Patents Issued in July 25, 2019
-
Publication number: 20190227869Abstract: A first tier of error correcting code operations on a data block may be performed. The first tier of error correcting code operations on the data block may be determined to be associated with an unsuccessful correction of an error of the data block. Responsive to determining that the first tier of error correcting code operations on the data block are associated with the unsuccessful correction of the error of the data block, a remix operation on the data block to change a logical to physical association of the data block from a first logical association to a second logical association may be performed.Type: ApplicationFiled: January 22, 2018Publication date: July 25, 2019Inventor: Samuel E. Bradshaw
-
Publication number: 20190227870Abstract: User data that is to be stored at a memory system can be received. System data associated with the memory system can be identified and the user data and the system data can be stored at the memory system based on an error control operation. A subset of the system data can be identified and the subset of the system data can be stored at the memory system based on another error control operation.Type: ApplicationFiled: July 6, 2018Publication date: July 25, 2019Inventors: Vamsi Rayaprolu, Sivagnanam Parthasarathy, Sampath K. Ratnam, Peter Feeley, Kishore Kumar Muchherla
-
Publication number: 20190227871Abstract: Technologies for providing multiple levels of error correction include a memory that includes media access circuitry coupled to a memory media. The media access circuitry is to read data from the memory media. Additionally, the media access circuitry is to perform, with an error correction logic unit located in the media access circuitry, error correction on the read data to produce error-corrected data.Type: ApplicationFiled: April 4, 2019Publication date: July 25, 2019Inventors: Wei Wu, Rajesh Sundaram, Chetan Chauhan, Jawad B. Khan, Shigeki Tomishima, Srikanth Srinivasan
-
Publication number: 20190227872Abstract: Techniques are disclosed for managing data storage in data storage systems. The techniques comprise providing a number of RAID groups. Each RAID group relating to a respective set of data storage drives that support RAID storage in the RAID group. The techniques also comprise monitoring I/O operations to identify read-active data stored by data storage drives of a RAID group. The techniques also comprise copying the read-active data from the data storage drives of the RAID group to data storage drives of another RAID group.Type: ApplicationFiled: August 1, 2018Publication date: July 25, 2019Inventors: Nickolay Alexandrovich Dalmatov, Vladimir Shatunov
-
Publication number: 20190227873Abstract: Data recovery following the loss of a volume manager is described, wherein a volume manager receives a command, and location information and credentials to access a distributed storage. The data to be recovered may include one or more data files stored as one or more discrete portions. Each portion includes metadata, including at least a file ID tag. The volume manager retrieves each portion of data from the distributed storage and records, in an index, the location that each portion of data was retrieved from. The volume manager reads and stores the file ID tag with the associated location of the attached portion of data in the distributed storage in the volume manager index.Type: ApplicationFiled: April 3, 2019Publication date: July 25, 2019Inventors: Murilo O. Araujo, Ricardo M. Matinata, Rafael P. Sene
-
Publication number: 20190227874Abstract: Data recovery following the loss of a volume manager is described, wherein a volume manager receives a command, and location information and credentials to access a distributed storage. The data to be recovered may include one or more data files stored as one or more discrete portions. Each portion includes metadata, including at least a file ID tag. The volume manager retrieves each portion of data from the distributed storage and records, in an index, the location that each portion of data was retrieved from. The volume manager reads and stores the file ID tag with the associated location of the attached portion of data in the distributed storage in the volume manager index.Type: ApplicationFiled: April 3, 2019Publication date: July 25, 2019Inventors: Murilo O. Araujo, Ricardo M. Matinata, Rafael P. Sene
-
Publication number: 20190227875Abstract: A storage cluster is provided. The storage cluster includes a plurality of storage nodes within a chassis. The plurality of storage nodes has flash memory for storage of user data and is configured to distribute the user data and metadata throughout the plurality of storage nodes such that the storage nodes can access the user data with a failure of two of the plurality of storage nodes. Each of the storage nodes is configured to generate at least one address translation table that maps around defects in the flash memory on one of a per flash package basis, per flash die basis, per flash plane basis, per flash block basis, per flash page basis, or per physical address basis. Each of the plurality of storage nodes is configured to apply the at least one address translation table to write and read accesses of the user data.Type: ApplicationFiled: March 29, 2019Publication date: July 25, 2019Inventors: John D. Davis, John Hayes, Hari Kannan, Nenad Miladinovic, Zhangxi Tan
-
