Patents Issued in February 21, 2019
-
Publication number: 20190056967Abstract: A first execution of an application is performed on a virtual machine. A set of virtual machine parameters associated with the first execution is determined. One or more command lines of the application are mapped to the set of virtual machine parameters. The mapping is stored in a cache. A second execution of the application is performed on the virtual machine. The second execution retrieves the set of virtual machine parameters from the cache.Type: ApplicationFiled: December 15, 2017Publication date: February 21, 2019Inventors: Daniel Heidinga, Peter D. Shipton, Aleksandar Micic, Devarghya Bhattacharya, Kenneth B. Kent
-
Publication number: 20190056968Abstract: A method is provided for a protection module or a process to use a hypervisor to protect memory pages of a guest operating system on the hypervisor. The method includes modifying a shared memory page in a context of the process, which causes the guest operating system to allocate a private memory page to the process, copy data from the shared memory page to the private memory page, and modify the private memory page. The method further includes causing the hypervisor to protect the private memory page by monitoring the private memory page and generating an alert when the private memory page is accessed.Type: ApplicationFiled: January 11, 2018Publication date: February 21, 2019Inventor: SUKRUT PATIL
-
Publication number: 20190056969Abstract: Systems and methods are provided for detecting sub-optimal performance of one or more virtual computing platforms. Usage data representing user activity, and performance data representing computing hardware resource utilization, is collected from a plurality of virtual machines hosted on one or more virtual computing platforms. The usage data and performance data is then analyzed along with configuration data representing the hardware components of the computing devices operating the virtual computing platform.Type: ApplicationFiled: August 16, 2018Publication date: February 21, 2019Inventors: Marat KHANDROS, Amirreza OGHBAEE, Ali SYED, Kamran PIRASTEH, Weitao LIN, Alexander Michael KRUSH, Jacob Alexander ABBOTT
-
Publication number: 20190056970Abstract: In a method for computer-aided coupling a processing module into a modular technical system, wherein the technical system has a host system designed to provide a virtual machine having real-time capability, and a processing module with a hardware unit having sensor or an actuator, and a connection unit having a communication component for controlling the hardware unit by way of control instructions and a data memory storing configuration data and a control program for providing the control instructions. Data messages are exchanged between the processing module and the host system via the connection unit. The following steps are carried out: The method includes reading the configuration data and the control program from the data memory; instantiating a virtual machine on the host computer; loading the configuration data and the control program into the virtual machine; and transmitting control instructions to the processing module for controlling the hardware unit.Type: ApplicationFiled: August 16, 2018Publication date: February 21, 2019Applicant: Siemens AktiengesellschaftInventor: Rene Graf
-
Publication number: 20190056971Abstract: A control apparatus comprises first to third parts. The first part manages an image, which is information required for execution of a container. The second part requests the third part to start a container corresponding to an image of a predetermined version. The third part instructs the container corresponding to the image of the predetermined version to be created in response to the request from the second part on the basis of the image managed by the first part.Type: ApplicationFiled: June 28, 2016Publication date: February 21, 2019Applicant: NEC CorporationInventors: Mayo OOHIRA, Tomohito IGUCHI, Kazuhiro EGASHIRA
-
Publication number: 20190056972Abstract: A network traffic monitoring system is provided. The system includes a host computer executing a plurality of virtual machines (VMs), including a monitoring VM and a virtual switch (vSwitch). The vSwitch includes a plurality of virtual Network Interface Cards (vNICs) associated with the plurality of VMs. The monitoring VM is coupled to the vSwitch and executed by the host computer. The vSwitch is configured to mirror a plurality of data packets exchanged between two communicating VMs to a vNIC associated with the monitoring VM. The monitoring VM is configured to retrieve the plurality of mirrored data packets from the vNIC associated with the monitoring VM. The monitoring VM is further configured to generate timestamps indicative of packet arrival time at the vSwitch for each data packet in the retrieved plurality based, at least in part, on a computed base time.Type: ApplicationFiled: March 11, 2016Publication date: February 21, 2019Applicant: NetScout Systems Texas, LLCInventors: Tianlin Zhou, Yang He
-
Publication number: 20190056973Abstract: Embodiments of the present invention provide memory optimization by phase-dependent data residency. Application programs are profiled a priori or in real time for temporal memory usage. Memory regions such as initialization data are proactively removed from memory when the application transitions to a new phase. A hypervisor monitors application activity and coordinates the removal of memory regions that are no longer needed by the application. Additionally, memory regions that are anticipated to be needed in the future are proactively preloaded.Type: ApplicationFiled: October 24, 2018Publication date: February 21, 2019Inventors: Peter D. Bain, Peter D. Shipton
