Patents Issued in January 17, 2019
-
Publication number: 20190018711Abstract: In various exemplary embodiments, a system, article of manufacture, and method for providing, a cloud computing infrastructure on a system infrastructure comprising, a first virtual computing environment associated with a first class of service, the first class of service defining, in one embodiment, a first set of obligations, restrictions, and/or capabilities; providing, in the same cloud, a second virtual computing environment associated with a second class of service, the second class of service defining a second set of obligations, restrictions, and/or capabilities different from those of the first class of service; and executing the first virtual computing environment according to the first class of service and the second virtual computing environment according to the second class of service, the first virtual computing environment having a different access to the hardware platform than the second virtual environment based on the respective class of service.Type: ApplicationFiled: April 24, 2018Publication date: January 17, 2019Inventor: Jean-Christophe Martin
-
Publication number: 20190018712Abstract: Embodiments of the present disclosure relate to managing volatile and non-volatile memory. A set of volatile memory sensor data may be obtained. A set of non-volatile memory sensor data may be obtained. The set of volatile memory sensor data and the set of non-volatile memory sensor data may be analyzed. A memory condition may be determined to exist based on the analysis. In response to determining that the memory condition exists, one or more memory actions may be issued.Type: ApplicationFiled: July 14, 2017Publication date: January 17, 2019Inventors: Briana E. Foxworth, Saravanan Sethuraman, Kevin M. Mcilvain, Lucas W. Mulkey, Adam J. McPadden
-
Publication number: 20190018713Abstract: Embodiments of the present disclosure relate to managing volatile and non-volatile memory. A set of volatile memory sensor data may be obtained. A set of non-volatile memory sensor data may be obtained. The set of volatile memory sensor data and the set of non-volatile memory sensor data may be analyzed. A memory condition may be determined to exist based on the analysis. In response to determining that the memory condition exists, one or more memory actions may be issued.Type: ApplicationFiled: August 30, 2017Publication date: January 17, 2019Inventors: Briana E. Foxworth, Saravanan Sethuraman, Kevin M. Mcilvain, Lucas W. Mulkey, Adam J. McPadden
-
Publication number: 20190018714Abstract: In a method of contention management in the distributed index and query system, one or more index processing threads of an index thread pool in a distributed computing environment is used to index documents buffered into a work queue buffer after being received via a network connection. Simultaneous to the indexing, one or more query processing threads of a query thread pool to is utilized to process received queries of indexed documents. A sum of the index processing threads and the query processing threads is a plurality of processing threads. Responsive to the work queue buffer reaching a predefined fullness, the work queue buffer is emptied into an allotted storage space in a data storage device. The number of index processing threads is set in a linear relationship to a ratio of a utilized amount of the allotted storage space to a total amount of the allotted storage space.Type: ApplicationFiled: July 11, 2017Publication date: January 17, 2019Inventor: Christopher TODD
-
Publication number: 20190018715Abstract: Event-driven processing is facilitated by a unikernel-based method which includes receiving, based on an event, a code execution request containing parameter values for an application code unikernel. The application code unikernel includes uploaded application code in a single-purpose virtual machine image. Based on receiving the code execution request, the application code unikernel is run, which includes providing the parameter values as bootvariables as part of booting the program code unikernel. Further, running the application code unikernel may include executing the application code unikernel directly on a hypervisor. The application code unikernel may include only operating system components required to run the uploaded application code.Type: ApplicationFiled: July 13, 2017Publication date: January 17, 2019Inventors: Michael BEHRENDT, Daniel FEDERSCHMIDT, Dominik FROEHLICH, Andreas NAUERZ
-
Publication number: 20190018716Abstract: A host computer and method for multicasting data between networking interfaces of hypervisors in a distributed computer system uses a Virtual Extensible LAN Network Identifier (VNI) assigned to a multicast group and an identifier of a VXLAN Tunnel End Point (VTEP) of the host computer associated to the VNI so that data being multicast for the multicast group can be routed to the networking interfaces via VTEPs associated with the VNI.Type: ApplicationFiled: July 17, 2017Publication date: January 17, 2019Applicant: Nicira, Inc.Inventors: Fei Guo, Yonggang Wang, Keyong Sun, Dousheng Zhao, Lele Zhang
-
