Patents Issued in February 6, 2020
  • Publication number: 20200042389
    Abstract: Methods, systems, and other aspects for reconstructing data and rebuilding a failed storage device in a storage system using one or more functioning compute resources and/or storage resources of the failed storage device. For example, a method may include, responsive to a detection of a failed storage device in a storage system, locating data and redundancy information in functioning storage device(s) in the storage system for reconstructing data of the failed storage device; issuing peer-to-peer commands to the functioning storage device(s) to obtain the data and the redundancy information from the functioning storage device(s); and reconstructing the data of the failed storage device based on the data and the redundancy information obtained from the functioning storage device(s), wherein a functioning compute resource of the failed computing device at least partially performs one or more of the locating, issuing, and reconstructing.
    Type: Application
    Filed: August 3, 2018
    Publication date: February 6, 2020
    Inventors: Anand Kulkarni, Vladislav Bolkhovitin, Brian Walter O'Krafka, Sanjay Subbarao
  • Publication number: 20200042390
    Abstract: Example peer storage systems, storage devices, and methods provide peer data recovery across a peer communication channel. Peer storage devices establish peer communication channels that communicate data among the peer storage devices. A storage device may identify storage media segments from their storage medium for recovery of failed data units. A peer storage device may be identified that contains recovery data for the failed data units. The recovery data may be received over the peer communication channel and the storage media segments may be recovered using the recovery data.
    Type: Application
    Filed: August 3, 2018
    Publication date: February 6, 2020
    Inventor: Adam Roberts
  • Publication number: 20200042391
    Abstract: An information handling system includes a storage device and a processor. The storage device stores Power-On Self Test (POST) code, diagnostic code, and remediation code. The POST code determines whether an error occurred while booting the information handling system. If an error occurred, the diagnostic code determines whether the error is associated with a configuration setting of the information handling system being in a first state. If the error is associated with the configuration setting being in the first state, the remediation code changes the first configuration setting from the first state to a second state, and reboots the information handling system.
    Type: Application
    Filed: August 2, 2018
    Publication date: February 6, 2020
    Inventors: Chris E. Pepper, Gregory A. Havenga, Michael J. Landrus
  • Publication number: 20200042392
    Abstract: A new snapshot of a storage volume is created by suppressing write requests. Once pending write requests from the computing nodes are completed, storage nodes create a new snapshot for the storage volume by allocating a new segment to the new snapshot. Subsequent write requests to the storage volume are then performed on the segments allocated to the new snapshot. An orchestration layer implements a bundled application that is provisioned with storage volumes and containers. A snapshot of the application may be created and used to rollback or clone the application. The amount of processing cores, memory, and containers may be increased or decreased based on usage. Components of the bundled application may be assigned to nodes to satisfy affinity and anti-affinity rules. Device sets may be generated according to these rules and used to plan for the assignment of storage volumes and containers of the bundled application.
    Type: Application
    Filed: July 31, 2018
    Publication date: February 6, 2020
    Inventors: Ravi Kumar Alluboyina, Dhanashankar Venkatesan
  • Publication number: 20200042393
    Abstract: Copy-on-Write (CoW) snapshots share data on disk for extents that have not been overwritten, which allows for efficient use of disk space. A chain of snapshots may be created, where each snapshot corresponds to a point in time. A sequence of snapshots may be copied by rebuilding each snapshot for the destination volume based on the source volume, resulting in memory usage at the destination volume substantially similar to the memory usage of the snapshot sequence at the source volume.
    Type: Application
    Filed: July 31, 2018
    Publication date: February 6, 2020
    Applicant: Portworx, Inc.
    Inventor: Dinesh Israni
  • Publication number: 20200042394
    Abstract: A storage system in one embodiment comprises a storage controller and a plurality of storage devices comprising a plurality of memory portions. The storage controller is configured to monitor a plurality of servers for a failure event. The servers store a plurality of copies of the memory portions. The storage controller is further configured to mark as invalid a copy of a memory portion on a failed server, search for and identify a location on an operational server for storing a new version of the copy, and communicate the copy invalidity and the identified location to a client device using the memory portion. The client device is configured to generate the new version of the copy for storage on the operational server, and the storage controller receives a notification from the client device regarding whether the new version of the copy was generated and stored on the operational server.
