2018
    Applicant: FUJITSU LIMITED
    Inventor: Peng LI
  • Publication number: 20180046524
    Abstract: Systems, methods, and computer-readable media having computer-executable instructions embodied thereon for providing cloud rules and an alerting framework are provided. In embodiments, one or more rules associated with one or more healthcare information systems are received. The one or more rules each designate an initiating and at least one target application. One or more actions are associated to each target application. The initiating application is monitored for a trigger associated with the one or more rules. In embodiments, the trigger causes the one or more actions to be communicated to each target applications. In embodiments, the one or more actions initiate various changes in a display associated with each target application.
    Type: Application
    Filed: October 27, 2017
    Publication date: February 15, 2018
    Applicant: CERNER INNOVATION, INC.
    Inventors: KAREN RAMSEY, KRISTINE MARIE NESSA, LYNN BEVERLY MADER
  • Publication number: 20180046525
    Abstract: Disclosed are various embodiments for fast and accurate identification of message-based application programming interface (API) calls in applications. A set of compliance rules is obtained from a compliance rule store. A request to analyze an application is received. An application analysis is performed by scanning the application to identify one or more public APIs invoked by the application.
    Type: Application
    Filed: October 24, 2017
    Publication date: February 15, 2018
    Inventor: CHAOTING XUAN
  • Publication number: 20180046526
    Abstract: Novel tools and techniques for tracing application execution and performance. Some of the tools provide a framework for monitoring the execution and/or performance of applications in an execution chain. In some cases, the framework can accomplish this monitoring with a few simple calls to an application programming interface on an application server. In other cases, the framework can provide for the passing of traceability data in protocol-specific headers of existing inter-application (and/or intra-application) communication protocols.
    Type: Application
    Filed: October 27, 2017
    Publication date: February 15, 2018
    Inventors: Igor I. Malkiman, Chauncey G. Powis, Tyson Matthew Bunch
  • Publication number: 20180046527
    Abstract: A storage device with a memory may utilize an optimized read retry operation. A read retry table includes a number of read retry cases with updated read thresholds. The read thresholds in the read retry table may be used to avoid errors caused by shifting of charge levels. The optimization of read retry includes weighting or reordering of the read retry cases in the read retry table. The selection of a read retry case (and corresponding read thresholds) are determined based on the weighting or reordering.
    Type: Application
    Filed: August 15, 2016
    Publication date: February 15, 2018
    Applicant: SanDisk Technologies LLC
    Inventors: Philip Reusswig, Deepak Raghu, Zelei Guo, Chris Nga Yee Yip
  • Publication number: 20180046528
    Abstract: A management system for a plurality of hard disk drives which gives disk-specific information includes a storage unit and a processor. The storage unit is configured to couple to the plurality of hard disk drives and includes an information module configured to store identification information of each hard disk drive and a checking module configured to check status of each hard disk drive according to a location information in the identification and send out an error warning if in error status. The processor is coupled to the storage unit and obtains the identification information and error warnings. The error warning comprises the identification information and an error type of the error hard disk drive. An electronic device with the management system is further provided.
    Type: Application
    Filed: August 31, 2016
    Publication date: February 15, 2018
    Inventor: WEI-SHUAI LIAO
  • Publication number: 20180046529
    Abstract: In order to specify and analyze a failure occurring in an information processing system with a high degree of accuracy, an log analysis system includes an analysis unit comparing a structural pattern of a log message group constituted by at least one log message with a known pattern, and associating, with the structural pattern of the log message group, reference information including information about the known pattern matching a structural pattern of another log message group supplementary the log message group, and a pattern generation unit generating a new pattern from the log message group having a structural pattern different from the known pattern in accordance with an analysis result given by the analysis unit.
    Type: Application
    Filed: February 12, 2016
    Publication date: February 15, 2018
    Inventor: Ryosuke TOGAWA
  • Publication number: 20180046530
    Abstract: A processor system includes a master processor that successively processes a plurality of tasks, a checker processor that successively processes at least one of the plurality of tasks, and a control circuit that performs control so that the checker processor operates when the master processor and the checker processor perform a lock-step operation, and the checker processor stops its operation when the master processor and the checker processor do not perform the lock-step operation, the lock-step operation being an operation in which each of the master and checker processors processes the same task, in which the control circuit performs control so that a period from when a task is processed by the lock-step operation to when another task is processed in the next lock-step operation is equal to or shorter than a maximum test period, the maximum test period being a test period acceptable to the processor system.