-
Publication number: 20190056974Abstract: A plurality of dispatch queues corresponding to a plurality of processing entities are maintained, wherein each dispatch queue includes one or more task control blocks or is empty, and wherein an ordered list of dispatch queues is maintained for each processing entity of the plurality of processing entities. A state for each of the plurality of dispatch queues is determined and the determined state is compared to a desired state for the plurality of dispatch queues. A task control block is moved from one dispatch queue to another dispatch queue, in response to the comparing of the determined state to the desired state for the plurality of dispatch queues.Type: ApplicationFiled: August 18, 2017Publication date: February 21, 2019Inventors: Seamus J. Burke, Trung N. Nguyen, Louis A. Rasor
-
Publication number: 20190056975Abstract: Embodiments of the present disclosure provide a VNFM determining method and a network functions virtualization orchestrator. The method includes: receiving, by an NFVO, a first VNF instantiation request; determining, according to the first VNF instantiation request from VNFMs in a management domain of the NFVO, a VNFM managing the to-be-instantiated VNF; and sending a second VNF instantiation request to the determined VNFM, where the second VNF instantiation request is used to request the determined VNFM to instantiate the to-be-instantiated VNF. A correct VNFM is selected for the VNF, thereby ensuring that VNF deployment and life cycle management are performed correctly and highly efficiently.Type: ApplicationFiled: October 23, 2018Publication date: February 21, 2019Inventors: Fang YU, Xu YANG, Haitao XIA
-
Publication number: 20190056976Abstract: A method and device for the synchronization of processes, a first signal being sent by a clock-giving processor, the first signal having, in an alternating manner, first edges having a first direction and second edges having a second direction opposite the first edge, a temporal distance between at least one of the first edges and at least one of the second edges being determined as a function of a state of a counter in the clock-giving processor. A method for the synchronization of processes, a first signal being received by a clock-receiving processor, the first signal having, in an alternating manner, first edges having a first direction and second edges having a second direction opposite the first edge, a state of a counter in the clock-receiving processor being determined as a function of a temporal distance between at least one of the first edges and at least one of the second edges.Type: ApplicationFiled: August 16, 2018Publication date: February 21, 2019Inventors: Thomas Gebauer, Christoph Mueller, Cristina Murillo Miranda
-
Publication number: 20190056977Abstract: A system and method for gas pump or carwash environments which allows new applications to be added to established systems, having a computing system, software techniques, and hardware or software communications interfaces. Various embodiments include methods of separation and interception and the software techniques. One implementation includes separating a first application from an equipped device by interposing a bridge; intercepting, with the bridge, downstream communications to the equipped device from the first application; using the bridge, accepting downstream communications to the equipped device from a second application; with the bridge, locking communications with the equipped device to one of the first application and the second application; and unlocking the communications with the equipped device in response to receiving a status from the equipped device.Type: ApplicationFiled: August 17, 2018Publication date: February 21, 2019Applicant: Wiz-Tec EMS, Inc.Inventors: Zhi WANG, Kevin Christopher WANG
-
Publication number: 20190056978Abstract: Systems and methods for providing targeted event notifications to subscribers are disclosed. In an example embodiment, events may be received from a publisher. The events may be categorized into a plurality of topics. The events may be distributed among brokers to process a topic selected from the plurality of topics based on the events. Further, it may be determined whether the topic exists in a list of topics handled by the brokers. Authentication credentials of the publisher may be validated, based on the determination. Based on the validation, queues of the events may be formed based on an order of receipt of the events. The events present in the queues may be filtered based on subscriptions of the events. For the fileted events, targeted even notifications may be forwarded to the subscribers.Type: ApplicationFiled: February 27, 2018Publication date: February 21, 2019Applicant: Microsoft Technology Licensing, LLCInventors: Cesar M. RUIZ-MERAZ, Clemens F. VASTERS, David L. STUCKI, Hillary CAITUIRO MONGE, Hitesh MADAN, Jayaraman KALYANA SUNDARAM, PadmaPriya ARADHYULA BHAVANI, Venkata Raja Gopal RAVIPATI
-
Publication number: 20190056979Abstract: Provided is a service provision in a multi-tenant environment which includes determining, by an outsourcing service augmentation platform, that an event has occurred within a tenant instance. Authorization credentials needed to access the tenant instance are provided to the platform. Further steps can include identifying a type of the event and processing the event. The processing includes determining that data corresponding to the event is needed from the tenant instance, requesting the data from an application programming interface (API) corresponding to the tenant instance, receiving the data from the tenant instance, and executing actions within the platform based on the data, the type of event, and a configuration of services defined for the tenant instance.Type: ApplicationFiled: May 8, 2018Publication date: February 21, 2019Inventors: Wesley Bryan, Scott Ingulli
