Patents Issued in December 24, 2020
-
Publication number: 20200401436Abstract: A system and method to operate applications through positional virtualization technology. The system comprises a server including at least one processor and memory storing a persistent virtual world system comprising a data structure in which at least one virtual replica of at least one corresponding real object is represented, and at least one application run and hosted on at least one virtual machine virtually positioned in a location of the persistent virtual world system. Provisioning of the virtual machines is managed by a virtual machine management system stored in the memory of the server. One or more user devices connected to the servers via a network are configured to access and execute the applications hosted on the virtual machines of the at least one server and to receive resources thereof based on application requirements.Type: ApplicationFiled: June 17, 2020Publication date: December 24, 2020Applicant: TMRW Foundation IP & Holding S. À R.L.Inventor: Cevat Yerli
-
Publication number: 20200401437Abstract: Methods and apparatus to manage virtual machines are disclosed. An example method includes determining that a deployment of a first virtual machine has halted because the first virtual machine is dependent on a second virtual machine that has not been fully deployed and in response to detecting that the second virtual machine has been deployed, notifying, via a processor, the first virtual machine that deployment of the first virtual machine may continue.Type: ApplicationFiled: June 29, 2020Publication date: December 24, 2020Inventors: Thirumalesh Reddy, Sreekantha Indireddy, Shreekanth Ankala, Bhavin Mathia
-
Publication number: 20200401438Abstract: A “Master-Virtual Machine (VM) framework” is provided that contains a Master-VM, which is a custom built VM for learning about a specified technology, service or product, and an optional host server device that is a custom built portable physical server. The Master-VM framework enables a user to use a single virtual machine (“Master-VM”) from an online source to set up a hands-on lab for learning about a specified application. For example, the user can use the Master-VM to set up a hands-on lab to learn about Hadoop technology. The hands-on lab can include a collection of VMs associated with Hadoop technology framework and various training materials such as documentations, training videos, lab exercises associated with Hadoop technology. The Master-VM can deploy the collection of VMs associated and allow the user to access, explore, evaluate or configure the Hadoop technology framework using the multiple VMs and the training materials.Type: ApplicationFiled: July 5, 2020Publication date: December 24, 2020Inventor: Ananda Kammampati
-
Publication number: 20200401439Abstract: Disclosed are systems and methods for executing system calls in a virtualized environment. A method includes executing, on a host, a host process corresponding to a guest process executing within a virtual machine and having an associated guest-process virtual address space, the host process having an associated host-process virtual address space. The method also includes mapping the host-process virtual address space and the guest-process virtual address space to a host physical memory, trapping a system call invoked by the guest process, and performing the trapped system call using the host process, wherein state changes in the host-process virtual address space caused by the trapped system call are reflected in the guest-process virtual address space. The method further includes causing execution of the guest process to be resumed after performing the trapped system call.Type: ApplicationFiled: September 4, 2020Publication date: December 24, 2020Inventors: Andrey Naenko, Alexey Koryakin, Nikolay Dobrovolskiy, Serguei M. Beloussov
-
Publication number: 20200401440Abstract: Embodiments of systems, methods, and apparatuses for heterogeneous computing are described. In some embodiments, a hardware heterogeneous scheduler dispatches instructions for execution on one or more plurality of heterogeneous processing elements, the instructions corresponding to a code fragment to be processed by the one or more of the plurality of heterogeneous processing elements, wherein the instructions are native instructions to at least one of the one or more of the plurality of heterogeneous processing elements.Type: ApplicationFiled: June 26, 2020Publication date: December 24, 2020Inventors: Rajesh M. SANKARAN, Gilbert NEIGER, Narayan RANGANATHAN, Stephen R. VAN DOREN, Joseph NUZMAN, Niall D. MCDONNELL, Michael A. O'HANLON, Lokpraveen B. MOSUR, Tracy Garrett DRYSDALE, Eriko NURVITADHI, Asit K. MISHRA, Ganesh VENKATESH, Deborah T. MARR, Nicholas P. CARTER, Jonathan D. PEARCE, Edward T. GROCHOWSKI, Richard J. GRECO, Robert VALENTINE, Jesus CORBAL, Thomas D. FLETCHER, Dennis R. BRADFORD, Dwight P. MANLEY, Mark J. CHARNEY, Jeffrey J. COOK, Paul CAPRIOLI, Koichi YAMADA, Kent D. GLOSSOP, David B. SHEFFIELD
-
Publication number: 20200401441Abstract: Processing circuitry (8) processes software processes at one of a plurality of exception levels and in one of a plurality of realms, each realm corresponding to a portion of at least one software process and being associated with a boundary exception level indicating a most privileged exception level at which the realm can be processed by the processing circuitry (8). In response to a realm exiting exception condition during processing of a given realm, where the exception condition is to be handled by an exception handler at a more privileged exception level than the boundary exception level of the given realm, the processing circuitry (8) performs state masking to make inaccessible, to software processes processed at a more privileged exception level than the boundary exception level, architectural state of a subset of registers selected depending on the boundary exception level of the given realm.Type: ApplicationFiled: June 11, 2018Publication date: December 24, 2020Inventors: Matthew Lucien EVANS, Jason PARKER, Gareth Rhys STOCKWELL, Martin WEIDMANN
