Patents Issued in October 31, 2024
-
Publication number: 20240362149Abstract: The present disclosure provides a component debugging method, apparatus and device, and a storage medium. The method comprises: first, displaying a debugging page for a target component, the debugging page comprising a debugging panel and a form exhibition window, the debugging panel being used for displaying an attribute of a target component in a preset debugging mode, the preset debugging mode being used for indicating a debugging operation for the attribute, and the form exhibition window being used for exhibiting the form of the target component; then, in response to the debugging operation for a target attribute on the debugging page, obtaining a debugged attribute value of the target attribute, and displaying the form of the target component in the form exhibition window on the basis of the debugged attribute value.Type: ApplicationFiled: May 5, 2022Publication date: October 31, 2024Inventors: Hao QIU, Yujie LI, Zhengyu JIANG, Jiayi XIAO, Jun SHEN
-
Publication number: 20240362150Abstract: A debug circuit is provided in an information processing device and performs debugging of a polling program that polls a flag of a control register used for control on a peripheral function of the information processing device. The debug circuit includes: an execution instruction detection circuit that detects an execution instruction of the peripheral function to generate a detection signal; an expected value comparison circuit that compares a flag value of a flag read from the control register against an expected value of the flag; and a polling time measurement circuit that measures a polling value related to polling of the flag of the control register based on the detection signal and a comparison result obtained by the expected value comparison circuit.Type: ApplicationFiled: April 23, 2024Publication date: October 31, 2024Applicant: LAPIS Technology Co., Ltd.Inventor: Kenji NOZAKI
-
Publication number: 20240362151Abstract: In an example embodiment, a Language Server Protocol (LSP) is utilized to connect IDEs to test frameworks via a shared language server. More particularly, the shared language server is modified to permit feedback to be delivered regarding test results from the test framework to be delivered to the IDEs, either directly via a code action that supports direct feedback, or indirectly by causing the language server to write test results to the IDEs as code comments within the software code itself. The result is that a single test framework can be utilized by developers using completely different IDEs, without requiring a separate test framework to be developed for each IDE.Type: ApplicationFiled: April 25, 2023Publication date: October 31, 2024Inventor: David Kunz
-
Publication number: 20240362152Abstract: Systems and methods in the field of software development and workflows for networked applications. System would allow rotation of test, staging, and production servers by reassigning their respective addressing, with minimal or no modification to the servers. It would reduce or eliminate uncertainty, additional testing, delays, and downtime as a result of server rotation and maintenance.Type: ApplicationFiled: April 10, 2024Publication date: October 31, 2024Inventor: Ronald Abramson
-
Publication number: 20240362153Abstract: Various embodiments are generally directed to techniques for test automation portals for behavior-driven development. Some embodiments are particularly directed to a user interface portal and supporting systems that allow users of various capabilities to view available Behavior-Driven Development (BDD) tests, select one or more BDD tests, execute/schedule automated BDD tests, view execution results, and view execution history from one central location without the need for programming/developer skills.Type: ApplicationFiled: April 27, 2023Publication date: October 31, 2024Inventors: Asha Laxmi Sriramdas, Sudeshna Das
-
Publication number: 20240362154Abstract: A smart test generation system is described herein that removes much of the burden of creating boilerplate or routine code from the developer. The system intelligently generates as much code as possible so that the developer can focus on what he or she wants the test to do, rather than spending time setting up the test's framework. The unit test code generated by the smart test generation system is extremely detailed and complete compared to past solutions for test code generation. Thus, the smart test generation system quickly and easily sets developers up to write unit test code by freeing the developer from writing boring and repetitive test framework and setup code.Type: ApplicationFiled: July 8, 2024Publication date: October 31, 2024Inventor: Nathan Shevick
-
Publication number: 20240362155Abstract: Example implementations described herein are directed to an application crash testing platform that tests provided applications through a machine learning algorithm. Multiple instances of the application are spawned on a cloud-based platform, wherein the machine learning algorithm provides input to each of the instances until an incident causing the application to become inoperable is reached.Type: ApplicationFiled: April 26, 2022Publication date: October 31, 2024Inventor: Dennis HUANG
-
Publication number: 20240362156Abstract: According to some embodiments, systems and methods are provided including receiving a definition for a scenario including a plurality of operation steps, wherein a first and second operation step is executable by a respective first and second application under test; recording a first and second test script for the respective first and second operation steps of the scenario with a respective first and second test automation tool; receiving a first and second test script identifier for the recorded respective first and second test script at a persistence proxy layer; updating the definition of the scenario; receiving the recorded first and second test scripts at an orchestrator; identifying one of the first application under test and the second application under test for each operation step in the updated scenario; and executing one of the first and second test scripts based on the scenario definition. Numerous other aspects are provided.Type: ApplicationFiled: April 25, 2023Publication date: October 31, 2024Inventors: Zhijie AI, Dan LIU