Publication number: 20190018717Abstract: Systems and methods for normalizing cloud resource interactions across disparate objects and actions provided by a plurality of different cloud services. The methods comprise: obtaining information that identifies the objects and indicates what actions can be performed for the objects; processing the information to consolidate at least two of the actions supported by different ones of the objects into a single action; causing a unified view to be presented in a User Interface (“UI”) that allows an initiation of the single action whereby the at least two actions supported by different ones of the objects are concurrently selected; receiving a standardized command for initiating the single action; transforming a first protocol format of the standardized command into a second different protocol format to generate at least one non-standardized command; and using the non-standardized command to cause performance of the at least two actions by said different ones of the objects.Type: ApplicationFiled: July 14, 2017Publication date: January 17, 2019Inventors: Ricardo F. Feijoo, Thomas Kludy
-
Publication number: 20190018718Abstract: A message broker configured to handle messages received from a plurality of client applications comprises a plurality of message queues that are each associated with a different task. A first synchronous message is received at a first message queue from a first client application. A determination is made that at a time the first synchronous message is received there is an earlier-received message from a different client application waiting in the first message queue. In response to the determination, the first synchronous message is coalesced with the earlier-received message such that a task associated with the first message queue is executed only once for both messages and a notice of the execution is returned to the first client application.Type: ApplicationFiled: July 13, 2017Publication date: January 17, 2019Inventors: William F. Phillips, Victor M. Lourenco, Patrick J. Clas
-
Publication number: 20190018719Abstract: Systems and methods may provide network-based application functionality to a remote mobile computing device. A method includes establishing, in response to a request, a remote session connection with the remote mobile computing device via an application container client at the remote mobile computing device, and accessing a virtual application process, based on a particular configuration of the remote mobile computing device, for a mobile application. The method also includes transmitting to the remote mobile computing device, via the remote session connection, content for presenting an interface of the mobile application according to the virtual application process, the content being configured for rendering by the application container client at the remote mobile computing device to simulate an interface associated with the mobile application according to the particular configuration of the remote mobile computing device, wherein the mobile application is not stored on the remote mobile computing device.Type: ApplicationFiled: July 13, 2017Publication date: January 17, 2019Inventor: Max Brin
-
Publication number: 20190018720Abstract: An apparatus and a method are disclosed herein for improving predictive and preventive analytics, event tracking and processing of large combinations of data. In one embodiment, a method comprising, receiving a first data set, the first data set including data from a plurality of sources; applying a first rule set to the first subset; responsive to detecting an emergency as a result of the application of the first rule set, generating an emergency notification; generating an intuition by (a) applying a second rule set to a second subset of the first data set, the second rule set selected from one or more rule sets based on the emergency notification, and (b) selecting a course of action based on a result of the application of the second predefined rule set; and providing the course of action to a user is disclosed.Type: ApplicationFiled: September 7, 2018Publication date: January 17, 2019Inventors: Rabindra Chakraborty, Jay Kalra, Anupam Awasthi, Amol Awasthi
-
Publication number: 20190018721Abstract: Systems and methods for executing a quantum computation comprising a plurality gates on a quantum information processor are provided. An initial quantum-logic gate sequence comprising the plurality of gates is received. Then, for each instance in a plurality of instances, a procedure is performed. In each instance of the procedure a respective modified quantum-logic gate sequence is generated by applying a virtual random gate to a first single-qubit gate in the plurality of gates. The respective modified quantum-logic gate sequence is then executed on the quantum device to obtain a respective outcome. The respective outcome across the plurality of instances of the procedure is averaged to obtain a noise-tailored outcome for the initial quantum-logic gate sequence.Type: ApplicationFiled: July 3, 2018Publication date: January 17, 2019Inventors: Joel J. Wallman, Joseph Emerson
-
Publication number: 20190018722Abstract: A system, device, and method of deviation detection in at least one sensor dataset associated with one or more sensors in a technical system are provided. The method includes generating a best fit model of the technical system based on a target sensor dataset. The method also includes predicting a sensor dataset of the target sensor using the best fit model and non-target sensor datasets of non-target sensors, and determining a deviation tolerance by determining a difference between the predicted sensor dataset and the target sensor dataset. The method also includes detecting deviation in actual sensor dataset of the target sensor when a data-point in the actual sensor dataset exceeds the deviation tolerance and detecting deviation in the at least one sensor dataset of the one or more sensors by detecting deviation in each of the non-target sensor datasets.Type: ApplicationFiled: July 12, 2017Publication date: January 17, 2019Inventors: Vinay Ramanath, Asmi Rizvi Khaleeli, Gaurav Hegde
-