-
Publication number: 20190056980Abstract: A terminal apparatus receives identification information for events transmitted sequentially in conjunction with occurrence of events; sequentially identifies estimated time points at which each event is estimated to occur; determines whether progress of the plurality of events has stopped depending on whether it receives identification information for each event at a corresponding estimated time point for each event; in each of a plurality of event groups obtained by temporally dividing events, when an estimated time point is reached for an earliest event among at least one event belonging to each event group, causes a playback device to play related information for the at least one event belonging to each event group, and when progress of events is determined to have stopped, defers update of related information, which the playback device caused to play, and then resumes update of played related information when identification information is received after the determination.Type: ApplicationFiled: October 23, 2018Publication date: February 21, 2019Inventors: Hiroyuki IWASE, Yuki SETO, Yumiko OCHI, Tetsuro ISHIDA, Takahiro IWATA, Shota MORIGUCHI
-
Publication number: 20190056981Abstract: A non-volatile storage apparatus includes a set of non-volatile memory cells and one or more control circuits in communication with the set of non-volatile memory cells, the one or more control circuits are configured to collect failure bit counts (FBCs) for data read from the set of non-volatile memory cells, obtain one or more metrics of a cumulative distribution of the FBCs, calculate an indicator from the one or more metrics of the cumulative distribution of the FBCs and a target FBC, obtain a probability for the target FBC from the indicator, and manage at least one of: garbage collection, wear leveling, and read threshold voltage adjustment of the set of non-volatile memory cells according to the probability for the target FBC.Type: ApplicationFiled: August 16, 2017Publication date: February 21, 2019Applicant: WESTERN DIGITAL TECHNOLOGIES, INC.Inventors: Arthur Shulkin, David Rozman, Tomer Eliash
-
Publication number: 20190056982Abstract: System and method for auto-calculating uncertainty of a measurement performed by a measurement device. The measurement device initiates a measurement or measurements. In response to the measurement initiation, a driver of the measurement device sends an error specification request to each of a plurality of hardware modules involved in the measurement. Each of the plurality of hardware modules determines the requested error specifications based on a current configuration of the respective hardware module. The measurement device then calculates an uncertainty associated with the measurement or measurements based on the error specifications.Type: ApplicationFiled: August 16, 2017Publication date: February 21, 2019Inventor: Robert W. Hamner
-
Publication number: 20190056983Abstract: Disclosed is a management server for analyzing a root cause related with an abnormal situation in an IT system. The management server may include: a memory; and at least one processor connected with the memory.Type: ApplicationFiled: August 29, 2017Publication date: February 21, 2019Inventors: Daebeom JEONG, Kyungkoo YOON
-
Publication number: 20190056984Abstract: Systems and methods for agentless remediation and recovery. In an illustrative, non-limiting embodiment, an Information Handling System (IHS) may include a Central Processing Unit (CPU); a Basic Input/Output System (BIOS) coupled to the CPU; a logic controller coupled to the CPU; and a memory coupled to the logic controller, the memory having program instructions stored thereon that, upon execution by the logic controller, cause the IHS to: during a first stage, check an operational state of a plurality of hardware components within the IHS in the absence of any involvement by the CPU or the BIOS; and during a second stage following the first stage, identify a failed hardware component amongst the plurality of hardware components in the absence of any involvement by the CPU or the BIOS.Type: ApplicationFiled: October 23, 2018Publication date: February 21, 2019Applicant: Dell Products, L.P.Inventors: Abeye Teshome, Joseph Kozlowski
-
Publication number: 20190056985Abstract: The subject matter described herein is generally directed towards detection and remediation of virtual computing instance (VCI) failure on host devices. Monitoring is performed to detect suspected failures of different guest operating systems, identify failure information, and perform remediation to provide high availability for the VCI.Type: ApplicationFiled: August 15, 2017Publication date: February 21, 2019Inventors: Keith Farkas, Kevin Scott Christopher, Aalap Desai, Manoj Krishnan, Jesse Andrew Mendonca, Rohan Patil
-
Publication number: 20190056986Abstract: Examples associated with inactive application restarting are described. One example method includes establishing a connection between a host device and a remote device. The connection is used for communications between the host device and an application on the remote device. An inactive state of the application is detected on the remote device. A message is transmitted to the remote device to notify a user to restart the application. A user interaction with the message restarts the application.Type: ApplicationFiled: August 21, 2017Publication date: February 21, 2019Inventors: Chee Keat Fong, Phuc Dinh
-