    Type: Application
    Filed: July 31, 2018
    Publication date: February 6, 2020
    Inventors: Inna Resnik, Zvi Schneider, Dani Shemesh
  • Publication number: 20200042395
    Abstract: In an embodiment, described herein is a system and method for discovering backups of a database running on a database host, for use by a centralized backup system to validate backup compliance. A report agent executing on the database host can implement a discovery process configured to gather metadata for the backups of the database from a number of dynamic performance views of the database. The metadata is recorded in a control file of the database, and can include one or more commands used by the backup tool to create the backups. The report agent can categorize the metadata into one or more groups based on the backup commands, map backup files associated with each backup to that backup, create a backup report to describe the mapping information and additional information for each backup, and send the backup report to the centralized backup system.
    Type: Application
    Filed: July 31, 2018
    Publication date: February 6, 2020
    Inventors: Wei CHU, Xinyan ZHANG, Kenneth OWENS, Adrian DOBREAN, Daniel WOLSKI
  • Publication number: 20200042396
    Abstract: System and method for creating linked clones of storage objects stored in a storage uses a target storage structure that includes a linked clone being created from a selected snapshot of a storage object and surface snapshots. The linked clone is created in the target storage structure with references to the selected snapshot of the storage object in a source storage structure without completely copying the selected snapshot to the target storage structure. The surface snapshots, which correspond to other snapshots of the storage object in the source storage structure, are created in the target storage structure with references to the other snapshots without completely copying the other snapshots to the target storage structure to produce the linked clone with similar snapshots as the storage object at a point in time when the selected snapshot was captured.
    Type: Application
    Filed: July 31, 2018
    Publication date: February 6, 2020
    Inventors: Asit DESAI, Derek ULUSKI, Alexander T. GARTHWAITE, Sunil Satnur, Ilya LANGUEV, Anoop Jaishankar
  • Publication number: 20200042397
    Abstract: A method and system for providing file level restore (FLR) service for restoring one or more files stored in a plurality of file systems in a backup of a first virtual machine is provided. The method creates a FLR session for a user, including: creating a virtual disk file in a second virtual machine providing the FLR service, the virtual disk file including an empty file system being mounted as a root folder of a virtual appliance in the second virtual machine; creating a respective folder for each of the plurality of file systems under the root folder; mounting each of the plurality of file systems to the respective folder; and mounting the root folder to a folder of the second virtual machine. The method restores the one or more files by the user through accessing the folder of the second virtual machine in the FLR session.
    Type: Application
    Filed: August 31, 2018
    Publication date: February 6, 2020
    Inventors: Jing Yu, Ming Zhang, Boda Lei, Yun Wang, Liang Zheng
  • Publication number: 20200042398
    Abstract: Disclosed herein are systems and method for method for predictive data protection. In one aspect, an exemplary method comprises selecting data stored on a computing device for backing up, according to a predetermined schedule for performing a backup; collecting features associated with the computing device where the data for the backup is stored, the features comprising device information for the computing device, user information for a user of the data, and external information associated with a locale of the computing device; analyzing the features to determine a set of backup parameters for the backup, wherein the backup parameters comprise scheduling parameters and destination storage parameters; generating a backup plan based on the set of parameters for performing the backup; and performing the backup of the data according to the backup plan.
    Type: Application
    Filed: August 6, 2019
    Publication date: February 6, 2020
    Inventors: Dmitry Martynov, Stanislav Protasov, Serguei Beloussov
  • Publication number: 20200042399
    Abstract: There is disclosed techniques for managing data storage. In one embodiment, the techniques comprise recording index information in a block-based segment of a file system. The index information relates to an extent list in a virtual block map (VBM) pointing to the block-based segment. The techniques also comprise detecting an error in connection with the VBM. The techniques also comprise rebuilding the VBM based on the index information in response to detecting the error.
    Type: Application
    Filed: September 10, 2018
    Publication date: February 6, 2020
    Inventors: Yaming Kuang, Jun Liu, Xiao Hua Fan
  • Publication number: 20200042400
    Abstract: A first threshold corresponds to a data change at which a backup is triggered. A second threshold corresponds to a time interval at which the backup is triggered. A client is polled to obtain a first value indicating an amount of data changed since a last backup. A second value is tracked indicating an amount of time elapsed since the last backup. A determination is made as to whether to trigger the backup based on at least one of the first value exceeding the first threshold or the second value exceeding the second threshold. When the backup is not triggered because neither the first value exceeds the first threshold nor the second value exceeds the second threshold, the backup is triggered regardless based on a degree to which the first threshold has been reached, a degree to which the second threshold has been reached, and current usage of resources.