    Type: Application
    Filed: October 25, 2017
    Publication date: February 15, 2018
    Inventor: Tatsushi Okamoto
  • Publication number: 20180046531
    Abstract: A safety-relevant computer system, in particular a railway safety system, contains at least two hardware channels. A memory check results of the channels are fed to at least one comparator, which triggers an error response if the memory check results are not equal. In order to be able to use diverse software programs created by compilers, memory check results of the diverse software programs of each channel are fed to the comparator. The memory check results of a first software program of the first and second channels are compared with each other and the memory check results of a second software program of the first and second channels are compared with each other.
    Type: Application
    Filed: February 22, 2016
    Publication date: February 15, 2018
    Inventor: WALDEMAR HARSCH
  • Publication number: 20180046532
    Abstract: A storage system maintains a cache and a non-volatile storage. An error recovery component queries a cache component to determine whether modified customer data exists in a memory preserve cache. In response to determining that the modified customer data exists in the memory preserve cache, and in response to a failure beyond a threshold number of times of initial microcode load (IML) attempts to recover the modified customer data, an error notification is transmitted for manual intervention to avoid loss of the modified customer data.
    Type: Application
    Filed: October 23, 2017
    Publication date: February 15, 2018
    Inventors: Kevin J. Ash, Lokesh M. Gupta, Matthew J. Kalos
  • Publication number: 20180046533
    Abstract: A computer-implemented method, includes, in a pageable operating system environment that does not keep all kernel pages in memory, identifying one or more stack frame pages. The method includes storing the one or more stack frame pages in a logical dump volume, wherein the logical dump volume is accessed upon a system reboot. A corresponding computer system and computer program product are also disclosed.
    Type: Application
    Filed: August 11, 2016
    Publication date: February 15, 2018
    Inventors: Uma Maheswara R. Chandolu, Saurabh K. Gupta, Keerthi B. Kumar
  • Publication number: 20180046534
    Abstract: A network device includes a processor; and a memory storing computer-readable instructions therein, the computer-readable instructions, when executed by the processor, causing the network device to perform: storing a first mail address and a second mail address; generating a first email to be addressed to the first mail address and a second email to be addressed to the second mail address, the first email having a first body including a URL, the second email having a second body including the URL; detecting a specific failure occurring in the network device; transmitting the first email to the first mail address and the second email to the second mail address when the specific failure is detected.
    Type: Application
    Filed: October 12, 2017
    Publication date: February 15, 2018
    Applicant: BROTHER KOGYO KABUSHIKI KAISHA
    Inventors: Shigetaka YOSHIDA, Atsushi KOJIMA, Hideto MATSUMOTO, Kiyotaka OHARA
  • Publication number: 20180046535
    Abstract: An information processing apparatus including: a memory configured to store information, each piece of the information associating a cause for shutdown of the information processing apparatus with one or more key inputs that respectively corresponds to one or more reboots triggered off by shutdown with the cause, and a processor coupled to the memory and the processor configured to: obtain a specified cause of a specified shutdown of the information processing apparatus, and for each reboot of one or more specified reboots triggered off by the specified shutdown with the specified cause, input a specified key input to the information processing apparatus, the specified key input corresponding to the reboot of the one or more specified reboots associated with the specified cause in the memory.
    Type: Application
    Filed: August 8, 2017
    Publication date: February 15, 2018
    Applicant: FUJITSU LIMITED
    Inventor: Takahiro KONNO
  • Publication number: 20180046536
    Abstract: Processing faults in a virtual computing environment. A method includes receiving a request to perform a memory access for a virtual machine. The method further includes identifying that that the memory access is unable to be performed without taking a fault. The method further includes identifying that a virtual fault can be taken to service the fault. The virtual fault is taken by servicing the fault asynchronously with respect to the virtual machine. The method further includes identifying that a virtual fault should be taken by evaluating criteria to weigh taking a virtual fault for servicing the fault asynchronously versus servicing the fault synchronously. As a result of identifying that a virtual fault should be taken, the method farther includes notifying the virtual machine that a virtual fault should be taken for the memory access. The method further includes servicing the fault asynchronously with respect to the virtual machine.
