Patents Issued in April 30, 2020
  • Publication number: 20200133768
    Abstract: Disclosed are a semiconductor memory device, a controller, and a memory system. The semiconductor memory device includes a memory cell array including a plurality of memory cells, and an error correcting code (ECC) decoder configured to receive first data and a parity output from selected memory cells of the memory cell array. The ECC decoder generates a syndrome based on the first data and the parity, generates a decoding status flag (DSF) indicating a type of an error of the first data by the syndrome, and outputs the second data and the DSF to an external device outside of the semiconductor memory device when a read operation of the semiconductor memory device is performed.
    Type: Application
    Filed: April 1, 2019
    Publication date: April 30, 2020
    Inventors: Myung Kyu LEE, Jun Jin KONG, Ki Jun LEE, Sung Hye CHO, Dae Hyun KIM, Yong Gyu CHU
  • Publication number: 20200133769
    Abstract: A memory device that performs internal ECC (error checking and correction) can treat an N-bit channel as two N/2-bit channels for application of ECC. The ECC for an N/2-bit channel is simpler than the ECC for N bits, and thus, each N/2-bit portion can be separately correctable when treated as two N/2-bit portions. The memory device can include an additional hardware for the application of ECC to the channel as two sub-channels. For example, the memory device can include an additional subarray to store ECC bits for the internal ECC to enable the application of ECC to two sub-channels of the N-bit channel. The memory device can include an additional driver to access the additional subarray when applied.
    Type: Application
    Filed: December 20, 2019
    Publication date: April 30, 2020
    Inventor: Kuljit S. BAINS
  • Publication number: 20200133770
    Abstract: A storage device includes: a plurality of memory devices configured as a virtual device utilizing stateless data protection; and a virtual device layer configured to manage the virtual device to store objects by applying a first data protection to some of the objects and a second data protection to other ones of the objects depending on respective sizes of the objects.
    Type: Application
    Filed: December 24, 2019
    Publication date: April 30, 2020
    Inventor: Yang Seok Ki
  • Publication number: 20200133771
    Abstract: This disclosure describes a programmable device, referred to generally as a data processing unit, having multiple processing units for processing streams of information, such as network packets or storage packets. This disclosure also describes techniques that include enabling data durability coding on a network. In some examples, such techniques may involve storing data in fragments across multiple fault domains in a manner that enables efficient recovery of the data using only a subset of the data. Further, this disclosure describes techniques that include applying a unified approach to implementing a variety of durability coding schemes. In some examples, such techniques may involve implementing each of a plurality of durability coding and/or erasure coding schemes using a common matrix approach, and storing, for each durability and/or erasure coding scheme, an appropriate set of matrix coefficients.
    Type: Application
    Filed: October 24, 2018
    Publication date: April 30, 2020
    Inventors: Rajan Goyal, Abhishek Kumar Dikshit
  • Publication number: 20200133772
    Abstract: Techniques are presented for maintaining data distributed across a plurality of storage drives (drives) in a robust manner. A method includes (a) collecting physical state information from each drive of the plurality of drives, (b) generating a predicted failure probability of each drive based on the collected physical state information from that drive, the predicted failure probability indicating a likelihood that that drive will fail within a predetermined period of time, and (c) rearranging a distribution of data across the plurality of drives to minimize a probability of DU/DL. Systems, apparatuses, and computer program products for performing similar methods are also provided.
    Type: Application
    Filed: October 31, 2018
    Publication date: April 30, 2020
    Inventors: Nickolay Alexandrovich Dalmatov, Alexander Shraifel
  • Publication number: 20200133773
    Abstract: In an example, a storage device includes a plurality of pages, a main page table structure, and an auxiliary page table structure. The main page table structure includes a first data mapping between a logical address of first data and a first physical address pointing to a first data page. Further, the auxiliary page table structure includes a first metadata mapping between a logical address of first metadata and a second physical address pointing to a first metadata page.
    Type: Application
    Filed: December 19, 2018
    Publication date: April 30, 2020
    Inventor: Chetan Bendakaluru Lingarajappa
  • Publication number: 20200133774
    Abstract: Techniques manage data of a Redundant Array of Independent Disks (RAID). Such techniques involve: obtaining a first parity of checksum pair, which is determined based on a first checksum when user data of data disks in the RAID are predetermined values; determining, based on current checksums of the data disks in the RAID, a second parity of checksum pair of the RAID, the first parity of checksum pair and the second parity of checksum pair respectively comprising a row parity of checksum and a diagonal parity of checksum; and determining, based on the first parity of checksum pair and the second parity of checksum pair, a third parity of checksum pair for updating parity data of parity disks of the RAID.
