Error Detection (epo) Patents (Class 714/E11.142)
-
Publication number: 20140122939Abstract: Methods and systems may track the invocation path of a system or a library call from Java native interface (JNI) in Java applications. A native call of interest having an associated failure condition, an invocation path associated with the native call of interest, and a Java boundary crossover method (Java method invoking a JNI method) within the invocation path may all identified based on failure diagnostic information. The identified information may also be fed to a Java virtual machine (JVM). When the application is re-run, a check can be made prior to execution of the JNI method, as to whether the Java boundary crossover method is being executed. If so, then the execution stack may be compared to the invocation path of interest.Type: ApplicationFiled: October 31, 2012Publication date: May 1, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Amar Devegowda, Venkataraghavan Lakshminarayanachar, Sathiskumar Palaniappan, Anshu Verma
-
Publication number: 20140115398Abstract: A signal from a system, such as a reactive system, that reflects health indicators of the system may be selected. A signal analyzer may extract the health indicators from the signal and conduct a diagnostics of the health of the system based on the health indicators.Type: ApplicationFiled: October 23, 2012Publication date: April 24, 2014Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.Inventors: Ayelet Pnueli, Ami Shiff, Avner Arnstein, Ron Maurer, Tsafrir Yedid Am, Lior Katz
-
Publication number: 20130339806Abstract: When an abort of a transaction occurs, a determination is made as to whether diagnostic information is to be stored in one or more transaction diagnostic blocks (TDBs). There are different types of transaction diagnostic blocks to accept diagnostic information depending on the type of abort and other considerations. As examples, there are a program-specified TDB in which information is stored if a valid TDB address is provided in a transaction begin instruction; a program interruption TDB, which is stored into when the program is aborted due to an interruption; and a program interception TDB, which is stored into when an abort results in an interception.Type: ApplicationFiled: June 15, 2012Publication date: December 19, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Dan F. Greiner, Christian Jacobi, Marcel Mitran, Timothy J. Slegel
-
Publication number: 20130227356Abstract: A mobile terminal to handle a booting process includes a processor to process the booting process, a log storage to store error information of a module extracted from a system log, and a log comparator, during the booting process, to extract the error information of the module from the log storage, and to exclude an initialization of the module based on the error information of the module stored in the log storage. A method that uses a processor to handle a booting process includes loading error information of a module from a system log to a log storage, processing, using the processor, the booting process by initializing multiple modules, and determining whether to initialize the module based on the loaded error information of the module.Type: ApplicationFiled: October 16, 2012Publication date: August 29, 2013Applicant: PANTECH CO., LTD.Inventor: PANTECH CO., LTD.
-
Publication number: 20130151886Abstract: A method switches physical links of a serial attached small computer system interface (SAS) expander of a computing device. If a physical link of the SAS expander is malfunctioning, configuration parameters of the malfunctioned physical link are stored to a storage system of the computing device, and a reserved physical link corresponding to the malfunctioned physical link is selected from firmware of the SAS expander. The method further modifies configuration parameters of the malfunction physical link, produces a new firmware according to the modified configuration parameters and the selected reserved physical link, and switches the malfunctioned physical link to the reserved physical link by writing the new firmware to the SAS expander.Type: ApplicationFiled: November 16, 2012Publication date: June 13, 2013Inventor: CHIH-HUANG WU
-
Patent number: 8458398Abstract: A computer-readable medium storing a data management program makes a computer manage data redundantly stored in storage devices having storage areas split into slices for data management. The data management program realizes the following functions in the computer. A first function receives irregularity information indicating that each of one or more of the storage devices may be possibly faulty, and stores the irregularity information in a storage; and a second function determines, by reference to the irregularity information, whether or not a first storage device containing a slice to be accessed is possibly faulty, on receipt of access information indicating occurrence of a request to access the slice. When yes is determined, the second function instructs an external device to recover data stored in the slice, where the external device controls a second storage device storing redundant data identical to the data stored in the slice.Type: GrantFiled: September 14, 2009Date of Patent: June 4, 2013Assignee: Fujitsu LimitedInventors: Yasuo Noguchi, Kazutaka Ogihara, Masahisa Tamura, Yoshihiro Tsuchiya, Tetsutaro Maruyama, Takashi Watanabe, Tatsuo Kumano, Kazuichi Oe
-