-
Publication number: 20240362157Abstract: A method for transformation and visualization of consolidated data is provided. The method is executed by a determination engine implemented as a computer program within a computing environment. The method includes executing a data consolidation that normalizes aggregated data into the consolidated data by subjecting the aggregated data to transformations per weights to output the consolidated data. The method includes executing a data transformation and visualization by determining final ratings for the consolidated data and generating on a display a user interface comprising a heatmap depicting the consolidated data according to the final ratings.Type: ApplicationFiled: June 6, 2023Publication date: October 31, 2024Applicant: UiPath, Inc.Inventors: Lev KUSHNIR, Amol AWATE, Rick CHALKLEY, Gerd WEISHAAR, Gurpreet CHAHAL, Sumit CHOURASIA
-
Publication number: 20240362158Abstract: Systems, methods and apparatus for managing a distributed environment are disclosed. A method for testing nodes in a distributed system includes configuring a plurality of virtual nodes to emulate a distributed system that is used to process and manage distributed immutable data objects, initiating a test of the emulated distributed system, the test including performing one or more transactions on a first distributed immutable data object to obtain a modified first distributed immutable data object; and verifying the emulated distributed system by comparing the modified first distributed immutable data object with a second distributed immutable data object that has been processed in a validated system.Type: ApplicationFiled: July 8, 2024Publication date: October 31, 2024Inventors: Robert Stavros, Bryan Turek, Ian Stavros
-
Publication number: 20240362159Abstract: A system includes a memory and a processor coupled to the memory. The processor renders a virtual environment on a user device. The processor detects that a first view of the virtual environment has been rendered and accesses from the memory a first expected view pattern that corresponds to the first view. The processor compares the first view to the first expected view pattern and detects that a pattern of one or more visual elements in the first view does not match with an expected pattern of visual elements in the first expected view pattern. In response, the processor determines that an error has occurred relating to rendering the virtual environment. The processor obtains a solution corresponding to the error and applies the solution to resolve the detected error.Type: ApplicationFiled: July 10, 2024Publication date: October 31, 2024Inventor: Swathi Bussa
-
Publication number: 20240362160Abstract: A method for extracting data from a data memory. The method includes: providing data; storing the data in a data memory; developing an optimal extraction strategy based on a current use case and/or available resources; extracting data from the data memory based on the optimal extraction strategy; and providing the extracted data.Type: ApplicationFiled: April 24, 2024Publication date: October 31, 2024Inventors: Ajay Kumar Nagaraj, David Huber, Joseph Trotta, Holger Peters, Daniel Zander
-
Publication number: 20240362161Abstract: Systems, methods, and data storage devices for redundant storage of data across namespaces with dynamic capacity allocation are described. Data storage devices may support multiple host connections to multiple namespaces allocated in their non-volatile storage medium according to a storage protocol, such as non-volatile memory express (NVMe). Each namespace may initially be allocated with an allocated capacity. For at least some of the namespaces, a portion of the allocated capacity may be allocated to a floating namespace pool. A redundant array of independent disks (RAID) configuration may be established across the namespaces for redundant storage of host data. When the fill mark for one of the namespaces reaches a flexible capacity threshold, capacity from the floating namespace pool may be dynamically allocated to that namespace and removed from the floating namespace pool.Type: ApplicationFiled: July 20, 2023Publication date: October 31, 2024Inventors: Sridhar Sabesan, Dinesh Babu, Pavan Gururaj
-
Publication number: 20240362162Abstract: According to one embodiment, a memory system includes a nonvolatile memory including plural blocks each including plural pages, and a controller. When receiving a write request designating a first logical address and a first block number from the host, the controller determines a first location in a first block having the first block number to which data from the host should be written, and writes the data from the host to the first location in the first block. The controller notifies the host of either an in-block physical address indicative of the first location, or a group of the first logical address, the first block number and the first in-block physical address.Type: ApplicationFiled: July 10, 2024Publication date: October 31, 2024Applicant: Kioxia CorporationInventors: Hideki YOSHIDA, Shinichi KANNO
-