Publication number: 20190227876Abstract: Methods, apparatus, systems and articles of manufacture for mitigating a firmware failure are disclosed. An example apparatus includes at least one hardware processor and first memory including instructions to be executed by the at least one hardware processor. The example apparatus further includes mask memory including a feature mask associated with a first firmware version, the feature mask identifying features of the first firmware version to be disabled. A platform firmware controller is to apply the first firmware version to the first memory for execution by the at least one processor, initialize the at least one processor using the feature mask, and in response to a detection of a failure, determine a first de-feature mask based on a second de-feature mask previously used by the at least one processor and the feature update mask; and initialize the processor using the first de-feature mask.Type: ApplicationFiled: March 30, 2019Publication date: July 25, 2019Inventors: Sean Dardis, Karunakara Kotary, Michael Kubacki, Ankit Sinha
-
Publication number: 20190227877Abstract: Methods and systems for efficiently downloading archived snapshot data from the cloud or from an archival data store are described. In a disaster recovery scenario in which an entire storage appliance for backing up different point in time versions of a virtual machine has failed (e.g., due to a fire), archived snapshot data for the different point in time versions may be acquired by a second storage appliance from an archival data store (e.g., cloud-based data storage) using one or more snapshot mapping files. A snapshot mapping file may include pointers to a plurality of data blocks within the archival data store for generating a full image snapshot associated with a particular point in time version of the virtual machine. The plurality of data blocks may comprise the minimum number of data blocks necessary to construct the particular point in time version of the virtual machine.Type: ApplicationFiled: January 19, 2018Publication date: July 25, 2019Applicant: RUBRIK, INC.Inventors: Prateek Pandey, Arpit Agarwal
-
Publication number: 20190227878Abstract: Methods and systems for reclaiming disk space via consolidation and deletion of expired snapshots are described. The expired snapshots may comprise snapshots of a virtual machine that are no longer required to be stored within a data storage domain (e.g., a cluster of data storage nodes or a cloud-based data store). In some cases, rather than storing an incremental file corresponding with a particular snapshot of the virtual machine, a full image of the particular snapshot may be generated and stored within the data storage domain. The generation of the full image may allow a chain of dependencies supporting the expired snapshots to be broken and for the expired snapshots to be deleted or consolidated. The full image of the particular snapshot may be generated using compute capacity in the cloud or may be generated locally by a storage appliance and uploaded to the data storage domain.Type: ApplicationFiled: January 19, 2018Publication date: July 25, 2019Applicant: RUBRIK, INC.Inventors: Arpit Agarwal, Utpal Prasad
-
Publication number: 20190227879Abstract: A storage system according to certain embodiments includes a client-side repository (CSR). The CSR may communicate with a client at a higher data transfer rate than the rate used for communication between the client and secondary storage. During copy operations, for instance, some or all of the data being backed up or otherwise copied to secondary storage is stored in the CSR. During restore operations, copies of the data stored in the CSR is accessed from the CSR instead of from secondary storage, improving performance. Remaining data blocks not stored in the CSR can be restored from secondary storage.Type: ApplicationFiled: December 18, 2018Publication date: July 25, 2019Inventors: Manoj Kumar Vijayan, Deepak Raghunath Attarde, Hetalkumar N. Joshi
-
Publication number: 20190227880Abstract: The invention relates to a sensor system. The sensor system comprises sensor devices. The sensor devices are configured for exchanging data via a network connection. Each of the sensor devices is configured to measure sensor data wherein each of the sensor devices comprises a local processor and a local memory coupled to the local processor. Each local memory comprises a local data repository. The local memory comprises local instructions which, when executed by the local processor, cause the local processor to: repeatedly store the sensor data in the local data repository as a data file, wherein each data file stored has a unique name; and repeatedly synchronize with the local data repository of the other of the sensor devices, wherein each local data repository maintains a complete copy of the data file of each of the sensor devices after synchronization.Type: ApplicationFiled: January 24, 2018Publication date: July 25, 2019Inventors: Agnieszka Tkaczyk-Walczak, Krzysztof Fabjanski, Marek Peszt, Piotr Jozef Walczak
-
Publication number: 20190227881Abstract: In example implementations, a method is provided. The method monitors, by a processor, data changes. A measured value of a variable associated with the data changes are detected to exceed a threshold associated with the variable. A snapshot interval is changed to a time interval associated with the variable. Then a snapshot of the memory device is recorded at the time interval.Type: ApplicationFiled: January 24, 2018Publication date: July 25, 2019Inventors: Lalatendu Patro, Tushar Vengurlekar
-
Publication number: 20190227882Abstract: Example methods and systems to validate integrity of data and one or more configurations in response to an upgrade in a virtualized computing environment are disclosed. One method may include preparing a first pre-upgrade backup file and a first post-upgrade backup file in response to a data plane upgrade of the virtualized computing environment and validating the integrity of data and one or more configurations based on the first pre-upgrade backup file and the first post-upgrade backup file before upgrading a control plane of the virtualized computing environment.Type: ApplicationFiled: March 8, 2018Publication date: July 25, 2019Inventors: PRASHANT SHELKE, SHARWARI PHADNIS, YOGESH VHORA, KARTIKI KALE, NEHA PRATIK DHAKATE, GANESH AVACHARE, MOHAMMAD SIDDIQUI
