Patents Issued in April 19, 2018
-
Publication number: 20180107521Abstract: A multiprocessor computer system facility is provided for selectively reallocating a logical processing unit within the computer system. The logical processing unit is one logical processing unit of multiple logical processing units backed by a socket of a plurality of sockets of the multiprocessor computer system. The selectively reallocating includes: monitoring, during execution of program code of the multiple logical processing units, a performance metric of a hardware resource of the socket, the hardware resource being shared by the multiple logical processing units; and reassigning the logical processing unit, based on the monitoring, to a different socket of the plurality of sockets of the multiprocessor computer system to, in part, improve the performance metric of the hardware resource of the socket.Type: ApplicationFiled: October 19, 2016Publication date: April 19, 2018Inventors: Oliver BENKE, Hartmut E. PENNER, Klaus THEURICH
-
Publication number: 20180107522Abstract: Data processing jobs are concentrated into instances of computing environments which instances are added to guarantee availability, while other instances may become idle and removed. Such data processing jobs are each assigned to a program running on (at least) one processor, while at the same time running such jobs in the smallest practical number of Virtual Computing Environments, while also ensuring sufficient Virtual Computing Environments are on standby for new jobs as they arise, while facilitating maintenance functions.Type: ApplicationFiled: May 9, 2016Publication date: April 19, 2018Inventor: Eric Cameron Wilson
-
Publication number: 20180107523Abstract: Disclosed aspects include managing a set of wear-leveling data with respect to a set of physical cores of a set of compute nodes. A set of physical cores of the set of compute nodes may be monitored using a set of processor utilization resource registers (PURRs) to identify the set of wear-leveling data. By monitoring the set of physical cores of the set of compute nodes, a set of thread events with respect to the set of physical cores of the set of compute nodes may be detected. Based on the set of thread events, the set of wear-leveling data may be determined. The set of wear-leveling data may then be established in a data store. The wear leveling data may be used to manage asset placement with respect to a shared pool of configurable computing resources.Type: ApplicationFiled: December 14, 2017Publication date: April 19, 2018Inventors: Chethan Jain, Maria R. Ward
-
Publication number: 20180107524Abstract: A computer system, method, and computer readable product are provided for adaptive parallelism of workload execution on computers with accelerators. In various embodiments, information about both static and dynamic characteristics of computational accelerators for a plurality of computers is received. Based on this information, waves of a workload is divided among this plurality of computers for processing. As the dynamic characteristics of those computational accelerators change over time, future waves may be divided among this plurality of computers differently.Type: ApplicationFiled: October 13, 2016Publication date: April 19, 2018Inventors: Liana L. Fong, Wei Tan, Xiaolong Xie, Husheng Zhou
-
Publication number: 20180107525Abstract: The current document is directed to automated application-release-management facilities that, in a described implementation, coordinate continuous development and release of cloud-computing applications. The application-release-management process is specified, in the described implementation, by application-release-management pipelines, each pipeline comprising one or more stages, with each stage comprising one or more tasks. The currently described methods and systems allow resources to be shared among multiple, interdependent release pipelines and allow access to shared resources to be controlled.Type: ApplicationFiled: November 11, 2016Publication date: April 19, 2018Inventors: AGILA GOVINDARAJU, Ravi Kasha, Mohammed Muneebuddin
-
Publication number: 20180107526Abstract: The present disclosure provides methods, systems, and media for allowing access to quantum ready and/or quantum enabled computers in a distributed computing environment (e.g., the cloud). Such methods and systems may provide optimization and computational services on the cloud. Methods and systems of the present disclosure may enable quantum computing to be relatively and readily scaled across various types of quantum computers and users at various locations, in some cases without the need for users to have a deep understanding of the resources, implementation or the knowledge that may be required for solving optimization problems using a quantum computer. Systems provided herein may include user interfaces that enable users to perform data analysis in a distributed computing environment while taking advantage of quantum technology in the backend.Type: ApplicationFiled: December 5, 2017Publication date: April 19, 2018Inventors: Majid DADASHIKELAYEH, Arman ZARIBAFIYAN
-
Publication number: 20180107527Abstract: Provided are a computer program product, system, and method for determining storage tiers for placement of data sets during execution of tasks in a workflow. A representation of a workflow execution pattern of tasks for a job indicates a dependency of the tasks and data sets operated on by the tasks. A determination is made of an assignment of the data sets for the tasks to a plurality of the storage tiers based on the dependency of the tasks indicated in the workflow execution pattern. A moving is scheduled of a subject data set of the data sets operated on by a subject task of the tasks that is subject to an event to an assigned storage tier indicated in the assignment for the subject task subject. The moving of the data set is scheduled to be performed in response to the event with respect to the subject task.Type: ApplicationFiled: December 15, 2017Publication date: April 19, 2018Inventors: Aayush Gupta, Sangeetha Seshadri