    Type: Application
    Filed: September 25, 2019
    Publication date: April 30, 2020
    Inventors: Jianbin Kang, Jibing Dong, Hongpo Gao
  • Publication number: 20200133775
    Abstract: Techniques manage a redundant array of independent disks. In such a technique, a response time of a first storage device in the RAID is compared to a first threshold. In response to the response time of the first storage device exceeding the first threshold, the first storage device is configured as a pseudo-degraded storage device, such that the pseudo-degraded storage device is responsive to write requests only.
    Type: Application
    Filed: September 24, 2019
    Publication date: April 30, 2020
    Inventors: Jianbin Kang, Jian Gao, Geng Han
  • Publication number: 20200133776
    Abstract: A technique involves: in response to establishing a stripe in a Redundant Array of Independent Disks (RAID), generating first mapping information of the stripe in a block allocated for the stripe, the RAID being built based on extents obtained by dividing disks, the stripe including a first extent set, the first mapping information recording respective disk locations of the first extent set; in response to a failure occurring in a first disk where a first extent in the first extent set is located, replacing the first extent with a second extent to obtain a second extent set corresponding to the stripe; generating second mapping information of the stripe in the block, to record respective disk locations of the second extent set; and in response to the first disk being recovered from the failure, restoring data in the stripe based on the first mapping information and the second mapping information.
    Type: Application
    Filed: September 25, 2019
    Publication date: April 30, 2020
    Inventors: Jibing Dong, Jian Gao, Geng Han, Xinlei Xu
  • Publication number: 20200133777
    Abstract: A system includes byte-addressable non-volatile memory (NVM) modules. The system includes media controllers communicatively connected to one another over a memory semantic fabric. Each media controller is responsible for a corresponding NVM module to which the media controller is attached. The media controllers cooperatively provide redundant array of independent disks (RAID) functionality at a granularity at which the NVM modules are byte-addressable without employing a master RAID controller.
    Type: Application
    Filed: October 31, 2018
    Publication date: April 30, 2020
    Inventors: Gregg B. Lesartre, Russ W. Herrell, Chris Michael Brueggen
  • Publication number: 20200133778
    Abstract: According to implementations of the present disclosure, there is provided a method for managing a storage system, extents in the storage system being from multiple storage devices in a resource pool associated with the storage system. In the method, regarding multiple extents comprised in a storage device among the multiple storage devices, respective service states of the multiple extents are obtained. Respective features of respective extents among the multiple extents are determined on the basis of respective service states of the multiple extents. An association relation between a failure in an extent in a storage device in the resource pool and a feature of the extent is obtained. A failure extent in which a failure is to be occurred is identified from the multiple extents on the basis of respective features of the multiple extents and the association relation.
    Type: Application
    Filed: February 25, 2019
    Publication date: April 30, 2020
    Inventor: Bing Liu
  • Publication number: 20200133779
    Abstract: Techniques providing I/O control involve: in response to receiving an I/O request, detecting a first set bits for a stripe in a RAID. The RAID is built on disk slices divided from disks. The stripes include extents. Each of the first set bits indicates whether a disk slice where a corresponding extent in the stripe is located is in a failure state. The techniques further involve determining, from the stripe and based on the first set bits, a first set of extents in the failure state and a second set of extents out of the failure state. The techniques further involve executing the I/O request on the second set of extents without executing the I/O request on the first set of extents. Such techniques can simplify storage bits in I/O control, support the degraded stripe write request for the RAID and enhance performance executing the I/O control.
    Type: Application
    Filed: September 30, 2019
    Publication date: April 30, 2020
    Inventors: Geng Han, Jianbin Kang, Jibing Dong
  • Publication number: 20200133780
    Abstract: Embodiments of the present disclosure provide a method, a device and a computer program product for data processing. The method comprises determining, at a first node of a plurality of nodes of a metadata management system, a set of nodes from the plurality of nodes that store access information associated with a shard of metadata; determining, from the set of nodes, the number of available nodes capable of providing the shard; and adjusting the number of available nodes based on a threshold number. In this way, a distributed management of the shard of metadata in each node could be achieved without using the management node in a conventional way.
    Type: Application
    Filed: March 6, 2019
    Publication date: April 30, 2020
    Inventors: Yong Zhang, Pengfei Wu, Ming Zhang, Kun Wang
  • Publication number: 20200133781
    Abstract: Systems and methods for determining retention periods or policies for backups are disclosed. A rule book stores relationships between rules and recommended retention periods. Data related to a backup is collected and organized. A query is generated from the organized data and used to identify a rule from the rule book. The retention period corresponding to the identified rule in the rule book is then applied to the corresponding backup.