Publication number: 20240362163Abstract: Some examples relate to providing a fabric-attached memory (FAM) for applications using message passing procedure. In an example, a remotely accessible memory creation function of a message passing procedure is modified to include a reference to a region of memory in a FAM. A remotely accessible memory data structure representing a remotely accessible memory is created through the remotely accessible memory creation function. When an application calls a message passing function of the message passing procedure, a determination is made whether the remotely accessible memory data structure in the message passing function includes a reference to the region of memory in the FAM. In response to a determination that the remotely accessible memory data structure includes a reference to the region of memory in the FAM, the message passing function call is routed to a FAM message passing function corresponding to the message passing function.Type: ApplicationFiled: April 28, 2023Publication date: October 31, 2024Inventors: Soumitra Chatterjee, Chinmay Ghosh, Mashood Abdulla Kodavanji, Sharad Singhal
-
Publication number: 20240362164Abstract: A controller of a storage device includes a memory configured to serve as a lookahead cache; a read request storage configured to store therein read requests; and a cache manager configured to perform a bottleneck check operation when a process for a cache hit read request stored in the read request storage is completed, and selectively deactivate the lookahead cache based on a check result in bottleneck check operations.Type: ApplicationFiled: October 13, 2023Publication date: October 31, 2024Inventors: Hyun Jin Chung, Hee Cheol KIM
-
Publication number: 20240362165Abstract: A computing device and a data processing method and system are provided. The computing device includes a central processing unit, at least one heterogeneous device, and a shared memory pool. The central processing unit is configured to: divide the shared memory pool into a plurality of memory spaces, store, in a first memory space in the plurality of memory spaces, first to-be-processed data that is provided by a client and that is associated with a service, and notify a first heterogeneous device of an address of the first to-be-processed data in the first memory space and a first operation that needs to be performed by the first heterogeneous device. The first heterogeneous device performs the first operation on the first to-be-processed data, and stores obtained first data in a second memory space.Type: ApplicationFiled: July 12, 2024Publication date: October 31, 2024Inventors: Xiao Liu, Zhou Yu
-
METHODS AND APPARATUS FOR INFLIGHT DATA FORWARDING AND INVALIDATION OF PENDING WRITES IN STORE QUEUE
Publication number: 20240362166Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to forward and invalidate inflight data in a store queue. An example apparatus includes a cache storage, a cache controller coupled to the cache storage and operable to receive a first memory operation, determine that the first memory operation corresponds to a read miss in the cache storage, determine a victim address in the cache storage to evict in response to the read miss, issue a read-invalidate command that specifies the victim address, compare the victim address to a set of addresses associated with a set of memory operations being processed by the cache controller, and in response to the victim address matching a first address of the set of addresses corresponding to a second memory operation of the set of memory operations, provide data associated with the second memory operation.Type: ApplicationFiled: April 24, 2023Publication date: October 31, 2024Inventors: Naveen Bhoria, Timothy David Anderson, Pete Michael Hippleheuser -
Publication number: 20240362167Abstract: A database system is operable to cache first resultant data generated via executing a first query in cache memory resources during a first temporal period. An instruction to re-execute the first query is processed during the first temporal period by accessing the first resultant data in the cache memory resources. A cached resultant invalidation instruction indicating the first relational database table is received. The first resultant data from the cache memory resources is removed during a second temporal period based on processing the cached resultant invalidation instruction. A third instruction to re-execute the first query is processed after the second temporal period by re-executing the first query via access to the first relational database table in the first storage resources to re-generate corresponding first resultant data for the first query.Type: ApplicationFiled: March 28, 2024Publication date: October 31, 2024Applicant: Ocient Holdings LLCInventors: David Charles Boutcher, Rob Bestgen
-
Publication number: 20240362168Abstract: A computer-implemented method, a computer program product, and a computer system for handling logical-to-physical table (LPT) entries. A computer implements a class of metadata including a logical-to-physical table (LPT) and LPT entries corresponding to the class of metadata. A computer caches, from the logical-to-physical translation layer, selected metadata blocks in a non-durable cache, the selected metadata blocks being selected from the class of metadata. A computer reduces a size of the selected metadata blocks by encoding the LPT entries from the non-durable cache during write operations to a flash memory. A computer records a location in flash memory of the encoded LPT entries in the logical-to-physical translation layer.Type: ApplicationFiled: April 27, 2023Publication date: October 31, 2024Inventors: Radu Ioan Stoica, Timothy J. Fisher, Nikolaos Papandreou, Roman Alexander Pletka, Aaron Daniel Fry, Charalampos Pozidis, Andrew D. Walls
-