    Type: Application
    Filed: November 4, 2016
    Publication date: February 15, 2018
    Inventors: Mehmet Iyigun, Kevin Michael Broas, Arun U. Kishan, Yevgeniy M. Bak, John Joseph Richardson
  • Publication number: 20180046537
    Abstract: A method for execution by one or more processing modules of one or more computing devices of a dispersed storage network (DSN), the method begins by receiving an access request from a requesting entity. The method continues by determining a vault ID (identifier) based on the access request, identifying a vault configuration based on the vault ID, identifying a vault access range associated with the vault ID, and identifying a group associated with the requesting entity. The method continues by determining permissions for the group based on the vault configuration and the vault access range and authorizing the access request based on the permissions. When favorably authorized, the method continues by facilitating access to the DSN utilizing the vault configuration.
    Type: Application
    Filed: October 27, 2017
    Publication date: February 15, 2018
    Inventors: Ilya Volvovski, S. Christopher Gladwin, Gary W. Grube, Timothy W. Markison, Jason K. Resch, Thomas F. Shirley, JR., Greg R. Dhuse, Manish Motwani, Andrew D. Baptist, Wesley B. Leggette
  • Publication number: 20180046538
    Abstract: A memory device including a memory having a plurality of memory cells for storing data. The memory device includes a controller communicatively coupled to the memory and configured to organize the data as a plurality of stripes. Each individual stripe of the plurality of stripes includes a plurality of data groups, each of the plurality of data groups stored in the memory using a subset of the plurality of memory cells. Stripe lengths (number of data groups) for individual stripes are determined by the controller based on detecting a condition associated with one or more data groups of the plurality of data groups. At least one data group of the plurality of data groups for each of the individual stripes includes parity data for correcting bit errors associated with the subset of the plurality of memory cells for the individual stripe.
    Type: Application
    Filed: March 29, 2017
    Publication date: February 15, 2018
    Inventors: Fan Zhang, Chenrong Xiong, Yu Cai, Aman Bhatia, HyungSeok Kim, June Lee
  • Publication number: 20180046539
    Abstract: An error detection code generating device includes: a detector configured to detect a number of changed bits, which indicates a number of bits changed between transmitted data and a parity of a previous session and transmitted data and a parity of a current session; a generator configured to generate a first add code for a detection of an error based on the number of changed bits detected by the detector and the parity of the transmitted data of the current session; and a compression circuit configured to compress the first add signal generated by the generator and generate a second add code to be added to the transmitted data of the current session.
    Type: Application
    Filed: June 14, 2017
    Publication date: February 15, 2018
    Applicant: FUJITSU LIMITED
    Inventor: Masaru Takehara
  • Publication number: 20180046540
    Abstract: Techniques for codeword decoding are described. In an example, a system accesses information about a block of a storage device of the system. The block includes data lines and redundant lines. The data lines are available to store data and include a bad data line that is unreliable for data storage. The redundant lines include a redundant line that replaces the bad data line, and a free redundant line that remains available after replacement of all bad data lines from the data lines. The information includes an identifier of the bad data line and an identifier of the free redundant line. The system accesses a codeword stored in the block. A portion of the codeword is stored in the free redundant line. The system decodes the codeword based on the identifier of the bad data line and the identifier of the free redundant line.
    Type: Application
    Filed: April 13, 2017
    Publication date: February 15, 2018
    Inventors: Fan Zhang, June Lee, Chenrong Xiong, Aman Bhatia, Naveen Kumar, David Pignatelli
  • Publication number: 20180046541
    Abstract: A method of correcting a memory error of a dynamic random-access memory module (DRAM) using a double data rate (DDR) interface, the method includes conducting a memory transaction including multiple bursts with a memory controller to send data from data chips of the DRAM to the memory controller, detecting one or more errors using an ECC chip of the DRAM, determining a number of the bursts having the errors using the ECC chip of the DRAM, determining whether the number of the bursts having the errors is greater than a threshold number, determining a type of the errors, and directing the memory controller based on the determined type of the errors, wherein the DRAM includes a single ECC chip per memory channel.