    Type: Application
    Filed: October 25, 2018
    Publication date: April 30, 2020
    Inventors: Mahesh Reddy Av, Gururaj Kulkarni, Swaroop Shankar D H, Lakshminarayanan Muniswamy
  • Publication number: 20200133782
    Abstract: The present technology pertains to restoring a directory to a state prior to a past synchronization event. A content management system can present an interface including history of synchronization events for a directory, and a user can select to restore a directory to a state prior to any one of the past synchronization events.
    Type: Application
    Filed: December 18, 2018
    Publication date: April 30, 2020
    Inventors: Pranav Vishnu Ramabhadran, Ken Park, Wes O'Haire, Raveesh Nayar, Helen Lu, Grant Mathews, Sam Keller, Niklas Nordlof, Marian Oman, Julia Weingardt
  • Publication number: 20200133783
    Abstract: Embodiments are described for a heuristic configuration selection process as part of or accessible by the backup management process. This processing component provides a method to automatically determine the configuration parameters needed to obtain optimal performance for a given backup/restore job. This process involves identifying key parameters that determine backup performance and suggest means to derive and incorporate those configurable parameters into the backup software automatically. Embodiments can be applied to stream based backups, or other types of backup software as well.
    Type: Application
    Filed: October 25, 2018
    Publication date: April 30, 2020
    Inventors: Dinesh Kumar, Anand Reddy
  • Publication number: 20200133784
    Abstract: Systems and methods for performing differential and full data protection operations. Parameters that define minimum, interval, and maximum values are provided to an agent. These values relate to changes in the data or in a database. The agent monitors the database and backups are triggered in accordance with these values. A differential backup is not performed until the minimum value is reached and differential backups are performed only after subsequent intervals are reached. A full backup is performed once the maximum value is reached.
    Type: Application
    Filed: October 25, 2018
    Publication date: April 30, 2020
    Inventors: Jigar Premajibhai Bhanushali, Sunil Yadav
  • Publication number: 20200133785
    Abstract: A method, apparatus, and system for storing indexed metadata associated with backed up data is provided. The operations comprising: for each first data item stored at a first client device to be backed up, extracting, at the first client device, an associated first metadata item; transforming, at the first client device, the first metadata item based on a predefined metadata definition; associating, at the first client device, a first client identifier and a backup identifier with the transformed first metadata item; and transferring the transformed first metadata item from the first client device to a metadata bus of a search cluster.
    Type: Application
    Filed: October 26, 2018
    Publication date: April 30, 2020
    Inventors: Jing YU, Mengze Liao, Yongsheng GUO, Adam Brenner, Ming ZHANG
  • Publication number: 20200133786
    Abstract: The present technology pertains to restoring a directory to a state prior to a past synchronization event. A content management system can present an interface including history of synchronization events for a directory, and a user can select to restore a directory to a state prior to any one of the past synchronization events.
    Type: Application
    Filed: December 18, 2018
    Publication date: April 30, 2020
    Inventors: Pranav Vishnu Ramabhadran, Ken Park, Wes O'Haire, Raveesh Nayar, Helen Lu, Grant Mathews, Sam Keller, Niklas Nordlof, Marian Oman, Julia Weingardt
  • Publication number: 20200133787
    Abstract: Embodiments of the present disclosure relate to method, electronic device and computer readable medium of file management. The method comprises: generating an index structure of files in first backup data created at a first point of time, the index structure at least indicating a file name and associated path information of each of the files, the first backup data being incremental backup data relative to second backup data created at a second point of time prior to the first point of time; determining, for a folder involved in the first backup data, existing files that have been present at the second point of time in the folder based on the second backup data; and identifying files modified between the first point of time and the second point of time in the folder by determining whether the index structure comprises index items of the existing files. Accordingly, the modified files can be quickly identified and the computation complexity can be reduced.
    Type: Application
    Filed: February 27, 2019
    Publication date: April 30, 2020
    Inventors: Chaoqian Cai, Tony Jiayue Dong, Crane Xiaohe Shi
  • Publication number: 20200133788
    Abstract: Embodiments of the present disclosure relate to a method, device and computer readable medium for restoring files. The method described herein comprises: at a client, in response to receiving an instruction for restoring a set of files on a virtual machine from a backup server, obtaining a backup of a set of files from the backup server; transmitting information about the backup and a file downloading application to the virtual machine; causing the file downloading application to be executed on the virtual machine by transmitting an instruction for executing the file downloading application to the virtual machine, such that the virtual machine downloads the backup from the client based on the information about the backup.