Publication number: 20240362169Abstract: An example memory controller and readable storage medium are disclosed. An example memory system includes: a non-volatile memory device and a memory controller coupled to the non-volatile memory device; the memory controller is configured to: determine whether data for the logical block address mapping of a received read command belongs to tables of a first class or tables of a second class, and confirm the heat of the data corresponding to the logical block address of the received read command; determine a level of the amount of drift of a threshold voltage of a memory cell corresponding to the logical block address, according to the heat of the data corresponding to the logical block address of the received read command; determine different read voltages that are correspondingly sent to the memory cell corresponding to the logical block address, according to different levels of the amount of drift.Type: ApplicationFiled: September 21, 2023Publication date: October 31, 2024Inventors: Fanya Bi, Xing Wang, Hua Tan, Zhe Sun, Bo Yu, Guangyao Han
-
Publication number: 20240362170Abstract: Methods, systems, apparatuses, and computer program products are provided for protecting data in a memory of an integrated circuit (IC). A process token is obtained in a special purpose IC from a host that is external to and communicatively connected to the special purpose IC. The process token is stored in a first memory portion of the special purpose IC. In response to receiving a processing request from the host, the processing request is processed, and data generated by processing the processing request is written in a second memory portion of the special purpose IC. When a read request is received to read the data in the second memory portion, a determination is made whether the read request includes a read token that matches the previously stored process token. If the read token matches the process token, the data in the second memory portion may be returned to the host.Type: ApplicationFiled: July 10, 2024Publication date: October 31, 2024Inventors: Blake D. PELTON, Haohai YU, Chirag VARDE
-
Publication number: 20240362171Abstract: Physical memory isolation in a virtualized system is described. A notification is received from a guest in the virtualized system that an address space isolation component has been created in the guest. At the host of the virtualized system, a memory isolation domain that is bound with the address space isolation component is created. The memory isolation domain includes a set of second level address translation tables dedicated for that memory isolation domain. Guest-physical address (GPA) range(s) are received from the guest that are mapped into memory of the guest, and memory access permissions for the GPA range(s) are received and are being mapped for a process into the created memory isolation domain. The host determines whether the mapping for the process into the created memory isolation domain is permitted. If not permitted, the mapping is blocked thereby preventing access. If permitted, the mapping is granted thereby allowing access.Type: ApplicationFiled: April 26, 2024Publication date: October 31, 2024Inventors: Sergej Proskurin, Sebastian Wolfgang Vogl, Jonas Pfoh
-
Publication number: 20240362172Abstract: A storage medium storing a program for causing a computer to execute first determination of determining, in a case where information regarding a communication apparatus is acquired via communication with the communication apparatus using a first connection method, that communication using the first connection method is enabled by the communication apparatus, and determining, based on information included in the information acquired in first acquisition and indicating a state in which communication using a second connection method different from the first connection method is enabled by the communication apparatus, that the communication using the second connection method is enabled by the communication apparatus.Type: ApplicationFiled: July 11, 2024Publication date: October 31, 2024Inventor: Shiho Sekiguchi
-
Publication number: 20240362173Abstract: A microprocessor-PLD hybrid architecture includes an IPC microprocessor and a PLD in signal communication with the IPC microprocessor via an IPC interface. The IPC microprocessor outputs a data read command to initiate a data read operation or a data write command. The PLD includes a plurality of PLD modules that store data and a bus controller. The bus controller communicates with the plurality of PLD modules via a plurality of PLD interfaces and is configured to sequentially execute a set of bus controller instructions. The bus controller reads data from a target PLD module from among the plurality of PLD modules in response to receiving the data read command, and transfers the data to the IPC microprocessor. The bus controller receives data from the IPC microprocessor and stores the data in a target PLD module from among the plurality of PLD modules in response to receiving the data write command.Type: ApplicationFiled: September 27, 2023Publication date: October 31, 2024Inventors: Rajesh Madathikandam, Robin David Hill, Stephen Potter, Ashish Vijay, Rajeeva Krishna, Anitha Thangavel
-
Publication number: 20240362174Abstract: A driver adaptable to a debugging system includes a driver controller, and a driver general-purpose input and output (GPIO) controlled by the driver controller. The driver GPIO directly transfers a debug log of status messages of a touchscreen to a host general-purpose input and output (GPIO) of a host without handshaking between the driver and the host.Type: ApplicationFiled: April 29, 2023Publication date: October 31, 2024Inventors: Yu-Nian Ou, Chun-Kai Chuang, Pei-Yuan Hung, Yu-Hsiang Lin
-