-
Publication number: 20200401442Abstract: An information processing apparatus includes: a control circuit; an interface circuit; and an information processing circuit, wherein the control circuit is configured to: execute a first processing that includes causing the information processing circuit to individually execute a plurality of divided first control commands as one processing unit in a predetermined execution order, via the interface circuit; execute an interrupt detection processing that includes detecting an interrupt issued from the information processing circuit or the interface circuit; execute a command generation processing that includes generating a second control command for identifying an interrupt factor of the interrupt detected by the interrupt detection processing; and execute a processing order change processing that includes preferentially arranging the second control command generated by the command generation processing over the unexecuted first control commands to change the execution order.Type: ApplicationFiled: June 4, 2020Publication date: December 24, 2020Applicant: FUJITSU LIMITEDInventor: Go Endo
-
Publication number: 20200401443Abstract: A method includes saving state information in response to receiving a system management interrupt (SMI), the state information including a first value retrieved from a first register and a second value retrieved from a second register. The method further includes determining a function associated with the SMI based on the first value and determining a calling address associated with the SMI based on the second value. A counter corresponding to the function and calling address pair is incremented in response to receiving the SMI. The method concludes by selectively invoking the function based on the value of the counter and based on a predetermined threshold.Type: ApplicationFiled: June 19, 2019Publication date: December 24, 2020Inventors: Nicholas D. Grobelny, Girish S. Dhoble, Ricardo L. Martinez, Abeye S. Teshome
-
Publication number: 20200401444Abstract: Techniques are disclosed for reducing the latency between the completion of a producer task and the launch of a consumer task dependent on the producer task. Such latency exists when the information needed to launch the consumer task is unavailable when the producer task completes. Thus, various techniques are disclosed, where a task management unit initiates the retrieval of the information needed to launch the consumer task from memory in parallel with the producer task being launched. Because the retrieval of such information is initiated in parallel with the launch of the producer task, the information is often available when the producer task completes, thus allowing for the consumer task to be launched without delay. The disclosed techniques, therefore, enable the latency between completing the producer task and launching the consumer task to be reduced.Type: ApplicationFiled: June 24, 2019Publication date: December 24, 2020Inventors: Gentaro HIROTA, Brian PHARRIS, Jeff TUCKEY, Robert OVERMAN, Stephen JONES
-
Publication number: 20200401445Abstract: This disclosure relates to a graph-data-based task scheduling method, which includes: obtaining subgraph data divided from graph data to be processed by a computing node, performing a unit computing task for a graph node in the subgraph data, obtaining a first quantized value corresponding to a completed unit computing task in response to data corresponding to the completed unit computing task being formed into blockchain data, obtaining a second quantized value corresponding to the completed unit computing task in response to the data corresponding to the completed unit computing task being not formed into blockchain data, determining a third quantized value corresponding to an uncompleted unit computing task in the subgraph data, and exchanging the graph node and the first quantized value with another computing node in response to the second quantized value and the third quantized value failing to meet an equilibrium condition.Type: ApplicationFiled: September 1, 2020Publication date: December 24, 2020Applicant: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventor: Bo ZHENG
-
Publication number: 20200401446Abstract: A computer-implemented method include sending a first cycle of received event data to an external system for processing and while waiting for the external system to confirm that processing of the first cycle of received event data has been completed, receiving a stream of additional event data for processing and assigning some of the additional event data to a second cycle of received event data, wherein the second cycle has a scheduled transmission time to be sent to the external system for processing. The second cycle of received event data is prevented from being sent to the external system when the scheduled transmission time arrives because the external system has not returned confirmation that processing has been completed for the first cycle.Type: ApplicationFiled: June 18, 2019Publication date: December 24, 2020Inventors: Kiran Kumar Kodali, Aruna Subba Rao, Ragesh Gopan Gopakumaran Nair Remadeviamma
-