    Type: Application
    Filed: October 5, 2016
    Publication date: February 15, 2018
    Inventors: Dimin Niu, Mu-Tien Chang, Hongzhong Zheng, Hyun-Joong Kim, Won-hyung Song, Jangseok Choi
  • Publication number: 20180046542
    Abstract: In one exemplary embodiment, the decoding method includes: reading first data from a plurality of first memory cells of a rewritable non-volatile memory module; performing a first decoding operation on the first data based on a first decoding condition; and performing a second decoding operation on the first data based on a second decoding condition if the first decoding operation conforms to a first default status, where a strict level of locating an error bit in the first data based on the second decoding condition is higher than a strict level of locating the error bit in the first data based on the first decoding condition. Therefore, a decoding efficiency of a memory storage device can be improved.
    Type: Application
    Filed: October 21, 2016
    Publication date: February 15, 2018
    Applicant: PHISON ELECTRONICS CORP.
    Inventors: Yu-Hsiang Lin, Shao-Wei Yen, Cheng-Che Yang, Kuo-Hsin Lai
  • Publication number: 20180046543
    Abstract: Methods and structure for preventing lower page corruption in flash memory. One embodiment is a flash storage device that includes Multi-Level Cell (MLC) flash memory, Single-Level Cell (SLC) flash memory, and a controller coupled to the MLC flash memory and the SLC flash memory. The controller is configured to program host data to a lower page of the MLC flash memory, to generate an erasure code for the host data, and to store the erasure code in the SLC flash memory. The controller is also configured to detect an interrupted write operation to an upper page linked to the lower page, to retrieve the erasure code from the SLC flash memory, and to correct the host data of the lower page of the MLC flash memory using the erasure code.
    Type: Application
    Filed: August 9, 2016
    Publication date: February 15, 2018
    Inventors: Timothy Canepa, Stephen Hanna
  • Publication number: 20180046544
    Abstract: A computing device includes an interface configured to interface and communicate with a dispersed storage network (DSN), a memory that stores operational instructions, and a processing module operably coupled to the interface and to the memory such that the processing module, when operable within the computing device based on the operational instructions, is configured to perform various operations. The computing device determines characteristic(s) of encoded data slices (EDSs) of a data object and determines a first estimated class for the EDSs based on the characteristic(s) of the EDSs of the data object. The computing device then selects storage locations within storage units (SUs) of the DSN for the EDSs to be distributedly stored based on the first estimated class and collects write and/or delete request analytics associated with the EDSs. Based on updated information regarding the analytics, the computing device may then update/move/change the storage locations of the EDSs.
    Type: Application
    Filed: August 9, 2016
    Publication date: February 15, 2018
    Inventors: Jason K. Resch, Ilya Volvovski
  • Publication number: 20180046545
    Abstract: Fault-tolerant distributed information handling systems and methods, including a method in a system including: a first host configured to store a first fragment of data, a second host configured to store a second fragment of data, a third host configured to store a third fragment of data, and a fourth host configured to store a first code derived at least from the first fragment of data, the second fragment of data, and the third fragment of data, are provided. The method includes: the first agent transmitting via a multicast operation an updated second fragment of data to the second host and the fourth host; a second agent corresponding to the second host transmitting via a unicast operation the second fragment of data to the fourth host; and generating a second code derived from the first code, the second fragment of data, and the updated second fragment of data.
    Type: Application
    Filed: August 12, 2016
    Publication date: February 15, 2018
    Inventors: Ke Xu, Dharmesh M. Patel, William Brad Langford
  • Publication number: 20180046546
    Abstract: A smart storage device is provided. The smart storage device contains a data analysis engine and an error detection engine. An external controller sends a command indicating that data contained on a storage medium in the smart storage device which meets certain criterion should be scrubbed, and the smart storage device locates that data without the external controller passing the actual location of the data on the storage medium.
    Type: Application
    Filed: October 3, 2016
    Publication date: February 15, 2018
    Inventors: Sheng Qiu, Yang Seok Ki
  • Publication number: 20180046547
    Abstract: A dispersed storage network (DSN) includes storage units storing dispersed error-encoded data slices, and logically grouped into a container served by a computing device configured as a container controller. A method for use in such a DSN, includes obtaining by the container controller, a container status of the container, the container status including a status indicator associated with a first storage unit included in the container. The container controller determines whether the container status compares favorably to a status threshold, and in response to an unfavorable comparison, determines a data slice to be migrated from the first storage unit. The method further includes determining, at the container controller, a second storage unit to receive the data slice to be migrated, and facilitating, at the container controller, migration of the data slice to be migrated from the first storage unit to the second storage unit.