-
Publication number: 20190227883Abstract: The data storage system according to certain aspects can implement table level database restore. Table level database restore may refer to restoring a database table and its related data without restoring the entire database. The data storage system may use table metadata index to implement table level restore. A table metadata index may be created for each table, e.g., during a backup of the database. The table metadata index for a table can include any type of information for restoring the table and its related data. Some examples of the type of information included in the table metadata index include the following: container for the table, table backup location, system data, table index, table relationships, etc. Table metadata index can make the restoring of tables fast and efficient by packaging information that can be used to restore a table and its related data in an easily accessible manner.Type: ApplicationFiled: December 19, 2018Publication date: July 25, 2019Inventors: Paramasivam KUMARASAMY, Brahmaiah VALLABHANENI
-
Publication number: 20190227884Abstract: A solid state drive (SSD) includes a nonvolatile memory array and a cache memory. The nonvolatile memory array has an encrypted integrated memory buffer (IMB) space. The cache memory has a decrypted copy of the IMB and an encrypted backup copy of the IMB. In power loss recovery (PLR) after a power loss imminent (PLI) event, the SSD can determine whether to recover the unencrypted copy of the IMB or the backup encrypted copy. The backup encrypted copy can reduce the risk of loss of data in the IMB in the event that multiple PLI events occur and a corrupted copy of the IMB is used to overwrite the IMB in the nonvolatile memory during a previous PLR.Type: ApplicationFiled: March 29, 2019Publication date: July 25, 2019Inventors: Peng LI, David J. PELSTER, Gamil CAIN, Ryan J. NORTON
-
Publication number: 20190227885Abstract: A dynamic random access memory (DRAM) device includes an on-die termination (ODT) controller including an input to receive an ODT signal from a memory controller, and ODT circuitry to terminate an interface circuit, the interface circuit to provide a data signal between the memory controller and the DRAM device. The ODT controller is configured in a first impedance switching mode to terminate the interface circuit at a first impedance level in response to a first state of the ODT signal, to terminate the interface circuit at a second impedance level in response to a second state of the ODT signal, and to terminate the interface circuit at a third impedance level in response to a change in the ODT signal from the first state to the second state, the third impedance level being between the first impedance level and the second impedance level.Type: ApplicationFiled: January 22, 2018Publication date: July 25, 2019Inventors: Bhyrav M. Mutnury, Stuart Allen Berke, Vadhiraj Sankaranarayanan
-
Publication number: 20190227886Abstract: A memory system for storing data is disclosed, the memory system including a plurality of memory devices configured to store data, each memory device having a plurality of bits, the memory devices configured and associated to work together as a rank to respond to a request; a memory control circuit associated with the plurality of memory devices and configured to output command and control signals to the plurality of memory devices; a detector for detecting a bit error in an operation; and a controller for remapping the bit error to a spare bit lane in response to the detector detecting the bit error.Type: ApplicationFiled: January 19, 2018Publication date: July 25, 2019Inventors: Stephen Glancy, Kyu-Hyoun Kim, Warren E. Maule, Kevin M. Mcilvain
-
Publication number: 20190227887Abstract: Embodiments described herein provide a mission-critical artificial intelligence (AI) processor (MAIP), which includes an instruction buffer, processing circuitry, a data buffer, command circuitry, and communication circuitry. During operation, the instruction buffer stores a first hardware instruction and a second hardware instruction. The processing circuitry executes the first hardware instruction, which computes an intermediate stage of an AI model. The data buffer stores data generated from executing the first hardware instruction. The command circuitry determines that the second hardware instruction is a hardware-initiated store instruction for transferring the data from the data buffer. Based on the hardware-initiated store instruction, the communication circuitry transfers the data from the data buffer to a memory device of a computing system, which includes the mission-critical processor, via a communication interface.Type: ApplicationFiled: June 5, 2018Publication date: July 25, 2019Applicant: DinoplusAI Holdings LimitedInventors: Yujie Hu, Tong Wu, Xiaosong Wang, Zongwei Zhu, Chung Kuang Chin, Clifford Gold, Steven Sertillange, Yick Kei Wong
-
Publication number: 20190227888Abstract: A multi-node data storage system comprises a first data storage system having an owner node and a backup node in a first location coupled to a second data storage system having an owner node and a backup node in a second location. Each storage system includes a copy of the same data volume. A failure of a node of the multi-node storage system is detected. An outstanding write request to the first storage system is identified. If the owner node in the first storage system fails, it is determined whether the outstanding write corresponds to a host write to the backup node of the first storage system. If so, a retransmission message is sent to the second storage system. Otherwise, the data region associated with the outstanding write request is read from the first storage system, and a resynchronization message is sent to the second storage system.Type: ApplicationFiled: January 23, 2018Publication date: July 25, 2019Inventors: Florent Rostagni, Andrea Sipka, John Wilkinson
