State Recovery (i.e., Process Or Data File) Patents (Class 714/15)
-
Patent number: 10091298Abstract: A method includes determining a level of confidence regarding a revision level for a set of encoded data slices. The method further includes, when the level of confidence is equal to or above a confidence threshold, sending write and commit requests, wherein a write and commit request includes an encoded data slice, a current revision value, and a new revision value. The method further includes, when favorable responses have been received, issuing finalize write requests. The method further includes, when the level of confidence is below the confidence threshold, sending write requests, wherein a write request includes the encoded data slice of the set of encoded data slices and a new revision value. The method further includes, when favorable write responses have been received, issuing write commit requests. The method further includes, when favorable write commit responses have been received, issuing finalize write requests.Type: GrantFiled: May 27, 2016Date of Patent: October 2, 2018Assignee: International Business Machines CorporationInventors: Andrew D. Baptist, Greg R. Dhuse, Ravi V. Khadiwala
-
Patent number: 10083074Abstract: Mechanisms for controlling access to storage volumes on the secondary storage system is provided. A determination is made as to whether a first site computing device has sent a notification of a failure condition of a first site. In response to a determination that the notification of the failure condition of the first site has not been received, secondary workloads of a second site computing device are permitted to access storage volumes on the secondary storage system. In response to a determination that the notification of the failure condition of the first site has been received, a mode of operation of the second site is modified from a normal mode of operation to a failure mode of operation. In the failure mode of operation, the storage system controller of the second site blocks at least a portion of access requests from secondary workloads of the second site computing device.Type: GrantFiled: December 21, 2015Date of Patent: September 25, 2018Assignee: International Business Machines CorporationInventors: Chiahong Chen, John C. Elliott, William G. Sherman
-
Patent number: 10082556Abstract: A system for correcting network planning data includes a planning repository containing information related to network traffic, network element locations and network element connectivity. The system further includes a repository that includes a plurality of call data records. In addition, the system includes an information processing system including a processor and a memory device coupled to the processor. The memory device contains a set of instructions that, when executed by the processor, cause the processor to receive location data associated with a wireless network cell from a plurality of devices connected to the wireless network. The set of instructions further causes the processor to identify call data records associated with the received location data and to compare information in the received location data with corresponding information stored in the identified call data records to identify errors in the information stored in the planning repository.Type: GrantFiled: July 12, 2017Date of Patent: September 25, 2018Assignee: NetScout Systems, IncInventors: Geoff Hopcraft, Nathaniel Hunt, Michael Wright
-
Patent number: 10083096Abstract: A system for restoring purged data includes an input interface and a processor. The input interface to receive an indication of purged data to restore. The processor is to reinstate the purged data using a stored copy and rebuild one or more relations to the purged data using an effective change stack.Type: GrantFiled: December 15, 2015Date of Patent: September 25, 2018Assignee: Workday, Inc.Inventors: Seamus Donohue, Sergio Mendiola Cruz, Ken Pugsley, John Levey, Gerald Green, Iacopo Pace
-
Patent number: 10083591Abstract: There is disclosed a telemetry monitoring system including a central monitoring unit configured to display data regarding one or more portable devices, each associated with the breathing apparatus of a user. The system further includes removable data storage connected to the central monitoring unit and configured to store system status data of the central monitoring unit as recovery data, the system status data defining an operational status of the central monitoring unit. In the event of a failure of the telemetry monitoring system, the telemetry monitoring system can be recovered by restoring the recovery data to the central monitoring unit or a replacement central monitoring unit from the removable data storage.Type: GrantFiled: April 26, 2017Date of Patent: September 25, 2018Assignee: Draeger Safety UK LimitedInventors: Conor Carr, Matthew Barnes, Steve Grainger
-
Patent number: 10078472Abstract: A method for a computing device to rebuild a plurality of to-be rebuilt encoded data slices in a dispersed storage network (DSN) begins with the computing device, for each set of encoded data slices of a plurality of sets of encoded data slices that includes at least one of the plurality of to-be rebuilt encoded data slices, determining a cumulative memory health for memory devices of storage units storing other encoded data slices of the respective set of encoded data slices and determining a probability of data loss. The method continues with the computing device prioritizing rebuilding based on the probability of data loss for each set of encoded data slices and rebuilding, in accordance with the prioritizing, a first to-be rebuilt encoded data slice of the plurality of to-be rebuilt encoded data slices to produce a first rebuilt encoded data slice.Type: GrantFiled: December 30, 2015Date of Patent: September 18, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventor: Thomas Darrel Cocagne