Publication number: 20200401447Abstract: Embodiments of the present disclosure relate to a method for building an application. According to the method, a request is received from a building environment to acquire at least one component for executing at least one function of at least one feature of the application. The at least one feature is to be deployed to at least one target node in a distributed service platform comprising a plurality of nodes. The at least one target node and the at least one component are determined based on the request. The at least one component is acquired from the at least one target node. The at least one component is sent to the building environment for building the at least one feature.Type: ApplicationFiled: June 19, 2019Publication date: December 24, 2020Inventors: Ping Xiao, Peng Hui Jiang, Xin Peng Liu, Guang Han Sui
-
Publication number: 20200401448Abstract: An intelligent resource initiation and deployment system is provided that identifies a location of a user, identifies entities adjacent the user based on the user location, and identifies a resource application and/or the resource pools. The invention identifies a resource pool which optimizes resource grants for the user based on the desired outcome of the user and/or the entity at which the user is located. The system further includes identifying when the resource pool is active, or what additional information is needed for the user to make the optimized resource pool active. The present invention shifts the processing capacity, memory, and processing speeds related to determination and selection of a resource pool and/or validation of the resource pool during interactions from the time of the interaction to before the interaction is even initiated.Type: ApplicationFiled: June 20, 2019Publication date: December 24, 2020Applicant: BANK OF AMERICA CORPORATIONInventors: Kerry Michelle Cantley, Heather Roseann Dolan
-
Publication number: 20200401449Abstract: Embodiments of the present disclosure relate to requirement-based resource sharing in a computing environment. In an embodiment, a computer-implemented method is disclosed. According to the method, it is determined whether a plurality of services to be provisioned in a computing environment match with each other in resource consumption based on respective resource requirements of the plurality of services. In response to determining that the plurality of services match with each other, a resource pool is allocated in the computing environment to be shared by the plurality of services. The resource pool has a resource quota determined based on at least one of the resource requirements. The plurality of services is caused to be provisioned in the computing environment using the resource pool. In other embodiments, a computer system and a computer program product are disclosed.Type: ApplicationFiled: June 21, 2019Publication date: December 24, 2020Inventors: Yi Qun Zhang, Ping GP Cao, Xu Lei XL Zhou, Jian Dong Yin, Li Long Chen
-
Publication number: 20200401450Abstract: Systems and methods for scheduling tasks using sliding time windows are provided. In certain embodiments, a system for scheduling the execution of tasks includes at least one processing unit configured to execute multiple tasks, wherein each task in the multiple tasks is scheduled to execute within a scheduler instance in multiple scheduler instances, each scheduler instance in the multiple scheduler instances being associated with a set of time windows in multiple time windows and with a set of processing units in the at least one processing unit in each time window, time windows in the plurality of time windows having a start time and an allotted duration and the scheduler instance associated with the time windows begins executing associated tasks no earlier than the start time and executes for no longer than the allotted duration, and wherein the start time is slidable to earlier moments in time.Type: ApplicationFiled: September 8, 2020Publication date: December 24, 2020Applicant: Honeywell International Inc.Inventors: Srivatsan Varadarajan, Larry James Miller, Arthur Kirk McCready, Aaron R. Larson, Richard Frost, Ryan Lawrence Roffelsen
-
Publication number: 20200401451Abstract: In an approach for managing physical processor usage of a shared memory buffer, a processor receives a request for memory. A processor receives a request for memory from a process running on a physical processor. A processor determines whether the request for memory is less than or equal to a pre-determined threshold, wherein the pre-determined threshold is based on characteristics of a server on which the physical processor resides, needs of the server, and a frequency of requests of each memory size. Responsive to determining the request for memory is greater than the pre-determined threshold, a processor identifies a node on which the physical processor resides. A processor identifies a memory buffer of a set of memory buffers allocated to the node on which the physical processor resides. A processor allocates the memory buffer.Type: ApplicationFiled: June 20, 2019Publication date: December 24, 2020Inventors: Muruganandam Somasundaram, Jeffrey Paul Kubala, Jerry A. Moody, Hunter J. Kauffman
-
Publication number: 20200401452Abstract: An example method includes receiving a resource request for at least one compute and/or storage resource from a distributed computing system distributed among multiple data centers, determining a resource policy that is associated with the resource request, wherein the resource policy includes a rule specifying at least one metadata tag and at least one criterion associated with the at least one metadata tag, identifying at least one object included in a resource object model that complies with the rule of the resource policy, wherein the at least one object has an assigned value for the metadata tag that satisfies the at least one criterion, selecting a data center that is associated with the at least one object identified from the resource object model, and deploying, on the selected data center, the at least one compute or storage resource.Type: ApplicationFiled: June 18, 2019Publication date: December 24, 2020Inventors: Charles Arthur Piercey, Aniket G. Daptari, Prasad Miriyala, Erwin Daria, William Stuart Mackie