Publication number: 20190056987Abstract: A method comprising the steps of responding to expiration of a timer, transmitting a signal from the timer to circuitry; responsive to receiving the signal, retrieving by the circuitry (i) first values stored in an analog array, and (ii) second values stored in a digital non-volatile memory; performing, by the circuitry, operations comprising a comparison of the first values and the second values; analyzing, by the circuitry, results of the comparison to determine whether an error is greater than or equal to a predefined threshold; responsive to determining the error is greater than or equal to the predefined threshold, initiating, by the circuitry, operations to reprogram the analog array with the second value is described.Type: ApplicationFiled: August 17, 2018Publication date: February 21, 2019Applicant: SyntiantInventors: Kurt F. Busch, Jeremiah H. Holleman, III, Pieter Vorenkamp, Stephen W. Bailey
-
Publication number: 20190056988Abstract: An H matrix generating circuit for generating an H matrix of a QC-LDPC code may include: a conversion value calculation unit calculating conversion values corresponding to column sections of an original H matrix including a plurality of circulant matrices; and a shift unit generating an advanced H matrix by circularly shifting circulant matrices positioned in column sections of the original H matrix by amounts of the conversion values, respectively.Type: ApplicationFiled: January 15, 2018Publication date: February 21, 2019Inventors: Chol Su CHAE, Jang Seob KIM
-
Publication number: 20190056989Abstract: The present disclosure relates to partially written superblock treatment. An example apparatus includes a memory device operable as a multiplane memory resource including blocks organized as superblocks. The memory device is configured to maintain, internal to the memory device, included in a status of an open superblock, a page indicator corresponding to a last written page of the open superblock. The memory device is further configured, responsive to receipt, from a controller, of a read request to a page of the open superblock, determine from page map information maintained internal to the memory device and from the indicator of the last written page, which of a number of different read trim sets to use to read the page of the open superblock corresponding to the read request.Type: ApplicationFiled: August 15, 2017Publication date: February 21, 2019Inventors: Dheeraj Srinivasan, Ali Mohammadzadeh
-
Publication number: 20190056990Abstract: Errors can be introduced when data is transferred over a link between two entities such as between a host and a memory. Link error protection schemes can be implemented to detect and correct errors that occur on the link to enhance transmission reliability. However, these benefits are not without costs since such protection schemes increase both latency and power consumption. In one or more aspects, it is proposed to dynamically adjust the level of link error protection applied to match any change in the operating environment. For example, likelihood of link errors strongly correlates with the link speed. If the link speed is increased, a greater level of link error protection can be applied to counteract the increase in the link errors. If the link speed is decreased, the level of protection can be decreased so that latency and power consumption penalties can be minimized.Type: ApplicationFiled: August 21, 2017Publication date: February 21, 2019Inventors: Jungwon SUH, Alain ARTIERI, Dexter Tamio CHUN, Deepti Vijayalakshmi SRIRAMAGIRI
-
Publication number: 20190056991Abstract: An error correction circuit includes a control unit suitable for receiving a data chunk including a plurality of data blocks, each of the data blocks being included in a corresponding codeword of a first direction and a corresponding codeword of a second direction; and a decoder suitable for performing a decoding operation for a codeword selected by the control unit in the data chunk, wherein the control unit preferentially selects, depending on a result of a first decoding operation for a first codeword of the first direction, a second codeword of the second direction or a third codeword of the first direction.Type: ApplicationFiled: March 1, 2018Publication date: February 21, 2019Inventor: Jang Seob KIM
-
Publication number: 20190056992Abstract: A data storage device includes a nonvolatile memory device configured to store a codeword; and a controller configured to read the codeword from the nonvolatile memory device, and perform a decoding process for the codeword, wherein, when performing the decoding process, the controller calculates a flag of the codeword, calculates an expected number of errors by applying an adjustment coefficient to the flag, compares the expected number of errors to an allowed number of errors, and skips or performs a decoding operation for the codeword depending on a comparison result.Type: ApplicationFiled: March 1, 2018Publication date: February 21, 2019Inventor: Jang Seob KIM
-
Publication number: 20190056993Abstract: An error correction circuit includes a control unit configured to receive a data chunk including data blocks, each of the data blocks being included in corresponding codewords of first and second directions; and a decoder configured to perform a decoding operation for a codeword selected by the control unit. The control unit selects a first codeword among codewords selected in the data chunk, and provides the first codeword to the decoder by performing a flip operation in a first data block included in the first codeword. The control unit selects a second codeword among the selected codewords, and provides the second codeword to the decoder by performing a flip operation in a second data block included in the second codeword. When a decoding operation for the first codeword fails, the control unit selects the second data block to be included in different codewords from the first data block.Type: ApplicationFiled: March 1, 2018Publication date: February 21, 2019Inventor: Jang Seob KIM