    Type: Application
    Filed: July 31, 2018
    Publication date: February 6, 2020
    Inventors: Pravin Kumar Ashokkumar, Sunder Ramesh Andra, Elakkuvan Chidambaram
  • Publication number: 20200042401
    Abstract: A content addressable storage system in one embodiment comprises a plurality of storage devices and a storage controller. The content addressable storage system is configured to receive from another storage system a plurality of snapshots for at least one storage volume designated for backup from the other storage system to the content addressable storage system. For each of a plurality of pages of a given one of the snapshots, the content addressable storage system generates a content-based signature for the page, compares the content-based signature for the page to a previous content-based signature generated for a corresponding page having the same address in a previous one of the snapshots, and stores the page of the given snapshot in one or more of the storage devices of the content addressable storage system responsive to an absence of a match between the compared content-based signatures. The content-based signatures illustratively comprise respective hash handles.
    Type: Application
    Filed: July 31, 2018
    Publication date: February 6, 2020
    Inventors: David Meiri, Anton Kucherov
  • Publication number: 20200042402
    Abstract: Systems for multi-cluster virtualized computing system management. A method for performing virtual entity replication between source computing clusters and target computing clusters commences upon establishing a virtual entity naming convention that is observed by both the source computing clusters and the target computing clusters. A snapshot from a source cluster is associated with a global snapshot ID before being transmitted to a target computing cluster. At some point in time, the source cluster will initiate acts to replicate a virtual entity to a particular data state that is associated with a particular named snapshot. A second replication protocol then commences. The second replication protocol includes exchanges that serve to determine whether or not the target computing cluster has a copy of a particular named snapshot as named by the global snapshot ID, and if so, to then initiate virtual entity replication at the target computing cluster using the named snapshot.
    Type: Application
    Filed: July 31, 2018
    Publication date: February 6, 2020
    Applicant: Nutanix, Inc.
    Inventors: Praveen Kumar PADIA, Bharat Kumar BEEDU, Kiran Tatiparthi, Krishnaveni BUDATI, Wangzi HE
  • Publication number: 20200042403
    Abstract: Apparatuses, methods, systems, and program products are disclosed for cluster configuration backup and recovery. One method includes receiving, by use of a processor, configuration data for a cluster. The method includes storing the configuration data for the cluster. The method also includes forming a machine-readable code that corresponds to the stored configuration data for the cluster. The machine-readable code may be used for restoring the stored configuration data to the cluster.
    Type: Application
    Filed: August 1, 2018
    Publication date: February 6, 2020
    Inventors: Komal S. Shah, Shweta Kulkarni, Bharti Soni, Shrirang S. Bhagwat
  • Publication number: 20200042404
    Abstract: Systems and methods for synthesizing cloud snapshots of production data. A client system includes data and snapshots may be taken of that data. These snapshots are transferred to the cloud and hydrated to block devices that are similar to the devices on which the production data exists. Snapshots are then taken of the block devices. The cloud snapshots are the same as and correspond to the locally generated snapshots.
    Type: Application
    Filed: August 3, 2018
    Publication date: February 6, 2020
    Inventor: Sunil Kumar
  • Publication number: 20200042405
    Abstract: One example method includes, in response to a crash event, obtaining data protection system credentials, accessing a target storage of the data protection system, obtaining, from the target storage, a configuration file including configuration information for a data protection cluster, and using, by the data protection cluster, the configuration information to self-configure. The method further includes creating a consistency group (CG) of a group of volume, and restoring a journal volume to append backup indexes.
    Type: Application
    Filed: August 2, 2018
    Publication date: February 6, 2020
    Inventor: Kiran Kumar Dudala
  • Publication number: 20200042406
    Abstract: Systems and methods for discovering applications. An application may be discovered by determining a topology of the application in a containerized platform. Discovering the topology may include determining the components of the application and then determining relationships between the components. The relationships may include whether a component (e.g., a microservice) is user facing and may be based on traffic patterns between the components. The components or microservices may be prioritized or ranked based on the topology. The topology can be used when performing a data protection operation such as a restore operation.
    Type: Application
    Filed: August 3, 2018
    Publication date: February 6, 2020
    Inventors: Assaf Natanzon, Luay Al-Alem, Antony Bett, Michael Rhodes
  • Publication number: 20200042407
    Abstract: An example method of restoring a database includes obtaining information about backup data of a database from a source storage separate from a compute infrastructure. The information includes a list of data blocks of a file, transferring the data blocks on the list from the source storage to a local storage on the compute infrastructure, and tracking which data blocks of the file have been transferred from the source storage to the local storage concurrently when transferring the data blocks.