-
Publication number: 20200401453Abstract: Embodiments of the present invention provide a system for generation and maintenance of nested hierarchical resource modules. The system is configured for identifying one or more indicators associated with one or more resource pools of a user, generating one or more resource modules in the one or more resource pools of the user based on identifying the one or more indicators, automatically transferring resources to each of the one or more resource modules, identifying initiation of a resource interaction by the user, wherein the resource interaction is between the user and a third party entity, determining a type of the resource interaction and identify at least one resource module that is associated with the determined type, and transferring the resources from the at least one of the one or more resource modules to the third party entity.Type: ApplicationFiled: June 18, 2019Publication date: December 24, 2020Applicant: BANK OF AMERICA CORPORATIONInventors: Kerry Michelle Cantley, Katherine Dintenfass, Heather Roseann Dolan
-
Publication number: 20200401454Abstract: An application manager receives or defines a service specification for a first application that defines a set of required computing resources that are necessary to run each application component of the first application. A resource supply manager in communication with the application manager manages a plurality of computing resources in a shared computing environment.Type: ApplicationFiled: September 4, 2020Publication date: December 24, 2020Inventors: Wai Ming Wong, Michael C. Hui
-
Publication number: 20200401455Abstract: An aspect of the invention includes a method for receiving a request to reclaim a portion of a memory assigned to a virtual machine (VM). In response to receiving the request, an increment of the plurality of increments to vacate is selected. The selecting is based at least in part on the failure counts corresponding to each of the plurality of increments. An attempt is made to vacate all contents of the selected increment. Based at least in part on determining that all contents of the selected increment were not vacated, a failure count corresponding to the selected increment is incremented. Based at least in part on determining that all contents of the selected increment were vacated, an assignment of the selected increment to the VM is removed.Type: ApplicationFiled: June 19, 2019Publication date: December 24, 2020Inventors: Walter Church, IV, Ronald C. Pierson
-
Publication number: 20200401456Abstract: A virtual machine's (VM's) usage of a resource over a first time period may be monitored to determine a load pattern for the VM. A time series analysis of the load pattern may be performed to generate a predictive resource usage model, the predictive resource usage model indicating one or more predicted variations in the usage of the resource by the VM over a second time period. A predicted resource usage of the VM at a future time that is within the second time period may be determined based, at least in part, on the predictive resource usage model. An amount of the resource to allocate to the VM at a current time may be determined based, at least in part, on the predicted resource usage of the VM at the future time and the actual resource usage of the VM at the current time.Type: ApplicationFiled: June 24, 2019Publication date: December 24, 2020Inventors: Martin Sivak, Andrej Krejcir
-
Publication number: 20200401457Abstract: Methods, systems and computer program products for configuring microservices platforms in one or more computing clusters. In one of the computing clusters, a request to instantiate a microservice platform is received, wherein the request is received in a computing cluster having a first node and a second node, and wherein the first node and second node comprise a first virtualized storage controller and a second virtualized storage controller, respectively. The storage controllers each manage their respective storage pools comprising local storage devices. A first microservice manager is deployed on the first node and a second microservice manager is deployed on the second node.Type: ApplicationFiled: July 31, 2019Publication date: December 24, 2020Inventors: Pravin SINGHAL, Anand JAYARAMAN, Aroosh SOHI
-
Publication number: 20200401458Abstract: These methods, systems, and other aspects can provide for adaptive distribution/re-distribution of data processing tasks. An example method may create, by a processor in a first node, a status object for a data processing task and assign, by the processor in the first node, the data processing task to a worker of a second node. Further, after a first period of time, the method may query, by the processor in the first node, the status object for a task status of the assigned data processing task reported by the second node. The task status reflects a status of execution of the assigned data processing task by the second node. The method determines, by the processor in the first node, to reassign the assigned data processing task based on a received task status reported by the second node, and reassign, by the processor in the first node, the assigned task.Type: ApplicationFiled: June 20, 2019Publication date: December 24, 2020Inventors: Souvik Kumar Roy, Ameet Pyati
-
Publication number: 20200401459Abstract: Examples include registering a device driver with an operating system, including registering available hardware offloads. The operating system receives a call to a hardware offload, inserts a binary filter representing the hardware offload into a hardware component and causes the execution of the binary filter by the hardware component when the hardware offload is available, and executes the binary filter in software when the hardware offload is not available.Type: ApplicationFiled: July 20, 2020Publication date: December 24, 2020Inventors: Eliezer TAMIR, Johannes BERG, Andrew CUNNINGHAM, Peter WASKIEWICZ, Jr., Andrey CHILIKIN