-
Publication number: 20190056994Abstract: A non-volatile storage apparatus includes a set of non-volatile memory cells and one or more control circuits in communication with the set of non-volatile memory cells. The one or more control circuits are configured to collect failure bit counts (FBCs) for data read from the set of non-volatile memory cells in a first time period and manage the set of non-volatile memory cells according to a probability of occurrence of a target FBC in a second time period that is subsequent to the first time period. The probability of occurrence of the target FBC during the second time period is calculated from a model of FBC distribution change of the set of non-volatile memory cells.Type: ApplicationFiled: March 21, 2018Publication date: February 21, 2019Applicant: WESTERN DIGITAL TECHNOLOGIES, INC.Inventors: Arthur Shulkin, David Rozman, Tomer Eliash
-
Publication number: 20190056995Abstract: A method begins by a processing module of a dispersed storage network (DSN) determining to modify a configuration of a set of storage units by obtaining a first DSN address range set and first storage information for the set of storage units based on the current configuration. The method continues with the processing module producing a modified and modifying the first DSN address range set to produce a second DSN address range set, where the second DSN address range set is based on the modified configuration and the first storage information. The method continues by transmitting the second DSN address range set to the set of storage units; and facilitating migration of encoded data slices from each storage unit of the set of storage units in accordance with the modified configuration and the second DSN address range set.Type: ApplicationFiled: October 22, 2018Publication date: February 21, 2019Inventors: Jason K. Resch, Wesley B. Leggette
-
Publication number: 20190056996Abstract: A method begins by a processing module of a dispersed storage network (DSN) identifying a data object of a group of data objects for storage in the DSN and determining micro slice encoding parameters for the encoding the data object. The method continues by identifying a set of distributed storage (DS) units for storing encoded micro slices (EMSs) and generating a set of meta-slices from the set of EMSs, followed by determining whether DS units are available to store the meta-slices, determining a mapping scheme for storing the set of EMSs and mapping each meta-slice associated with a DS unit available to store the EMSs. The method continues by transmitting each meta-slice associated with a DS unit available to store the EMSs and when certain DS units of are not available to store the EMSs, transmitting each meta-slice associated with a DS unit not available to the DS units available to store the EMSs.Type: ApplicationFiled: October 22, 2018Publication date: February 21, 2019Inventors: Jason K. Resch, Wesley B. Leggette
-
Publication number: 20190056997Abstract: A computing device includes an interface configured to interface and communicate with a dispersed storage network (DSN), a memory that stores operational instructions, and a processing module operably coupled to the interface and memory such that the processing module, when operable within the computing device based on the operational instructions, is configured to perform various operations. The computing device receives distributed computing data and a distributed computing request that includes a trigger pattern and then identifies a portion of the distributed computing data.Type: ApplicationFiled: October 22, 2018Publication date: February 21, 2019Inventors: Andrew D. Baptist, Greg R. Dhuse, S. Christopher Gladwin, Gary W. Grube, Wesley B. Leggette, Manish Motwani, Jason K. Resch, Thomas F. Shirley, JR., Ilya Volvovski
-
Publication number: 20190056998Abstract: A method for a dispersed storage network (DSN) includes determining a storage/retrieval method including storing/retrieving the data file locally in the set top box as a data file, storing encoded data slices of the data file in set top boxes or storing encoded data slices of the data file in DSN memory. For storing/retrieving in set top boxes or in DSN memory, the set top box sends a subscription request message and determines a storage/retrieval designation to include any of: store locally, store indirect, or store direct; and for a determination of indirect, the set top boxe sends the data file to the DS processing unit; and for direct, determines operational parameters, creates encoded data slices of the data file in accordance with the operational parameters, determines storage locations and sends the encoded data slices to other set top boxes.Type: ApplicationFiled: October 24, 2018Publication date: February 21, 2019Inventors: Gary W. Grube, Timothy W. Markison
-
Publication number: 20190056999Abstract: An NVDIMM requests an authentication object in response to a detected command to initiate a save operation to copy first memory data located in volatile memory on the NVDIMM to non-volatile memory located on the NVDIMM. The NVDIMM determines based on the authentication object that authentication has failed. The NVDIMM implements, in response to determining that authentication has failed, a security measure to prevent recovery of the first memory data.Type: ApplicationFiled: August 15, 2017Publication date: February 21, 2019Inventors: Briana E. Foxworth, Saravanan Sethuraman, Lucas W. Mulkey, Adam J. McPadden, Kevin M. Mcilvain
-