    Type: Application
    Filed: July 24, 2019
    Publication date: February 6, 2020
    Inventors: Joshua Duncan Hight, Jiangbin Luo, Christopher Wong
  • Publication number: 20200042408
    Abstract: A distributed system for creating a consistency snapshot for a distributed application includes a control node and multiple execution nodes including a source execution node, an intermediate execution node, and a leaf execution node. The source execution node receives a snapshot event, and generates a single-point snapshot of an application instance associated with the source execution node. Each of the intermediate execution node and the leaf execution node sequentially receives snapshot events separately sent by two parent nodes of the respective nodes, generates a single-point snapshot of an application instance associated with the respective nodes after receiving the first snapshot event, records a log of a task when executing the task triggered by another parent node different from a parent node sending the first snapshot event, and stops recording a log of a task triggered each time one snapshot event sent by a parent node is received subsequently.
    Type: Application
    Filed: September 26, 2019
    Publication date: February 6, 2020
    Inventors: Wei YIN, Bin LUO
  • Publication number: 20200042409
    Abstract: Techniques to restore data from backup are disclosed. In various embodiments, an indication of a subcomponent to be restored from backup is received. View information associated with the backup is used to determine a set of physical components required to be retrieved from the backup to restore the requested subcomponent. The determined set of physical components is retrieved from the backup. The retrieved physical components are used to restore the subcomponent. In various embodiments, the view information includes data that identifies each of a plurality of separately-recoverable subcomponents of the backup and for each one or more physical components comprising the backup which would be required to restore that subcomponent.
    Type: Application
    Filed: October 9, 2019
    Publication date: February 6, 2020
    Inventors: Sonal Pandey, Venkatraman Venkatasubramanyam, Vaibhav Jain
  • Publication number: 20200042410
    Abstract: A high-availability network device cluster role synchronization technique for devices configured with multiple network controllers is disclosed. An HA node may contain information regarding a role within a cluster for that HA node. This information should property be maintained or erased based on a type of failover for an HA device. For example, if there is a loss of the active controller that causes only a controller failover, changes to the role of the HA node may not be necessary. Thus, an election process within a cluster may be avoided. However, if a failover of an entire HA node occurs (or restart of an HA node), role information prior to the restart may not be applicable and an election process may need to be initiated such that the cluster may continue to function. Different types of roles may exist for nodes within a cluster.
    Type: Application
    Filed: July 31, 2018
    Publication date: February 6, 2020
    Inventors: Manan Gupta, Sudhanshu Rajvaidya
  • Publication number: 20200042411
    Abstract: Methods and devices for providing reserved failover capacity across a plurality of data centers are described herein. An exemplary method includes determining whether a management process is executing at a first data center corresponding to a first physical location. In accordance with a determination that the management process is not executing at the first data center corresponding to the first physical location a host is initiated at a second data center corresponding to a second physical location and the management process is executed on the initiated host at the second data center corresponding to the second physical location.
    Type: Application
    Filed: July 10, 2019
    Publication date: February 6, 2020
    Inventors: Manoj KRISHNAN, Gabriel TARASUK-LEVIN
  • Publication number: 20200042412
    Abstract: Methods, systems, and other aspects for using a failed storage device in a peer-to-peer (P2P) storage system to perform a storage-centric task. For example, a method may include, responsive to a detection of a failed storage device in a P2P storage system, determining, by the failed storage device, that a storage-centric task is assigned to the failed storage device; and performing, by the failed storage device, the storage-centric task responsive to P2P communications with a functioning storage device in the P2P storage system.
    Type: Application
    Filed: August 3, 2018
    Publication date: February 6, 2020
    Inventors: Anand Kulkarni, Vladislav Bolkhovitin
  • Publication number: 20200042413
    Abstract: Techniques for implementing high availability for persistent memory are provided. In one embodiment, a first computer system can detect an alternating current (AC) power loss/cycle event and, in response to the event, can save data in a persistent memory of the first computer system to a memory or storage device that is remote from the first computer system and is accessible by a second computer system. The first computer system can then generate a signal for the second computer system subsequently to initiating or completing the save process, thereby allowing the second computer system to restore the saved data from the memory or storage device into its own persistent memory.