-
Publication number: 20200401460Abstract: Executing and managing flow plans by performing at least the following: receiving an indication to initiate a task flow including a plurality of discrete but related operations at a customer instance environment of a cloud-based computing platform; obtaining a definition of the task flow identifying run-time requirements for each of the plurality of operations; determining a first execution environment for the first of the plurality of operations; initiating execution of the first operation in the first execution environment; and determining the proper execution environment for subsequent operations of the task flow until all operations of the task flow are complete. Factors, such as look-ahead optimization, environmental operational capabilities, access and security requirements, current load, future load, etc. may be considered when determining the proper execution environment for a given operation.Type: ApplicationFiled: August 31, 2020Publication date: December 24, 2020Inventors: Venkata Kiran Kumar Koya, Robert Peter-Paul Recatto, Nicholas Michael Stark, Harry Thomas Nelson
-
Publication number: 20200401461Abstract: Providing self-resetting multi-producer multi-consumer semaphores in distributed processor-based systems is disclosed. In one aspect, a synchronization management circuit provides a semaphore including a counting semaphore value indicator, a current wait count indicator, and a target wait count indicator. When a consumer completes a wait operation, the synchronization management circuit adjusts the value of the current wait count indicator towards the value of the target wait count indicator, and compares the value of the current wait count indicator to the value of the target wait count indicator. If the value of the current wait count indicator has reached the value of the target wait count indicator, the synchronization management circuit infers that all consumers have observed the semaphore, and accordingly resets both the counting semaphore value indicator and the current wait count indicator to an initial wait value to place the semaphore in its initial state for reuse.Type: ApplicationFiled: June 18, 2019Publication date: December 24, 2020Inventors: Colin Beaton Verrilli, Natarajan Vaidhyanathan
-
Publication number: 20200401462Abstract: Methods and systems for providing a collaboration platform that enables “software agents” to share data with one another such that one software agent may interoperate with the other software agent. When the domains of different software agents overlap, completely, or partially, it becomes possible for the software agents to exchange information and behaviors in collaboration using a shared model and to create digital twins. Collaboration among the software agents, connected client(s), devices and other services may be provided through a data synchronization service and shared model provided by, and used within, the collaboration platform.Type: ApplicationFiled: June 19, 2020Publication date: December 24, 2020Inventors: Kevin Viggers, Dan Pigat
-
Publication number: 20200401463Abstract: An approach for providing exclusive access to a resource shared by a plurality of processes in a computer system. The approach includes a computer processor retrieving a process identifier for a first process attempting to access the resource, where the process identifier is uniquely assigned to each process of the plurality of processes requiring the resource with the computer system. The approach includes the computer processor using the process identifier for the first process and a mutual exclusion object that includes a lock position allowing exclusive access to the resource and a wait position for a next process to attain the lock position to provide exclusive access to the resource.Type: ApplicationFiled: June 24, 2019Publication date: December 24, 2020Inventors: Simon Weishaupt, Bernd Nerz, Wolfgang Fischer
-
Publication number: 20200401464Abstract: There are provided systems and methods for shared application interface data through a device-to-device communication session. A user may utilize a device to engage in an electronic communication session with another user, such as a shared messaging or video chat session. During the session, the user may utilize another application on the same device to perform separate application data processing, such as accessing a website or an online marketplace that may include interface output data. The user may activate a plug-in or add-on that may allow application data sharing for current application data in the separate application during the communication session. The device may determine the present application data, such as a displayable instance of the current interface data, and may transmit the data to the other user's device through the communication session. Further, the plug-in may allow for split transaction and data processing.Type: ApplicationFiled: June 30, 2020Publication date: December 24, 2020Inventor: Todd Studnicka
-
Publication number: 20200401465Abstract: Systems, methods, and apparatuses for providing healthcare integrations, are provided. The system may include a network, a server communicatively coupleable to the network, the server configured to generate an interface accessible via the network, a plurality of third-party service Application Programming Interfaces (APIs) coupleable to the network, and a user device coupleable to the network, the user device configured to access the interface generated by the server to generate a connector, the connector configured to include at least one of the plurality of third-party service APIs.Type: ApplicationFiled: June 21, 2020Publication date: December 24, 2020Inventors: Joshua Adam Douglas, Matthew Thomas Wimberley, Clinton Thomas Johnson