-
Publication number: 20180107528Abstract: According to an example, aggregation based event identification may include aggregating each of a plurality of source events by an event type of event types that represent dusters of the source events and/or a host of a source event of the source events to generate a reduced number of the source events. Aggregation based event identification may further include analyzing a characteristic for each of the reduced number of the source events, and assigning, based on the analysis of the characteristic for each of the reduced number of the source events, a characteristic weight to each of the reduced number of the source events. Further, aggregation based event identification may include aggregating the characteristic weights for each of the reduced number of the source events to determine an aggregated event issue weight for each of the reduced number of the source events.Type: ApplicationFiled: April 30, 2015Publication date: April 19, 2018Inventors: Fernando Vizer, Noam Fraenkel, Yair Horovitz
-
Publication number: 20180107529Abstract: Aspects of the present disclosure describe structural event detection from system log messages. More particularly disclosed are computer-implemented methods to mine structural events as directed workflow graphs where nodes of the graphs represent log patterns and edges represent relations among patterns. Advantageously, the structural events are inclusive and correspond to interpretable episodes in the system and methods according to the present disclosure directly model the overall quality of structural events. Through both qualitative and quantitative experiments on real-world datasets, the effectiveness of the disclosed methods are demonstrated.Type: ApplicationFiled: October 13, 2017Publication date: April 19, 2018Inventors: Pranay ANCHURI, Fei WU
-
Publication number: 20180107530Abstract: The present disclosure provides a method and system for a scalable complex event processing of event streams. The method includes reception of one or more input event streams and collection of one or more output event streams. Further, the method includes modeling of each instance of each input event stream and each instance of the plurality of instances for intermediate states as records of a database table. The method includes indexing of each record of the database table and distribution of a first set of records in temporary memory and the second set of records in one or more persistent storage devices. The method includes flushing the second set of records of the database table in one or more persistent storage devices and querying of the plurality of records of the database table. The method includes inferring one or more complex events from transition of a plurality of states.Type: ApplicationFiled: October 16, 2017Publication date: April 19, 2018Inventors: Rajeev GUPTA, Mahesh DHABADE, Mangesh KUTE, Prasad DESHPANDE, Sachin SINHA
-
Publication number: 20180107531Abstract: Disclosed herein are a service server, a user terminal, and a method of 3D collaborative printing providing a 3D collaborative printing service. A method of 3D collaborative printing performed by a 3D collaborative printing system includes generating, by a user terminal, control information to store the control information in a service server; generating, by the service server, a secure token to transmit the secure token to the user terminal; transmitting, by the user terminal, the secure token to one or more 3D printer; receiving, by the one or more 3D printer, the control information corresponding to the secure token from the service server using the secure token; and performing, by the one or more 3D printer, an operation corresponding to the control information.Type: ApplicationFiled: October 5, 2017Publication date: April 19, 2018Inventors: Seung-Wook LEE, Chang-Joon PARK, Jin-Sung CHOI
-
Publication number: 20180107532Abstract: A V2X communication apparatus includes a message transceiver for receiving a V2X communication message and transmitting V2X data to an apparatus in a vehicle, a parameter calculator for calculating a reliability verification parameter for verifying reliability of the V2X data, a reliability level decider for deciding a reliability level by comparing the reliability verification parameter with a predetermined reference value, and a message generator for generating the V2X data using the V2X communication message and generating the V2X data including the decided reliability level.Type: ApplicationFiled: November 23, 2016Publication date: April 19, 2018Inventors: Jong Rok PARK, Dong Gyu NOH, Su Lyun SUNG, Tae Jun LEE, Cho Rong RYU, Hahk Rel NOH, Dae Sung HWANG
-
Publication number: 20180107533Abstract: In a fixing system, a first terminal device transmits information about a trouble in a target device to a server, receives information for restoration of the target device, and operates a measuring instrument for measurement on the target device to measure the state of the target device based on the information for restoration of the target device. The server receives the information about the trouble, and refers to a fixing know-how database to analyze the trouble. The fixing know-how database contains know-how information about fixing of the target device. The server selects information required for fixing from information for restoration specified based on a result of the analysis by a trouble analyzing unit so as to comply with a selection condition set in advance, and transmits the selected information to the first terminal device.Type: ApplicationFiled: October 17, 2017Publication date: April 19, 2018Inventors: Susumu ITOU, Hitoshi HIROTA