Publication number: 20240362175Abstract: A system on chip includes an interrupt controller, a processor, and an on-chip bus, wherein the interrupt controller is connected to the processor through the on-chip bus. The interrupt controller is configured to store execution environment identifiers corresponding to different execution environments; and send, after receiving a first interrupt instruction, the first interrupt instruction to the processor. The processor is configured to obtain, in response to the first interrupt instruction, a first execution environment identifier corresponding to the first interrupt instruction from the interrupt controller; and execute, when the first execution environment identifier is the same as a second execution environment identifier, the first interrupt instruction in a corresponding execution domain of a current execution environment, wherein the second execution environment identifier is an execution environment identifier of an execution environment to which a current execution domain belongs.Type: ApplicationFiled: April 25, 2024Publication date: October 31, 2024Inventors: Zhixing CHEN, Wenbin ZHENG
-
Publication number: 20240362176Abstract: A device includes a master device, a set of slave devices and a bus. The master device is configured to transmit first messages carrying a set of operation data message portions indicative of operations for implementation by slave devices of the set of slave devices, and second messages addressed to slave devices in the set of slave devices. The second messages convey identifiers identifying respective ones of the slave devices to which the second messages are addressed requesting respective reactions towards the master device within respective expected reaction intervals. The slave devices are configured to receive the first messages transmitted from the master device, read respective operation data message portions in the set of operation data message portions, implement respective operations as a function of the respective operation data message portions read, and receive the second messages transmitted from the master device.Type: ApplicationFiled: July 5, 2024Publication date: October 31, 2024Inventors: Fred Rennig, Ludek Beran
-
Publication number: 20240362177Abstract: The present disclosure provides a data transfer device for synchronous control of computers, comprising a PCB board integrated with a USB high-speed sharing chip, a keyboard and mouse emulation chip, and a shared disk, the data transfer device further includes a microcontroller, which is connected with the USB high-speed sharing chip, the keyboard and mouse emulation chip, and the shared disk, respectively, and the PCB board also integrates a hub mechanism. The data transfer device's microcontroller allows a user to simultaneously access two computers, and the combination of the shared disk and the USB high-speed sharing chip enables fast data exchange between the two computers, thereby achieving visual transformation between the two computers. The data transfer device also functions as a hub, allowing connection of different types of devices.Type: ApplicationFiled: August 17, 2023Publication date: October 31, 2024Inventor: QIANG WANG
-
Publication number: 20240362178Abstract: A memory device includes a first physical interface, a second physical interface, a first memory core, a second memory core, and a setting circuit. The first memory core is assigned to the first physical interface and includes a plurality of first stacked memory dies and connected via a through electrode. The second memory core is assigned to the second physical interface and includes a plurality of second stacked memory dies connected via a through electrode. The setting circuit sets at least one physical interface to be used for connection with an external device of the memory device among the first physical interface and the second physical interface.Type: ApplicationFiled: October 12, 2023Publication date: October 31, 2024Applicant: Samsung Electronics Co., Ltd.Inventors: Yunseok YANG, Yunkyeong JEONG, Jaewoo SHIN, Minhwan AN, Jin Suk CHUNG
-
Publication number: 20240362179Abstract: An asynchronous communication system configured to operate a MIL-1553 protocol. The system includes: a bus; a bus controller coupled to the bus that is configured to control access to the bus; a remote terminal connected to the bus; a device controller connected to the remote terminal; and a read/write overlap avoidance latch connected to the remote terminal. The read/write overlap avoidance latch provides an active signal to the device controller that prevents the device controller from writing data to the remote terminal while the bus controller is reading data from the device controller during a read cycle.Type: ApplicationFiled: August 1, 2023Publication date: October 31, 2024Inventors: Pravinsharma Kaliyannan Eswaran, Annamalai Nallathambi, Sneha Ashok Moon, Akansha Bhosle
-
Publication number: 20240362180Abstract: Graphics processors and graphics processing units having dot product accumulate instructions for a hybrid floating point format are disclosed. In one embodiment, a graphics multiprocessor comprises an instruction unit to dispatch instructions and a processing resource coupled to the instruction unit. The processing resource is configured to receive a dot product accumulate instruction from the instruction unit and to process the dot product accumulate instruction using a bfloat16 number (BF16) format.Type: ApplicationFiled: April 26, 2024Publication date: October 31, 2024Applicant: Intel CorporationInventors: Subramaniam Maiyuran, Shubra Marwaha, Ashutosh Garg, Supratim Pal, Jorge Parra, Chandra Gurram, Varghese George, Darin Starkey, Guei-Yuan Lueh
-