Publication number: 20190018723Abstract: In some examples, host IDs associated with the respective source component and a result of a partial calculation of an aggregate metric score may be received from each of a plurality of source components associated with a host of an information technology (IT) system. The partial calculation based on individual metric scores may be associated with the respective source component. The aggregate metric score may be calculated using the partial calculations and the host IDs, the aggregate metric score associated with metric measurements of the source components.Type: ApplicationFiled: July 11, 2017Publication date: January 17, 2019Inventors: Ron Maurer, Marina Lyan, Nurit Peres, Fernando Vizer, Pavel Danichev, Shahar Tel
-
Publication number: 20190018724Abstract: Disclosed are data gathering and analysis systems, methods, and computer-readable storage media to facilitate an investigation process. The method includes accessing a data object representing an investigative issue as part of initiating an investigative session. The method further includes causing presentation, on a display of a device, of a user interface configured to receive user search queries and present search results for each received search query. The method further includes tracking user activity including one or more user actions performed during the investigative session. The method further includes creating a record of the user activity, and linking the record of the user activity with the data object representing the investigative issue.Type: ApplicationFiled: September 19, 2018Publication date: January 17, 2019Inventors: David Skiff, Allen Cai, Benjamin Lee, Christopher Yu, Hind Kraytem, Jason Ma, Myles Scolnick, Tarik Benabdallah, Zhixian Shen
-
Publication number: 20190018725Abstract: A method begins with a processing module querying distributed storage network (DSN) storage units regarding storage errors associated with a data segment. The method continues with the processing module receiving query responses and depending on the responses, assigning a first threshold priority or a second threshold priority to encoded data slices (EDSs) associated with the data segment. The method proceeds with the processing module, depending on the assigned threshold priority, issuing read slice requests and rebuilding EDS associated with the data segment.Type: ApplicationFiled: September 19, 2018Publication date: January 17, 2019Inventors: S. Christopher Gladwin, Asimuddin Kazi
-
Publication number: 20190018726Abstract: In an approach to cleanup of unpredictable test results, one or more computer processors generate a data area associated with a first test instruction in a test stream. The one or more computer processors determine whether the generated data area overlaps with an unpredictable data area. In response to determining the generated data area overlaps with an unpredictable data area, the one or more computer processors determine a second test instruction associated with the overlapped unpredictable data area, where the second test instruction precedes the first test instruction in the test stream. The one or more computer processors select a location in the test stream between the first test instruction and the second test instruction. The one or more computer processors insert one or more pre-requisite instructions in the selected location, where the one or more pre-requisite instructions load the overlapped unpredictable data area with pre-defined data.Type: ApplicationFiled: July 14, 2017Publication date: January 17, 2019Inventor: Louis P. Gomes
-
Publication number: 20190018727Abstract: A storage system periodically replicates data to another storage system for data backup and protection. The storage system is configured to detect an irregularity potentially causing a fault in the storage system. Such a detected irregularity may a component failure in a storage device, a temperature change in a storage device, etc. In response to the detected irregularity, the storage system increases a replication rate of data to the backup storage system.Type: ApplicationFiled: July 17, 2017Publication date: January 17, 2019Inventors: Stephen S. Huh, Ian Davies, Douglas William Dewey
-
Publication number: 20190018728Abstract: In an approach to cleanup of unpredictable test results, one or more computer processors generate a data area associated with a first test instruction in a test stream. The one or more computer processors determine whether the generated data area overlaps with an unpredictable data area. In response to determining the generated data area overlaps with an unpredictable data area, the one or more computer processors determine a second test instruction associated with the overlapped unpredictable data area, where the second test instruction precedes the first test instruction in the test stream. The one or more computer processors select a location in the test stream between the first test instruction and the second test instruction. The one or more computer processors insert one or more pre-requisite instructions in the selected location, where the one or more pre-requisite instructions load the overlapped unpredictable data area with pre-defined data.Type: ApplicationFiled: November 3, 2017Publication date: January 17, 2019Inventor: Louis P. Gomes
-