-
Patent number: 10079841Abstract: One example method and correspond apparatus extracts a model of a computer application during load time and stores the model of the computer application in a database. This example method and corresponding apparatus also inserts instructions into the computer application to collect data at runtime. This example method and corresponding apparatus then analyzes the data collected at runtime against the stored model of the computer application to detect one or more security events and tracks the one or more security events using a state machine.Type: GrantFiled: September 12, 2014Date of Patent: September 18, 2018Assignee: Virsec Systems, Inc.Inventors: Satya Vrat Gupta, Raymond F. DeMeo
-
Patent number: 10067834Abstract: Embodiments of information handling systems and methods are provided herein for resetting one or more system components in response to a watchdog timer (WDT) event. More specifically, the present disclosure provides information handling systems and methods for handling WDT events that occur within information handling systems comprising enhanced Serial Peripheral Interface (eSPI) master and slave devices.Type: GrantFiled: October 5, 2017Date of Patent: September 4, 2018Assignee: Dell Products LPInventors: Adolfo S. Montero, Chin-Jui Liu
-
Patent number: 10055311Abstract: A technology is provided for enabling a virtual computing environment to be changed to a reversion state approximating an earlier state is provided. The customer may create, organize, and change virtual computing resources within the virtual computing environment. The customer may also realize that recent desired changes made to the virtual computing environment have disrupted functionality that previously worked before the desired changes were made. A reversion service may be provided that allows the virtual computing environment to be changed to a reversion state approximating a state that preceded the changes without violating system rules, protocols, or limitations to which the virtual computing environment might be subject.Type: GrantFiled: September 9, 2015Date of Patent: August 21, 2018Assignee: Amazon Technologies, Inc.Inventors: Gregory Vitaly Troyan, David Arthur Stanford, Jr., Gregory Bevan McConnel
-
Patent number: 10042624Abstract: A method of delivering a user specific customized service to a mobile user device is disclosed. A user identifier is provided to an individual user associated with a device. Upon requesting a device configuration for the device, metadata pertaining to the device configuration is received from the device. A device signature is then created by parsing the received metadata and the device configuration is identified based on the device signature. A set of components customized for the device configuration is selected based on the device signature and a template having a set of predetermined components. The selection includes mapping the device signature to the template. The selected set of components is then compiled into a customized instance of the application for the device. Access to the instance of the application is provided to the user via a customized pointer.Type: GrantFiled: December 14, 2012Date of Patent: August 7, 2018Assignee: OATH INC.Inventors: Sean N. Byrnes, Gabriel Vanrenen, Dan Scholnick
-
Patent number: 10042881Abstract: The present technology proposes techniques for ensuring globally consistent transactions. This technology may allow distributed systems to ensure the causal order of read and write transactions across different partitions of a distributed database. By assigning causally generated timestamps to the transactions based on one or more globally coherent time services, the timestamps can be used to preserve and represent the causal order of the transactions in the distributed system. In this regard, certain transactions may wait for a period of time after choosing a timestamp in order to delay the start of any second transaction that might depend on it. The wait may ensure that the effects of the first transaction are not made visible until its timestamp is guaranteed to be in the past. This may ensure that a consistent snapshot of the distributed database can be determined for any past timestamp.Type: GrantFiled: November 22, 2016Date of Patent: August 7, 2018Assignee: Google LLCInventors: Wilson Cheng-Yi Hsieh, Alexander Lloyd, Peter Hochschild, Michael James Boyer Epstein, Sean Quinlan
-
Patent number: 10038593Abstract: The present invention provides a method and system for recovering a virtual network. The method may include obtaining a snapshot of the virtual network; and in a preset mode, reading configuration information of the virtual network from the snapshot. Further, based on the configuration information, one or more virtual network devices may be created and corresponding configuration parameters to the one or more created virtual network devices may be distributed. Based on the snapshot, the one or more created virtual network devices may be connected to virtual machines and a physical network.Type: GrantFiled: April 12, 2016Date of Patent: July 31, 2018Assignee: SANGFOR TECHNOLOGIES INC.Inventors: Huangfeng Wang, Jian Lei
-