Publication number: 20130132771Abstract: An approach is provided for providing information consistency in distributed computing environments. An information consistency platform determines one or more finite state machines based, at least in part, on one or more states of one or more respective steps of at least one update operation operating on one or more data items, wherein the one or more finite state machines executes, at least in part, the at least one update operation, one or more other operations, or a combination thereof on the one or more data items.Type: ApplicationFiled: November 18, 2011Publication date: May 23, 2013Inventors: Zane Zheng Yan Pan, Fujian Yang
-
Publication number: 20130080843Abstract: In particular embodiments, a method includes analyzing a binary decision diagram (BDD) representing a data stream from a sensor to determine a compression rate of the BDD and indicating a sensor malfunction in the sensor if the compression rate of the BDD deviates from a specified compression rate range.Type: ApplicationFiled: September 23, 2011Publication date: March 28, 2013Applicant: Fujitsu LimitedInventors: Stergios Stergiou, Jawahar Jain, Tsuneo Nakata
-
Publication number: 20130067288Abstract: Various embodiments enable automatic cooperative logging of information associated with a connection between at least two computing devices. In some cases, a first computing device can automatically trigger logging on a second computing device upon detection of at least one scenario. Alternately or additionally, the second computing device can respond to the first computing device with additional and/or supplemental logging requests.Type: ApplicationFiled: September 9, 2011Publication date: March 14, 2013Applicant: Microsoft CorporationInventors: Darren Louie, Jeroen Vanturennout, Gaurav S. Anand, Kevin Michael Woley, Benjamin D.L. Stewart, Donovan P. Regan, George Joy, Matthew R. Ayers
-
Publication number: 20130067267Abstract: Placing an application on a node in a cluster. A method includes detecting an unexpected event indicating that an application should be placed on a node in the cluster. Real time information about resource utilization on one or more nodes in the cluster is received. Based on the real time information, a determination of a node to place the application is made. The application is placed on the determined node.Type: ApplicationFiled: September 9, 2011Publication date: March 14, 2013Applicant: MICROSOFT CORPORATIONInventors: Amitabh Prakash Tamhane, Mykyta Synytskyy, Lokesh S. Koppolu, David A. Dion, Andrea D'Amato
-
Publication number: 20130067289Abstract: A method includes, in a storage device that includes a non-volatile memory having a physical storage space, receiving data items associated with respective logical addresses assigned in a logical address space that is larger than the physical storage space. The logical addresses of the data items are translated into respective physical storage locations in the non-volatile memory. The data items are stored in the respective physical storage locations.Type: ApplicationFiled: September 7, 2012Publication date: March 14, 2013Inventors: Ariel Maislos, Avraham (Poza) Meir
-
Publication number: 20130036332Abstract: Systems and methods for maximizing a number of available states for a version number used for memory corruption detection. A physical memory may be a DRAM comprising a plurality of regions. Version numbers associated with data structures allocated in the physical memory may be generated so that version numbers of adjacent data structures in a virtual address space are different. A reserved set and an available set of version numbers are associated with each one of the plurality of regions. A version number in a reserved set of a given region may be in an available set of another region. The processor detects no memory corruption error in response to at least determining a version number stored in a memory location in a first region identified by a memory access operation is also in a reserved set associated with the first region.Type: ApplicationFiled: August 5, 2011Publication date: February 7, 2013Inventors: Darryl J. Gove, Zoran Radovic, Jonathan Adams
-
Publication number: 20120210174Abstract: A sensor control device including an anomaly diagnosis section. When at least one of a first NOX concentration Ip2W based on the output OP1 of a first differential amplification circuit (210) and a second NOX concentration Ip2N based on the output OP2 of a second differential amplification circuit (220) falls within an anomaly diagnosis range ZN, the difference D between Ip2W and Ip2N is obtained, and the difference D is stored in a difference accumulation buffer BF such that 16 values of the difference D continuously sampled up to the present are stored. The integrated value (difference integral value) Dint of the difference D is obtained. When the difference integrated value Dint becomes equal to or greater than a predetermined value Di0, the sensor control device indicates a diagnosis result of “anomalous.Type: ApplicationFiled: October 6, 2010Publication date: August 16, 2012Applicant: NGK SPARK PLUG CO., LTD.Inventors: Katsunori Yazawa, Yuji Kimoto
-
Publication number: 20120159265Abstract: A first controller stores externally input data to a memory of the first controller, reads data stored in the memory of the first controller and transmits the data to a second controller through a first controller bridge, detects a failure at the first controller bridge in transmission of the data. The second controller receives the data through a second controller bridge, writes the received data into a memory of the second controller, and determines whether the failure is caused by the first controller if a failure occurs in the memory controller and the second controller bridge. If a failure is detected in the first controller and the second controller and the failure is caused by the first controller, the first controller transmits the data causing the failure during transmission through the first controller bridge and the second controller receives the data through the second controller bridge.Type: ApplicationFiled: October 24, 2011Publication date: June 21, 2012Applicant: FUJITSU LIMITEDInventors: Satoru NISHITA, Yukio Nishimura