-
Publication number: 20190227889Abstract: Example implementations described herein are directed to systems and methods involving an application running on a host computer and configured to manage storage infrastructure. The application not only manages resources already allocated to itself, but also manages the allocation and de-allocation of resources to itself. The resources can be allocated and de-allocated based on the type of process being executed, wherein upon occurrence of a failure on a primary storage system, higher priority processes that are executed on connected failover storage system nodes are given priority while the lower priority processes of such failover storage system nodes are disabled.Type: ApplicationFiled: January 25, 2017Publication date: July 25, 2019Inventors: Yuki SAKASHITA, Keisuke HATASAKI
-
Publication number: 20190227890Abstract: An information processing apparatus transmits a task executing request to a first control node to execute a task including multiple processes among multiple control nodes; and stores management information associating the task executing request transmitted to the first control node with a response result received from the first control node. The task executing request includes: a command to execute the task; a command to respond with a first notification indicating normal completion of the plurality of processes; a command to execute, when execution of at least one of the processes fails, a regaining process that regains statuses of one or more remaining processes successfully executed to statuses before being executed; and a command to response, when the regaining process is normally completed, a second notification indicating normal completion of the regaining process. Accordingly, the load on a control node managing multiple control nodes can be reduced.Type: ApplicationFiled: December 17, 2018Publication date: July 25, 2019Applicant: FUJITSU LIMITEDInventors: Masaki Takeuchi, Yoshimasa MISHUKU, Yutaro Hiraoka
-
Publication number: 20190227891Abstract: Disclosed are a method, a terminal, a device, and a computer readable storage medium for improving the performance of a virtual machine. The method includes determining whether a failure of a disk of a host having a virtual disk file stored therein occurs if a virtual machine sends a read request or a write request to the virtual disk file; sending the read or write request to a storage device which is associated with the host and has the virtual disk file stored therein if the failure occurs, so that the storage device is able to feed back data; detecting whether the disk of the host is recovered if the data fed back from the write request is received; and writing the data fed back from the write request into the disk of the host if the disk of the host is recovered.Type: ApplicationFiled: March 14, 2017Publication date: July 25, 2019Inventor: Qiguo Zhang
-
Publication number: 20190227892Abstract: A device implementing a system for object placement includes at least one processor configured to identify an object stored on two of a plurality of storage devices, and to determine a pairing value for each pair of the plurality of storage devices, the pairing value corresponding to a number of stored objects common to the pair. The at least one processor is further configured to select, based on the determined pairing values, two storage devices having a lowest pairing value relative to the determined pairing values, and to move the object to each of the two selected storage devices.Type: ApplicationFiled: September 28, 2018Publication date: July 25, 2019Inventors: David HEMMO, Vinay ARI, Bernard L. GALLET
-
Publication number: 20190227893Abstract: Methods for determining a fixed point format for one or more layers of a DNN based on the portion of the output error of the DNN attributed to the fixed point formats of the different layers. Specifically, in the methods described herein the output error of a DNN attributable to the quantisation of the weights or input data values of each layer is determined using a Taylor approximation and the fixed point number format of one or more layers is adjusted based on the attribution. For example, where the fixed point number formats used by a DNN comprises an exponent and a mantissa bit length, the mantissa bit length of the layer allocated the lowest portion of the output error may be reduced, or the mantissa bit length of the layer allocated the highest portion of the output error may be increased. Such a method may be iteratively repeated to determine an optimum set of fixed point number formats for the layers of a DNN.Type: ApplicationFiled: November 5, 2018Publication date: July 25, 2019Inventor: James Imber
-
Publication number: 20190227894Abstract: A system for testing a data storage device includes the data storage device, an electronic device and a computer device. The electronic device includes a host device coupled to the data storage device and communicating with the data storage device via an interface logic. The computer device is coupled to the electronic device and is configured to issue a plurality of commands to test the data storage device in a test procedure. When the electronic device has been successfully started up, the computer device issues a first command to the electronic device to trigger the electronic device to enter a hibernate mode. After waiting for a first predetermined period of time, the computer device issues a second command to the electronic device, so as to wake up the electronic device.Type: ApplicationFiled: October 18, 2018Publication date: July 25, 2019Inventor: Po-Yi SHIH