Publication number: 20190057000Abstract: Embodiments of the claimed invention include a computing device having a host processor for executing a firmware environment and a manageability controller. The firmware environment reserves a frame buffer in main memory and loads a graphics protocol driver to provide the frame buffer to an operating system of the computing device. The operating system renders graphical images to the frame buffer using a graphics driver. The manageability controller reads the graphical image from the frame buffer and may transmit the graphical image to a remote computing device. In response to a fatal error of the computing device, the manageability controller may store the graphical image to a non-volatile storage device. The host processor may assert a host reset signal in response to the fatal error, and the manageability controller may send an acknowledgment to the host processor after storing the graphical image. Other embodiments are described and claimed.Type: ApplicationFiled: August 15, 2017Publication date: February 21, 2019Inventors: Kasper Wszolek, Janusz P. Jurski, Piotr Kwidzinski, Robert C. Swanson, Madhusudhan Rangarajan
-
Publication number: 20190057001Abstract: A system for maintaining a repository replication system includes an interface and a processor. The interface is to receive a request to modify a repository, wherein the repository comprises repository copies. The processor is to determine whether modifying the repository resulted in an indication of an error, wherein the indication of the error is based at least in part on a plurality of checksums, wherein a checksum of the plurality of checksums is associated with a repository copy of the repository copies; and in the event that modifying the repository resulted in the indication of the error: queue a repair request to repair the error; and execute a repair process to repair the error associated with the repair request, wherein executing the repair process occurs asynchronously to queuing the error request.Type: ApplicationFiled: September 17, 2018Publication date: February 21, 2019Inventor: Patrick Reynolds
-
Publication number: 20190057002Abstract: A control apparatus includes a synchronization state transmission/reception unit configured to transmit and receive a synchronization state to and from another control apparatus via a network, and a state data transmission/reception unit configured to transmit and receive state data to and from the another control apparatus via the network. Thus, the control apparatus can grasp the synchronization state of the another control apparatus. Further, even when the control apparatus is restarted due to a failure, the control apparatus receives state data from another control apparatus that has been synchronized with the control apparatus and is in operation so that the control apparatus can recover without stopping the entire system.Type: ApplicationFiled: April 1, 2016Publication date: February 21, 2019Applicant: MITSUBISHI ELECTRIC CORPORATIONInventor: Masuo ITO
-
Publication number: 20190057003Abstract: A second connection control device includes a processor. The processor receives a reception notification that notifies that a first connection control device has received a first connection request from a first main control device. The first connection request requests to establish a first connection with a first storage device via a first communication route through the first connection control device. The processor transmits a third connection request to the first storage device upon receiving the reception notification. The third connection request requests to establish a third connection with the first storage device. The processor transmits a success notification to the first main control device upon receiving a second connection request after the third connection is established. The success notification indicates that a second connection is established. The second connection request requests to establish the second connection with the first storage device via a second communication route.Type: ApplicationFiled: August 9, 2018Publication date: February 21, 2019Applicant: FUJITSU LIMITEDInventor: Junichi OGAWA
-
Intelligent Redundant Array Of Independent Disks With Resilvering Beyond Bandwidth Of A Single Drive
Publication number: 20190057004Abstract: A process for reconstructing data stored on a failed storage drive in a RAID storage system involves performing a resilvering procedure on a first portion of the data for reconstruction and performing a recompaction procedure on the remaining portion of the data for reconstruction. Because the resilvering procedure rebuilds its data only on the replacement storage drive, but the recompaction procedure rebuilds its data on one or more, likely multiple, non-failed storage drives, the additional bandwidth provided by the non-failed drives is utilized to increase the speed of the overall data reconstruction. Determining how much of the data storage chunk processing to distribute to the resilvering and to the recompaction procedures may be based on the respective write workloads of the replacement and non-failed drives, as well as on the percentage of free storage space available from each of the chunks.Type: ApplicationFiled: February 2, 2018Publication date: February 21, 2019Inventors: Shailendra Tripathi, Sreekanth Garigala, Sandeep Sebe -
Publication number: 20190057005Abstract: A system for monitoring a virtual machine executed on a host. The system includes a processor that receives an indication that a failure caused a storage device to be inaccessible to the virtual machine, the inaccessible storage device impacting an ability of the virtual machine to provide service, and applies a remedy to restore access to the storage device based on a type of the failure.Type: ApplicationFiled: October 19, 2018Publication date: February 21, 2019Inventors: Joanne Ren, Igor Tarashansky, Keith Farkas, Elisha Ziskind, Manoj Krishnan