Publication number: 20190018729Abstract: Examples described herein generally relate to device analytics. Specifically, the present disclosure provides telemetry-based analytics to identify and remediate top end-user impacting issues. For example, a device may detect an anomaly associated with an application program at the computing device based on a detection parameter. Further, the device may automatically identify at least one remediation action associated with the detected anomaly. The device may also determine whether application of the at least one remediation action to the detected anomaly satisfies a remediation threshold. Additionally, the device may transmit the at least one remediation action to the computing device in accordance with a determination that the application of the at least one remediation action to the detected anomaly satisfies the remediation threshold.Type: ApplicationFiled: March 8, 2018Publication date: January 17, 2019Inventors: Marc SHEPARD, Marc-Andrea KLIMASCHEWSKI, Chen LIANG, Ramasubramanian SHASTRI, Hung M. DANG, Bryston M. NITTA, Oana S. NICA
-
Publication number: 20190018730Abstract: A point cloud filter method and apparatus is provided for use in point cloud rendering from real-time point cloud data collection from a variety of sensor types is provided that delivers enhanced performance including reducing processing requirements, limiting local memory consumption and optimizing overall data visualization.Type: ApplicationFiled: May 24, 2018Publication date: January 17, 2019Applicant: Topcon Positioning Systems, Inc.Inventors: Ivan CHARAMISINAU, Michael BURENKOV, Dmitry DATKO
-
Publication number: 20190018731Abstract: A method of detecting faults in a register bank is disclosed. The register bank includes at least one chain of registers. The method comprises sequentially shifting parameters stored in each register of the chain to an output node of the chain and inverting each parameter and feeding each parameter back to an input node of that chain, and sequentially shifting the inverted parameters through the chain until all the non-inverted parameters have been output at the output node. A first checksum of the parameters output at the output node is calculated. The inverted parameters in each register of the chain are sequentially shifted to the output node of the chain. A second checksum of the inverted parameters output at the output node is calculated, and the first and second checksums are compared.Type: ApplicationFiled: June 20, 2018Publication date: January 17, 2019Inventor: Jan-Peter SCHAT
-
Publication number: 20190018732Abstract: Apparatuses and methods for parity generations in error-correcting code (ECC) memory to reduce chip areas and test time in imaging system are disclosed herein. Memory tests are needed to catch hard failures and soft errors. Random and nondestructive errors are soft errors and are undesirable. Soft errors can be detected and corrected by the disclosed ECC which is based on Hamming code. Before data are written into memory, the first parity generator based on the disclosed ECC generates the first parity by calculating the data. The first parity and data are stored into the ECC memory as a composite word. When the previously stored word is fetched from the ECC memory, the second parity generator based on the disclosed ECC is used to generate the second parity. A comparison between the first and second parity leads to a disclosed error mask, which is used to correct a single bit error if the error only happens to a single bit of the fetched data.Type: ApplicationFiled: July 13, 2017Publication date: January 17, 2019Inventors: Hoon Ryu, Jong-Sik Na, TaeHyung Jung
-
Publication number: 20190018733Abstract: A memory device includes a memory array that includes a buffer data. The memory device also includes a memory controller. The memory controller includes an error correction code (ECC) component. The memory controller further receives a status command and an indication related to the quality of the data to analyze with the ECC component. Based on a status value, the memory controller utilizes one of a plurality of error correction techniques via the ECC component to correct an error (e.g., soft state, calibration, etc.).Type: ApplicationFiled: August 20, 2018Publication date: January 17, 2019Inventors: Violante Moschiano, Walter Di Francesco, Luca De Santis, Giovanni Santin
-
Publication number: 20190018734Abstract: Technology is provided for updating a data set at a data storage system. In an example storage system, the system stores a data set in a plurality of data storage devices. The system stores parity data at a plurality of parity devices. The system receives update data from a client system for a first section of the data set. The system generates updated parity data based on an original version of the first section of the data set and the update data. The system transmits update parity data to the plurality of parity devices. The system receives update notifications from a plurality of parity devices. The system determines that update notifications have been received from at least a threshold number of parity devices in the plurality of parity devices. In response, the system updates the first section of the data set at the leader data storage device.Type: ApplicationFiled: July 11, 2017Publication date: January 17, 2019Inventors: Arman Fazeli Chaghooshi, Lluis Pamies-Juarez, Cyril Guyot, Robert Eugeniu Mateescu
-
Publication number: 20190018735Abstract: In one embodiment, error detection and correction is performed in a content-addressable memory using single-bit position lookup operations. A lookup operation is performed generating a resultant match vector reflective of matching a single-bit position within each of multiple content-addressable memory entries against a corresponding bit value at the single-bit position within a lookup word. The resultant match vector is processed to determine if there are any errors and typically which entries contain a wrong bit value. The correct match vector (e.g., having no errors) is determined from the correct stored matching values (e.g., those used to program the content-addressable memory entries) and the value at the single-bit position within the lookup word. One embodiment compares the correct and resultant match vectors, while one embodiment performs this comparison using an error-correcting code of the correct match vector.Type: ApplicationFiled: July 17, 2017Publication date: January 17, 2019Applicant: Cisco Technology, Inc.Inventors: Doron Shoham, Ilan Lisha