    Type: Application
    Filed: March 27, 2019
    Publication date: April 30, 2020
    Inventors: Jie Liu, Ningping Gou, Ying Li, Dening Xu, Feng Ou
  • Publication number: 20200133789
    Abstract: Systems and methods for performing data protection operations in a containerized application. A sidecar application is associated with or attached to a main application. The sidecar application has access to the resources of the main application. Backup requests are handled by the sidecar so that the application, which may be stateful, can be placed in a consistent state prior to performing the backup operation. The backup operation is then performed on the consistent application or on the data that is quiesced.
    Type: Application
    Filed: October 25, 2018
    Publication date: April 30, 2020
    Inventors: Assaf Natanzon, Luay Al-Alem, Antony Bett, Michael Rhodes
  • Publication number: 20200133790
    Abstract: Management and configuration of a tiered data storage system are described. An agent software application on computing devices in a first tier processes snapshot backups and pushes them to an appliance software application on a server in a second tier. The agent software application may optionally store checkpoint backups in the first tier. The appliance software application processes archive backups and pushes them to cloud storage in a third tier. A cloud application on a management server receives storage policy specifications from customers and promulgates the policies to the agent software application and the appliance software application. The policy specifications include an optional checkpoint specification including a checkpoint time period for backups in the first tier, a snapshot specification including a snapshot time period for backups in the second tier, and an archive specification including an archive time period for backups in the third tier.
    Type: Application
    Filed: October 25, 2018
    Publication date: April 30, 2020
    Inventor: Rod Christensen
  • Publication number: 20200133791
    Abstract: According to one embodiment, one or more consistent states of a virtual machine (VM) are backed up and stored. An index library is used to extract, from the consistent state(s) of the VM, metadata corresponding to content files captured in the consistent state(s). The extracted metadata is stored into a metadata catalog, where the metadata catalog is subsequently downloaded by an index server to index the content files captured in the consistent state(s).
    Type: Application
    Filed: October 25, 2018
    Publication date: April 30, 2020
    Inventors: Cherami Liu, Yubing Zhang, Scott Zhang, Lihui Su, Jerry Jourdain, Adam Brenner
  • Publication number: 20200133792
    Abstract: The present disclosure relates to a method, apparatus and computer program product for managing a virtual machine. According to example implementations of the present disclosure, there is provided a method for managing a virtual machine. In the method, in response to receiving a backup request for the virtual machine, corresponding metadata of a corresponding object of at least one object in the virtual machine is obtained, the corresponding metadata describing multiple attributes of the corresponding object in a file system of the virtual machine. A corresponding abstract describing a basic attribute of multiple attributes of the corresponding object is generated on the basis of the corresponding metadata. An index of a backup version of the virtual machine is created on the basis of the corresponding abstract, the index comprising a corresponding path of the corresponding object in the backup version of the virtual machine.
    Type: Application
    Filed: February 27, 2019
    Publication date: April 30, 2020
    Inventors: Ming Zhang, Lihui Su, Yubing Zhang, Zak Liang
  • Publication number: 20200133793
    Abstract: Data replication groups may be used to store data in a distributed computing environment. A data replication group may include a set of nodes executing a consensus protocol to maintain data durably. In order to increase efficiency and performance of the data replication group leadership and/or fitness information may be determined for each node of the set of nodes executing the consensus protocol. The fitness information may be based at least in part on information associated with computing resource in the distributed computing environment and one or more constraints on assignment of a role of master node in the data replication group. The master node may be responsible for advancing the data replication group.
    Type: Application
    Filed: December 30, 2019
    Publication date: April 30, 2020
    Inventors: Christopher Magee Greenwood, Divya Ashok Kumar Jain
  • Publication number: 20200133794
    Abstract: A storage system in one embodiment comprises a plurality of storage devices and a storage controller. The storage controller is configured to scan data pages and associated metadata structures of the storage system, the metadata structures comprising at least a first metadata structure associating unique hash identifiers with physical locations of respective data pages in the storage system and a second metadata structure associating the physical locations of respective data pages with hash digests of the data pages and the unique hash identifiers. The storage controller is further configured to detect an error in one of the first and second metadata structures. Responsive to the detected error, the storage controller recovers a corresponding portion of the metadata based at least in part on one or more entries of the other one of the first and second metadata structures.