-
Publication number: 20190057006Abstract: A method and information handling system configured to store, via a monitoring system data repository memory device, aggregate information handling system performance telemetry data crowd-sourced from a population of information handling systems and categorized into mapping classifications based on software application inventory and software application associations with drivers and libraries and to execute instructions, via an application processor, of an information handling system diagnostic platform in an intelligent configuration management system to obtain aggregate information handling system performance telemetry data for a performance characteristic of information handling systems having a first mapping classification corresponding to a client information handling system, and to construct, at the management information handling system, a performance characteristic baseline of operation across the aggregated telemetry data for one mapping classification and receive monitored telemetry data for the perType: ApplicationFiled: August 8, 2018Publication date: February 21, 2019Applicant: Dell Products, LPInventors: Anantha K. Boyapalle, Michael S. Gatson, Marc R. Hammons, Danilo O. Tan, Nikhil M. Vichare
-
Publication number: 20190057007Abstract: Systems and methods are disclosed for advising a user when an energy storage device in a computing system needs charging. State of charge data of the energy storage device can be measured and stored at regular intervals. The historic state of charge data can be queried over a plurality of intervals and a state of charge curve generated that is representative of a user's charging habits over time. The state of charge curve can be used to generate a rate of charge histogram and an acceleration of charge histogram. These can be used to predict when a user will charge next, and whether the energy storage device will have an amount of energy below a predetermined threshold amount before the next predicted charging time. A first device can determine when a second device typically charges and whether the energy storage device in the second device will have an amount of energy below the predetermined threshold amount before the next predicted charge time for the second device.Type: ApplicationFiled: September 4, 2018Publication date: February 21, 2019Inventors: Cyril DE LA CROPTE DE CHANTERAC, Phillip STANLEY-MARBELL, Kartik VENKATRAMAN, Gaurav KAPOOR
-
Publication number: 20190057008Abstract: A system is configured to track and store system and event data for various computing devices. The system is configured to associate the various computing devices with profiles based at least in part on characteristics of the computing devices. The system is further configured to compare performance data and/or performance metrics for particular computing devices having a particular profile against all other devices that share the particular profile. The system then displays this comparison to a user of the particular computing device, substantially automatically diagnoses an issue with the particular computing device based on the performance and system event data, and/or enables the user to diagnose the problem based on the performance and system event data.Type: ApplicationFiled: August 21, 2018Publication date: February 21, 2019Inventors: Dustin Brewer, Stuart Saunders, Cameron Hurst
-
Publication number: 20190057009Abstract: A method, a system, and an article are provided for detecting and managing anomalies associated with content presentations. An example computer-implemented method can include: obtaining a stream of data including a record of clicks on a plurality of client devices; aggregating the stream of data to generate a batch click stream for each of the client devices; processing the stream of data using a real-time anomaly detector to detect a first anomaly indicating that at least one of the client devices was previously associated with fraudulent clicks; processing each batch click stream using a batch anomaly detector to detect a second anomaly indicating that at least one of the batch click streams includes fraudulent clicks; and facilitating an adjustment of content presentations on the client devices, based on at least one of the detected first anomaly and the detected second anomaly.Type: ApplicationFiled: July 11, 2018Publication date: February 21, 2019Inventors: Heng Wang, Arun Kejariwal, James Koh, Ishan Upadhyaya, Owen S. Vallis
-
Publication number: 20190057010Abstract: Systems for dynamically controlling data transmissions are provided. In some examples, a system may receive data from one or more computer systems. Data associated with an event may be extracted and the extracted data may be compared to one or more machine learning datasets to determine a likelihood that an issue associated with a computer system may occur. The system may determine whether the likelihood is greater than a predetermined threshold. If so, a modification to avoid the potential issue or mitigate an impact may be identified. The modification may be transmitted to and executed by the computer system to modify one or more aspects of the computer system. In some examples, one or more efficiency modifications may be identified based on the comparison of the extracted data to the machine learning datasets. The identified efficiency modification may be transmitted to and executed by the computer system to modify one or more aspects of the computer system.Type: ApplicationFiled: August 17, 2017Publication date: February 21, 2019Inventors: Manu Kurian, Floyd F. Rock, JR., Saritha Prasad Vrittamani, Patrick Nicholas Lawrence, Paul Grayson Roscoe