-
Publication number: 20190227895Abstract: A status monitoring system includes multiple sensors that detect a status of a monitoring target, a transmission unit that transmits changed detection data when detection data detected by the multiple sensors changes, a storage unit that stores the detection data transmitted by the transmission unit, a prediction unit that predicts, from past detection data stored in the storage unit, a time at which the detection data detected by the multiple sensors is predicted to change, and an instruction unit that instructs a specific subset of the multiple sensors to transmit data for checking operation a preset amount of time before the time predicted by the prediction unit.Type: ApplicationFiled: September 14, 2018Publication date: July 25, 2019Applicant: FUJI XEROX CO., LTD.Inventor: Takeshi NOGUCHI
-
Publication number: 20190227896Abstract: According to some possible implementations, a monitoring device may receive a set of inputs from one or more drivers of a device connected to a bus. The one or more drivers may be capable of driving a bus line of the bus, and the bus may connect multiple devices capable of driving the bus line. The monitoring device may determine a length of time over which the set of inputs maintains a value indicating that the bus is not idle. The monitoring device may compare the length of time and a threshold. The monitoring device may output a signal based on comparing the length of time and the threshold.Type: ApplicationFiled: January 19, 2018Publication date: July 25, 2019Inventor: Wolfgang SCHERR
-
Publication number: 20190227897Abstract: Described herein is a Leader-Follower Additive Manufacturing (AM) system which controls multiple AM Devices (3D Printers) simultaneously in order to minimize human monitoring and control during the mass manufacture of AM products. This is accomplished by combining individual AM device closed-loop feedback control with the ability for AM devices to communicate feedback loop data to other AM devices. The communication of feedback loop data between AM devices during the mass fabrication of AM components improves AM process reliability and repeatability. Within the system, AM devices are able to assume the roles of Leaders or Followers; Leader AM devices lead the Follower AM devices during the fabrication of multiple AM products. If errors occur during the fabrication of the AM products, individual AM devices are able to create and implement solutions that solve fabrication errors and communicate that data with the other AM devices for present and future AM fabrication efforts.Type: ApplicationFiled: January 23, 2019Publication date: July 25, 2019Inventor: Joseph Matthew Sinclair
-
Publication number: 20190227898Abstract: Method and apparatus for distributing wear in a disc stack. A data transducer is used to record data to a data recording surface in the disc stack. Performance statistics are accumulated including a dwell metric value indicative of dwell time of the transducer adjacent a selected radial location and an operational life metric value indicative of accumulated elapsed operation of the transducer. Data are migrated from the selected radial location to a target location within the disc stack responsive to at least a selected one of the dwell metric value or the operational life metric value. In some cases, the dwell metric value may indicate an estimated amount of lubricant disturbance and the operational life operation may indicate operational hours of a heat assisted magnetic recording (HAMR) element. The target location may be on a different data recording surface having an associated transducer with a lower operational life metric value.Type: ApplicationFiled: January 19, 2018Publication date: July 25, 2019Inventors: Mark A. Gaertner, Anil Kashyap
-
Publication number: 20190227899Abstract: Method, computer program product, and system for dynamic tracing, including monitoring a log file, wherein the log file comprises events, wherein an event comprises an event code and an event time stamp, receiving a ranking and rating table (“table”), wherein the table comprises one or more error codes and a ranking for each of the one or more error codes, matching the event code with an error code of the one or more error codes, calculating a rating for the error code, comparing the calculated rating to a rating threshold, enabling an information capture level based on the rating threshold of the calculated rating, in response to enabling the information capture level, copying events from the log file into an abbreviated log file, wherein the copied events include the error code for the calculated rating, creating an alert indicating a changed information capture level, and resetting the dynamic tracing.Type: ApplicationFiled: March 29, 2019Publication date: July 25, 2019Inventors: Javed Iqbal Abdul, Jose Peter
-
Publication number: 20190227900Abstract: A code entity of an application, for which a differential analysis is to be performed, is identified in a replayable trace of a prior execution of the application. A prior invocations of the code entity are replayed by re-executing executable instructions of the code entity based on the replayable trace. Based on the replay, a families of invocations of the code entity are identified. Each family is defined based upon attributes that identify at least one class of runtime behavior of the code entity that is observed during the replay of the invocations of the code entity. First attributes of a first family that substantially contribute to classifying a first class of invocations of the code entity within the first family are identified, and second attributes of a second family that substantially contribute to classifying a second class of invocations of the code entity within the second family are identified.Type: ApplicationFiled: April 3, 2019Publication date: July 25, 2019Inventor: Jordi Mola