-
Publication number: 20180107534Abstract: Environmental data, associated with a first computer, is received. Social media data, associated with the first computer, is also received. A first severity value, based on the environmental data, is determined. A second severity value, based on the social media data, is determined. A first weighted severity score is determined. The first weighted severity score is a combination of the first and second severity values. One or more actions is determined. The determined action is one of a recovery point objective action or a recovery time objective action. Each action has a threshold. Whether the first weighted severity score is equal to or greater than any threshold associated with any action is determined. In response to determining that the first weighted severity score is equal to or greater than one or more thresholds, each action associated with each threshold is implemented.Type: ApplicationFiled: December 15, 2017Publication date: April 19, 2018Inventors: Eric S. Angeles, Megan L. Bennett, Fabio A. Gomez Diaz, Shawn P. Mullen
-
Publication number: 20180107535Abstract: A method includes maintaining, by a storage unit, a plurality of source name based addressing maps regarding encoding data slice storage by a plurality of storage units. The method further includes receiving, by the storage unit, an access request for an encoded data slice having a source name corresponding to a DSN address. The method further includes accessing, by the storage unit, the source name based address maps to determine whether the encoded data slice is effected by the DAP redistribution operation. The method further includes, when the encoded data slice is effected by the DAP redistribution operation, determining, by the storage unit, to execute the access request, proxy the access request, or deny the access request. The method further includes, when the determination is to execute the access request, executing, by the storage unit, the access request for the encoded data slice.Type: ApplicationFiled: December 15, 2017Publication date: April 19, 2018Inventors: Adam M. Gray, Greg R. Dhuse, Andrew D. Baptist, Ravi V. Khadiwala, Wesley B. Leggette, Scott M. Horan, Franco V. Borich, Bart R. Cilfone, Daniel J. Scholl, Jason K. Resch, Kumar Abhijeet
-
Publication number: 20180107536Abstract: According to one embodiment, a memory system includes a non-volatile first memory, a second memory, a battery, a first processor, and a second processor. The first processor is configured to execute fault diagnosis on the battery by discharging energy stored in the battery. The second processor is configured to write data cached in the second memory into the first memory and reduce an upper limit of the amount of data to be cached when executing the fault diagnosis than the upper limit of the amount of data to be cached when not executing the fault diagnosis.Type: ApplicationFiled: December 19, 2017Publication date: April 19, 2018Applicant: Toshiba Memory CorporationInventors: Masami Aochi, Yoshihisa Kojima, Nobuyuki Suzuki
-
Publication number: 20180107537Abstract: Out-of-bounds recovery circuits configured to detect an out-of-bounds violation in an electronic device, and cause the electronic device to transition to a predetermined safe state when an out-of-bounds violation is detected. The out-of-bounds recovery circuits include detection logic configured to detect that an out-of-bounds violation has occurred when a processing element of the electronic device has fetched an instruction from an unallowable memory address range for the current operating state of the electronic device; and transition logic configured to cause the electronic device to transition to a predetermined safe state when an out-of-bounds violation has been detected by the detection logic.Type: ApplicationFiled: October 16, 2017Publication date: April 19, 2018Inventors: Ashish Darbari, Iain Singleton
-
Publication number: 20180107538Abstract: A mechanism is provided for loading a phase-locked loop (PLL) configuration into a PLL module using Flash memory. A Flash data image configuration from the Flash memory is loaded into a set of holding registers in response to the PLL module locking a current PLL configuration from a set of current configuration registers. The Flash data image configuration in the set of holding registers is compared to the current PLL configuration in the set of current configuration registers in response to the Flash data image configuration failing to be corrupted. The Flash data image configuration onto a PLL module input in response to the Flash data image configuration differing from the current PLL configuration. The Flash data image configuration is loaded in the set of holding registers into the set of current configuration registers in response to the PLL module locking the Flash data image configuration.Type: ApplicationFiled: October 18, 2016Publication date: April 19, 2018Inventors: Gerald M. Grabowski, Daniel F. Moertl, Michael J. Palmer, Kelvin Wong
-
Publication number: 20180107539Abstract: A semiconductor memory device includes: a normal data storing region suitable for storing normal cell data and outputting N normal cell data to a first local data line in response to one of a plurality of column selection signals, and a parity storing region suitable for storing parity bits and outputting M parity bits to a second local data line in response to at least one of the plurality of the column selection signals, N and M being positive integers, wherein, when M is smaller than N, the parity storing region outputs the M parity bits in response to one of the plurality of the column selection signals, and when M is greater than N, the parity storing region outputs the M parity bits in response to at least two column selection signals that are enabled simultaneously among the plurality of the column selection signals.Type: ApplicationFiled: May 24, 2017Publication date: April 19, 2018Inventor: Hyung-Sik WON