    Type: Application
    Filed: October 30, 2017
    Publication date: February 15, 2018
    Inventors: S. Christopher Gladwin, Jason K. Resch, Gary W. Grube, Timothy W. Markison
  • Publication number: 20180046548
    Abstract: A method for tracking objects in a first memory during a plurality of time intervals is provided, wherein the method comprises: updating, by one or more update threads, copying, by the one or more test threads, the one or more non-copied shadow objects to a second memory, determining, by the one or more test threads whether the step of copying the one or more non-copied shadow objects was successful, and updating, by the one or more test threads, the status variables of corresponding objects that correspond to the one or more non-copied shadow objects that were copied successfully, wherein subsequent bits of the status variables correspond to subsequent time intervals and wherein the one or more update threads and the one or more test threads operate on disjoint sets of bits of the status variables.
    Type: Application
    Filed: October 2, 2017
    Publication date: February 15, 2018
    Inventors: Shay Goikhman, Antoni Wolski, Eliezer Levy, Antonios Iliopoulos
  • Publication number: 20180046549
    Abstract: Embodiments of the present invention provide systems and methods for recovering a high availability storage system. The storage system includes a first layer and a second layer, each layer including a controller board, a router board, and storage elements. When a component of a layer fails, the storage system continues to function in the presence of a single failure of any component, up to two storage element failures in either layer, or a single power supply failure. While a component is down, the storage system will run in a degraded mode. The passive zone is not serving input/output requests, but is continuously updating its state in dynamic random access memory to enable failover within a short period of time using the layer that is fully operational. When the issue with the failed zone is corrected, a failback procedure brings the system back to a normal operating state.
    Type: Application
    Filed: August 15, 2016
    Publication date: February 15, 2018
    Inventors: Ladislav STEFFKO, Vijay KARAMCHETI
  • Publication number: 20180046550
    Abstract: Techniques are provided for pre-filtering of join execution over multi-column range summaries and other synopses. An exemplary method comprises maintaining a synopsis for a plurality of data tables, wherein a given synopsis summarizes a set of records in a corresponding data table; and, in response to a request for a join operation for a set of the data tables: joining the synopses associated with the set of data tables to generate a joined synopsis; for joined records in the joined synopsis, obtaining corresponding records from the set of data tables as candidate records; and joining the candidate records. Two or more of the set of data tables can be distributed across a plurality of nodes and the synopses can be replicated and/or broadcasted across the plurality of nodes. Incremental updates to broadcasted and/or replicated synopses are optionally provided to at least one node.
    Type: Application
    Filed: August 10, 2016
    Publication date: February 15, 2018
    Inventors: Yuan Chi Chang, Timothy Ray Malkemus, Mohammad Sadoghi Hamedani
  • Publication number: 20180046551
    Abstract: Provided are techniques for replicating relational transactional log data to a big data platform. Change records contained in change data tables are fetched. A relational change history with transaction snapshot consistency is rebuilt to generate consistent change records by joining the change data tables and a unit of work table based on a commit sequence identifier. The consistent change records are stored on the big data platform, and queries are answered on the big data platform using the consistent change records.
    Type: Application
    Filed: August 15, 2016
    Publication date: February 15, 2018
    Inventors: Serge Bourbonnais, Austin F.M. D'Costa, Yat On Lau, Xiao Li, Hong Min, Gong Su, Jonathan W. Wierenga, Christian Zentgraf
  • Publication number: 20180046552
    Abstract: A log-structured data store implementing data backup may implement variable data replication. Write requests may be received at different storage nodes maintaining respective replicas of a portion of a log for data maintained in the log-structured data store. Log records indicating the write requests may be stored in the respective replicas of the log portions at the different storage nodes. The log records may be sent to a backup data store to be durability persisted as part of an archived version of the log. At some of the storage nodes, in response to determining that the log records have been durably persisted in the backup data store, storage space for the log records may be reclaimed. In other remaining storage nodes, the log records may be retained and made accessible for servicing read requests.
    Type: Application
    Filed: October 9, 2017
    Publication date: February 15, 2018
    Applicant: Amazon Technologies, Inc.