-
Publication number: 20120151272Abstract: A scalable and fault tolerant finite state machine engine, for example, for use in an automated incident management system, logs or records data in persistent storage at different points or levels during various internal processing of an event associated with an information technology element, and action taken associated with the event, by executing a finite state machine instance that encodes policies for handling incidents on such types of information technology elements. In the event that the finite state machine engine is shutdown during processing, the finite state machine engine is able to pick up from where it left off when it was shutdown, for each abnormally terminated finite state machine instance, by using the data logged in the persistent storage and determining a point of processing from where it should continue its execution.Type: ApplicationFiled: December 9, 2010Publication date: June 14, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Michael M. Behrendt, Rafah A. Hosn, Ruchi Mahindru, Harigovind V. Ramasamy, Soumitra Sarkar, Mahesh Viswanathan, Norbert G. Vogl
-
Publication number: 20120151246Abstract: A communication interface apparatus 10 includes: a transmitter/receiver 50 which transmits and receives a client signal to and from a client apparatus 2; a detector 51 which detects a failure in reception of the client signal; an indication signal transmitter 61 which transmits, to a transmission apparatus 4b at a far end of a path set up over a transmission network 3 to transmit the client signal, an indication signal that causes the transmission apparatus to shut down a connection for transmitting and receiving the client signal to and from a client apparatus 2b; and an indication signal controller 71 which controls to not transmit out the indication signal unless the failure in reception of the client signal continues over a first waiting time.Type: ApplicationFiled: November 29, 2011Publication date: June 14, 2012Applicant: FUJITSU LIMITEDInventor: Masaru TANAKA
-
Publication number: 20120131384Abstract: A computer system including a first processor, an error detecting circuit and a south bridge chip is provided. The first processor outputs a first catastrophic error signal. The error detecting circuit is coupled to the first processor to receive the first catastrophic error signal. When the first catastrophic error signal changes to a first level and is maintained for a period exceeding a first predetermined time, the error detecting circuit outputs an internal error reset signal. When the first catastrophic error signal changes to a first level and passes a second predetermined time, the error detecting circuit outputs a machine error reset signal. Here, the second predetermined time is greater than the first predetermined time. The south bridge chip is coupled to the error detecting circuit and reboots the computer system according the internal error reset signal or the machine error reset signal.Type: ApplicationFiled: December 24, 2010Publication date: May 24, 2012Applicant: INVENTEC CORPORATIONInventor: Xiao-Bing Zou
-
Publication number: 20120110393Abstract: A method, apparatus and computer program product for providing failover for a point to point tunnel for wireless local area network split-plane environments is presented. A second network switch learns first data associated with a third network switch and the second network switch terminates a tunnel. The third network switch learns second data associated with the second network switch. The first and second data are synchronized between the second network switch and the third network switch. The second network switch and the third network switch load sharing tunnel data packets. The third network switch forwards tunnel control packets received by the third network switch to the second network switch. A failure relating to the second network switch is detected and a new tunnel is established with the third network switch.Type: ApplicationFiled: November 1, 2010Publication date: May 3, 2012Applicant: AVAYA INC.Inventors: Shu Ching Shieh, Mohnish Anumala, Alexandros Moisiadis, Debin Zhang, Lawrence James DiBurro
-
Publication number: 20120060047Abstract: A system including at least one electric rotary machine and an integrated control circuit and an electronic control unit, the system being embarked in an automobile. The integrated control circuit of the system includes a RAM connected to the electronic control unit via a data communication link, and the electronic control unit includes a rewritable memory. The system further includes a configuration data permanent storage of the system in the rewritable memory as well as an upload of the configuration data into the RAM during a configuration phase of the system. The system herein enables the integrated control circuit of the electric rotary machine to be standardized by virtue of the fact that the configuration data are no longer written in a read-only memory but reside in a RAM of this circuit.Type: ApplicationFiled: October 26, 2009Publication date: March 8, 2012Inventor: Damien Cuoq
-