-
Publication number: 20190227901Abstract: Simulation processing is performed on a host apparatus in respective time periods to simulate operation of simulated agents of a target apparatus. During each time period, the simulation processing exclusively simulates operation of a single simulated agent. When the target program code processed in a current time period allocated for simulation of a given simulated agent includes a transaction start instruction representing a start of a transaction comprising instructions executed between the transaction start instruction and a transaction end instruction for which effects of the instructions of the transaction are to be committed when the transaction end instruction is reached in the absence of the transaction being aborted, it is detected whether the current time period ends before the transaction end instruction of the transaction is reached, and if so the transaction is aborted. This enables a correct transaction behaviour to be simulated without requiring memory conflict checking.Type: ApplicationFiled: January 19, 2018Publication date: July 25, 2019Inventors: Benjamin Jean-Baptiste DAMET, Mihail Ivanov ATANASSOV
-
Publication number: 20190227902Abstract: A classification machine learning model is trained to predict the likelihood that a software program is likely to have a software bug in the future. The model is based on features from different source code files having changes made to fix a software bug and source code files having changes that were not made for a bug fix. The features include a time-weighted bug density, a time-weighted addition factor, and a time-weighted deletion factor for a source code file and its dependent code, a page rank, and complexity features representing a number of different types of code elements in the source code file.Type: ApplicationFiled: June 11, 2018Publication date: July 25, 2019Inventors: XI CHENG, NEELAKANTAN SUNDARESAN, MINGWEI TANG
-
Publication number: 20190227903Abstract: A dynamic experimentation evaluation system provides a framework in which a continuous stream of metric data is monitored to establish a causal relationship between changes in a software program and the effect of user-observable behavior. In one aspect, an A/B test is performed continuously on a stream of metric data representing the usage of a control version of software product and the usage of a treatment version of the software product. A sequential probability ratio test (SPRT) is used as the test statistic to determine when to terminate the test and produce results within a specific confidence interval and controlled error rate.Type: ApplicationFiled: September 14, 2018Publication date: July 25, 2019Inventors: NEELAKANTAN SUNDARESAN, CENZHUO YAO
-
Publication number: 20190227904Abstract: A novel and useful system and method of time traveling source code debugging including several advanced capabilities that significantly improve the source code debugging process. Upon hitting a breakpoint or opening a dump file, the debugger travels to the future which can be altered by a user by modifying code on the fly (live coding) and receiving immediate feedback to validate bug fixes. Visual annotations including values of variables and expressions are provided as a heads up display effectively flattening time and space. A pivoting capability allows a user to switch the execution context of the code at any time. Point in time links that store the state of the debugging session can be created and activated. An asynchronous collaboration and messaging system enables multiple participants to share a debugging session. An optional redaction capability is also provided for obscuring or replacing sensitive private information.Type: ApplicationFiled: January 7, 2019Publication date: July 25, 2019Applicant: CODEVALUE D.T. LTD.Inventors: Omer Raviv, Alon Mordechai Fliess
-
Publication number: 20190227905Abstract: A debug-enabled processing device includes a processor, a communication transceiver circuit, and a debug support unit. The debug support unit has a plurality of dedicated debug registers to facilitate debugging a software program under execution by the processor. One of the plurality of debug registers is a control register having at least four bits, which are used to enable/disable a plurality of debugging operations. Others of the debug registers include a set of index registers that may be configured to pass data to and from the processor.Type: ApplicationFiled: March 28, 2019Publication date: July 25, 2019Inventors: Xiao Kang JIAO, PengFei ZHU
-
Publication number: 20190227906Abstract: Verifying architectural compliance of a processor core using processor-sparing functions. A simulation of a model for a register-transfer level design of the processor core is performed. A first state of the model is dumped, when no error exists. An error is injected in the model. A second state of the model is dumped, after the injected error is detected in the simulation. Upon dumping the second state, the model is reset and initialized with the first state. State information of the second state is loaded in the reset and initialized model.Type: ApplicationFiled: March 29, 2019Publication date: July 25, 2019Inventors: Ophir Erez, Bodo Hoppe, Divya K. Joshi, Gerrit Koch, Parminder Singh
-