Patent number: 10033759Abstract: A computing device is described that comprises one or more hardware processors and a memory communicatively coupled to the one or more hardware processors. The memory comprises software that, when executed by the processors, operates as (i) a virtual machine and (ii) a hypervisor. The virtual machine includes a guest kernel that facilitates communications between a guest application being processed within the virtual machine and one or more virtual resources. The hypervisor configures a portion of the guest kernel to intercept a system call from the guest application and redirect information associated with the system call to the hypervisor. The hypervisor enables logic within the guest kernel to analyze information associated with the system call to determine whether the system call is associated with a malicious attack in response to the system call being initiated during a memory page execution cycle.Type: GrantFiled: June 29, 2016Date of Patent: July 24, 2018Assignee: FireEye, Inc.Inventors: Atul Kabra, Julian Stecklina, Hirendra Rathor, Udo Steinberg
-
Patent number: 10025681Abstract: A computer-implemented method, according to one embodiment, includes: using a supplemental data storage volume at a secondary location to track a first set of data updates to a primary data storage volume at a primary location in response to a failure event at the primary location; retrieving a second set of tracked data updates to the primary data storage volume stored in a secondary data storage volume at the secondary location; merging the second set of tracked data updates into the first set of tracked data updates in the supplemental data storage volume; and transitioning the merged data updates from the supplemental data storage volume at the secondary location to the primary data storage volume at the primary location. Other systems, methods, and computer program products are described in additional embodiments.Type: GrantFiled: August 16, 2017Date of Patent: July 17, 2018Assignee: International Business Machines CorporationInventors: David R. Blea, Theresa M. Brown, Gregory E. McBride, Carol S. Mellgren, Warren K. Stanley, Matthew J. Ward
-
Patent number: 10019327Abstract: A system includes a multi-process application that runs. A multi-process application runs on primary hosts and is checkpointed by a checkpointer comprised of at least one of a kernel-mode checkpointer module and one or more user-space interceptors providing at least one of barrier synchronization, checkpointing thread, resource flushing, and an application virtualization space. Checkpoints may be written to storage and the application restored from said stored checkpoint at a later time. Checkpointing may be incremental using Page Table Entry (PTE) pages and Virtual Memory Areas (VMA) information. Checkpointing is transparent to the application and requires no modification to the application, operating system, networking stack or libraries. In an alternate embodiment the kernel-mode checkpointer is built into the kernel.Type: GrantFiled: May 27, 2016Date of Patent: July 10, 2018Assignee: Open Invention Network LLCInventors: Keith Richard Backensto, Allan Havemose
-
Patent number: 10015119Abstract: A method and system for file transfer, an instant messaging terminal, and a computer storage medium are described, so as to solve the problem that in case of a poor network environment, too much manual intervention is required when file transfer through an existing instant messaging software encounters a network connection interruption, leading to a low transfer efficiency and poor user. With the present disclosure, an instant messaging terminal is provided with an option of automatic retransfer upon disconnection, an option of automatic reception upon disconnection, and an option of automatic offline-file forwarding upon disconnection, such that when transfer of a file is interrupted, an instant messaging system can automatically retransfer (or resume the interrupted transfer of) the file, thus enhancing efficiency in file transfer.Type: GrantFiled: December 12, 2013Date of Patent: July 3, 2018Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventors: Dengke Yao, Shaowei Su, Xiaoyong Feng, Ling Xie
-
Patent number: 10007586Abstract: Various techniques for deferred server recovery are disclosed herein. In one embodiment, a method includes receiving a notification of a fault from a host in the computing system. The host is performing one or more computing tasks for one or more users. The method can then include determining whether recovery of the fault in the received notification is deferrable on the host. In response to determining that the fault in the received notification is deferrable, the method includes setting a time delay to perform a pending recovery operation on the host at a later time and disallowing additional assignment of computing tasks to the host.Type: GrantFiled: March 10, 2016Date of Patent: June 26, 2018Assignee: Microsoft Technology Licensing, LLCInventors: Nic Allen, Gaurav Jagtiani
-
Patent number: 10007784Abstract: Technologies for control flow exploit mitigation include a computing device having a processor with real-time instruction tracing support. During execution of a process, the processor generates trace data indicative of control flow of the process. The computing device analyzes the trace data to identify suspected control flow exploits. The computing device may use heuristic algorithms to identify return-oriented programming exploits. The computing device may maintain a shadow stack based on the trace data. The computing device may identify indirect branches to unauthorized addresses based on the trace data to identify jump-oriented programming exploits. The computing device may check the trace data whenever the process is preempted. The processor may detect mispredicted return instructions in real time and invoke a software handler in the process space of the process to verify and maintain the shadow stack. Other embodiments are described and claimed.Type: GrantFiled: March 27, 2015Date of Patent: June 26, 2018Assignee: Intel CorporationInventors: Michael LeMay, Ravi L. Sahita, Beeman C. Strong, Thilo Schmitt, Yuriy Bulygin, Markus T. Metzger
-