Publication number: 20120047397Abstract: A controlling apparatus for controlling an information processing apparatus, the controlling apparatus includes a first controller including a first data transfer unit that communicates data between the information processing apparatus, and a first processing unit that generates a command to instruct the first data transfer unit to communicate data between the information processing apparatus, and a second controller including a second data transfer unit that communicates data between the information processing apparatus, and a second processing unit that generates a command to instruct the second data transfer unit to communicate data between the information processing apparatus.Type: ApplicationFiled: August 16, 2011Publication date: February 23, 2012Applicant: Fujitsu LimitedInventors: Tamaki Imakawa, Hitoshi Matsumori, Toshiharu Maekawa, Michio Numata, Satoru Sakai
-
Publication number: 20110307879Abstract: A program update device includes: a first storage unit to retain a program of a first version; a second storage unit to retain a program of a second version equal to or later than the first version; an acquiring unit to acquire a difference between the program of the second version and a program of a third version later than the second version; and an update unit to generate the program of the third version from the program of the second version that is stored in the second storage unit and the difference acquired by the acquiring unit, and to store the generated program of the third version in the first storage unit.Type: ApplicationFiled: February 4, 2010Publication date: December 15, 2011Applicants: TOYOTA JIDOSHA KABUSHIKI KAISHA, FUJITSU TEN LIMITEDInventors: Yasuhisa Ishida, Shigehiko Kagotani, Hironobu Sugimoto, Tomoki Kodan
-
Publication number: 20110258484Abstract: Also provided are techniques for failover when a network adapter fails, wherein the network adapter is connected to a miniport driver that is connected to a filter driver. With the miniport driver, it is determined that at least one of the network adapter and a data path through the network adapter has failed. With the miniport driver, the filter driver is notified that at least one of the network adapter and the data path through the network adapter has failed.Type: ApplicationFiled: June 23, 2011Publication date: October 20, 2011Inventors: Alexander BELYAKOV, Mikhail SENNIKOVSKY, Alexey DROZDOV
-
Publication number: 20110252272Abstract: The method determines whether a particular node of a high availability cluster is functioning properly or is a failed node. The method dumps node process state information as a dump data for the failed or crashed node in a shared storage area of the high availability cluster. A high availability cluster manager identifies the dump data that corresponds to the failed node as the most recent dump data for that failed node. The high availability cluster manager interrogates the dump data using kernel debugger services to identify a process trace and thereby identify the crash-causing application for the failed node. The method determines if the dump data includes a process match for the failed node process. The high availability cluster manager may initiate a crash-causing application notification to administrators or other entities of the high availability cluster.Type: ApplicationFiled: April 12, 2010Publication date: October 13, 2011Applicant: International Business Machines CorporationInventors: James A. Goodwin, Manjunath B. Muttur
-
Publication number: 20110252275Abstract: An approach is provided for fast processing of data files. A plurality of records are received from a source system. The records are validated against a predetermined data source. An error notification is generated based on the validation. The validated records are partitioned based on a unique parameter. The partitioned records are transformed according to a format specified by a target system. The transformed records are selectively corrected.Type: ApplicationFiled: April 7, 2010Publication date: October 13, 2011Applicant: VERIZON PATENT AND LICENSING INC.Inventors: Bhaskar R. Gudlavenkatasiva, Veeravijay Mariappan
-
Publication number: 20110235503Abstract: A system and method for communications system routing component level high availability are provided. A method for providing routing component level high availability includes synchronizing information from an active information source, detecting a failure in a routing component, replacing the failed routing component with a backup routing component, and completing synchronization of the information.Type: ApplicationFiled: July 1, 2010Publication date: September 29, 2011Applicant: FutureWei Technologies, Inc.Inventors: Huaimo Chen, Qianglin Quintin Zhao
-
Publication number: 20110197100Abstract: A non-volatile redundant verifiable indication of data storage status is provided with respect to data storage operations conducted with respect to removable data storage media, and store the indication with an auxiliary non-volatile memory of the data storage media, such that the indication stays with the media. At least one state value indicating the status of the data storage operation is written to one page of the auxiliary non-volatile memory, and a redundancy check is provided with respect to at least the written state value of the one page of the auxiliary non-volatile memory; and the same state value is written to a second page of the auxiliary non-volatile memory, and a redundancy check is provided with respect to at least the written state value of the second page of the auxiliary non-volatile memory. The redundancy checks indicate the validity of the state values.Type: ApplicationFiled: February 10, 2010Publication date: August 11, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: PAUL M. GRECO, GLEN A. JAQUETTE, PAUL J. SEGER