    Inventors: Pradeep Jnana Madhavarapu, Anurag Windlass Gupta, Yan Valerie Leshinsky, Samuel James McKelvie, James McClellan Corey
  • Publication number: 20180046553
    Abstract: A storage control device includes a processor configured to create a first snapshot corresponding to a storage area by a copy-on-write method and management information used for managing a location of a data block updated after the creation, and copy all files included in the first snapshot to a first backup area. The processor is configured to create a second snapshot and identify, on basis of the management information, a second area in a first area of the second snapshot. The first area stores therein first metadata on all of second files included in the second snapshot. The second area is updated after the creation. The processor is configured to identify updated files updated after the creation among the second files, on basis of second metadata among the first metadata. The second metadata is included in the second area and copy the updated files to a second backup area.
    Type: Application
    Filed: July 14, 2017
    Publication date: February 15, 2018
    Applicant: FUJITSU LIMITED
    Inventor: Hiroshi OKAMOTO
  • Publication number: 20180046554
    Abstract: Data in a database cache in memory of an operating database server is copied to memory of a standby database server, without requiring synchronization between the operating server and the standby server. If the operating server fails, the database is recovered to a consistent state in the standby server using a sequential database log and the copied data in the cache of the standby server. Preferably, recovery is performed by reading the log to determine a set of database actions to recover, verifying blocks of data in the standby server's cache, using verified blocks to recover at least some actions, and reading blocks from storage only when a corresponding verified block is not available in the cache.
    Type: Application
    Filed: October 30, 2017
    Publication date: February 15, 2018
    Inventors: Douglas Griffith, Anil Kalavakolanu, Minh Q. Pham, Isac Rodrigues Da Silva, Stephen A. Schlachter
  • Publication number: 20180046555
    Abstract: A system and method for generating replicas of a file of a protected storage system from protected data in a recovery system. The method including protecting data in a recovery system including a target disk configured to store a replica of the protected storage system from a before a time window and a journal including data and metadata of write operations to the protected storage system that occurred during the time window, obtaining a request to restore a file and an indication of a specified time point from which the file should be restored, generating a replica of a table of content of a file system of the protected storage system from the journal and the target disk, extracting location of the file from the table of content, and generating a replica of the file from the journal and the target disk, using the extracted file location.
    Type: Application
    Filed: October 31, 2017
    Publication date: February 15, 2018
    Applicant: Zerto Ltd
    Inventors: Oded KEDEM, Tomer BEN-OR, Gil BARASH
  • Publication number: 20180046556
    Abstract: Undo logging for persistent memory transactions may permit concurrent transactions to write to the same persistent object. After an undo log record has been written, a single persist barrier may be issued. The tail pointer of the undo log may be updated after the persist barrier, and without another persist barrier, so the tail update may be persisted when the next log record is written and persisted. Undo logging for persistent memory transactions may rely on inferring the tail of an undo log after a failure rather than relying on a guaranteed correct tail pointer based on persisting the tail after every append. Additionally, transaction version numbers and checksum information may be stored to the undo log enabling failure recovery.
    Type: Application
    Filed: August 11, 2017
    Publication date: February 15, 2018
    Inventors: Virendra J. Marathe, Margo I. Seltzer, Steve Byan
  • Publication number: 20180046557
    Abstract: A semiconductor device (1) includes a first processing unit (10-1), a second processing unit (10-2), a writing unit (12), a storage unit (14), and a processing control unit (20). The writing unit (12) writes first information related to processing of each of the first processing unit (10-1) and the second processing unit (10-2) into the storage unit (14). The processing control unit (20) controls the operations of the first processing unit (10-1) and the second processing unit (10-2). The processing control unit (20) performs control to stop the first processing unit (10-1) when an error occurs in the first processing unit (10-1). When it is determined that the second processing unit (10-2) where an error has not occurred is able to maintain execution of the first processing by using first information stored in the storage unit (14), the second processing unit (10-2) maintains execution of the first processing.
    Type: Application
    Filed: June 2, 2017
    Publication date: February 15, 2018
    Inventors: Shunsuke NAKANO, Yoshitaka TAKI
  • Publication number: 20180046558
    Abstract: An information processing apparatus includes a plurality of partitions, a first controlling device belonging to a first partition among the plurality of partitions, and a second controlling device belonging to a second partition among the plurality of partitions. The first controlling device includes a first processor configured to control the plurality of partitions. The second controlling device includes a second processor configured to control the second partition.