-
Publication number: 20180107540Abstract: An operation method of a data storage apparatus includes performing a first read operation using an optimal read voltage on read-failed memory cells, performing ECC decoding operation on read data, performing a second read operation using an oversampling read voltage on the read-failed memory cells when the ECC decoding operation fails, determining whether potential error memory cells which are turned on through the optimal read voltage and are turned off through the oversampling read voltage are present in the read data, determining whether neighboring memory cells which share a bit line with the potential error memory cells and are coupled to neighboring word lines are in erased state when the potential error memory cells are present, and inverting bit values corresponding to the potential error memory cells in the read data from the read-failed memory cells through the first read operation when neighboring memory cells are in erased state.Type: ApplicationFiled: September 12, 2017Publication date: April 19, 2018Inventor: Jae Yoon LEE
-
Publication number: 20180107541Abstract: Error correction code (ECC) hardware includes write generation (Gen) ECC logic and a check ECC block coupled to an ECC output of a memory circuit with read Gen ECC logic coupled to an XOR circuit that outputs a syndrome signal to a syndrome decode block coupled to a single bit error correction block. A first MUX receives the write data is in series with an input to the write Gen ECC logic or a second MUX receives the read data from the memory circuit in series with an input of the read Gen ECC logic A cross-coupling connector couples the read data from the memory circuit to a second input of the first MUX or for coupling the write data to a second input of the second MUX. An ECC bit comparator compares an output of the write Gen ECC logic to the read Gen ECC logic output.Type: ApplicationFiled: December 15, 2017Publication date: April 19, 2018Inventors: Saket Jalan, Indu Prathapan, Abishek Ganapati Karkisaval
-
Publication number: 20180107542Abstract: A memory component internally generates and stores the check bits of error detect and correct code (EDC). In a first mode, during a read transaction, the check bits are sent to the memory controller along with the data on the data mask (DM) signal lines. In a second mode, an unmasked write transaction is defined where the check bits are sent to the memory component on the data mask signal lines. In a third mode, a masked write transaction is defined where at least a portion of the check bits are sent from the memory controller on the data signal lines coincident with an asserted data mask signal line. By sending the check bits along with the data, the EDC code can be used to detect and correct errors that occur between the memory component and the memory controller.Type: ApplicationFiled: October 26, 2017Publication date: April 19, 2018Inventors: Frederick A. Ware, Brent S. Haukness, Lawrence Lai
-
Publication number: 20180107543Abstract: A method begins by sending a set of read requests to a set of storage units of a dispersed storage network regarding a set of encoded data slices (EDSs). The method continues by receiving read responses from at least some storage units of the set of storage units, where at least one read response includes two EDSs. As read responses are being received and prior to receiving the read responses completely, the method continues by determining whether a decode threshold number of read responses have been received. When the threshold number of read responses have been received, the method continues by determining whether a first EDS position of each of the decode threshold number of read responses includes EDSs having different pillar numbers. When the read responses include the EDSs having different pillar numbers, the method continues by decoding the EDSs to recapture a data segment of a data object.Type: ApplicationFiled: December 15, 2017Publication date: April 19, 2018Inventors: Andrew D. Baptist, Greg R. Dhuse, Ravi V. Khadiwala, Jason K. Resch, Wesley B. Leggette, Trevor J. Vossberg, S. Christopher Gladwin
-
Publication number: 20180107544Abstract: A method for execution by an integrity processing unit includes detecting a storage error associated with storage of at least one encoded data slice in at least one memory of an associated storage unit of a set of storage units. Error parameters associated with the storage error are determined and a plurality of recovery alternatives to abate the storage error are identified based on the error parameters. A plurality of cost-benefit factors that correspond the plurality of recovery alternatives are determined. One of the plurality of recovery alternatives is selected based on the plurality of cost-benefit factors, and execution of the one of the plurality of recovery alternatives is facilitated to abate the storage error.Type: ApplicationFiled: December 15, 2017Publication date: April 19, 2018Inventor: Jason K. Resch
-