-
Publication number: 20110173501Abstract: A mitigation enablement module for a computer that improves application reliability. When performing memory management operations, the mitigation enablement module and associated memory manager selectively use mitigations that are intended to prevent an application bug from cause an application error. The memory manager may selectively apply mitigations for each of one or more applications based on the likelihood that such mitigations are successful at preventing bugs from causing application errors. The likelihood is determined from historical information on whether the mitigations, when applied, prevented bugs from causing memory operations that could cause application errors. This historical information can be gathered on a single computer over multiple invocations of the application or may be aggregated from multiple computers, each invoking the application.Type: ApplicationFiled: March 25, 2011Publication date: July 14, 2011Applicant: Microsoft CorporationInventors: Silviu C. Calinoiu, David G. Grant, Anthony J. Lorelli, Pavan Kasturi, William Campbell
-
Publication number: 20110173514Abstract: A method of transmitting data according to a data transmission protocol wherein the data is transmitted as a plurality of data frames and each data frame includes an error checking field comprising at least two sub-fields, the data of the first sub-field being formed by a first error checking method performed on data of the frame and the data of the second sub-field being formed by a second error checking method performed on the said data of the frame, the first and second methods being such that the data of the first sub-field has different error checking properties from those of the data of the second sub-field.Type: ApplicationFiled: March 21, 2011Publication date: July 14, 2011Applicant: SOLARFLARE COMMUNICATIONS, INC.Inventors: Steve L. Pope, Derek Roberts, David Riddoch, David Clarke
-
Publication number: 20110126050Abstract: One embodiment of the present invention provides a system for assisting a user in recovering from a task interruption. During operation, the system records the user's activity while the user is performing a task, and detects an interruption to the task. Upon the detection of the interruption, the system transfers to a storage the recorded user activities during a predetermined time period before the interruption. The system presents a visual representation of the recorded activities to the user, thereby assisting the user in recovering from the task interruption.Type: ApplicationFiled: November 20, 2009Publication date: May 26, 2011Applicant: PALO ALTO RESEARCH CENTER INCORPORATEDInventors: James M.A. Begole, Oliver Brdiczka, Norman Makato Su
-
Publication number: 20110107156Abstract: A computer receives one or more processing requests from at least one or more clients through a network and executes an application for processing the received processing requests using a Java servlet. The processing requests each contain one or more addresses as the destinations of the processing requests. The computer is connected to a database including the following information: application information in which an identifier that uniquely identifies each application and binary logic for executing the application are brought into correspondence with each other; and adapter information in which the identifier and each of the addresses are brought into correspondence with each other. When the computer receives the processing request, it identifies the binary logic based on an address contained in the received processing request and executes the identified binary logic and thereby executes the application.Type: ApplicationFiled: August 10, 2010Publication date: May 5, 2011Applicant: HITACHI, LTD.Inventors: Tatsuhiko MIYATA, Yukiko TAKEDA, Kazuma YUMOTO
-
Publication number: 20110078504Abstract: An information processing apparatus able to recover consistency between file entity data and file management information when detecting an inconsistency therebetween at start-up of the apparatus, while reducing unavailable time of the apparatus as much as possible. A CPU of the information processing apparatus executes a base program stored in a storage unit to check for an abnormality in consistency between file entity data and file management information which are stored in another storage unit. If an abnormality is detected, the CPU executes a program for degeneracy operation stored in still another storage unit to perform a degeneracy operation, and recovers the consistency.Type: ApplicationFiled: August 5, 2010Publication date: March 31, 2011Applicant: CANON KABUSHIKI KAISHAInventor: Yasuo Komada
-
Publication number: 20110072317Abstract: A control apparatus includes a lower layer control unit configured to perform control of a load, an upper layer control unit configured to control the lower layer control unit, a communication unit configured to perform communication between the upper layer control unit and the lower layer control unit via a communication line, a detection unit configured to detect power supply voltage of the lower layer control unit, wherein the upper layer control unit detects communication abnormality of the communication unit and notifies the communication abnormality, the upper layer control unit notifying abnormality of power supply voltage of the lower layer control unit, in such a manner as to be identified from the communication abnormality of the communication unit.Type: ApplicationFiled: September 20, 2010Publication date: March 24, 2011Applicant: CANON KABUSHIKI KAISHAInventor: Noriaki Adachi