Publication number: 20190227907Abstract: A storage device includes a nonvolatile memory, a controller configured to control writing of data to the nonvolatile memory and reading of data from the nonvolatile memory in response to a request from a host, and a power module configured to receive power from the host. The controller is configured to transmit debugging data to the host through a channel connected to the host. The controller may be configured to transmit the debugging data to the host via at least one power line that is configurable for provision of power to the storage device.Type: ApplicationFiled: August 14, 2018Publication date: July 25, 2019Inventor: Hee Jong Kim
-
Publication number: 20190227908Abstract: A technical problem faced when remotely controlling or debugging electronic devices is that remote control or debugging often requires a direct connection. However, debugging ports are inaccessible on many devices. Technical solutions described herein provide systems and methods for secure communication via existing communication infrastructure (e.g., public instant messenger (IM)), providing various debugging abilities including debugging and file sharing. Technical solutions described herein also provide systems and methods for debugging based on remote device memory state collection and sending for embedded or IoT devices. This solution avoids a hardware debugging connection by using a debugging methodology resident on the device to read and dump the relevant memory, registers, and other device state information in a secure and automated manner.Type: ApplicationFiled: August 3, 2017Publication date: July 25, 2019Inventors: Tamir Damian Munafo, Yuli Barcohen, Dor Levy, Nachum Barcohen, Eli Elik Kupermann, Fred Bolay, Elad Dabool
-
Publication number: 20190227909Abstract: A testing service is provided for testing software applications. A developer of a software application provides the software application to the testing service. The testing service installs and runs instances of the application on respective target devices such as cellular communication devices. The target devices may be of different makes and models, and may have different configurations such as different screen aspect ratios. As the instances execute, the testing service captures the screen output of the target devices and provides it back to the developer. The screen output of the multiple devices is displayed simultaneously to the developer, so that the developer can assess whether the application produces acceptable screen output despite the different configurations of the various devices.Type: ApplicationFiled: January 22, 2018Publication date: July 25, 2019Inventors: Samson Kim-Sun Kwong, Peter P. Myron, Michael J. Mitchell
-
Publication number: 20190227910Abstract: A novel and useful system and method of time traveling source code debugging including several advanced capabilities that significantly improve the source code debugging process. Upon hitting a breakpoint or opening a dump file, the debugger travels to the future which can be altered by a user by modifying code on the fly (live coding) and receiving immediate feedback to validate bug fixes. Visual annotations including values of variables and expressions are provided as a heads up display effectively flattening time and space. A pivoting capability allows a user to switch the execution context of the code at any time. Point in time links that store the state of the debugging session can be created and activated. An asynchronous collaboration and messaging system enables multiple participants to share a debugging session. An optional redaction capability is also provided for obscuring or replacing sensitive private information.Type: ApplicationFiled: January 7, 2019Publication date: July 25, 2019Applicant: CODEVALUE D.T. LTD.Inventors: Omer Raviv, Alon Mordechai Fliess
-
Publication number: 20190227911Abstract: A novel and useful system and method of time traveling source code debugging including several advanced capabilities that significantly improve the source code debugging process. Upon hitting a breakpoint or opening a dump file, the debugger travels to the future which can be altered by a user by modifying code on the fly (live coding) and receiving immediate feedback to validate bug fixes. Visual annotations including values of variables and expressions are provided as a heads up display effectively flattening time and space. A pivoting capability allows a user to switch the execution context of the code at any time. Point in time links that store the state of the debugging session can be created and activated. An asynchronous collaboration and messaging system enables multiple participants to share a debugging session. An optional redaction capability is also provided for obscuring or replacing sensitive private information.Type: ApplicationFiled: January 7, 2019Publication date: July 25, 2019Applicant: CODEVALUE D.T. LTD.Inventors: Omer Raviv, Alon Mordechai Fliess
-
Publication number: 20190227912Abstract: Machine learning techniques are used to determine the viability of user data measuring the behavior of a new version of the program when compared with user data that measured the behavior of a previous version of the program. The machine learning techniques utilize statistical techniques in a non-conventional manner to train a system to learn from data obtained from the usage of both a new version of the program and a previous version that accounts for the variability in the user population, time variability of the results of the previous version, and feature coverage between the two test results in order to ensure the suitability of the user data in making estimations or predictions about the performance and reliability of the new version.Type: ApplicationFiled: May 25, 2018Publication date: July 25, 2019Inventors: JORGE BANUELOS, XI CHENG, NEELAKANTAN SUNDARESAN, CENZHUO YAO, KEXIN XU
-