-
Publication number: 20200401466Abstract: Methods, systems and computer program products for facilitating real time conversations based on topic determination are provided. Aspects include receiving one or more user topic profiles. Aspects also include receiving an audio recording of a conversation obtained from one or more audio sensors. Aspects also include converting the audio recording of the conversation to text. Aspects also include determining a topic of the conversation by applying a topic model to the text. Aspects also include determining one or more potentially interested users based on the topic of the conversation and the one or more user topic profiles. Aspects also include notifying the one or more potentially interested users that the conversation is occurring.Type: ApplicationFiled: June 20, 2019Publication date: December 24, 2020Inventors: Keith Gregory FROST, Stephen Arthur BOXWELL, Stanley John VERNIER, Kyle Matthew BRAKE
-
Publication number: 20200401467Abstract: Provided are a management and control method for applications, a terminal, and a storage medium. The method includes: determining, according to a broadcast message received from an operating system, an identifier of a broadcast receiver corresponding to an identifier of the broadcast message; screening out at least one broadcast receiver declared by an application which has an identifier the same as the identifier of the broadcast receiver corresponding to the identifier of the broadcast message; and transmitting the broadcast message to a broadcast receiver in a reception-enabled state among the at least one broadcast receiver declared by the application, and performing management and control on the application corresponding to the broadcast receiver in the reception-enabled state.Type: ApplicationFiled: August 28, 2018Publication date: December 24, 2020Applicant: ZTE CorporationInventor: Xiaorui LIU
-
Publication number: 20200401468Abstract: Web application code includes a unified rendering application programming interface (API) library and unified rendering API calls. The unified rendering API calls comply with call definitions and are to library functions. The library functions are in both a server rendering library and a client rendering library. The call definitions are the same for using the server rendering library and the client rendering library. From a client computing device and a server computing device, a rendering system is identified for rendering a visualization to obtain an identified system. The rendering library matching the rendering system is linked to the web application code, where the rendering library is at least of the client rendering library or the server rendering library.Type: ApplicationFiled: September 12, 2018Publication date: December 24, 2020Applicant: Schlumberger Technology CorporationInventors: Alain CUDENNEC, Farid HARHAD, Arnaud HOUEGBELO, Yuri VANZINE
-
Publication number: 20200401469Abstract: A computer implemented method comprises analysing data defining the first image which is displayable when a computer application runs to determine at least one candidate user interactive area in the image. A user interactive area is one which is responsive to user input when the computer application is run. The method comprises attempting to interact with the determined at least one candidate user interactive area and comparing the data defining the first image with data defining a further image to determine if the respective candidate user interactive area is an interactive area.Type: ApplicationFiled: June 19, 2019Publication date: December 24, 2020Inventors: Alexander ANDELKOVIC, Alice REINAUDO, Sara KARIMI
-
Publication number: 20200401470Abstract: One embodiment of the present invention can provide a system for identifying a root cause of an anomaly event in operation of one or more machines is provided. During operation, the system can obtain sensor data from a set of sensors associated with the one or more machines, convert the sensor data into a set of sensor states, build an optimal DAG based on the set of sensor states to model causal dependency; determining, by using the DAG, a probability of an anomaly state of a target sensor given a state of a direct neighbor sensor, and determining a root cause of the anomaly event associated with the target sensor by back-tracking the anomaly state in the DAG.Type: ApplicationFiled: June 21, 2019Publication date: December 24, 2020Applicant: Palo Alto Research Center IncorporatedInventor: Deokwoo Jung
-
Publication number: 20200401471Abstract: A method and system for implementing an enterprise error handler and audit module for a web application.Type: ApplicationFiled: April 30, 2020Publication date: December 24, 2020Inventor: David Michael Vigna
-
Publication number: 20200401472Abstract: An apparatus includes a database and a processor. The database stores a set of inputs and a set of outputs, some of which are labeled as inaccurate. The processor forms a matrix of basis functions to represent the system that generated the outputs, such that a solution exists to the equations formed by multiplying the matrix by a vector of the inputs and setting this equal to a vector of the outputs. The processor reduces the number of adjustable parameters in a first row of the matrix associated with a first inaccurate output and determines that a solution to the matrix equation still exists. The processor reduces the number of adjustable parameters in a second row of the matrix associated with a second inaccurate output and determines that a solution to the matrix equation no longer exists. The processor sends the first output as a remediation candidate to an administrator.Type: ApplicationFiled: June 24, 2019Publication date: December 24, 2020Inventor: Aravinthane Tamizhmani