    Type: Application
    Filed: October 25, 2018
    Publication date: April 30, 2020
    Inventors: Nimrod Shani, Leron Fliess, Tal Zohar
  • Publication number: 20200133795
    Abstract: One example method includes discovering an application topology, discovering relationships between microservices that are elements of the application topology, ranking the microservices, identifying one or more of the microservices as a persistency microservice, selecting one or more persistency microservices for backup, and defining a backup policy based on the microservice relationships, the microservice rankings, and the selected persistent microservices. A backup operation is then performed that includes backing up persistent data and/or persistent metadata generated and/or modified by one or more of the persistency microservices.
    Type: Application
    Filed: October 26, 2018
    Publication date: April 30, 2020
    Inventors: Michael Rhodes, Assaf Natanzon, Luay Al-Alem, Antony Bett
  • Publication number: 20200133796
    Abstract: A method, apparatus, and system for managing file level restore agents is provided. The operations comprising: determining a computing resource usage level at a data protection appliance; determining whether the computing resource usage level at the data protection appliance is below a first threshold; in response to determining that the computing resource usage level at the data protection appliance is below a first threshold, assigning a new file level restore-associated job to a first tier file level restore agent for performance; and in response to determining that the computing resource usage level at the data protection appliance is not below a first threshold, assigning the new file level restore-associated job to a second tier file level restore agent for performance.
    Type: Application
    Filed: October 26, 2018
    Publication date: April 30, 2020
    Inventors: Mengze LIAO, Jing YU, Ming ZHANG, Kunal RUVALA, Yongsheng GUO, Jinru YAN
  • Publication number: 20200133797
    Abstract: Techniques for performing online recovery of space accounting metadata. The techniques include reestablishing a plurality of counters for tracking amounts of physical storage space committed and/or unique to the volumes and/or volume families. The techniques include, while reestablishing the counters, conducting a tree walk through a mapping hierarchy of each volume and/or volume family, marking starting and ending points through the mapping hierarchy, and monitoring a logical offset from the starting point during the tree walk. Upon receipt of an IO request, the techniques determine whether the IO request and space accounting metadata recovery activities are attempting to access the same metadata based on the logical offset relative to the starting point, and update the counters and/or temporary versions of the counters, as appropriate. By providing such techniques, metadata inconsistencies can be addressed while allowing users of the data storage system full or at least partial access to their data.
    Type: Application
    Filed: October 30, 2018
    Publication date: April 30, 2020
    Inventors: Kumari Bijayalaxmi Nanda, Dixit Patel
  • Publication number: 20200133798
    Abstract: An aspect of resolving conflicts during recovery operations includes separating journal entries for first and second types of recovery operations into each of a first and second array. For each entry in the first array, an aspect includes taking a range lock of a designated number of the addresses and creating an entry in a table. For each entry in the second array, an aspect includes upon determining a corresponding sub-LUN has been locked for an entry in the first array, incrementing a count in the table. Upon determining the corresponding sub-LUN is not locked for the entry, an aspect includes taking the address lock for the entry in the second array. An aspect further includes opening gates for a corresponding address, performing a first recovery operation corresponding to the first type of recovery operation, and performing a second recovery operation corresponding to the second type of recovery operation.
    Type: Application
    Filed: October 31, 2018
    Publication date: April 30, 2020
    Applicant: EMC IP Holding Company LLC
    Inventors: Ying Hu, Xiangping Chen
  • Publication number: 20200133799
    Abstract: An auxiliary storage device is disclosed. The device provides independent backup and recovery functions: enables easy use by attaching a commercialized auxiliary memory device in existing computers; minimizes of access time to the auxiliary memory device; enables automatic backup of data in a computer auxiliary memory device; recovers original data from a specific time using data that has been backed up through a simple operation when data on the auxiliary memory device has been damaged; and performs a recovery function for the auxiliary memory device by rebooting using backed-up OS information as needed.
    Type: Application
    Filed: April 30, 2018
    Publication date: April 30, 2020
    Inventor: Deok Woo KIM
  • Publication number: 20200133800
    Abstract: A technique for reducing recovery time in a computing apparatus includes: storing data in a key-value store residing in a persistent memory, the key-value store including a plurality of persistent nodes including key-value pairs, the key-value pairs of the persistent nodes being unsorted; caching selected persistent nodes in a volatile memory, the key-value pairs of the cached nodes being sorted, the caching including instantiating a dual pointer for each cached node, the dual pointer including a volatile pointer to a child node of the cached node and a persistent pointer to the child node of the corresponding persistent node in the key-value store; and rebuilding the cache of selected nodes upon demand using the dual pointers in the event of recovery.