-
Publication number: 20110047408Abstract: A data processing apparatus and method are provided for handling hard errors. The data processing apparatus comprises processing circuitry for performing data processing operations, and cache storage having a plurality of cache records for storing data values for access by the processing circuitry when performing the data processing operations. A cache record error storage having at least one error record, and a hard error storage having at least one hard error record, are provided for keeping track of errors detected when accessing cache records of the cache storage. In particular, when an error is first detected for a particular cache record, one of the error records in the cache record error storage is allocated to store a cache record identifier for that cache record, and an associated count value is set to a first value.Type: ApplicationFiled: August 20, 2009Publication date: February 24, 2011Applicant: ARM LimitedInventors: Damien Rene Gilbert Gille, Luc Orion
-
Publication number: 20110022884Abstract: An appliance communicates via a communication network via various communication services available for transmitting data via said communication network, said appliance comprising means of: detecting an anomaly in a communication that is established with said appliance via one of said communication services, implementing a defense communication mode, wherein the communications to be established with said appliance via a communication service for which a detection has occurred are inhibited, the communications to be established via another communication service being allowed.Type: ApplicationFiled: March 30, 2009Publication date: January 27, 2011Applicant: France TelecomInventors: Lars Kiessling, Franck Weens, Jocelyn Barranco
-
Publication number: 20110022901Abstract: A method for testing hard disks under an extensible firmware interface (EFI) provides a device tree of hard disks. Nodes of the device tree represent block devices or file systems of the hard disks. Devices paths and handles corresponding to each of the device paths are obtained from the device tree. Parent controller handles of each of the device paths are obtained. If there are parent controller handles the same as the obtained handles, the parent controller handles the same as the obtained handles are deleted. The computer determines that a number of the hard disks is equal to a number of the device paths corresponding to the remained parent controller handles. Nodes information of each of the device paths corresponding to the remained parent controller handles are determined as hard disk information of each of the hard disks.Type: ApplicationFiled: December 31, 2009Publication date: January 27, 2011Applicants: HONG FU JIN PRECISION INDUSTRY (ShenZhen) CO., LTD, HON HAI PRECISION INDUSTRY CO., LTD.Inventor: GE-XIN ZENG
-
Publication number: 20100318869Abstract: An approach includes detecting failure of an error detection scheme relating to transmission of data units of a transport block. A negative acknowledgement message is generated in response to the detection of the failure. The negative acknowledgement message is forwarded to a radio link controller for discarding one or more of the data units.Type: ApplicationFiled: June 13, 2008Publication date: December 16, 2010Applicant: NOKIA CORPORATIONInventor: Tsuyoshi Kashima
-
Publication number: 20100306581Abstract: Described embodiments provide for end-of-life (EOL) checking for NAND flash devices. An exemplary implementation of a computing environment comprises at least one NAND data storage device operative to store one or more data elements. In the illustrative implementation, the EOL data processing and storage management paradigm allows for the storage of data according using a selected EOL enforcement algorithm that can utilize current and/or historical correction levels. The NAND data storage EOL checking module can be operable to cooperate with one or more NAND data store components to execute one or more selected EOL operations to protect stored data.Type: ApplicationFiled: June 1, 2009Publication date: December 2, 2010Inventor: Joshua Johnson
-
Publication number: 20100281202Abstract: Performing wear-leveling and bad block management of limited lifetime memory devices. A method for performing wear-leveling in a memory includes receiving logical memory addresses and applying a randomizing function to the logical memory addresses to generate intermediate addresses within a range of intermediate addresses. The intermediate addresses are mapped into physical addresses of a memory using an algebraic mapping. The physical addresses are within a range of physical addresses that include at least one more location than the range of intermediate addresses. The physical addresses are output for use in accessing the memory. The mapping between the intermediate addresses and the physical addresses is periodically shifted. In addition, contents of bad blocks are replaced with redundantly encoded redirection addresses.Type: ApplicationFiled: April 30, 2009Publication date: November 4, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Bulent Abali, John P. Karidis, Luis A. Lastras-Montano
-