Publication number: 20180107545Abstract: A method includes maintaining, by a storage unit, a plurality of source name based addressing maps regarding encoding data slice storage by a plurality of storage units. The method further includes receiving, by the storage unit, an access request for an encoded data slice having a source name corresponding to a DSN address. The method further includes accessing, by the storage unit, the source name based address maps to determine whether the encoded data slice is effected by the DAP redistribution operation. The method further includes, when the encoded data slice is effected by the DAP redistribution operation, determining, by the storage unit, to execute the access request, proxy the access request, or deny the access request. The method further includes, when the determination is to execute the access request, executing, by the storage unit, the access request for the encoded data slice.Type: ApplicationFiled: December 15, 2017Publication date: April 19, 2018Inventors: Adam M. Gray, Greg R. Dhuse, Andrew D. Baptist, Ravi V. Khadiwala, Wesley B. Leggette, Scott M. Horan, Franco V. Borich, Bart R. Cilfone, Daniel J. Scholl
-
Publication number: 20180107546Abstract: The invention discloses a data storage system and managing method thereof. The data storage system according to the invention accesses or rebuilds data based on a plurality of primary logical storage devices and at least one spare logical storage device. The primary logical storage devices are planned into a plurality of data blocks in a first RAID architecture. The at least one spare logical storage device is planned into a plurality of spare blocks in a second RAID architecture. The data storage system according to the invention utilizes a plurality of virtual storage devices and several one-to-one and onto functions to distributedly map the data blocks and the spare blocks to a plurality of blocks in a plurality of physical storage devices.Type: ApplicationFiled: August 22, 2017Publication date: April 19, 2018Inventors: CHENG-YI HUANG, SHIN-PING LIN, YUN-MIN CHENG
-
Publication number: 20180107547Abstract: A method for execution by a resource allocation module includes facilitating migration of a first set of encoded data slices stored at a storage unit for decommissioning to a newly commissioned storage unit, and facilitating migration of a remaining set of encoded data slices stored at the storage unit for decommissioning as foster encoded data slices to at least one other storage unit. For each foster encoded data slice, it is determined whether to facilitate migration of the foster encoded data slice to the newly commissioned storage unit. When determining to facilitate the migration of the foster encoded data slice, the migration of the foster encoded data slice to the newly commissioned storage unit is facilitated. An association of the newly commissioned storage unit and identity of the foster encoded data slice is updated in response to detecting successful migration of the foster encoded data slice.Type: ApplicationFiled: December 14, 2017Publication date: April 19, 2018Inventors: Thomas F. Shirley, JR., Gary W. Grube, Bart R. Cilfone, Ravi V. Khadiwala, Greg R. Dhuse, Thomas D. Cocagne, Michael Colin Storm, Yogesh R. Vedpathak, Wesley B. Leggette, Jason K. Resch, Andrew D. Baptist, Ilya Volvovski
-
Publication number: 20180107548Abstract: A computing device includes an interface configured to interface and communicate with a dispersed storage network (DSN), a memory that stores operational instructions, and processing circuitry operably coupled to the interface and to the memory. The processing circuitry is configured to execute the operational instructions to perform various operations and functions. The computing device determine status of a set of memory devices of one or more sets of storage units (SUs) that distributedly store a set of encoded data slices (EDSs) within the DSN. The computing device detects one or more memory devices thereof that are failing and determines a number of available EDSs. When an insufficient number of EDSs are available, the computing device issues urgent read slice request(s) to recover additional available EDS(s) and facilitate temporary storage thereof within the DSN.Type: ApplicationFiled: December 14, 2017Publication date: April 19, 2018Inventors: Asimuddin Kazi, Jason K. Resch
-
Publication number: 20180107549Abstract: A method includes performing, by a storage unit, a rebuild scanning function to identify an encoded data slice in need of rebuilding. The method further includes identifying, by the storage unit, storage units in the set of storage units storing encoded data slices of the set of encoded data slices that are usable for rebuilding the encoded data slice in need of rebuilding. The method further includes selecting, by the storage unit, one of the identified storage units to rebuild the encoded data slice in need of rebuilding based on a selection protocol. The method further includes sending, by the storage unit, a rebuild command to the one of the identified storage units regarding rebuilding the encoded data slice in need of rebuilding, wherein, in accordance with a rebuilding function, the one of the identified storage units rebuilds the encoded data slice in need of rebuilding.Type: ApplicationFiled: December 14, 2017Publication date: April 19, 2018Inventor: Jason K. Resch
-
Publication number: 20180107550Abstract: A method for execution by a storage unit of a dispersed storage network includes updating a rebuilding task list based on detecting at least one storage error associated with storage of encoded data slices in a set of storage units that includes the storage unit. An encoded data slice is rebuilt based on the rebuilding task list and an affinity with the encoded data slice. The rebuilding task list is again updated based on detecting execution of at least one task of the rebuilding task list. The rebuilding task list is further updated based on detecting expiration of an execution time frame between sequential tasks of the rebuilding task list.Type: ApplicationFiled: December 15, 2017Publication date: April 19, 2018Inventors: Greg R. Dhuse, Ravi V. Khadiwala, Jason K. Resch, Ilya Volvovski, Wesley B. Leggette, Andrew D. Baptist
-