    Type: Application
    Filed: October 26, 2018
    Publication date: April 30, 2020
    Inventors: Srikant Varadan, Tomasz Barszczak, Hao Luo
  • Publication number: 20200133801
    Abstract: A production host that hosts virtual machines includes a physical disk and a backup agent. The physical disk is utilized by a virtual machine of the virtual machines. The backup agent obtains a backup generation request; makes a first determination that the backup generation request impacts the physical disk; in response to the first determination: generates a mirror virtual disk for the physical disk; generates a backup of the mirror virtual disk as a backup of the physical disk; and stores the backup of the mirror virtual disk in backup storage.
    Type: Application
    Filed: October 26, 2018
    Publication date: April 30, 2020
    Inventors: Sharath Talkad Srinivasan, Suraj Dayanand Vithalkar
  • Publication number: 20200133802
    Abstract: A production host for hosting virtual machines includes a persistent storage and a production agent. The persistent storage stores virtual machine data of the virtual machines. The production agent obtains a dynamic backup generation rule for the virtual machines; for a predetermined period of time after obtaining the dynamic backup generate rule: generates first backups of the virtual machines based on the dynamic backup generate rule; and identifies a change rate of the virtual machine data; after the predetermined period of time, obtain a prediction-based backup generation rule that is based on the change rate of the virtual machine data over the predetermined period of time; and generates second backups of the virtual machines based on the prediction-based backup generation rule.
    Type: Application
    Filed: October 26, 2018
    Publication date: April 30, 2020
    Inventors: Sharath Talkad Srinivasan, Mahesh Rao
  • Publication number: 20200133803
    Abstract: A method for operating a microcontroller, which includes a processor and a peripheral circuit on a common chip, the method including initiating a process in the peripheral circuit, in the peripheral circuit generating recovery data, executing the process, checking whether the process has been executed successfully and, in the event that the check reveals that the process has not been executed successfully, generating recovered data from the recovery data, and executing the process again.
    Type: Application
    Filed: October 29, 2019
    Publication date: April 30, 2020
    Inventors: Veit Kleeberger, Rafael Zalman
  • Publication number: 20200133804
    Abstract: Techniques provide for data synchronization. For example, such a technique may involve: obtaining respective synchronization characteristics of a group of synchronization jobs to be processed, each synchronization characteristic indicating at least one of an expected completion time instant and an amount of data to be synchronized of a corresponding synchronization job; prioritizing the group of the synchronization jobs based on the synchronization characteristics; and controlling execution of the group of the synchronization jobs based on a result of the prioritizing. Accordingly, high priority is given to the synchronization jobs which can be rapidly completed thereby improving the Recovery Point Objective (RPO) achievement rate before occurrence of a failure.
    Type: Application
    Filed: September 20, 2019
    Publication date: April 30, 2020
    Inventors: Fang Du, Pan Xiao, Xu Chen, Peilei Chen
  • Publication number: 20200133805
    Abstract: Embodiments are described for detecting and recovering from an inoperable device management bus. A remote management controller is configured to offload device management bus transactions that use a messaging protocol. The messing protocol transactions are offloaded to a bus protocol controller that is responsible for managing bus operations using the messaging protocol. The bus protocol controller updates a set of bus status counters stored in a shared memory based on the processing of the offloaded messaging protocol transactions. The remote management controller processes device management bus transactions that use a bus protocol and updates the bus status counters based on the status of the bus protocol transactions. The remote management controller determines the status of the device management bus based on the bus status counters in shared memory, if the device management bus is inoperable, resets the remote management controller.
    Type: Application
    Filed: October 26, 2018
    Publication date: April 30, 2020
    Applicant: Dell Products, L.P.
    Inventors: Rama Rao Bisa, Chitrak Gupta, Mohan Murali Gurram, Komal Dhote, Suresh Vijaykumar, Prasanna Kumar Sahoo
  • Publication number: 20200133806
    Abstract: A memory controller controls a memory device including a plurality of memory blocks and a plurality of power modules respectively providing voltages to a plurality of word line groups, the memory controller comprising: a fail block detector detecting fail blocks on which an erase operation has failed among the plurality of memory blocks, and detecting fail word line groups among a plurality of word line groups included in each of the fail blocks; a fail block manager detecting, among the plurality of power modules, a defective power module providing the voltages to two or more fail word line groups each included in a different fail block among the fail blocks; and a power defect controller controlling the memory device such that the defective power module is changed to another power module among the plurality of power modules.