-
Publication number: 20190018736Abstract: A control circuit configured to associate a plurality of memory with an error correction scheme. The control circuit including an internal operation circuit configured to generate an internal command based on an access unit of the plurality of memory. The control circuit including a storage circuit configured to store information on the access unit of the plurality of memory.Type: ApplicationFiled: September 19, 2018Publication date: January 17, 2019Applicant: SK hynix Inc.Inventor: Won Ha CHOI
-
Publication number: 20190018737Abstract: A memory device includes an output pin, a mode register, a signal generator configured to generate a detection clock output signal including one of a random data pattern and a hold data pattern in response to first and second control signals from the mode register, and output the detection clock output signal through the output pin. The random data pattern includes pseudo-random data generated by the memory device. The hold data pattern is a fixed pattern pre stored in the memory device. The detection clock output signal is used for a clock and data recovery operation.Type: ApplicationFiled: March 28, 2018Publication date: January 17, 2019Inventors: YONG-HUN KIM, SU-YEON DOO, DONG-SEOK KANG, HYE-JUNG KWON, YOUNG-JU KIM
-
Publication number: 20190018738Abstract: A method for performing replication control in a storage system and an associated apparatus are provided.Type: ApplicationFiled: July 11, 2017Publication date: January 17, 2019Inventor: Hui-Wen Chen
-
Publication number: 20190018739Abstract: This disclosure includes a battery, an electricity input part for receiving electricity supplied from an external device, a charging controller for charging the battery with the electricity having been supplied via the electricity input part, and a controller for controlling execution of automatic backup. When the electricity input part is connected to the external device and there is data to be subjected to the automatic backup, until the automatic backup is completed, the controller compares a remaining capacity of the battery with a threshold, and executes the automatic backup when the remaining capacity is higher than the threshold. The controller is configured not to execute the automatic backup when the remaining capacity is equal to or lower than the threshold.Type: ApplicationFiled: June 4, 2018Publication date: January 17, 2019Inventor: Shingo HASHIMOTO
-
Publication number: 20190018740Abstract: A savepoint is initiated in an in-memory database system that is associated with a plurality of modified pages and comprises a pre-critical phase, a critical phase, and a post-critical phase. Thereafter, as part of the critical phase, a physical page number is assigned to each page in the critical phase. Further, as part of the critical phase, each page assigned a physical page number is individually locked. Subsequently, each page is handed over from a corresponding first thread to a corresponding second thread to copy such page into a corresponding shadow page as part of the post-critical phase.Type: ApplicationFiled: July 11, 2017Publication date: January 17, 2019Inventors: Dirk Thomsen, Werner Thesing
-
Publication number: 20190018741Abstract: A method for execution by one or more processing modules of one or more computing devices of a dispersed storage network (DSN), the method begins by generating a dispersed storage (DS) unit access request based on a DSN address, identifying a target DS unit based on the DSN address, outputting the DS unit access request to the target DS unit, identifying a DSN address range associated with the target DS unit in accordance with a storage map when receiving an access response addressing error. The method continues by issuing a range owner request to the target DS unit that includes the identified DSN address range associated with the target DS unit and updating the storage map based on received range owner response.Type: ApplicationFiled: September 20, 2018Publication date: January 17, 2019Inventors: Manish Motwani, Jason K. Resch, Wesley B. Leggette, Michael C. Storm
-
Publication number: 20190018742Abstract: Recovery of a database system by taking the database system offline is initiated. Thereafter, recovery operations specified by a redo log of the database system are replayed. A cleanup log is generated that identifies cleanup operations occurring during the replay of the recovery operations for garbage collection. Concurrent with the startup of the database, garbage collection of the cleanup operations as specified in the database savepoint is initiated. In addition, concurrent with the replay of the recovery operations, garbage collection of the cleanup operations specified by the cleanup log is initiated. The amount of parallelization of the garbage collection can be varied based on utilized processor resources. The database system is later brought online after all of the recovery operations are replayed.Type: ApplicationFiled: July 11, 2017Publication date: January 17, 2019Inventors: Dirk Thomsen, Christoph Roterring, Thorsten Glebe
-