Publication number: 20240362181Abstract: The present disclosure provides an application log coding output method, a device, a system, and a computer readable storage medium. The method comprises: loading a conversion appender using an extension mechanism of a native logger, loading a log converter and a native appender for outputting a log message using the conversion appender, the log converter comprising one or more log sub-converters, and loading the log sub-converters specified by an initialization parameter using the log converter; receiving the log message sent by the native logger using the conversion appender, scheduling the log sub-converters specified by the initialization parameter to execute log coding, and sending the processed log to the native appender for secure output. By using the method, diversified log coding output can be achieved without retrofitting an application, and the method is more friendly to developers.Type: ApplicationFiled: January 28, 2022Publication date: October 31, 2024Inventors: Lin Chen, Haiyang Zhang, Sen Yang
-
Publication number: 20240362182Abstract: The technology disclosed herein enables accelerated data transmission between producers and consumers. In a particular example, a method includes receiving a first request from a producer-connector component of a producer component to store a payload to a storage repository. In response to the first request, the method includes providing a unique identifier to the connector component. The connector component provides the unique identifier to the distributed-clustered application. The method further includes storing the payload in association with the unique identifier to the storage repository. The method also includes retrieving the payload from the storage repository using the unique identifier to identify the payload in the storage repository. The method includes receiving a second request from a consumer-connector component of the consumer component to retrieve the payload. In response to the second request, the method includes supplying the payload to the consumer component.Type: ApplicationFiled: April 28, 2023Publication date: October 31, 2024Applicant: NetApp, Inc.Inventors: Kiran Srinivasan, Senthil Murugan Vivekanandan, Gregory Pailet
-
Publication number: 20240362183Abstract: Techniques are provided for mirroring objects between object stores hosted by cloud providers that could have different data layout requirements. An object may be stored within an object store that supports a unified object format where the object is capable of storing compressed data. The object may be mirrored to a destination object store that may also support the unified object format or to a destination object store that does not support the unified object format. If the destination object store does not support the unified object format, then slot header metadata within the object is used to decompress the data within the object into an uncompressed format. The data is packaged from being in the uncompressed format into a fixed offset format supported by the destination object store to create a mirrored object that is stored into the destination object store while retaining compression of the data.Type: ApplicationFiled: April 27, 2023Publication date: October 31, 2024Inventors: Palak Sharma, Cheryl Marie Thompson, Qinghua Zheng, Venkateswarlu Tella
-
Publication number: 20240362184Abstract: Techniques described herein relate to systems and methods of data storage, and more particularly to automatic file site clone generation. In certain embodiments, a computing device may include receiving a selection indicating that a clone directory is visible in a head node. In response to the selection indicating that the clone directory to be visible in the head node, the computing device may include generating a snapshot of a target file system. Also, the computing device may include duplicating a directory of the target file system into the clone directory. Further, the computing device may include mapping an address of the target file system into the clone directory. The computing device may include linking the clone directory to the head node.Type: ApplicationFiled: April 27, 2023Publication date: October 31, 2024Applicant: Oracle International CorporationInventors: John Michael Harres, Mark Leroy Shellenbaum, Bhaskar Sarkar
-
Publication number: 20240362185Abstract: A lazy index construction technique efficiently and cost effectively manages creation and storage of an index data structure based on characteristics of storage media used by an archival storage system. The index data structure (index) is configured to reference snapshot data of snapshots stored in the archival storage system. The technique is configured to defer creation and storage of the index on the archival storage system in a lazy manner until all snapshot data is received by a replication receiver and stored on the storage media so that updates/changes to the index on the storage media are minimized. The technique may be used with any type or combination of (i) “overwrite” data structure embodied as an index (i.e., an index data structure with overwrite capabilities) stored in an (ii) archival storage system having storage media (e.g., an object store) that is not conducive to overwrite capabilities.Type: ApplicationFiled: September 8, 2023Publication date: October 31, 2024Inventors: Angshuman Bezbaruah, Brajesh Kumar Shrivastava
-
Publication number: 20240362186Abstract: A processor of a computing device is described that intercepts a write command output from a file system, the write command specifying new data to be written to a particular group of blocks of a storage device. The processor determines, based on a record of free blocks of the storage device, that the particular group of blocks of the storage device include one or more free blocks that are currently storing snapshot data as old data. Responsive to determining that the particular group of blocks of the storage device include one or more free blocks that are currently storing snapshot data as old data, the processor moves the old data to other free blocks of the storage device, and after moving the old data to the other free blocks, the processor forwards the write command to the storage device to write the new data to the particular group of blocks.Type: ApplicationFiled: July 10, 2024Publication date: October 31, 2024Inventors: Paul D. Lawrence, Mark Gregory Salyzyn