Publication number: 20180107551Abstract: A method for execution by a computing device includes determine whether to utilize a wide area network (WAN) to rebuild an encoded data slice for a memory associated with a storage unit to be located at a site of a plurality of sites. A subset of the plurality of sites associated with storage of a decode threshold number of slices associated with the encoded data slice is identified when it is determined to not utilize the WAN. The memory of the storage unit is temporarily co-located at each site of the subset, where partial slices for the encoded data slice are generated by other storage units at the sites utilizing locally stored encoded data slices, and where the storage unit performs a function on each partial slice and a previous representation of previously received partial slices to produce an updated representation of previously received partial slices.Type: ApplicationFiled: December 18, 2017Publication date: April 19, 2018Inventors: Thomas D. Cocagne, Jason K. Resch
-
Publication number: 20180107552Abstract: A first storage unit included in a first storage pool of a distributed storage network (DSN) receives a read-slice request associated with an encoded data slice. The first storage unit determines that the encoded data slice is unavailable, and that a migration process is active. The migration process includes migration of an encoded data slice between the first storage unit and a second storage unit included in a second storage pool. The first storage unit determines a status of a migration task associated with migration of the encoded data slice, and conditionally issues a proxy read-slice request from the present storage unit to the previous storage unit based, at least in part, on that status.Type: ApplicationFiled: December 19, 2017Publication date: April 19, 2018Inventors: Manish Motwani, Jason K. Resch, Andrew D. Baptist
-
Publication number: 20180107553Abstract: A method for execution by a computing device includes updating a storage error list in response to detecting a write slice failure. The storage error list is also updated in response to detecting a failure of a storage unit memory, wherein the storage unit memory is utilized to store a first at least one of a plurality of encoded data slices. A first range error message is issued in response to detecting loss of a local slice name list associated with storage of a second at least one of the plurality of encoded data slices. The storage error list is updated in response to receiving a second range error message. Rebuilding of a third at least one of the plurality of encoded data slices is facilitated based on interpreting the storage error list.Type: ApplicationFiled: December 19, 2017Publication date: April 19, 2018Inventors: Wesley B. Leggette, Jason K. Resch
-
Publication number: 20180107554Abstract: Methods for use in a dispersed storage network (DSN) to rebuild data. In various examples, at least one data segment of a data object is dispersed storage error encoded to produce a set of encoded data slices that includes an information dispersal algorithm (IDA) width number of encoded data slices, wherein the IDA width number is at least twice the number of storage units of a set of storage units utilized to store the data object. At least two encoded data slices are stored in each of the storage units. In response to detecting a storage error indicating an error slice, a partial threshold number of partial encoded data slices (generated by performing a partial encoding function on stored encoded data slices) are generated. The partial threshold number of partial encoded data slice responses are combined to produce a rebuilt encoded data slice corresponding to the error slice.Type: ApplicationFiled: December 19, 2017Publication date: April 19, 2018Inventors: Greg R. Dhuse, Trevor J. Vossberg, Jason K. Resch
-
Publication number: 20180107555Abstract: A method for execution by a managing unit of a dispersed storage network (DSN) includes facilitating capture of log information from a plurality of entities of the DSN for storage in a log vault of the DSN. An error condition with regards to at least one of the plurality of entities can be detected. Error correlation information that includes an identified at least one of the plurality of entities can be generated based on the error condition and the log information. A DSN configuration change can be facilitated based on the error correlation information.Type: ApplicationFiled: December 18, 2017Publication date: April 19, 2018Inventors: S. Christopher Gladwin, Bart R. Cilfone, Adam D. Eggum, Jason K. Resch
-
Publication number: 20180107556Abstract: Systems and methods for recovering a process in an application are disclosed. According to some aspects, a guest process is run within an application executing at a computing device. The guest process stores and processes untrusted content. An embedder process is run within the application and in parallel with the guest process. The embedder process stores and processes trusted content and a guest process state. The guest process state is periodically updated based on asynchronous communication between the guest process and the embedder process. The embedder process receives an indication of an execution failure of the guest process. The guest process is recovered after the execution failure based on the guest process state stored by the embedder process.Type: ApplicationFiled: August 28, 2017Publication date: April 19, 2018Inventor: Fady SAMUEL
-
Publication number: 20180107557Abstract: A computing problem management method, system, and non-transitory computer readable medium, include detecting an impending problem of a computing system, spawning a plurality of replicas when the detecting detects the impending problem, and launching a plurality of versions of an action, each version being launched and performed on a different replica of the plurality of replicas.Type: ApplicationFiled: December 7, 2017Publication date: April 19, 2018Inventors: Minkyong Kim, Min Li, Clifford A. Pickover, Valentina Salapura