    Type: Application
    Filed: May 28, 2019
    Publication date: April 30, 2020
    Inventors: Min Ho HER, Dong Hyun KIM, Seung Il KIM, Youn Ho JUNG
  • Publication number: 20200133807
    Abstract: In a data storage system in which a first storage array and a second storage array maintain first and second replicas of a production volume, the first storage array is responsive to a write command from a host to send a notification to the second storage array indicating that the replicated production volume will be updated. The notification has information that enables the second storage array to implement pre-processing steps to prepare for subsequent receipt of data associated with the write command. Both storage arrays implement the pre-processing steps at least partly concurrently. When the data associated with the write command is subsequently received, the first storage array writes the data to cache and then sends a copy of the data to the second storage array, i.e. in series. The second storage array then writes the data to cache. Elapsed time between receipt of the write command and returning an acknowledgment to the host may be improved by concurrent pre-processing.
    Type: Application
    Filed: October 24, 2018
    Publication date: April 30, 2020
    Applicant: EMC IP HOLDING COMPANY LLC
    Inventors: Toufic Tannous, Bhaskar Bora, Deepak Vokaliga
  • Publication number: 20200133808
    Abstract: A separate family space is provisioned as a separate fault domain for each production device in a storage system. The space provisioned for each family has contiguous logical block addresses that do not overlap with the address space of any other family. Snaps and clones in a first family space are used for fault recovery without interrupting IOs to a second family space. If the first family space points to the same virtual block as other families as a result of deduplication then the virtual block is un-deduped. For example, another instance of the virtual block may be created and pointers updated such that only the first family space points to one of the virtual block instances.
    Type: Application
    Filed: October 30, 2018
    Publication date: April 30, 2020
    Applicant: EMC IP HOLDING COMPANY LLC
    Inventors: Dixit Patel, William Davenport
  • Publication number: 20200133809
    Abstract: A technique involves: in response to receiving a request to write data to a storage device, acquiring metadata of a redundant array of independent disks (RAID) extent that is associated with the request to write data, the RAID extent being built based on disk slices comprised in a plurality of disks of the storage device; determining, based on the metadata, a disk slice of data write-enabled RAID extent to write the data; and copying an identification and a degradation number into a metadata page associated with a mapper for data recovery, the identification and degradation number being comprised in the metadata and associated with the data write-enabled RAID extent, the mapper being used to map a physical space and a virtual logical space, and the degradation number indicating the number of times that the disk slice comprised in the RAID extent changes from being normal to being degraded.
    Type: Application
    Filed: September 25, 2019
    Publication date: April 30, 2020
    Inventors: Geng Han, Xinlei Xu, Changyu Feng, Jian Gao
  • Publication number: 20200133810
    Abstract: Techniques involve: detecting whether a first set of disks include an inaccessible disk, respective disk sections in the first set of disks forming a first set of stripes; in response to detecting the first set of disks including the inaccessible disk, determining faulty stripes in the first set of stripes, the faulty stripes including a first number of inaccessible disk sections; and in response to the first number exceeding a second number of free sections of the first set of disks, moving data in at least one stripe in the first set of stripes to free sections of the second set of disks to release sections of the at least one stripe, respective disk sections in the second set of disks forming a second set of stripes, each stripe in the first set of stripes and the second set of stripes having the same number of sections.
    Type: Application
    Filed: October 3, 2019
    Publication date: April 30, 2020
    Inventors: Jian Gao, Hongpo Gao, Lei Sun
  • Publication number: 20200133811
    Abstract: Techniques provide for rebuilding data. Such techniques involve: obtaining health status information related to a first disk of a storage system, the first disk being divided into a plurality of disk units, and the health status information indicating a failure of a first disk unit of the plurality of disk units; determining a data block stored in the first disk unit based on a mapping between data blocks for the storage system and storage locations; and rebuilding the data block into a second disk of the storage system when maintaining accessibility of other data blocks in other disk units of the first disk than the first disk unit. Accordingly, it is possible to improve the data rebuilding efficiency when a disk fails partly and to continue utilizing the storage space portion in the disk that is not failed, without making the disk be offline temporarily.