    Type: Application
    Filed: July 31, 2017
    Publication date: February 15, 2018
    Applicant: FUJITSU LIMITED
    Inventor: Tomohiro Kobayashi
  • Publication number: 20180046559
    Abstract: A failure location specification method executed including retrieving first setting information indicating a setting of a forward communication of a round trip between a first virtual machine and a second virtual machine, the forward communication being a communication from the first virtual machine to the second virtual machine, retrieving second setting information indicating a setting of a backward communication of the round trip, the backward communication being a communication from the second virtual machine to the first virtual machine in response to the forward communication, when the second setting information indicates that a communication between the first virtual machine and the second virtual machine is not established, retrieving third setting information and fourth setting information based on the first setting information, and specifying a failure location based on a pattern indicating a communication state and a plurality of reference patterns corresponding to each of a plurality of locations.
    Type: Application
    Filed: July 17, 2017
    Publication date: February 15, 2018
    Applicant: FUJITSU LIMITED
    Inventor: Osamu SHIMOKUNI
  • Publication number: 20180046560
    Abstract: Systems, methods, and media for tracking a connected device are disclosed. For example, a wireless connection can be established between a user computing device and a connected hardware device. The user computing device can determine whether a Universally Unique Identifier (UUID) has been assigned to the connected hardware device. If no UUID has been assigned, the user computing device can generate a UUID, which the connected hardware device can receive and store. The user computing device can instruct a server to create a profile of the connected hardware device with the UUID. The connected hardware device can start broadcasting the UUID. A second user computing device can receive the UUID and retrieve the profile of the connected hardware device from the server with the UUID. The connected hardware device can also collect information, which can be transmitted to the server via a user computing device.
    Type: Application
    Filed: August 11, 2017
    Publication date: February 15, 2018
    Inventors: Andrew George GILLIES, Christopher Adam OVERHOLTZER, Dwight SPRINGTHORPE, II, Nicholas Joseph KOHUT
  • Publication number: 20180046561
    Abstract: A system for executing simulation jobs including: a job scheduler receiving a job request from a system user, the request specifying a simulation job and user-defined resource settings for the job; computing hardware resources executing simulation jobs designated by the scheduler which instructs the resources to execute the job with the settings; a performance monitor generates performance statistics; a statistics memory stores a characterization, the settings, and performance statistics for the job; an alert generator determines jobs similar to the specified job, to identify a first job having the same characterization as a second job, and for which the settings differ between the jobs, determining an improved performance statistic in one of the first and second jobs relative to the other, to generate an alert to the user indicating the resource settings of the job identified as having improved performance statistics.
    Type: Application
    Filed: May 31, 2017
    Publication date: February 15, 2018
    Applicant: Fujitsu Limited
    Inventor: Jim Enright
  • Publication number: 20180046562
    Abstract: A first code version is received. The first code version includes a plurality of code features, such as methods or classes. A second code version is received. The second code version includes a plurality of code features. The first code version is executed. A first plurality of code features executed during the execution of the first code version are determined. A second plurality of code features differing between the first and second code versions are determined. The first and second plurality of code features are compared. An indication is provided that a code feature is potentially relevant to the code behavior if the code feature is present in the first plurality of code features and in the second plurality of code features.
    Type: Application
    Filed: August 15, 2016
    Publication date: February 15, 2018
    Applicant: SAP SE
    Inventors: Xia Yu, Yang Peng, Xikang Wu, Jieyan Huang
  • Publication number: 20180046563
    Abstract: An approach is provided for predicting an exception during a debugging of software code before the debugging encounters the exception. A number of lines X is received. During a debugging of a line number L of the code, upcoming lines consisting of line numbers L+1 through L+X are executed. Based on the execution of the upcoming lines, the exception is predicted to be encountered at line number M, which is within a range of line numbers L+1 through L+X. During the debugging of the line number L, and based on the prediction and the line number being within the range, a warning is displayed that the exception is to be encountered at line number M.
    Type: Application
    Filed: October 26, 2017
    Publication date: February 15, 2018
    Inventors: Vikas Chandra, Sarika Sinha