-
Publication number: 20180107558Abstract: An information handling system and method provides basic input/output system (BIOS) recovery. At a baseboard management controller (BMC), a basic input/output system (BIOS) boot failure is detected. A non-volatile memory device a recovery image is obtained. The recovery image comprises instructions to perform a system software management (SSM) task. The instructions to perform the SSM task are executed. The execution comprises loading a BIOS image from a BMC persistent storage memory device, verifying the BIOS image, and writing the BIOS image to a BIOS non-volatile memory device. The system and method may utilize a recovery flash memory device attached to the BMC, a recovery flash memory device attached to a southbridge portion of a chipset, or a combination thereof to perform the BIOS recovery.Type: ApplicationFiled: December 7, 2017Publication date: April 19, 2018Inventors: Johan Rahardjo, Mukund P. Khatri
-
Publication number: 20180107559Abstract: A CPU monitoring device includes a memory that includes a plurality of memory areas arranged corresponding to a plurality of CPU cores; a monitoring unit that monitors whether processing performed in the plurality of CPU cores is operating normally, on the basis of an update state of data recorded in the plurality of memory areas; and a reset signal output unit that outputs a reset signal to the plurality of CPU cores when the monitoring unit has detected that the processing performed in the plurality of CPU cores is not operating normally, wherein idle processing is assigned to each of the plurality of CPU cores, the idle processing having the lowest processing priority in the CPU core and updating data recorded in a memory area arranged corresponding to the CPU core.Type: ApplicationFiled: December 11, 2017Publication date: April 19, 2018Applicant: OLYMPUS CORPORATIONInventor: Takashi MACHIDA
-
Publication number: 20180107560Abstract: Systems and methods provide custom synchronization procedures in file synchronization. A primary agent is used to monitor for changes, create synchronization plans to synchronized changes, and execute the synchronization plan. The primary agent, however, interacts with one or more separate custom agents to customize the synchronization plans. One exemplary technique involves monitoring for local changes to a first copy of a file tree and updates from another computing device regarding remote changes to a second copy of the file tree. When a change to either copy is identified, a synchronization plan for the change is created based on a default synchronization procedure. The synchronization plan is sent to a custom agent for customization. The custom agent creates the custom synchronization plan by modifying the synchronization plan and sends the custom synchronization plan to the primary agent. The custom synchronization plan is then executed by the primary agent.Type: ApplicationFiled: October 13, 2016Publication date: April 19, 2018Inventors: Neil MOORE, Adrian O'LENSKIE, Peter BROWN
-
Publication number: 20180107561Abstract: A method for backing a computing system includes generating a local history table of filesystem objects that have changed since storing a first backup of the computing system where the local history table includes attributes of the filesystem objects and a set of operations associated with changes to the filesystem objects. The method further includes transferring, from the computing system to a backup server, a second backup of the computing system, where the second backup includes a block level representation of a portion of a data storage medium associated with the computing system. The method additionally includes merging the local history table with a global history table stored on the backup server, the global history table mapping a history of filesystem objects to a set of block level backups of the computing system including the first backup of the computing system and the second backup of the computing system.Type: ApplicationFiled: October 19, 2016Publication date: April 19, 2018Inventors: Stefan Bender, Mauro Cruciani, Michael Loehr, Christian Mueller, Sabine U. Steinhauer
-
Publication number: 20180107562Abstract: Embodiments for selecting log snapshots for export in an automated data storage library by a processor. One or more log snapshots of an automated data storage library of an event displayed on a user interface of a device may be selected for exporting according to user defined criteria such that the one or more snapshots relate to the event or trigger, wherein the user interface provides an events table for searching and locating the event.Type: ApplicationFiled: October 19, 2016Publication date: April 19, 2018Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Brian G. GOODMAN, Leonard G. JESIONOWSKI, Jose G. MIRANDA GAVILLAN, Kenny N.G. QIU
-
Publication number: 20180107563Abstract: A method for accessing filesystem objects on a backup server storing block level backups, includes: receiving a request to access a filesystem object stored in the block level backups, the request including a pattern of characters identifying the filesystem object in a global history table mapping a history of filesystem objects to the block level backups; identifying, based on the pattern of characters, an object identifier in the global history table corresponding to the filesystem object; identifying, based on the object identifier, a set of one or more block level backups of the computing system having a copy of the filesystem object; selecting a block level backup from the set of one or more block level backups; mounting the selected block level backup to access a backed-up file system of the computing system; and retrieving, from the backed-up filesystem, the filesystem object.Type: ApplicationFiled: October 19, 2016Publication date: April 19, 2018Inventors: Stefan Bender, Mauro Cruciani, Michael Loehr, Christian Mueller, Sabine U. Steinhauer