Patent number: 10009261Abstract: Methods implemented in an electronic device are disclosed for checkpoint and rollback recovery in a SDN system. The method utilizes message identifiers to indicate an order of consistent states of forwarding tables of a plurality of network elements of the SDN system. The SDN controller of the SDN system receives a request to recover the network to a previous state, and identifies a consistent state of forwarding table for each of the plurality of network elements utilizing the message identifiers associated the consistent states, where the identified consistent states represent the previous state of the network without the identified consistent states being captured at the same time at the plurality of network elements. The SDN controller indicates the identified consistent state for each of the plurality of the network elements to a corresponding network element, where the corresponding network element makes its forwarding table consistent with the identified consistent state.Type: GrantFiled: October 27, 2014Date of Patent: June 26, 2018Assignee: Telefonaktiebolaget LM Ericsson (Publ)Inventors: Ying Zhang, Neda Beheshti-Zavareh, Ravi Manghirmalani
-
Patent number: 9996427Abstract: The capability to perform data backup and restore within a distributed database system environment is provided. The embodiments includes initiating a backup operation of a database distributed across a plurality of nodes, and coordinating synchronization of the backup operation within and among the plurality of nodes for parallel, local data dumping with transactional consistency to a single point in time.Type: GrantFiled: December 20, 2010Date of Patent: June 12, 2018Assignee: SYBASE, INC.Inventors: Paresh Manhar Rathod, Jay Gorakhnath Sudrik, Carlos Ruiz Muñoz, Graham William Ivey
-
Patent number: 9996430Abstract: Systems and methods for reconstructing unified data in an electronic storage network are provided which may include the identification and use of metadata stored centrally within the system. The metadata may be generated by a group of storage operation cells during storage operations within the network. The unified metadata is used to reconstruct data throughout the storage operation cells that may be missing, deleted or corrupt.Type: GrantFiled: March 9, 2017Date of Patent: June 12, 2018Assignee: Commvault Systems, Inc.Inventor: Parag Gokhale
-
Patent number: 9996378Abstract: A technique for failure monitoring and recovery of a first application executing on a first virtual machine includes storing machine state information during execution of the first virtual machine at predetermined checkpoints. An error message that includes an application error state at a failure point of the first application is received, by a hypervisor, from the first application. The first virtual machine is stopped in response to the error message. The hypervisor creates a second virtual machine and a second application from the stored machine state information that are copies of the first virtual machine and the first application. The second virtual machine and the second application are configured to execute from a checkpoint preceding the failure point. In response to receipt of a failure interrupt by the second application, one or more recovery processes are initiated in an attempt to avert the failure point.Type: GrantFiled: September 29, 2015Date of Patent: June 12, 2018Assignee: International Business Machines CorporationInventor: Geraint North
-
Patent number: 9990255Abstract: A first non-volatile memory stores a redundant copy of system data that relates to a configuration of at least one physical component of a system, where the first non-volatile memory is accessible by a controller in the system and inaccessible to a processor in the system. It is determined whether system data in a second non-volatile memory accessible by the processor is compromised. In response to determining that the system data in the second non-volatile memory is compromised, the compromised system data in the second non-volatile memory is repaired.Type: GrantFiled: April 23, 2013Date of Patent: June 5, 2018Assignee: Hewlett-Packard Development Company, L.P.Inventors: Jeffrey Kevin Jeansonne, Valiuddin Y Ali, Boris Balacheff
-
Patent number: 9983944Abstract: A method and system of checkpointing single process application groups and multi-process application groups. In an exemplary embodiment, the method may include creating at least one full checkpoint for each application in an application group, and creating at least one incremental application checkpoint for each application in the application group. Further, each of the at least one incremental application checkpoint may be automatically merged against a corresponding full application checkpoint. Further, checkpointing may be synchronized across all applications in the application group. In the exemplary embodiment, each application may use both fork( ) and exec( ) in any combination.Type: GrantFiled: April 25, 2016Date of Patent: May 29, 2018Assignee: Open Invention Network LLCInventors: Keith Richard Backensto, Allan Havemose
-
Patent number: 9984770Abstract: A method can be used for managing the operation of a non-volatile memory equipped with a system for correction of a single error and for detection of a double error. In the case of the detection of a defective bit line of the memory plane, a redundant bit line is assigned and the values of the bits of the memory cells of the defective line are copied into the memory cells of the redundant line and are inverted in the case of the detection of double errors by the system, or corrected by the system in the presence of single errors.Type: GrantFiled: April 28, 2016Date of Patent: May 29, 2018Assignee: STMicroelectronics (Rousset) SASInventors: Francesco La Rosa, Gineuve Alieri