-
Publication number: 20240362187Abstract: A method and system for overwriting-based deletion of information and verification of deletion is provided, wherein the method at least includes: receiving a deletion request and/or a random seed; performing fine-grained overwriting on the information by means of random overwriting; in response to an extraction request for a post-deletion state, making a master node in a source domain of the information broadcast the extraction request to at least one slave node; and sending the post-deletion state fed back by the slave node and a related state-verification parameter to a verifying terminal, so that the verifying terminal verifies an overwriting result based on a verifiable pseudo-random function. Thus, the present application can effectively prevent information recovery after being logically deleted, and efficaciously ensure verifiability as well as non-recoverability of deleted information, thereby assuring non-recoverable deletion and providing verifiability of deletion to information subjects.Type: ApplicationFiled: April 10, 2024Publication date: October 31, 2024Inventors: Peng XU, Shuning XU, Wei WANG, Runze XU, Tingting RAO, Hai JIN
-
Publication number: 20240362188Abstract: Edge nodes in distributed computing environments can be updated according to some aspects described herein. For example, a first node in the distributed computing environment can receive an update request from a management node. The update request can include an update file for updating a second node. In response to receiving the update request, the first node can generate a first partition and a second partition, containing the update file, within the first node. Additionally, the first node can generate a network tunnel between the first node and the second node. The first node can mount a file system for the second node onto the first partition and a copy of the file system onto the second partition of the first node via the network tunnel. The first node also can update the file system in the second partition using the update file to generate an updated file system.Type: ApplicationFiled: July 5, 2024Publication date: October 31, 2024Inventors: Leigh Griffin, Pierre-Yves Chibon
-
Publication number: 20240362189Abstract: A system and method for random-access manipulation of compacted data files, utilizing a reference codebook, a random-access engine, a data deconstruction engine, and a data deconstruction engine. The system may receive a data query pertaining to a data read or data write request, wherein the data file to be read from or written to is a compacted data file. A random-access engine may facilitate data manipulation processes by transforming the codebook into a hierarchical representation and then traversing the representation scanning for specific codewords associated with a data query request. In an embodiment, an estimator module is present and configured to utilize cardinality estimation to determine a starting codeword to begin searching the compacted data file for the data associated with the data query. The random-access engine may encode the data to be written, insert the encoded data into a compacted data file, and update the codebook as needed.Type: ApplicationFiled: July 10, 2024Publication date: October 31, 2024Inventors: Joshua Cooper, Charles Yeomans
-
Publication number: 20240362190Abstract: A computer system provides shared access to electronic data assets. The system may perform operations including: receiving, from a first user, a request to access a shared data asset, wherein: the shared data asset is associated with a shared data asset object, and the shared data asset object identifies at least a second user authorized to approve sharing of the shared data asset; in response to receiving the request from the first user: generating a data access request object including at least an identification of the first user and an identification of the shared data asset object; and providing an indication of the data access request object to the second user associated with the shared data asset object; receiving, from the second user, an approval of the request; and in response to receiving the approval of the request from the second user: granting the first user access to the shared data asset associated with the shared data asset object.Type: ApplicationFiled: July 11, 2024Publication date: October 31, 2024Inventors: Alexandra Greehy, Craig Massie, Alexander Bell-Thomas, Helena Kertesz, Mihai Condur, Nicolas Prettejohn, Pieris Christofi, Sam Stoll
-
Publication number: 20240362191Abstract: A lock controller is connected to a primary lock server having a primary memory to implement a primary ring buffer lock and a secondary lock server having a secondary memory to implement a mirrored primary ring buffer lock. The lock controller sends a first lock request and first read request to the primary lock server and receives a first order. Further, the lock controller sends a second lock request and a second read request to the secondary lock server and receives a second order. Further, the lock controller compares the first and second order, and if the second order differs from the first order, then sends a reorder request to the secondary lock server indicating the first order, so that the execution order of lock requests can be maintained. The disclosed lock controller ensures low latency and efficiently handles a server failure.Type: ApplicationFiled: July 10, 2024Publication date: October 31, 2024Inventors: Zvi Schneider, Assaf Natanzon
-