    Type: Application
    Filed: September 26, 2019
    Publication date: February 6, 2020
    Inventors: Pratap Subrahmanyam, Rajesh Venkatasubramanian, Kiran Tati, Qasim Ali
  • Publication number: 20200042414
    Abstract: The present disclosure includes apparatuses comprising replaceable memory. An example apparatus may include a controller and a memory package coupled to the controller and including a plurality of memory dies. At least one of the memory package and the controller may be a replaceable unit that is removable from the apparatus and replaceable with a different replaceable unit while maintaining operation of the apparatus.
    Type: Application
    Filed: October 15, 2019
    Publication date: February 6, 2020
    Inventors: Ananda C. S. Mahesh, Gregory P. Shogan
  • Publication number: 20200042415
    Abstract: A system for polling components is disclosed that includes a plurality of processors and a control system configured to interface with each of the plurality of processors, and to 1) poll each of the plurality of processors using a first polling loop and 2) transfer one of the plurality of processors to a second polling loop if the one of the plurality of processors is non-responsive to the poll.
    Type: Application
    Filed: August 3, 2018
    Publication date: February 6, 2020
    Applicant: DELL PRODUCTS L.P.
    Inventors: Akkiah Choudary Maddukuri, Arun Muthaiyan, Komal Kumar Dhote, Rama Rao Bisa
  • Publication number: 20200042416
    Abstract: An object of the present invention is to provide a redundant information processing system that can continue its operation without stopping as much as possible. To achieve this, the information processing system includes multiple storage nodes including processors, memories, and storage devices, as well as a network for connecting the storage nodes. The processor of at least one storage node performs the steps of: obtaining the configuration information of the information processing system; obtaining first failure information related to a first failure occurred in the information processing system; calculating the availability level of the information processing system when a second failure further occurs, based on the configuration information and the first failure information; and controlling the operation of the system based on the availability level. Then, the processor outputs a notification.
    Type: Application
    Filed: March 7, 2019
    Publication date: February 6, 2020
    Applicant: HITACHI, LTD.
    Inventors: Ai SATOYAMA, Tomohiro KAWAGUCHI
  • Publication number: 20200042417
    Abstract: Methods and apparatus relating to techniques for power management. In an example, an apparatus comprises logic, at least partially comprising hardware logic, to generate a voltage/frequency curve for at least one of a core or a sub-core in a processor and manage an operating voltage level of the at least one of a core or a sub-core using the voltage/frequency curve. Other embodiments are also disclosed and claimed.
    Type: Application
    Filed: July 30, 2019
    Publication date: February 6, 2020
    Applicant: Intel Corporation
    Inventors: Nikos Kaburlasos, Balaji Vembu, Josh B. Mastronarde, Altug Koker, Eric C. Samson, Abhishek R. Appu, Kiran C. Veernapu, Joydeep Ray, Vasanth Ranganathan, Sanjeev S. Jahagirdar
  • Publication number: 20200042418
    Abstract: Technologies are disclosed that help developers determine server resource usage caused by client application generated events. Embodiments may be employed while an application is under development to balance the benefit of a given event with an estimated cost to process the event once the application is deployed. One aspect of the present disclosure provides a telemetry application that receives application generated events and estimates a resource cost they cause to data collection servers. The resource cost may be based on historic data captured from similar or related events, as well as data about how often the event and related events are raised by the application.
    Type: Application
    Filed: July 31, 2018
    Publication date: February 6, 2020
    Inventors: Brian Eugene KIHNEMAN, Heron Arzaquel ANZURES REYES, Medhavin VADHANASINDHU, Siddharth DAHIYA, Dolly SOBHANI, Peter P. BAER, Ankit KAPUR, Eric Leighton SMITH, Kristopher Wayne LANGOHR
  • Publication number: 20200042419
    Abstract: Embodiments described herein provide a system for facilitating efficient benchmarking of a piece of hardware for artificial intelligence (AI) models. During operation, the system determines a set of AI models that are representative of applications that run on the piece of hardware. The piece of hardware can be configured to process AI-related operations. The system can determine workloads of the set of AI models based on layer information associated with a respective layer of a respective AI model in the set of AI models and form a set of workload clusters from the determined workloads. The system then determines, based on the set of workload clusters, a synthetic AI model configured to generate a workload that represents statistical properties of the determined workload.