-
Patent number: 9983952Abstract: A method, system, and computer program product that includes a processor cataloging a current resource definition and a current transaction state for the resource. The processor recovers the resource and a transaction state for the resource after an emergency restart, by utilizing the current resource definition and the current transaction state, wherein the recovering comprises recovering transactions of the resource. The processor completes or backs out of the transactions. The processor closes the resource and the processor recovers the resource by utilizing a global catalog.Type: GrantFiled: December 10, 2015Date of Patent: May 29, 2018Assignee: International Business Machines CorporationInventors: Fraser P. Bohm, Guo Q. Li, Ian J. Mitchell, Andrew D. Wharmby
-
Patent number: 9985804Abstract: A receiver includes a first sampler configured to sample, according to a first clock signal, a received signal including first data and second data and output first samples corresponding to the first data of the received signal. A first data comparator is configured to receive, from the first sampler, the first samples corresponding to the first data of the received signal and generate, based on the first clock signal, a first digital data output corresponding to the first data of the received signal. A first error comparator is configured to receive, from the first sampler, the first samples corresponding to the first data of the received signal and generate, based on the first clock signal, a first digital error output corresponding to the first data of the received signal and a first error associated with the first data of the received signal.Type: GrantFiled: June 8, 2016Date of Patent: May 29, 2018Assignee: Marvell World Trade Ltd.Inventor: Sasan Cyrusian
-
Patent number: 9971660Abstract: Exemplary methods, apparatuses, and systems determine that a first physical network interface controller of a first host computer has lost a client traffic network connection. At least one data compute node running on the first host computer has client traffic transmitted via the client traffic network connection. In response to the loss of the client traffic network connection, one or more host computers each having a physical network interface controller with a functioning network connection for the client traffic are identified. Further in response to the loss of the client traffic network connection, the data compute node is moved to one of the identified host computers. The first host computer utilizes a second physical network interface controller to move data compute node.Type: GrantFiled: September 12, 2014Date of Patent: May 15, 2018Assignee: VMWARE, INC.Inventors: Qianyi Zheng, Pin Xie
-
Patent number: 9971658Abstract: A system and method for deploying clients at a target site with disaster recovery considerations uses recovery profiles with multiple recovery parameter settings, which can be associated with a client to be deployed. The recovery profile associated with the client is used to automatically initiate a recovery-related operation for the client using a recovery parameter setting defined in the recovery profile associated with the client.Type: GrantFiled: March 11, 2015Date of Patent: May 15, 2018Assignee: VMware, Inc.Inventors: Rajesh Singh, Girish Ramchandra Rao, Puneet Gupta
-
Patent number: 9971622Abstract: Technologies for migrating an application from a source computing device to a destination computing device using lightweight virtualization includes a migration management module on each of the source and destination computing devices. The migration management module of the source computing device is configured to determine information of dependencies of the application to be migrated and perform a checkpointing operation on the application to generate application checkpoint data. The source computing device is further configured to transmit the dependencies and the application checkpoint data to the destination computing device. The migration management module of the destination computing device is configured to generate a container based on the dependency information and restore the application using the application checkpoint data. Other embodiments are described herein and claimed.Type: GrantFiled: June 25, 2015Date of Patent: May 15, 2018Assignee: Intel CorporationInventor: Ulf Bjorkengren
-
Patent number: 9971716Abstract: A computing device includes at least one master unit; at least one slave unit; an interconnect structure configured to route transactions from the at least one master unit to the at least one slave unit; and a transaction logger device configured to intercept and save a record of outstanding transactions sent by the at least one master unit to the interconnect structure. The transaction logger device is further configured to preserve the record of outstanding transactions when at least a part of the computing device is restarted.Type: GrantFiled: December 20, 2013Date of Patent: May 15, 2018Assignee: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL)Inventors: Andreas Anyuru, Per-Inge Tallberg, Staffan MÃ¥nsson, Ulf Morland
-
Patent number: 9965538Abstract: A log manager causing events to be written to the primary and the secondary computing systems for high availability, and returning threads quickly. Rather than cause every event write to be immediately written to the secondary computing system, the log management component is triggered to write to the secondary computing system upon detecting event write requests of event writes of a particular event type. In response to detecting such an event write, the log management component gathers a group of event writes corresponding to that particular event write, and dispatches the event writes as a group. The particular thread that initiated the particular event write of the particular event type is returned after dispatching the event write group, but before or without confirmation of the particular event write group has been written to the secondary computing system.Type: GrantFiled: January 19, 2016Date of Patent: May 8, 2018Assignee: Microsoft Technology Licensing, LLCInventors: Robert Patrick Fitzgerald, Per-Ake Larson, Michael James Zwilling, Cristian Diaconu