Publication number: 20190018743Abstract: Each information processing apparatus judges a busy flag of a first port thereof based on a result of comparison of a busy level of the first port and a busy level of a second port of another information processing apparatus. A monitoring apparatus determines from among the information processing apparatuses, a first information processing apparatus and a second information processing apparatus, based on the results of judgment by the information processing apparatuses. An L2 switch changes to the second information processing apparatus, a destination of a frame whose destination is the first information processing apparatus and changes to the first information processing apparatus, a transmission source of the frame whose transmission source is the second information processing apparatus.Type: ApplicationFiled: July 10, 2018Publication date: January 17, 2019Applicant: FUJITSU LIMITEDInventors: Masanori Takaoaka, Naoyoshi Toshine, Yuya Ikuta, Junichi Murakami, Hideki Nagatomo, Sei Murata, Akihide Otawa
-
Publication number: 20190018744Abstract: In a multi-core computer system, a method for dealing with a fault with a core includes detecting a fault in one of the cores. Information is transferred from a recovery buffer to a mapper. The information includes logical register mapping information. A recovery is performed using the information in the mapper. If a recovery cannot proceed, a sparing can be initiated using the information in the mapper.Type: ApplicationFiled: July 13, 2017Publication date: January 17, 2019Inventors: GREGORY W. ALEXANDER, BRIAN D. BARRICK, SHIMON BEN-YEHUDA, OPHIR EREZ, ANTHONY SAPORITO, TIMOTHY J. SLEGEL
-
Publication number: 20190018745Abstract: If a storage device B that is a target of rebuild processing is an SSD, in the rebuild processing, a RAID controller copies system data of the image forming apparatus to the storage device B after copying to the storage device B data other than the system data out of data stored in a storage device A. Accordingly, it is possible to copy the system data from the storage device A to the storage device B after the temperature of the flash memory in the storage device B (SSD) has increased.Type: ApplicationFiled: July 9, 2018Publication date: January 17, 2019Inventors: Takehiro Ito, Takeru Imamura, Kohei Asano
-
Publication number: 20190018746Abstract: A method of transferring memory from an active to a standby memory in an FT Server system. The method includes the steps of: reserving a portion of memory using BIOS; loading and initializing an FT Kernel Mode Driver; loading and initializing an FT Virtual Machine Manager (FTVMM) including the Second Level Address Translation table SLAT into the reserved memory. In another embodiment, the method includes tracking memory accesses using the FTVMM's SLAT in Reserved Memory and tracking “L2” Guest memory accesses by tracking the current Guest's SLAT and intercepting the Hypervisor's writes to the SLAT. In yet another embodiment, the method includes entering Brownout by collecting the D-Bits; invalidating the processor's cached SLAT translation entries, and copying the dirtied pages from the active memory to memory in the second Subsystem. In one embodiment, the method includes entering Blackout and moving the final dirty pages from active to the mirror memory.Type: ApplicationFiled: July 11, 2017Publication date: January 17, 2019Applicant: Stratus Technologies Bermuda Ltd.Inventors: Steven Michael Haid, John Rogers MacLeod
-
Publication number: 20190018747Abstract: An apparatus and method performing debug and rollback operations using snapshots. For example, one embodiment of an apparatus comprises: a graphics processing unit (GPU) to perform graphics processing operations by executing graphics commands; a command parser to parse graphics commands submitted to the GPU and generate a list of graphics memory pages which will be affected by the graphics commands; an I/O state tracker to track I/O accesses from a graphics driver to determine a list of registers affected by the I/O accesses; shapshot circuitry and/or logic to perform a memory snapshot and I/O snapshot based on the list of graphics memory pages and the list of registers, respectively; and rollback circuitry and/or logic to perform a rollback operation using the memory snapshot and I/O snapshot in response to detecting a GPU error condition.Type: ApplicationFiled: April 1, 2016Publication date: January 17, 2019Inventors: Yao Zu DONG, Kun TIAN
-
Publication number: 20190018748Abstract: Example implementations relate to determining a functional state of a system under test. For example, a system to determine a functional state of a system under test may include a system controller to execute a functional test of the system under test by invoking a subset of a plurality of functional agents to interact with the system under test. Further, the system may include an agent repository to interact with the system controller and store the plurality of functional agents. Also, the system may include a state module to determine a functional state for the system under test by querying each of the subset of functional agents and comparing aggregated results from the subset of functional agents against defined for the system under test.Type: ApplicationFiled: January 13, 2016Publication date: January 17, 2019Inventors: Inbar Shani, Eli Mordechai, Jonathan Taragin, Iris Sasson
-