    Type: Application
    Filed: July 31, 2018
    Publication date: February 6, 2020
    Applicant: Alibaba Group Holding Limited
    Inventors: Wei Wei, Lingjie Xu, Lingling Jin
  • Publication number: 20200042420
    Abstract: A computer-implemented method, a device and a computer program product are proposed. The method comprises obtaining a resource service time of a transaction of an application. The resource service time indicates a time period when the transaction occupies a computer resource. The method further comprises obtaining a time-resource model. The time-resource model indicates a historical relationship among the resource service time, a resource wait time of the transaction, and a reference resource utilization of a second transaction of a second application. The resource wait time indicates a time period when the transaction waits for the computer resource to become available, and the reference resource utilization indicates a degree of the second transaction occupying the computer resource during a time period when the second transaction is running Additionally, the method further comprises determining transaction run time based on the resource service time and the time-resource model.
    Type: Application
    Filed: August 3, 2018
    Publication date: February 6, 2020
    Inventors: Shan Gao, Li Gao, Qian Ren, Xiao Hai Ma, Ze Zhang, Li Wei Zhang, Bin Chen, Ting Ting Tang
  • Publication number: 20200042421
    Abstract: A computer-implemented method according to one embodiment includes identifying aggregated customer performance data for a system resource, creating a first system map for the system resource, utilizing the aggregated customer performance data, comparing the first system map to a second system map created for the system resource utilizing calibration data, and adjusting the second system map, based on the comparing.
    Type: Application
    Filed: October 8, 2019
    Publication date: February 6, 2020
    Inventors: Eduardo Campos Peiro, Joshua D. Martin, Bruce McNutt, Vernon W. Miller
  • Publication number: 20200042422
    Abstract: A log analysis system according to one example embodiment of the present invention includes: a log input unit that inputs first logs as an analysis target log; a first order-determination unit that determines first order that is occurrence order of first partial logs having an identifier indicating being associated with each other out of logs included in the first logs; a second order-determination unit that determines second order that is occurrence order of logs not having the identifier out of logs included in second logs obtained by removing the first partial logs from the first logs; and a third order-output unit that outputs third order that is occurrence order of logs included in the analysis target log by using the first order and the second order.
    Type: Application
    Filed: October 5, 2017
    Publication date: February 6, 2020
    Applicant: NEC Corporation
    Inventor: Ryosuke TOGAWA
  • Publication number: 20200042423
    Abstract: Apparatuses and methods for address detection are disclosed herein. An example apparatus it an address filter and an address tracking circuit. The address filter may be configured to receive a first address and to determine whether the first address matches an address of a plurality of addresses associated with the address filter. The address tracking circuit may be coupled to the address filter and configured to store the first address responsive to a determination that the first address matches an address of the plurality of addresses associated with the address filter. The address tracking circuit may further be configured to receive a second address and to change a count associated with the first address based on the second address matching the first address. The address tracking circuit may be configured to selectively provide the first address responsive to the count.
    Type: Application
    Filed: October 11, 2019
    Publication date: February 6, 2020
    Applicant: MICRON TECHNOLOGY, INC.
    Inventors: Kallol Mazumder, Jason M. Brown, Derek R. May, Jeffrey E. Koelling, Roger D. Norwood
  • Publication number: 20200042424
    Abstract: Embodiments of the present disclosure disclose a method, apparatus and system for processing log data. A specific embodiment of the method includes: acquiring multiple pieces of to-be-processed log data generated based on a log within a preset time period, the to-be-processed log data including multiple attributes and preset indicators; determining multiple attribute value groups; determining, for an attribute value group, based on indicator values of preset indicators respectively indicated by multiple pieces of to-be-processed log data having each attribute value in the attribute value group, an indicator statistic value of the preset indicators of a log having each attribute value in the attribute value group; and generating a log data aggregation table based on indicator statistic values of preset indicators respectively corresponding to the multiple attribute value groups.
    Type: Application
    Filed: July 8, 2019
    Publication date: February 6, 2020
    Inventor: Miao ZHANG
  • Publication number: 20200042425
    Abstract: A packet backpressure detection method and apparatus are provided. The method includes: a device which having a Peripheral Component Interconnect Express (PCIe) port storing a plurality of packets for transmission in a packet queue and storing a packet that is to be transmitted next in a first buffer, where the queue comprises a plurality of packets that are to be transmitted via the PCIe port; and the queue is stored in a second buffer; recording a storage duration of each packet stored in the first buffer, and accumulating the storage duration of each packet stored in the first buffer; removing the packet from the first buffer after the packet is transmitted via the PCIe port; and generating an indication of packet pressure at the PCIe port based on the accumulated storage duration.
    Type: Application
    Filed: October 15, 2019
    Publication date: February 6, 2020
    Applicant: HUAWEI TECHNOLOGIES CO.,LTD.