-
Patent number: 9953609Abstract: A display panel driving apparatus includes a control circuit, a data driver and a gate driver. The control circuit is configured to receive a first control signal for recovering a clock signal from a display signal including image data and the clock signal, and calculate a root mean square of the first control signal to output a second control signal. The data driver is configured to receive the display signal, receive the second control signal, recover the clock signal from the display signal according to the second control signal, and output a data signal based on the image data to a data line of a display panel. The gate driving part is configured to output a gate signal to a gate line of the display panel.Type: GrantFiled: January 14, 2016Date of Patent: April 24, 2018Assignee: SAMSUNG DISPLAY CO., LTD.Inventors: Sung-Jun Kim, Yong-Jae Lee, Kyung-Hwa Lim, Ki-Hyun Pyun
-
Patent number: 9952765Abstract: A layout of a transaction log enables efficient logging of metadata into entries of the log, as well as efficient reclamation and recovery of the log entries by a volume layer of a storage input/output (I/O) stack executing on one or more nodes of a cluster. The transaction log is illustratively a two stage, append-only logging structure, wherein the first level is non-volatile random access memory (NVRAM) embodied as a NVlog and the second stage is disk, e.g., solid state drive (SSD). During crash recovery, the log entries are examined for consistency and scanned to identify those entries that have completed and those that are active, which require replay. The log entries are walked from oldest to newest (using sequence numbers) searching for the highest sequence number. Partially complete log entries (e.g., log entries in-progress when a crash occurs) may be discarded for failing a checksum (e.g., a CRC error).Type: GrantFiled: October 6, 2015Date of Patent: April 24, 2018Assignee: NetApp, Inc.Inventors: Srinath Krishnamachari, Anshul Pundir, Sriranjani Babu
-
Patent number: 9952805Abstract: A processor receives a command from a server computer to designate a plurality of addresses related to a plurality of logical storage areas, and write a plurality of write data to the logical storage areas. The processor receives the write data and writes it to storage areas different from storage areas in which a plurality of holding data are stored in a first memory. When the processor determines that the write data are written to the first memory, the processor transmits a success response to a host computer. When the write data satisfy a predetermined condition, the processor writes the write data in the first memory to a plurality of first device storage areas. When it is determined that at least a part of the data is not written to the first memory, the processor transmits a failure response to the host computer.Type: GrantFiled: September 11, 2014Date of Patent: April 24, 2018Assignee: HITACHI, LTD.Inventors: Takashi Nagao, Tomohiro Kawaguchi, Yoshinori Oohira
-
Patent number: 9940590Abstract: The present disclosure relates to a system and method of generating a transaction count using filtering. Transaction data is collected for a set of transactions from an original data set. The collected transaction data is narrowed into a transaction data set by identifying a specific range of the data to be extracted. This transaction data set is filtered against one or more criteria. The transactions included in the transaction data set are then arranged into data packs in a format enabling efficient count generation. The count generation determines how many transactions meet the applied criteria. The data may then be efficiently stored in a database for later retrieval.Type: GrantFiled: March 18, 2015Date of Patent: April 10, 2018Assignee: CA, Inc.Inventor: Venkata Naresh Chippada
-
Patent number: 9933955Abstract: Data from a host is received into a volatile memory of a Data Storage Device (DSD) for storage on a disk of the DSD. Data received in the volatile memory from the host is identified for inclusion in a Power Safe Write Buffer (PSWB) and an indication is sent to the host indicating storage of data received from the host and identified for inclusion in the PSWB before storing the identified data on the disk. In the event of an unexpected power loss of the DSD, the identified data is transferred from the volatile memory to a Non-Volatile Solid-State Memory (NVSM) of the DSD.Type: GrantFiled: March 5, 2015Date of Patent: April 3, 2018Assignee: Western Digital Technologies, Inc.Inventors: Asif F. Gosla, Vijiyendran Subramaniam
-
Patent number: 9910744Abstract: A system includes a multi-process application that runs on primary hosts and is checkpointed by a checkpointer comprised of a kernel-mode checkpointer module and one or more user-space interceptors providing at least one of barrier synchronization, checkpointing thread, resource flushing, and an application virtualization space. Checkpoints may be written to storage and the application restored from said stored checkpoint at a later time. Checkpointing may be incremental using Page Table Entry (PTE) pages and Virtual Memory Areas (VMA) information. Checkpointing is transparent to the application and requires no modification to the application, operating system, networking stack or libraries. In an alternate embodiment the kernel-mode checkpointer is built into the kernel.Type: GrantFiled: February 9, 2016Date of Patent: March 6, 2018Assignee: Open Invention Network LLCInventor: Allan Havemose