Publication number: 20190018749Abstract: Provided is a data processing apparatus including a guide-word extraction unit that extracts, based on a name of a first node that is a node included in a social system model, at least one guide-word corresponding to the first node from a guide-word storage that stores correspondence between a name of a node and a guide-word; a guide-word selection unit that accepts selection input for at least one extracted guide-word; a performance indicator extraction unit that extracts, from a performance indicator storage that stores correspondence between a guide-word and at least one performance indicator regarding an information communication system, at least one performance indicator corresponding to a selected guide-word; a performance indicator selection unit that accepts selection input for at least one extracted performance indicator; and a model update unit that associates, as a second node, a selected performance indicator with the first node.Type: ApplicationFiled: August 22, 2016Publication date: January 17, 2019Applicant: NEC CorporationInventors: Fumio MACHIDA, Seiichi KOIZUMI, Masaya FUJIWAKA, Daichi KIMURA
-
Publication number: 20190018750Abstract: Aspects of the disclosure relate to providing type safe secure logging. A computing platform may receive application code comprising one or more calls to one or more logging methods. Subsequently, the computing platform may compile the application code comprising the one or more calls to the one or more logging methods to produce a compiled software application. During the compiling of the application code comprising the one or more calls to the one or more logging methods, the computing platform may enforce one or more type-based secure logging rules on the application code comprising the one or more calls to the one or more logging methods. Thereafter, the computing platform may store the compiled software application. In some embodiments, enforcing the one or more type-based secure logging rules may include allowing logging of one or more predetermined classes of objects.Type: ApplicationFiled: July 14, 2017Publication date: January 17, 2019Inventors: Thomas M. Kludy, Thomas Hammond
-
Publication number: 20190018751Abstract: A digital asset tracking system comprises one or more Client Machine (CM) being installed with an Agent; wherein the Agent determines digital asset to be armed and selects arming method to arm the to-be-armed digital asset; an Asset Management Platform (AMP) managed by a System Administrator; wherein the AMP allows the System Administrator to make informed decisions on which assets are to be armed for monitoring; and a Callback Server being installed in a server, hosted either by cloud service provider or in an enterprise network on an internet facing interface; wherein the Callback Server listens-in and logs all communications received from armed assets; and when an armed asset is being opened and viewed, the arming on the armed asset triggers a communication back to the Callback Server that logs all communications received. A digital asset tracking method is also provided.Type: ApplicationFiled: July 10, 2018Publication date: January 17, 2019Inventor: Amir DAVIDI
-
Publication number: 20190018752Abstract: Remotely debugging a non-responsive operating system (OS) of a computer system. Central processing units (CPUs) in a computer system are bound to receive queues of a network adapter. Interrupts for a CPU is disabled, wherein the CPU is not available to process hardware interrupt requests queued in the bound receive queues. A debugging message including debugging commands is received by the network adapter, wherein the debugging message is stored in a first receive queue of the network adapter bound to a first CPU. If the first CPU is available, the debugging commands in the debugging message stored in the first of the one or more receive queues of the network adapter are identified by a debugger of the computer system. The identified debugging commands are executed by the CPU to debug the non-responsive OS of the computer system.Type: ApplicationFiled: September 17, 2018Publication date: January 17, 2019Inventors: Gregory Etelson, Constantine Gavrilov, Alexander Snast
-
Publication number: 20190018753Abstract: According to an aspect of an embodiment, a method may include executing multiple tests with respect to code under test of a software program to perform multiple test executions. The method may further include identifying one or more passing tests and one or more failing tests of the test executions. In addition, the method may include determining an aggregated score for each statement based on two or more of: the passing tests and the failing tests; a semantic similarity between one or more statement tokens included in the respective statement and one or more report tokens included in an error report; and an amount of time that has passed from when the respective statement received a change. Moreover, the method may include identifying a particular statement of the plurality of statements as a fault location in the code under test based on the aggregated scores of the plurality of statements.Type: ApplicationFiled: July 12, 2017Publication date: January 17, 2019Applicant: FUJITSU LIMITEDInventors: Ripon K. SAHA, Mukul R. PRASAD
-
Publication number: 20190018754Abstract: The present disclosure describes methods, systems, and computer program products for providing additional stack trace information for time-based sampling (TBS) in asynchronous execution environments. One computer-implemented method includes determining whether time-based sampling is activated to capture a time-based sampling data during execution of a JavaScript function; in response to determining that the time-based sampling is activated to capture the time-based sampling data, determining whether a callback stack trace is active; in response to determining that the callback stack trace is active, loading the callback stack trace; retrieving a current stack trace of the JavaScript function; and saving the loaded callback stack trace and the current stack trace of the JavaScript function as the time-based sampling data.Type: ApplicationFiled: July 17, 2017Publication date: January 17, 2019Inventors: Ralf Schmelter, Rene Schuenemann, Axel Siebenborn