    Inventors: Bin Zhang, Ligang Chen, Jiahuai Chen, Lixia Xu
  • Publication number: 20200042426
    Abstract: A system and method is disclosed for the automated identification of causal relationships between a selected set of trigger events and observed abnormal conditions in a monitored computer system. On the detection of a trigger event, a focused, recursive search for recorded abnormalities in reported measurement data, topological changes or transaction load is started to identify operating conditions that explain the trigger event. The system also receives topology data from deployed agents which is used to create and maintain a topological model of the monitored system. The topological model is used to restrict the search for causal explanations of the trigger event to elements of that have a connection or interact with the element on which the trigger event occurred. This assures that only monitoring data of elements is considered that are potentially involved in the causal chain of events that led to the trigger event.
    Type: Application
    Filed: July 23, 2019
    Publication date: February 6, 2020
    Inventors: Ernst AMBICHL, Herwig MOSER, Otmar ERTL
  • Publication number: 20200042427
    Abstract: Techniques and structures to provide secure data transfer between entities in a multi-user on-demand computing environment. An electronic device may comprise at least one physical memory device, one or more processors coupled with the at least one physical memory device, the one or more processors configurable to create a scratch destination organization within the computing environment, receive, via a user interface, a metadata selection comprising a plurality of metadata resources, extract the plurality of metadata resources from an origin organization within the computing environment into a metadata bundle, and deploy the metadata bundle in the scratch organization. Additional subject matter may be described and claimed.
    Type: Application
    Filed: October 31, 2018
    Publication date: February 6, 2020
    Inventors: Florian Bastianelli, Pascal Mercier, Sameer Singhvi
  • Publication number: 20200042428
    Abstract: An instrumentation analysis system processes data streams by executing instructions specified using a data stream language program. A user interface allows users to specify data stream language programs. The user interface presents widgets to the user to specify various components of a data stream language program including a filter expression, an analytical function representing an aggregation or transformation, and so on. The user interface allows users to specify an expression based on results of previously specified data stream language programs. The instrumentation analysis system processes the data stream language programs specified by the user to generate a set of result data streams and plots the result data streams, for example, on a screen of a client device.
    Type: Application
    Filed: August 12, 2019
    Publication date: February 6, 2020
    Inventors: Eyal Ophir, Kevin Cheng
  • Publication number: 20200042429
    Abstract: A data analysis system processes data generated by instrumented software. The data analysis system receives data streams generated by instances of instrumented software executing on systems. The data analysis system also receives metadata describing data streams. The data analysis system receives an expression based on the metadata. The data analysis system receives data of data streams for each time interval and computes the result of the expression based on the received data values. The data analysis system repeats these steps for each time interval. The data analysis system may quantize data values of data streams for each time interval by generating an aggregate value for the time interval based on data received for each data stream for that time interval. The data analysis system evaluates the expression using the quantized data for the time interval.
    Type: Application
    Filed: August 16, 2019
    Publication date: February 6, 2020
    Inventors: Phillip Liu, Arijit Mukherji, Rajesh Raman, Kris Grandy, Jack Lindamood
  • Publication number: 20200042430
    Abstract: A data analysis system processes data generated by instrumented software. The data analysis system receives data streams generated by instances of instrumented software executing on systems. The data analysis system also receives metadata describing data streams. The data analysis system receives an expression based on the metadata. The data analysis system receives data of data streams for each time interval and computes the result of the expression based on the received data values. The data analysis system repeats these steps for each time interval. The data analysis system may quantize data values of data streams for each time interval by generating an aggregate value for the time interval based on data received for each data stream for that time interval. The data analysis system evaluates the expression using the quantized data for the time interval.
    Type: Application
    Filed: August 17, 2019
    Publication date: February 6, 2020
    Inventors: Phillip Liu, Arijit Mukherji, Rajesh Raman, Kris Grandy, Jack Lindamood
  • Publication number: 20200042431
    Abstract: Determining instruction execution history in a debugger, including: retrieving, from an instruction cache, cache data that includes an age value for each cache line in the instruction cache; sorting, by the age value for each cache line, entries in the instruction cache; retrieving, using an address contained in each cache line, one or more instructions associated with the address contained in each cache line; and displaying the one or more instructions.