-
Patent number: 9904688Abstract: Embodiments of the invention relate to small write performance enhancements for parallel file systems. One embodiment includes flushing a received write transaction from a first memory device to a second memory device on a node in a file system based on one or more byte-ranges within a file system block. It is determined to flush the received write transaction to a recovery log that is stored in a non-volatile storage layer of the file system. If it is determined to flush the received write transaction to the recovery log: appending data associated with the received write transaction in the recovery log of the file system, replicating the data associated with the received write transaction in another non-volatile storage layer of another node if required, and marking the one or more byte-ranges as committed.Type: GrantFiled: September 30, 2014Date of Patent: February 27, 2018Assignee: International Business Machines CorporationInventors: Dean Hildebrand, Frank B. Schmuck
-
Patent number: 9904556Abstract: An apparatus is provided that includes a device interface including port(s) coupled to and defining respective data channel(s) for respective peripheral(s). The device interface also includes boot control logic and a volatile buffer memory, and a volatile configuration memory. The apparatus also includes a non-volatile device storage memory including a contiguous memory block configured to store boot code with a boot set including a configuration routine. The boot control logic is configured to execute boot code including the boot set at power up or reset of the apparatus. The boot set includes a read of data from the device storage memory to the buffer memory, and a write of the data from the buffer memory to configuration memory to initialize the apparatus or a port, with the data being read from a portion of the device storage memory outside the contiguous memory block configured to store the boot code.Type: GrantFiled: March 15, 2013Date of Patent: February 27, 2018Assignee: THE BOEING COMPANYInventors: Philip J. Ellerbrock, Robert N. Zettwoch
-
Patent number: 9886283Abstract: A mobile communication system and a method of providing content data to user of a vehicle using the communication system. The method includes: determining at a vehicle a last-used content data function associated with a previous ignition cycle, wherein the last-used content data function was used to provide content data to vehicle users; determining an adaptive boot sequence that includes the last-used content data function; executing the adaptive boot sequence at a subsequent ignition cycle which includes initiating the last-used content data function; and providing content data in the vehicle via the last-used content data function.Type: GrantFiled: May 1, 2015Date of Patent: February 6, 2018Assignee: GM Global Technology Operations LLCInventor: Lawrence D. Cepuran
-
Patent number: 9886340Abstract: A memory system and a method for the error correction of memory are disclosed herein. The method for the error correction of memory is performed by a memory system including a plurality of memory chips. The method for the error correction of memory may include reading, by a first ECC engine unit included in each of a plurality of memory chips, a chunk including a plurality of data bursts, first parity bits, and position bits from each of the plurality of memory chips; extracting, by the first ECC engine unit, a single data burst having an error from the plurality of data bursts using the position bits; and performing, by the first ECC engine unit, first error correction using the first parity bit corresponding to the extracted error data burst.Type: GrantFiled: March 2, 2016Date of Patent: February 6, 2018Assignees: SEOUL NATIONAL UNIVERSITY R&DB FOUNDATION, WISCONSIN ALUMNI RESEARCH FOUNDATIONInventors: Jung Ho Ahn, Namsung Kim
-
Patent number: 9886363Abstract: A computer-implemented method for determining performance shortfall in a storage system includes recording a log of I/O operations of a storage system, wherein each I/O operation includes associated operational parameters. The method prepares the storage system to perform a replay of a performance shortfall that occurred during a specified time frame. The method performs the replay on the storage system based at least on the log of I/O operations and the I/O operations' associated operational parameters for the specified time frame. The method identifies a cause for the performance shortfall during the specified time frame based at least on the difference between I/O performance measures of the replay and I/O performance measures for the specified time frame.Type: GrantFiled: March 27, 2015Date of Patent: February 6, 2018Assignee: International Business Machines CorporationInventors: David D. Chambliss, Itzhack Goldberg, Neil Sondhi
-
Patent number: 9880926Abstract: A circuit may be configured to store data to a reserved zone of a non-volatile solid state memory (NVSSM) in a log structured manner and to use information stored in the reserved zone to restore data as needed. In some embodiments, a reserved area of a NVSSM may include die from one or more non-volatile memory modules, which can be divided into blocks and the blocks can be combined to form frames. In some examples, the frames may contain frame headers that can contain a unique identifier which can indicate which frame is to be used to restore data structures, such as during power up or for other restore events.Type: GrantFiled: August 20, 2013Date of Patent: January 30, 2018Assignee: Seagate Technology LLCInventor: Sumanth Jannyavula Venkata