-
Publication number: 20190018755Abstract: Recording a replay-able trace of execution of a multi-threaded process includes identifying a trace memory model that defines one or more orderable events that are to be ordered across a plurality of threads of the multi-threaded process. The plurality of threads are executed concurrently across one or more processing units of one or more processors. During execution of the plurality of threads, a separate replay-able trace is recorded for each thread independently. Recording includes, for each thread, recording initial state for the thread, recording at least one memory read performed by at least one processor instruction executed by the thread that takes memory as input, and recording a least one orderable event performed by the thread with a monotonically increasing number that orders the event among other orderable events across the plurality of threads.Type: ApplicationFiled: August 7, 2018Publication date: January 17, 2019Inventor: Jordi MOLA
-
Publication number: 20190018756Abstract: An execution trace of an application program comprises a sequence of ordered programming instructions generated during execution of the application program indicating an execution flow of the application program. The sequence of ordered programming instructions is partitioned into a plurality of linked code segments comprising first and second code segments. The first code segment comprises a terminating programming instruction that terminates the first code segment and links the first code segment to an initial programming instruction of the second code segment. A directed graph representing the execution flow of the application program between the plurality of linked code segments is generated. The directed graph comprises a plurality of linked nodes representing the plurality of linked code segments. The directed graph is output to a graphical user interface (GUI) for display.Type: ApplicationFiled: August 30, 2018Publication date: January 17, 2019Inventor: Munish Kumar
-
Publication number: 20190018757Abstract: A method, computer program product, and system performing a method that include a processor defining a code fingerprint by obtaining parameters describing at least one of an event type or an event. The code fingerprint includes a first sequence. The processor loads the code fingerprint into a register accessible to the processor. Concurrent with executing a program, the processor obtains the code fingerprint from the register and identifies the code fingerprint in the program by comparing a second sequence in the program to the first sequence. Based on identifying the code fingerprint in the program, the processor alerts a runtime environment where the program is executing.Type: ApplicationFiled: September 19, 2018Publication date: January 17, 2019Inventors: Giles R. Frazier, Michael K. Gschwind, Christian Jacobi, Chung-Lung K. Shum
-
Publication number: 20190018758Abstract: Techniques for using emulation to disassociate verification from stimulus in functional test are described. In one approach, a computer stores first data representing an initial state of an application and second data representing the same initial state of a model application, wherein the model application models expected behavior of the application. The computer selects actions for the application to perform and causes both the application and the model application to perform the actions. The computer updates the first and second data to represent the state of both the application and the model application after performing the actions. The computer then compares the first and second data to determine whether both refer to the same state. In response to a determination that the first data and the second data do not refer to the same state, the computer stores data indicating a test failure.Type: ApplicationFiled: May 15, 2018Publication date: January 17, 2019Inventors: Anne S. STERN, Mark S. PETROVIC, Xuyuan SI, Wilson ROSS
-
Publication number: 20190018759Abstract: The disclosure generally describes methods, software, and systems, including a method for providing information about a debugging session state. Information associated with a current debugging state for a debugging session of a first user is received from a first device. The information is stored. A command to share the information as with second different users is received at the server from the first device. Access to the stored information and a notification that the information is available are provided to each of one or more second different devices associated with the second different users. A command provided by a second different user to obtain the information is received at the server from a given second different device. The stored information is provided to the given second different device.Type: ApplicationFiled: July 17, 2017Publication date: January 17, 2019Inventor: Gilad Keinan
-
Publication number: 20190018760Abstract: A method for monitoring application program interface integrations is provided. The method includes identifying, based on monitored transactions, a plurality of run time dependencies between at least two services. Also, the method includes creating, for each of the identified dependencies, a context of the dependency. In addition, the method includes setting a baseline state of a system utilizing the contexts.Type: ApplicationFiled: April 29, 2016Publication date: January 17, 2019Applicant: Intuit Inc.Inventors: Jason Michael Webb, Amit Ramchandra Jere, Thomas Barnes, Shashi R. Shilarnav