-
Publication number: 20200401473Abstract: Disclosed are systems and methods for proactive disaster recovery. The described technique monitors for events raised by a system of interconnected external sensors and other devices for obtaining data on the external environment of servers. The system uses these events as a chain of triggers according to which preventative or preparatory actions for disaster recovery are performed.Type: ApplicationFiled: September 1, 2020Publication date: December 24, 2020Inventors: Kirill Korotaev, Serguei Beloussov, Alexander Tormasov, Oleg Melnikov, Oleg Shaikhatarov, Stanistav Protasov
-
Publication number: 20200401474Abstract: Disclosed are techniques for generating a parity check matrix representing an error correcting code (ECC) for protecting a plurality of bits of a message. In an aspect, a method includes initializing a matrix M to store selected three-bit codes, selecting a first three-bit code from a set L of three-bit combinations of a number of bits n of the ECC that minimizes a sum of squared row weights of each row of the matrix M, comparing the first three-bit code with each of a plurality of error syndromes, and calculating, based on no comparison of the first three-bit code with each of the plurality of error syndromes, new error syndromes and storing the new error syndromes, wherein the new error syndromes are calculated by comparing the first three-bit code with each three-bit code in the matrix M, and storing the first three-bit code in the matrix M.Type: ApplicationFiled: August 31, 2020Publication date: December 24, 2020Inventors: Alain ARTIERI, Deepti Vijayalakshmi SRIRAMAGIRI, Dexter Tamio CHUN, Jungwon SUH
-
Publication number: 20200401475Abstract: A method of correcting one or more bit errors in a memory device includes retrieving a codeword from a memory device. The codeword includes a data and an error correcting code. The method further includes determining whether the one or more bit errors are present in the retrieved codeword and correcting the retrieved codeword for the one bit error in response to determining one bit error is present in the retrieved codeword. The method also includes flipping a bit of the retrieved codeword in response to determining a plurality of bit errors is present in the retrieved codeword and correcting the retrieved codeword for the plurality of bit errors based on the bit-flipped codeword.Type: ApplicationFiled: August 31, 2020Publication date: December 24, 2020Applicant: Taiwan Semiconductor Manufacturing Co., Ltd.Inventor: Shih-Lien Linus Lu
-
Publication number: 20200401476Abstract: A semiconductor memory device includes a memory cell array, an error correction code (ECC) engine circuit, an error information register and a control logic circuit. The memory cell array includes memory cell rows. The control logic circuit controls the ECC engine circuit to generate an error generation signal based on performing a first ECC decoding on first sub-pages in a first memory cell row in a scrubbing operation and based on performing a second ECC decoding on second sub-pages in a second memory cell row in a normal read operation on the second memory cell row. The control logic circuit records error information in the error information register and controls the ECC engine circuit to skip an ECC encoding and an ECC decoding on a selected memory cell row of the first memory cell row and the second memory cell row based on the error information.Type: ApplicationFiled: February 17, 2020Publication date: December 24, 2020Applicant: Samsung Electronics Co., Ltd.Inventors: Sanguhn CHA, Hoyoung Song, Myungkyu Lee, Sunghye Cho
-
Publication number: 20200401477Abstract: A system and method for applying a first level of protection to data in a memory module include identifying a weak wordline from at least one of a plurality of blocks of the memory module. Each of the plurality of blocks includes a plurality of wordlines. The system and method also include determining that the weak wordline is to receive the first level of protection and applying the first level of protection to the weak wordline.Type: ApplicationFiled: June 20, 2019Publication date: December 24, 2020Applicant: Western Digital Technologies, Inc.Inventors: Avi Klein, Eran Sharon, Gadi Vishne, Igor Genshaft, Marina Frid, Michal Silbermintz
-
Publication number: 20200401478Abstract: Described herein is a Quantum Computing device comprising a first and a second square patch of qubits, each of the first and second square patch of qubits representing a logical qubit and being in a joint quantum state corresponding to a surface code, the surface code having a distance of two or more. The first and second square patch of qubits have a side-length equal to the distance plus one qubits. The device furthermore comprises one or more chain of qubits prepared in a joint GHZ state serving as a data bus. The chain of qubits neighbors both the first and the second square patch of qubits and has a length equal to or greater than the sum of the two side-lengths.Type: ApplicationFiled: June 25, 2019Publication date: December 24, 2020Inventors: Michele Reilly, Simon Devitt
-