-
Publication number: 20180107564Abstract: Techniques are disclosed herein for a cloud computing system for backing up a device. The system includes a scheduling manager to schedule a back-up for the device to occur at a time based on a time zone in which the device is located and based on workday customs local to the device. The system also includes a data store for storing identification of the time zone and the workday customs.Type: ApplicationFiled: October 19, 2016Publication date: April 19, 2018Inventors: Shaun Henry, Scott C. Clouthier, Olga Smirin
-
Publication number: 20180107565Abstract: A variable checkpoint mechanism in a streams manager checkpoints a streaming application based on periodic time periods for checkpoints. The variable checkpoint mechanism can take a checkpoint before a periodic time period ends when a spike is coming, or can take a checkpoint after the periodic time period ends when there is backpressure in a consistent region of the streaming application. When there is no anticipated spike coming and when there is no backpressure in a consistent region of the streaming application, the checkpoint is performed at the normal end of the periodic time period for checkpoints. In this manner the checkpoint timing of the variable checkpoint mechanism can be adjusted real-time to minimize the negative impact of checkpointing on the performance of the streaming application.Type: ApplicationFiled: May 17, 2017Publication date: April 19, 2018Inventors: Alexander Cook, Manuel Orozco, Christopher R. Sabotta, John M. Santosuosso
-
Publication number: 20180107566Abstract: Provided are a computer program product, system, and method for generating a health condition message on a health condition detected at a first server to send to a host system accessing the first server. A determination is made of a health condition with respect to access to a first storage. A determination is made of an estimated Input/Output (I/O) delay to access the first storage resulting from the determined health condition. A health condition message is generated indicating the estimated I/O delay. The health condition message is transmitted to the host system, wherein the host system uses the estimated I/O delay to determine whether to perform a swap operation to redirect host I/O requests to data from the first server to a second server.Type: ApplicationFiled: October 13, 2016Publication date: April 19, 2018Inventors: Clint A. Hardy, Matthew J. Kalos
-
Publication number: 20180107567Abstract: A method for execution by a dispersed storage network (DSN), the method begins by determining a failure rate of storage units of an active storage unit pool, establishing a number of standby storage units based on the determined failure rate, identifying an associated DSN address range of the failed storage unit, selecting an available standby storage unit, facilitating populating the selected available standby storage unit with data slices associated with the failed storage unit, utilizing the selected available standby storage unit, facilitating population of a replacement storage unit with the data slices from the selected available standby storage unit and facilitating processing of further receive data access requests for data associated with the associated DSN address range by utilizing the replacement storage unit.Type: ApplicationFiled: December 18, 2017Publication date: April 19, 2018Inventors: Teague S. Algie, Jason K. Resch
-
Publication number: 20180107568Abstract: An unrecoverable error is determined when attempting to access data stored in a target memory unit of a storage medium of a data storage device. Access to neighboring memory units that are proximate to the target memory unit is controlled in response. The controlling of the access affects a temperature of the target memory unit over a period of time. After the period of time, access to the data is attempted from the target memory unit.Type: ApplicationFiled: October 17, 2017Publication date: April 19, 2018Inventors: Jay Allen Sheldon, Ryan James Goss
-
Publication number: 20180107569Abstract: A method includes migrating a workload from a first server to a second server, wherein the first and second servers are within a management network. The method further includes transferring one or more configuration parameter(s) from the first server to the second server, wherein the one or more parameter(s) enables continued performance of the workload on the second server.Type: ApplicationFiled: October 18, 2016Publication date: April 19, 2018Inventors: Fred A. Bower, III, Caihong Zhang
-
Publication number: 20180107570Abstract: Provided are a computer program product, system, and method for processing a health condition message on a health condition to determine whether to perform a swap operation. A health condition message is received from a first server indicating an estimated Input/Output (I/O) delay to access a first storage resulting from a health condition experienced at the first server. A determination is made as to whether the estimated I/O delay exceeds a threshold response time for the first storage. A swap operation is performed to redirect I/O requests to data from the first server to the second server to access the data at the second storage in response to determining that the estimated I/O delay exceeds the threshold response time.Type: ApplicationFiled: October 13, 2016Publication date: April 19, 2018Inventors: Clint A. Hardy, Matthew J. Kalos