Publication number: 20100275057Abstract: A method, apparatus, and computer program product for performing a set of operations on a data storage device is provided. A data storage device is flagged as suspect. The adapter suspends the suspect data storage device from participation in the RAID array, assigns the suspect data storage device to a pool of data storage devices to be retested, selects a data storage device from a pool of spare data storage devices, rebuilds contents of the suspect data storage device on the selected disk drive, assigns the substitute data storage device to the RAID array, invokes a diagnostic test on the suspect data storage device, and analyzes the diagnostic result. Responsive to the diagnostic result exceeding a threshold, the suspect data storage device is repaired. The adapter assigns the repaired data storage device to the pool of spare data storage devices and increments a counter of the repaired data storage device.Type: ApplicationFiled: April 28, 2009Publication date: October 28, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: William John Durica, M. Amine Hajji
-
Publication number: 20100262855Abstract: A method is described that involves controlling the traffic levels through an uncore to provide thermal management for the uncore. The method including determining if an uncore's temperature in a first uncore state is above a first threshold value and changing the first uncore state to a second uncore state if the uncore temperature is above the first threshold value.Type: ApplicationFiled: April 6, 2010Publication date: October 14, 2010Inventors: Deep Buch, Vivek Garg, Subramaniam Maiyuran
-
Publication number: 20100251035Abstract: An information processing device includes: a receiving operation for receiving, from a transmission device, content and first verification data corresponding to divided content obtained by dividing the content; a detecting operation for detecting an error of the divided content based on second verification data to be calculated based on the divided content and the first verification data received in the receiving operation; and an obtaining operation for obtaining other divided content corresponding to the divided content having the error detected in the detecting operation from another information processing device different from the transmission device, when the error of the divided content is detected in the detecting operation.Type: ApplicationFiled: March 24, 2010Publication date: September 30, 2010Applicant: FUJITSU LIMITEDInventors: Eiji Hasegawa, Hironori Sakakihara
-
Publication number: 20100235678Abstract: Disclosed herein is a technique to protect sector remapped boundary data from corruption due to catastrophic errors such as loss of power in storage disks including SATA (Serial ATA) drives. Specially, one method is provided for protecting the boundary sector data from power failure through a data recovery mechanism, namely, a boundary sector table in which the boundary sectors are pre-stored in case any power failure or loss occurs during the sector remapped write operations. In connection with the boundary sector table stored in a reserved region of the storage disk, a boundary sector information index is provided in a bridge coupled to the disk, which serves as a key to identify and retrieve the needed boundary sector data from the table for corrupted data recovery.Type: ApplicationFiled: March 10, 2009Publication date: September 16, 2010Applicant: Emulex Design & Manufacturing CorporationInventors: Murthy KOMPELLA, Joseph H. Steinmetz, Narayan Ayalasomayajula
-
Publication number: 20100131805Abstract: A storage controller of the present invention detects error with relative ease when reading out data from a storage apparatus. An address data appending device appends address data to each of logical blocks with respect to the data received from a host. A device communication control device determines a divisional position in every data with a size of a predetermined number of blocks, counterchanges the data in anterior and posterior parts around the divisional position, and stores the data in the storage apparatus. When reading the data from the storage apparatus, an address data checking device determines whether or not the value of the address data appended to the block read out and an expected value of the address data calculated based on the divisional position match with each other. If the both values match with each other, the data is sent to the cache memory. If the both values fail to match each other, an error is detected.Type: ApplicationFiled: January 30, 2009Publication date: May 27, 2010Inventor: Eiju Katsuragi
-
Publication number: 20100131801Abstract: An electronic adapter device and an electronic system that comprises the electronic adapter device are described. The electronic adapter device comprises a device and a redundant device able to receive data from a first plurality of electronic devices and redundant data from a second plurality of electronic devices, and able to select therefrom first data and first redundant data respectively. The electronic adapter device also comprises a controller able to receive the selected first data and the selected first redundant data and is able to generate therefrom an error signal indicating a fault in an electronic device of the first plurality or a fault in the device.Type: ApplicationFiled: November 11, 2009Publication date: May 27, 2010Applicants: STMICROELECTRONICS S.R.L., PARADES S.C.A.R.L.Inventors: Massimo Baleani, Marco Losi, Alberto Ferrari, Leonardo Mangeruca
-