    Type: Application
    Filed: October 17, 2019
    Publication date: April 30, 2020
    Inventors: Wei Gao, Ao Sun, Yu Teng, Jialei Wu, Chunxi Cheng
  • Publication number: 20200133812
    Abstract: A control apparatus that communicates with a plurality of on-vehicle control devices through in-vehicle communication lines, and includes an acquisition unit configured to acquire electric energy of a battery supplying electric power to the plurality of on-vehicle control devices, and a control unit configured to instruct, in a case where predicted electric energy of the battery at a time when a process by a target device that is one of the plurality of on-vehicle control devices is completed is lower than a first threshold, other on-vehicle control devices to stop respective processes by the other on-vehicle control devices executed in parallel with the process by the target device.
    Type: Application
    Filed: May 28, 2018
    Publication date: April 30, 2020
    Applicant: SUMITOMO ELECTRIC INDUSTRIES, LTD.
    Inventors: Akihiro OGAWA, Hirofumi URAYAMA
  • Publication number: 20200133813
    Abstract: Particular embodiments described herein provide for an electronic device that can be configured to include a system condition engine and non-volatile memory. The system condition engine is configured to monitor a condition associated with an electronic device and non-volatile memory. The non-volatile memory can store a predetermined specification range or a specification threshold for the condition and when the condition is outside of the predetermined specification range or exceeds the specification threshold, the system condition engine can record that the condition was outside of the predetermined specification range or exceeded the specification threshold in the non-volatile memory. In an example, the non-volatile memory may be a fuse, especially a field programmable fuse.
    Type: Application
    Filed: December 27, 2019
    Publication date: April 30, 2020
    Applicant: Intel Corporation
    Inventors: Robert Forrest Kwasnick, Daniel J. Ragland
  • Publication number: 20200133814
    Abstract: Various embodiments are generally directed to techniques of collecting analyzing information on various types of applications in an environment by an application performance analytics platform and acting on the analyzed information. The application performance analytics platform may include at least a monitoring system, a time series database, and an APM tool collector, all of which may be programmatically interfaced with or connected to each other. The APM tool collector may access or pull APM metrics from one or more APM tools and input the metrics to the monitoring system. The time series database may access or pull log files and extract log data for analysis. Based on the analysis, the application performance analytics platform may generate one or more alerts.
    Type: Application
    Filed: October 25, 2018
    Publication date: April 30, 2020
    Applicant: Capital One Services, LLC
    Inventors: Anu PRABATH, Ashish SINGAM, Manisha BODALA, Laszlo SZERENYI, Eric THORNTON
  • Publication number: 20200133815
    Abstract: A request is received from a client device to connect to a wireless network associated with a cloud computing device. A first notification is received to indicate that a first client transaction has started. Using a first timer, a first timestamp associated with a start time of the first client transaction is identified. A first data frame having the first client transaction and the first timestamp is generated. A second notification indicating that the first client transaction has completed is received. Using the first timer, a second timestamp associated with an end time of the first client transaction is identified. Using the second timestamp, the first data frame is updated using the second timestamp. The first data frame is sent to the cloud computing device.
    Type: Application
    Filed: October 31, 2018
    Publication date: April 30, 2020
    Inventors: Kedar K. Gaonkar, Rajesh Pazhyannur, Aruna Nukala
  • Publication number: 20200133816
    Abstract: An Artificial Intelligence (AI)-based automated process is monitored via a process monitoring system that identifies components used in the execution of the sub-processes of the automated process. Various metrics are selected for collection prior to or during the execution of the AI-based automated process. The values of the metrics are collected as step outputs corresponding to the sub-processes. A final output generated upon the execution of the automated process is also collected. The step outputs can be used to determine the reason why the automated process produced a certain final output.
    Type: Application
    Filed: January 22, 2019
    Publication date: April 30, 2020
    Applicant: ACCENTURE GLOBAL SOLUTIONS LIMITED
    Inventors: Soujanya SONI, Kavita V V GANESHAN, Aishwarya KALIKI, Madhura SHIVARAM, Mandar Mohan PATIL
  • Publication number: 20200133817
    Abstract: A system and method for generating a data set structured for recognition of time series data by a machine learning computer are provided. The method includes acquiring time series data, generating tensor units based on the time series data, and identifying a target tensor unit including a time of failure of a mainframe computer system. The method further includes generating tensor sets, in which at least one tensor set includes the target tensor unit. The generated tensor sets are then migrated to a machine learning computer for generating or updating of a computer model based on the time series data, the computer model recognizing a data pattern preceding the time of failure of the mainframe computer system. The computer model is then applied to data in a production environment for identifying a production data pattern corresponding to a data pattern recognized in the tensor sets.
    Type: Application
    Filed: October 30, 2019
    Publication date: April 30, 2020
    Applicant: JPMorgan Chase Bank, N.A.
    Inventor: Laura SCHORNACK