-
Patent number: 9880776Abstract: A backup storage system and methods implemented by the backup storage system are disclosed. The backup software performs a plurality of backup operations to backup one or more data objects according to a backup schedule. The backup operations may be alternated across a plurality of backup storage devices, and each of the backup operations may operate to store a respective backup data set on one of the backup storage devices. In performing the plurality of backup operations, the backup storage system may create the backup data sets such that each respective backup storage device can be used independently of the other backup storage device(s) to perform a complete recovery of the one or more data objects to any point in time that corresponds to any respective backup data set stored on the respective backup storage device.Type: GrantFiled: February 22, 2013Date of Patent: January 30, 2018Assignee: Veritas Technologies LLCInventors: Ynn-Pyng Tsaur, Ping Wang
-
Patent number: 9875162Abstract: A method and system for recovering a corrupt storage system is discussed. A request to recover the system may be received. A backup snapshot for the last point-in-time the system was stable may be synthesized. A difference may be identified between that backup snapshot and the current system. The difference may be transmitted to the corrupt system to recover the data.Type: GrantFiled: December 16, 2013Date of Patent: January 23, 2018Assignee: EMC CorporationInventors: Anestis Panidis, Assaf Natanzon, Saar Cohen
-
Patent number: 9875806Abstract: Various systems and methods for implementing fuse-based integrity protection are described herein. A system for validating a read-only memory (ROM), the system comprising a ROM reader logic, implemented at least partly in hardware, to: access a read-only memory (ROM) having a plurality of permanently programmable electric couplings (PPECs), the PPECs having been programmed; survey a number of permanently altered PPECs in the set of PPECs to produce a counter value; read a binary representation of the counter value from PPEC values stored as a PPEC signature; and read a binary representation of the binary complement of the counter value from PPEC values in the PPEC signature; and a ROM validation logic, implemented at least partly, in hardware, to verify the integrity of the ROM using a combination of at least two of: the counter value, the binary representation of the counter value, and the binary representation of the binary complement of the counter value.Type: GrantFiled: February 27, 2017Date of Patent: January 23, 2018Assignee: Intel CorporationInventor: Michael Berger
-
Patent number: 9870290Abstract: A system, method, and computer readable medium for hybrid kernel-mode and user-mode checkpointing of multi-process applications. The computer readable medium includes computer-executable instructions for execution by a processing system. A multi-process application runs on primary hosts and is checkpointed by a checkpointer comprised of a kernel-mode checkpointer module and one or more user-space interceptors providing barrier synchronization, checkpointing thread, resource flushing, and an application virtualization space. Checkpoints may be written to storage and the application restored from said stored checkpoint at a later time. Checkpointing is transparent to the application and requires no modification to the application, operating system, networking stack or libraries. In an alternate embodiment the kernel-mode checkpointer is built into the kernel.Type: GrantFiled: October 20, 2015Date of Patent: January 16, 2018Assignee: Open Invention Network LLCInventor: Allan Havemose
-
Patent number: 9864657Abstract: A method and apparatus for automatically backing up application data and performing restoration as required are disclosed in the embodiments of the present document, which relates to application data backup and restoration technology of a terminal system. The method includes: an application layer setting an application data directory of an application into a system constant according to a backup instruction; a bottom layer acquiring a directory permission of the application data directory through the application data directory in the system constant; the bottom layer setting a permission of the application data directory to read-write; and the application layer backing up the application data under the application data directory of which the permission has been set to read-write, to perform restoration as required by using a backed-up application data hereafter.Type: GrantFiled: April 18, 2014Date of Patent: January 9, 2018Assignee: ZTE CorporationInventor: Bo Hu
-
Patent number: 9852013Abstract: An apparatus includes a processor and a storage storing instructions causing the processor to: maintain a federated area; receive a request to perform a job flow with a data set from a remote device; retrieve a job flow definition specifying the tasks of the job flow from the federated area; determine whether there is an instance log in the federated area generated by a previous performance of the job flow with the data set; in response to there being such an instance log, retrieve the version specified in the instance log of each task routine for each task from the federated area; in response to there being no such instance log, retrieve the most recent version of each task routine; perform the job flow with the retrieved versions of the task routines and the data set to generate a result report; and provide the result report to the remote device.Type: GrantFiled: June 5, 2017Date of Patent: December 26, 2017Assignee: SAS Institute Inc.Inventors: Henry Gabriel Victor Bequet, Kais Arfaoui, Ronald Earl Stogner