Publication number: 20200401479Abstract: Provided herein may be a memory controller and a method of operating the memory controller. The memory controller may control a memory device that stores data, and may include a bit counter configured to generate a count value by counting any one of bits in a programmed state and an erased state contained in the data, a flash translation layer configured to generate page information indicating an address of the data stored in the memory device, an additional data generator configured to generate judgment data for determining whether the data has changed, based on the count value and the page information, a comparator configured to generate comparison information by comparing the judgment data with detection data generated based on data read from the memory device, and a read data controller configured to perform an operation of correcting an error in the read data based on the comparison information.Type: ApplicationFiled: November 26, 2019Publication date: December 24, 2020Inventor: Jong Hwan LEE
-
Publication number: 20200401480Abstract: An erasure code (EC)-based data processing method implemented by a storage controller includes obtaining K data chunks, dividing each of the K data chunks into two data slices, encoding the 2*K data slices based on a parity matrix including 2*M rows and 2*(K+M) columns of elements, to obtain 2*M parity slices, and separately storing the K data chunks and the M parity chunks in different storage devices.Type: ApplicationFiled: June 24, 2020Publication date: December 24, 2020Inventors: Yanxing Zeng, Liang Chen, Ruliang Dong, Jinyi Zhang, Kebo Fu
-
Publication number: 20200401481Abstract: Devices and techniques for disposable parity are described herein. First and second portions of data can be obtained, and respective parity values stored in adjacent memory locations. An entry mapping the respective parity values to the first and second portions of data is updated when the parity values are stored. If an error occurs when writing a portion of data, the mapping entry is used to retrieve the parity data to correct the error. Otherwise, the parity data is discarded.Type: ApplicationFiled: September 3, 2020Publication date: December 24, 2020Inventor: Giuseppe Cariello
-
Publication number: 20200401482Abstract: Provided herein may be a memory controller and an operating method thereof. The memory controller may include: a read fail control circuit configured to perform, when the read operation fails, an assist read operation of determining optimal read voltages to be used to read the selected memory cells, and determine whether a threshold voltage distribution of the selected memory cells is an abnormal distribution based on read-related information obtained by the read operation and the assist read operation; and an error correction code (ECC) engine configured to perform an ECC decoding operation on hard decision data obtained by reading the selected memory cells using the optimal read voltages based on whether the threshold voltage distribution of the selected memory cells is the abnormal distribution.Type: ApplicationFiled: September 4, 2020Publication date: December 24, 2020Inventor: Yeong Dong GIM
-
Publication number: 20200401483Abstract: This disclosure describes a programmable device, referred to generally as a data processing unit, having multiple processing units for processing streams of information, such as network packets or storage packets. This disclosure also describes techniques that include enabling data durability coding on a network. In some examples, such techniques may involve storing data in fragments across multiple fault domains in a manner that enables efficient recovery of the data using only a subset of the data. Further, this disclosure describes techniques that include applying a unified approach to implementing a variety of durability coding schemes. In some examples, such techniques may involve implementing each of a plurality of durability coding and/or erasure coding schemes using a common matrix approach, and storing, for each durability and/or erasure coding scheme, an appropriate set of matrix coefficients.Type: ApplicationFiled: August 31, 2020Publication date: December 24, 2020Inventors: Rajan Goyal, Abhishek Kumar Dikshit
-
Publication number: 20200401484Abstract: A transport vehicle, a server, and a method for backing up a software update of a control device of the transport vehicle are provided. The method includes the steps: transmitting a first data set representing a current software version of the control device by the transport vehicle to a server, storing the first data set in the server; determining that a software update of the control device must occur; generating a second data set representing a target software version of the control device as a function of the first data set by the server; and transmitting the first data set and the second data set and a software package for updating the control device according to the second data set from the server to the transport vehicle.Type: ApplicationFiled: December 19, 2018Publication date: December 24, 2020Inventor: Marion HACKL
-
Publication number: 20200401485Abstract: A streamlined approach analyzes block-level backups of VM virtual disks and creates both coarse and fine indexes of backed up VM data files in the block-level backups. The indexes (collectively the “content index”) enable granular searching by filename, by file attributes (metadata), and/or by file contents, and further enable granular live browsing of backed up VM files. Thus, by using the illustrative data storage management system, ordinary block-level backups of virtual disks are “opened to view” through indexing. Any block-level copies can be indexed according to the illustrative embodiments, including file system block-level copies. The indexing occurs offline in an illustrative data storage management system, after VM virtual disks are backed up into block-level backup copies, and therefore the indexing does not cut into the source VM's performance. The disclosed approach is widely applicable to VMs executing in cloud computing environments and/or in non-cloud data centers.Type: ApplicationFiled: January 15, 2020Publication date: December 24, 2020Inventors: Amit MITKAR, Vinit Dilip DHATRAK