Publication number: 20240362192Abstract: An update method in which a computer updates data stored in a first storage device by copying a plurality of files stored in the first storage device to a second storage device and writing the files updated in the second storage device back to the first storage device, the plurality of files constituting a part of a database. The update method includes a query determination for determining whether a query for requesting writing to one of the files stored in the second storage device is based on a cluster key of the database, low-frequency file identification for identifying a file having a low writing frequency among the files stored in the second storage device, and write-back for writing the file having the low writing frequency identified in the low-frequency file identification to the first storage device.Type: ApplicationFiled: February 14, 2024Publication date: October 31, 2024Inventors: Yoshiki KUROKAWA, Toshihiko KASHIYAMA, Norifumi NISHIKAWA, Mayuko OZAWA, Kazuhiko MOGI
-
Publication number: 20240362193Abstract: A computer-implemented method including: receiving a first data set including a plurality of values for a plurality of features; removing one or more features and associated values from the first data set to generate a second data set; determining feature importance of at least a subset of the features of the second data set using multiple-evaluation criteria; and performing an action using at least one feature of the second data set and the determined feature importance.Type: ApplicationFiled: July 11, 2022Publication date: October 31, 2024Applicant: ROLLS-ROYCE plcInventors: Kee Khoon LEE, Henry KASIM, Terence HUNG, Airil Seet BIN AZRY SEET, Yirui FENG, Jonathan TAY, Albert PHANG, Piyush TAGADE
-
Publication number: 20240362194Abstract: A computer-implemented method for extracting bulk data by generating with a secure agent a transfer request for transfer of the bulk data; generating with a content management unit a bulk data extraction job having a job ID associated therewith in response to the transfer request and then transferring the job ID to the secure agent; generating a programmatic call using the job ID with the secure agent requesting data files including a manifest file; generating with the secure agent a search request for searching the manifest file for selected information; retrieving the manifest file with the content management unit in response to the search request; searching and parsing the manifest file with the content management unit to identify and retrieve the data files corresponding to the job ID; and transferring the data files associated with the job ID with the content management unit to a data extraction unit.Type: ApplicationFiled: July 8, 2024Publication date: October 31, 2024Inventors: Don ROBERTS, Laurence Anthony BROWN, Visal NAIR
-
Publication number: 20240362195Abstract: Various methods, apparatuses/systems, and media for generating platform and database agnostic reports without depending on reporting services are disclosed. A processor receives a configuration file via a user interface, the configuration file including reporting configurations for components associated with reporting service; interprets the configuration file by utilizing corresponding interpreter libraries; invokes, in response to interpreting the configuration file, a predefined application programming interface (API); processes, in response to invoking the API, the reporting configurations using the interpreter libraries to process data object references and pre-configured report layout formats; receives a request from a user to generate a custom report; and automatically renders, in response to receiving the request, a platform and a database agnostic report by implementing a desired visualization techniques.Type: ApplicationFiled: June 12, 2023Publication date: October 31, 2024Applicant: JPMorgan Chase Bank, N.A.Inventors: Desh SHARMA, Sweety JESWANI, Hans P. NIRMAL, Sushant PAUL, Sanketh BHAT
-
Publication number: 20240362196Abstract: Provided herein are systems and methods for real-time feature store configuration. The method includes decoding raw data received from a data source to obtain decoded raw data. The decoded raw data includes streaming data and batch data. An incremental computation of features associated with the decoded raw data is performed using at least one dynamic table object. The features are pushed to a feature store using at least one triggered task. Optionally, training of a machine learning model is performed using the features in the feature store.Type: ApplicationFiled: October 19, 2023Publication date: October 31, 2024Inventors: Sandeep Narendra Gupta, Qiming Jiang
-
Publication number: 20240362197Abstract: Recent developments in machine learning (commonly coined “artificial intelligence” or “AI”) have vastly expanded applications for this technology, such as myriad “chat” agents adept at understanding natural human language. While state of the art generative models can parse text queries from a user and provide comprehensive, accurate responses (including generating images depicting desired content), current implementations struggle with understanding all information present in images of documents, especially images of business documents. In particular, generative models fail to understand structured and semi-structured information, e.g., as indicated by graphical information such as lines, geometric relationships (e.g., indicated by tables, graphs, figures, etc.), formatting, and other contextual information that human readers easily and implicitly understand.Type: ApplicationFiled: July 3, 2024Publication date: October 31, 2024Inventors: Steve Thompson, Veronika Levdik, Iurii Vymenets, Donghan Lee
-
Publication number: 20240362198Abstract: A system providing for user-initiated, account-type limiting, association-limiting, and duration-dependent public access file disclosures over a semi-private network.Type: ApplicationFiled: April 26, 2023Publication date: October 31, 2024Inventors: Ariel Yakubov, Roman Zelichenko