Publication number: 20190227913Abstract: Embodiments described herein are directed to computer-implemented methods, systems, and computer program products for regression testing. A non-limiting example of a computer-implemented method includes receiving, by a processing system, application data from a user processing system deploying utilizing an application during normal use of the application. The method further includes generating, by the processing system, a regression test scenario for a new version of the application to be deployed on the user processing system, wherein the regression test scenario is based at least in part on the application data received from the user processing system. The method further includes executing, by the processing system, a regression test on the new version of the application using the regression test scenario.Type: ApplicationFiled: March 28, 2019Publication date: July 25, 2019Inventor: CRESYI PADILLA-RUBERTE
-
Publication number: 20190227914Abstract: Aspects of the disclosure are directed to providing access to the contents of a computing platform definition. A computing platform definition includes entries indicating devices and executables to deploy to a computing platform. An orchestration engine is communicatively connected to a computing platform that implements the computing platform definition. An interface includes callable units that provide access to the computing platform definition which may be invoked by the orchestration engine during execution of a stage of an orchestration pipeline performed with respect to the computing platform. The interface receives from the orchestration engine a request indicating one of the callable units. In response to the request, the interface retrieves the portion of the computing platform definition that is associated with the callable unit indicated and provides that portion of the computing platform definition to the orchestration engine for use during execution of the stage of the orchestration pipeline.Type: ApplicationFiled: March 29, 2019Publication date: July 25, 2019Inventors: Suresh G. Nair, Hemanth G. Jayakumar, Sundar Krishnamoorthy, Georges M. Nkamicaniye
-
Publication number: 20190227915Abstract: Methods, systems and apparatuses may provide for technology that applies a functional safety test stimulus to a hardware level simulator, automatically compiles an output of the hardware level simulator into a software test library (STL), and iteratively verifies that the diagnostic coverage of the STL file approximates the diagnostic coverage of the functional safety test stimulus.Type: ApplicationFiled: March 29, 2019Publication date: July 25, 2019Inventors: Krishnan Anandh, Richard Bousquet, Vyasa Sai, Andrea Kroll, Mauro Pipponzi
-
Publication number: 20190227916Abstract: Disclosed herein is a system for facilitating execution of test cases, in accordance with some embodiments. Accordingly, the system may include a communication device configured for receiving a first test case data including a plurality of first test steps and a second test case data including a plurality of second test steps. Further, the system may include a processing device configured for identifying a common test step between the plurality of first test steps and the plurality of second test steps. Further, the processing device may be configured for generating a plurality of first test results associated with the plurality of first test steps based on execution of the plurality of first test steps. Further, the system may include a storage device configured for storing the plurality of first test results in association with the plurality of first test steps.Type: ApplicationFiled: January 9, 2019Publication date: July 25, 2019Inventor: JayaSudha Yedalla
-
Publication number: 20190227917Abstract: Systems, methods, and devices for creating a test performance monitoring and reporting system that is adaptive for use with different types of mobile devices are disclosed. The test performance monitoring and reporting system adapts itself to be interoperable with different models of mobile device by combining sequences of deterministic logic blocks with device-specific asset libraries. Logic blocks can be added to or removed from the sequence. Logic blocks implement different operations of mobile devices, including using assets, launching applications, and replaying sequences of command interface interactions recorded from test users. The asset library contains assets corresponding to mobile device elements that can be manipulated by users. These assets are device-specific, and a test script can be adapted to fit a particular mobile device model by replacing the existing assets in the script with assets from the asset library of the particular mobile device.Type: ApplicationFiled: January 19, 2018Publication date: July 25, 2019Applicant: Spirent Communications, Inc.Inventors: Evan C. Henry, Ian S. Becker, Robert R. Brown, Yuanke Wang
-
Publication number: 20190227918Abstract: The present disclosure provides a method for allocating memory resources, a chip and a non-transitory readable medium. The method includes: dividing memory resources into primary memory resources and reserved memory resources, wherein the reserved memory resources are reserved for a secondary system; receiving a control information indicating that a mission of the secondary system is completed or not executed; and in response to the control information, updating the reserved memory resources by setting the reserved memory resources as available to a primary system. According to the present disclosure, after the mission of the secondary system is completed or not executed, the reserved memory resources are set as available to the primary system. That is, it is possible to recycle the reserved memory resources for the use of the primary system. Thus, waste of memory resources may be reduced and utilization rate of memory resources may be improved.Type: ApplicationFiled: November 23, 2018Publication date: July 25, 2019Inventor: KE XU