-
Publication number: 20190057011Abstract: In a computer-implemented method of data collection in a computing environment, the method including, operational data is captured within a computing environment, wherein the computing environment includes a plurality of managed components, wherein the managed components are interrelated. The operational data is dynamically filtered within the computing environment to identify event data and managed component relationship data, wherein the event data and managed component relationship data include temporal information. The event data and managed component relationship data is communicated to a remote service provider configured to perform analytics on the event data and managed component relationship data.Type: ApplicationFiled: June 14, 2018Publication date: February 21, 2019Applicant: VMware, Inc.Inventors: Christopher KNOWLES, Blair DOYLE, Alex BEWLEY, Jimmy PARK
-
Publication number: 20190057012Abstract: A method for diagnosing computer readable instructions related to transfers of control is disclosed. A state transition of a unit of execution within a logical operation providing an event handler for a Document Object Model is logged during runtime of the computer readable instructions. Diagnostic information of the logical operation is associated with the state transition. The state transition and associated diagnostic information is provided for retrieval at a selected point in the computer readable instructions.Type: ApplicationFiled: September 18, 2018Publication date: February 21, 2019Applicant: Microsoft Technology Licensing, LLCInventors: Michael C. Fanning, Felix Gerard Torquil Ifor Andrew, Daniel J. Moseley, Simon Calvert, Andrew R. Sterland, Timothy Rice, Jeffrey T. Fisher, Robert A. Paveza, Taylor C. Woll, Gregg Miskelly, Harold L. Pierson, III, Christopher Edmonds, Elliot H. Omiya, Karthik Vivek Nadig, Francisco Javier Wong, Zhaochuan Gao, Andriy Stasyuk
-
Publication number: 20190057013Abstract: Disclosed aspects relate to debugging a set of code components of an application program. A set of defect data which indicates a set of defects may be collected with respect to an application program. The set of defect data may be derived from a set of post-compilation users of the application program. A set of test case data which indicates a set of user interface features of the application program may be collected with respect to the application program. The set of test case data may be derived from a set of development tests of the application program. Using both the set of defect data and the set of test case data, a set of fragility data for the set of code components of the application program may be determined. Based on the set of fragility data, the set of code components of the application program may be debugged.Type: ApplicationFiled: October 24, 2018Publication date: February 21, 2019Inventors: Vijay Ekambaram, Leigh A. Williamson, Shinoj Zacharias
-
Publication number: 20190057014Abstract: In some examples, test relevancy prediction for code changes may include ascertaining files for a commit for a build, and for each test of a plurality of tests, determining a score based on a weight assigned to a file of the ascertained files. Test relevancy prediction for code changes may further include ordering each test of the plurality of tests according to the determined score, and identifying, based on the ordering of each test of the plurality of tests, tests from the plurality of tests for which the score exceeds a specified threshold. The identified tests may represent tests that are to be applied to the build.Type: ApplicationFiled: August 17, 2017Publication date: February 21, 2019Applicant: EntlT Software LLCInventors: Gabi Shalev, Itay Ben-Yehuda, Raz Regev, Elad Benedict
-
Publication number: 20190057015Abstract: Methods, systems, and computer-readable storage media for detecting a source of a defect in microservice-based applications, implementations including receiving at least one error log, the at least one error log including event data associated with at least one microservice in a set of microservices hosted on a cloud infrastructure, determining, for each microservice in the set of microservices, and for each type of defect in a set of types of defects, a probability that a respective microservice has a respective type of defect, and executing at least one action based on a probability indicating that a microservice of the set of microservices has a type of defect.Type: ApplicationFiled: August 15, 2017Publication date: February 21, 2019Inventor: Ahmad Hassan
-
Publication number: 20190057016Abstract: Methods, systems, and computer program products for integrating front-end applications with application program interfaces (APIs) and middleware business services. A front-end application flow, including at least one call to one or more business services flows, and one or more business services flows, each including one or more calls to application program interfaces (APIs), are received at a processor and the processor compiles a complete end-to-end flow that includes the front-end application flow and the one or more business services flows. The complete end-to-end flow is expressed in ordered terms of the one or more business services flows and the one or more calls to the APIs. A projected latency for the complete end-to-end flow is automatically constructed by the processor by totaling response times for each of the one or more calls to the APIs included in the complete end-to-end flow.Type: ApplicationFiled: August 21, 2017Publication date: February 21, 2019Inventors: Ilaria Pasquini, Nicolas Krasensky, Christelle Legrand, Rohit Aggarwal