Publication number: 20100083040Abstract: A system includes a solid state persistent storage device, and a plurality of storage controllers to manage access of the solid state persistent storage device. An expander circuit is connected to the solid state persistent storage device and has a plurality of computer-based bus interfaces connected to the corresponding plurality of storage controllers.Type: ApplicationFiled: September 30, 2008Publication date: April 1, 2010Inventors: Douglas L. Voigt, David William Thiel, David Alan Daigle
-
Publication number: 20100031264Abstract: A management apparatus for managing a production apparatus that executes a plurality of processes in accordance with a production plan detects an amount of a release-forgotten memory area that is kept allocated on a memory of the production apparatus by each process even after completion of the process. The management apparatus determines an amount of remaining memory based on the detected amount of the release-forgotten memory area and retrieves a process executable with the amount of remaining memory. The management apparatus determines a process to be executed next in accordance with either a result of the retrieval executed based on the detected amount of the release-forgotten memory area or the production plan and controls the production apparatus to execute the determined process.Type: ApplicationFiled: July 29, 2009Publication date: February 4, 2010Applicant: CANON KABUSHIKI KAISHAInventor: Motohisa Ito
-
Publication number: 20100005255Abstract: The present invention is a method for providing atomicity for host write Input/Outputs (I/Os) in a Continuous Data Protection (CDP)-enabled volume. When a host overwrite Input/Output (I/O) is initiated by a host against a data block of the CDP-enabled volume, the method may include creating an in-flight write log entry and providing the in-flight write log entry to an in-flight write log of the CDP-enabled volume. The in-flight write log entry may correspond to the host overwrite I/O. The method may further include locating mapping table information in a mapping table of the CDP-enabled volume. The mapping table information may correspond to the data block. The method may further include recording a journal entry in a journal of the CDP-enabled volume. The journal entry may include a journal entry timestamp which corresponds to the host overwrite I/O. The method may further include allocating a storage location for the host overwrite I/O.Type: ApplicationFiled: July 1, 2008Publication date: January 7, 2010Inventors: Shyam Kaushik, William P. Delaney
-
Publication number: 20090259882Abstract: A RAID controller uses a method to identify a storage device of a redundant array of storage devices that is returning corrupt data to the RAID controller. The method includes reading data from a location of each storage device in the redundant array a first time, and detecting that at least one storage device returned corrupt data. In response to detecting corrupt data, steps are performed for each storage device in the redundant array. The steps include reading data from the location of the storage device a second time without writing to the location in between the first and second reads, comparing the data read the first and second times, and identifying the storage device as a failing storage device if the compared data has a miscompare. Finally, the method includes updating the location of each storage device to a new location and repeating the steps for the new location.Type: ApplicationFiled: July 31, 2008Publication date: October 15, 2009Applicant: DOT HILL SYSTEMS CORPORATIONInventor: Jeffery Lawrence Shellhamer
-
Publication number: 20090235125Abstract: A booting system includes: a non-XIP memory, for storing a plurality of booting images, wherein the booting images comprise a source image and a plurality of duplicates of the source image; an XIP memory, coupled to the non-XIP memory; and a code shadowing module, coupled to the non-XIP memory and the XIP memory, for shadowing a specific booting image to the XIP memory if no errors are detected when carrying out error detection (EDC) checking on the specific booting image; wherein if at least a specific part of a booting image does not pass EDC checking, the code shadowing module shadows error-free parts of the booting image to the XIP memory, carries out EDC checking on at least a duplicate of the specific part, and then shadows an error-free part corresponding to the specific part to the XIP memory.Type: ApplicationFiled: May 22, 2009Publication date: September 17, 2009Inventor: Ming-Shiang Lai
-
Publication number: 20090217023Abstract: In a method for equipping a microprocessor-controlled device with new software code via a communication network, the device has a non-volatile program memory, with two memory areas, a first memory area and a second memory area. The first memory area (boot sector) is provided for a basic program, which provides a first operating system and first functionalities of the device, and the second memory area (update sector) is provided for the software code to be transferred. The first memory area is protected by hardware means against overwriting. The following method steps are performed. First, there is a system boot with the basic program from the first memory area. In such case, a system variable UPDATE is read. In case this has the value “perform update”, an invocation of a function “perform firmware update” occurs. Then this variable is set to the value “invalid firmware”. Next, a connection is established to a superordinated unit and the new software code is transferred into the device.Type: ApplicationFiled: April 21, 2006Publication date: August 27, 2009Applicant: Endress + Hauser GmbH + Co. KGInventors: Reinhard Griech, Christian Seiler