    Type: Application
    Filed: October 9, 2019
    Publication date: February 6, 2020
    Inventors: THOMAS M. GOODING, ANDREW T. TAUFERNER
  • Publication number: 20200042432
    Abstract: Disclosed is an improved approach to implement testing for distributed computing systems. A switchboard framework is provided that allows tests to be dynamically generated and executed against a system under test.
    Type: Application
    Filed: July 31, 2018
    Publication date: February 6, 2020
    Applicant: Nutanix, Inc.
    Inventors: Manan Hemantkumar SHAH, Jagpreet Kaur SAIGAL, Kilol SURJAN
  • Publication number: 20200042433
    Abstract: A computer-implemented method is provided for determining quality metrics for a question set. In an implementation, a test question set model may be produced based upon calculated quality metrics of a test question set with respect to a test corpus, and including features representing quality metrics. The test question set model may be compared to a baseline question set model based on a distance calculated between one or more projected model features of the baseline question set model and one or more runtime model features of the test question set model. Contents of the test question set may be adjusted based upon the calculated distance.
    Type: Application
    Filed: October 10, 2019
    Publication date: February 6, 2020
    Inventors: Nadiya Kochura, Vinodkumar Raghavan, Donald H. Randall, JR., Derek M. Reedy, Timothy B. Snow
  • Publication number: 20200042434
    Abstract: Techniques for analysis of verification parameters and reduction of training data are provided. A plurality of test results is received, where each of the plurality of test results specifies a respective one or more parameters and a respective one or more events. A list of parameters used to stimulate computing logic is determined. Additionally, a plurality of relevant parameters is generated, corresponding to parameters in the list of parameters that have at least two distinct values specified in the plurality of test results. A plurality of training cases is generated based on the plurality of test results and the plurality of relevant parameters. Further, a neural network is generated for design verification of the computing logic based on the plurality of relevant parameters. The neural network is trained based on the plurality of training cases.
    Type: Application
    Filed: August 6, 2018
    Publication date: February 6, 2020
    Inventors: Chad ALBERTSON, John BORKENHAGEN, Scott D. FREI, David G. WHEELER, Mark S. FREDRICKSON
  • Publication number: 20200042435
    Abstract: A pseudo main memory system. The system includes a memory adapter circuit for performing memory augmentation using compression, deduplication, and/or error correction. The memory adapter circuit is connected to a memory, and employs the memory augmentation methods to increase the effective storage capacity of the memory. The memory adapter circuit is also connected to a memory bus and implements an NVDIMM-F or modified NVDIMM-F interface for connecting to the memory bus.
    Type: Application
    Filed: October 11, 2019
    Publication date: February 6, 2020
    Inventors: Krishna T. Malladi, Jongmin Gim, Hongzhong Zheng
  • Publication number: 20200042436
    Abstract: Devices and techniques are disclosed herein for verifying host generated physical addresses at a memory device during a host-resident FTL mode of operation to ameliorate erroneous or potentially malicious access to the memory device.
    Type: Application
    Filed: August 3, 2018
    Publication date: February 6, 2020
    Inventor: David Aaron Palmer
  • Publication number: 20200042437
    Abstract: A method for managing a memory apparatus including at least one non-volatile (NV) memory element including a plurality of physical blocks includes: obtaining a first host address and first data from a received first access command; obtaining a second host address and second data from a received second access command; linking the first host address to at least a first page of the physical block and linking the second host address to at least a second page of the physical block; storing the first data and second data into the physical block; and selectively erasing a portion of the physical block according to a valid/invalid page count of the physical block, the valid/invalid page count corresponding to accessing pages of the physical block. A difference value of the first host address and the second host address is greater than a number of pages of the physical block.
    Type: Application
    Filed: October 8, 2019
    Publication date: February 6, 2020
    Inventors: Tsai-Cheng Lin, Chun-Kun Lee
  • Publication number: 20200042438
    Abstract: A memory system includes a nonvolatile memory device including a plurality of dies, each die including a plurality of planes, each plane including a plurality of blocks, each block including a plurality of pages, and further includes a plurality of page buffers, each page buffer for caching data in a unit of a page to be inputted to, and outputted from, each of the blocks; and a controller suitable for managing a plurality of super blocks according to a condition, each super block including N blocks capable of being read in parallel among the blocks, generating predicted required times for the super blocks, respectively, each of the predicted required times representing a time needed to extract valid data from the corresponding super block, and selecting a victim block for garbage collection from among the blocks based on the predicted required times.
    Type: Application
    Filed: July 3, 2019
    Publication date: February 6, 2020
    Inventors: Yeong-Sik YI, Jin-Woong KIM