Entries |
Document | Title | Date |
20080201606 | Recovery Routine Masking and Barriers to Support Phased Recovery Development - A method, computer program product, and data processing system for providing optional exception recovery features in operating system kernel code are disclosed. In a preferred embodiment, a segment of mainline code may designate a recovery routine for that segment by calling a kernel service provided for that purpose. The kernel service pushes the address of the designated recovery routine, context, and re-entry point information corresponding to the segment to a recovery stack. An additional “footprint” region is also allocated on the recovery stack and used to store other state information needed for recovery. A mask value or barrier count value is also stored on the recovery stack to allow recovery to be disabled for non-recoverable routines. | 08-21-2008 |
20080201607 | DISASTER RECOVERY IN A DATA PROCESSING SYSTEM - The present invention relates to a method of disaster recovery in data processing systems and to a recovery system. The invention allows for easy, fast and reliable recovery of a data processing system in a disaster situation. Unmodified backup data is stored to a target data processing system, the hardware of the target data processing system being different from the hardware of the source data processing system, from which the backup data originated. The stored backup data is then adapted to the hardware of the target data processing system by a remote recovery system using previously obtained reference data. | 08-21-2008 |
20080201608 | RECOVERING FROM ABNORMAL INTERRUPTION OF A PARITY UPDATE OPERATION IN A DISK ARRAY SYSTEM - Data associated with the state of a parity update operation in a disk array system such as a RAID-6 system is stored during performance of the operation so that, in the event the operation is interrupted, recovery may be initiated using the stored data. The stored data may include a state indicator that is indicative of the status of the parity update operation, and snapshot data (e.g., a delta value indicative of a difference between new and old data) captured during the parity update operation. | 08-21-2008 |
20080215915 | Mechanism to Change Firmware in a High Availability Single Processor System - A “high availability” system comprises multiple switches under the control of a control processor (“CP”). The firmware executing on the processor can be changed when desired. Consistent with the high availability nature of the system (i.e., minimal down time), a single CP system implements a firmware change by loading new firmware onto the system, saving state information pertaining to the old firmware, preventing the old firmware from communicating with the switches, bringing the new firmware to an active state and applying the saved state information to the new firmware. | 09-04-2008 |
20080215916 | TEMPLATE BASED PARALLEL CHECKPOINTING IN A MASSIVELY PARALLEL COMPUTER SYSTEM - A method and apparatus for a template based parallel checkpoint save for a massively parallel super computer system using a parallel variation of the rsync protocol, and network broadcast. In preferred embodiments, the checkpoint data for each node is compared to a template checkpoint file that resides in the storage and that was previously produced. Embodiments herein greatly decrease the amount of data that must be transmitted and stored for faster checkpointing and increased efficiency of the computer system. Embodiments are directed to a parallel computer system with nodes arranged in a cluster with a high speed interconnect that can perform broadcast communication. The checkpoint contains a set of actual small data blocks with their corresponding checksums from all nodes in the system. The data blocks may be compressed using conventional non-lossy data compression algorithms to further reduce the overall checkpoint size. | 09-04-2008 |
20080229147 | DATA PROTECTION SYSTEM - The present invention provides systems and methods for logically organizing data for storage and recovery on a data storage medium using a multi-level format. The present invention also provides systems and methods for protecting data stored on data storage medium so that the data may be recovered without errors. | 09-18-2008 |
20080229148 | ENHANCED ERROR IDENTIFICATION WITH DISK ARRAY PARITY CHECKING - When parity checking in a disk array such as a RAID-6 system determines data and parity information is unsynchronized, additional calculations are performed to determine whether the error may be attributed to faulty data on a disk drive or to a more systemic problem such as a faulty controller. In particular, for each particular error detected, the parity generating information is analyzed to determine if each error involves a common disk index. If so, the data can be corrected on that disk; if not other corrective procedures are implemented. | 09-18-2008 |
20080250271 | Error recovery following speculative execution with an instruction processing pipeline - An instruction processing pipeline | 10-09-2008 |
20080250272 | LOGGING LAST RESOURCE SYSTEM - A logging last resource (LLR) system can provide a transaction log and transaction data to a LLR resource after a number of two-phase-commit resources have been prepared. The LLR resource manager can operate on the transaction log and transaction data in an atomic fashion so that the local commit can be done. The local commit can be done by the LLR manager in an atomic manner. | 10-09-2008 |
20080256387 | AUTOMATED ERROR RECOVERY OF A LICENSED INTERNAL CODE UPDATE ON A STORAGE CONTROLLER - A system, method and article of manufacture are provided for the automatic recovery from errors encountered during an automated Licensed Internal Code (LIC) update on a storage controller. The present invention functions with a concurrent or nonconcurrent automated LIC update. The automated recovery from many error conditions is transparent to the attached host system and on-site service personnel, resulting in an improvement in the LIC update process. | 10-16-2008 |
20080263395 | EMBEDDED DEVICE AND IMAGE LOADING METHOD THEREOF - An embedded device ( | 10-23-2008 |
20080263396 | Data Processing Device And Data Control Circuit For Use Therein - When data that has been saved outside a circuit is restored, a data control circuit, before resuming the processing that an electronic circuit had been performing before the data was saved, performs particular processing different from that processing. Moreover, the data control circuit has a data saving control function whereby it, via a debugging port (or a general-purpose data input/output port) of a volatile memory storing data to be processed by the electronic circuit, saves that data (or sends an instruction to save that data). | 10-23-2008 |
20080270829 | CHECKPOINT OF APPLICATIONS USING UNIX® DOMAIN SOCKETS - A computer implemented method, apparatus, and computer program product for managing state data in a workload partitioned environment. Process state data for a process in a workload partition is saved. Process state data is used to restore the process to a given state. State data associated with open sockets and open files bound to the first process is saved. In response to a determination that the process is associated with a domain socket that is bound to a socket file, an absolute pathname for the socket file is saved. A domain socket associated with a connecting process in the workload partition uses the socket file to connect to a domain socket associated with a listening process in the same workload partition to enable the two processes to communicate with each other. | 10-30-2008 |
20080270830 | Data Processing System and Method for Operating a Data Processing System - To improve the availability of a data processing system despite possible memory errors, when reading a data word from a memory cell, the integrity of the data word is checked on the basis of redundant additional information, and if the data word turns out to be corrupted, an error correction procedure is performed in which the reliability performance of the memory cell is checked and, if the memory cell is found to be operational, its contents are restored. | 10-30-2008 |
20080270831 | Rollback method and information processing apparatus executing the same - It is determined that a write access is executed to a stack area of a main memory. It is then determined whether another write access to a corresponding access destination address in the stack area occurred in the past by referring to an access flag table. In contrast, it is determined that a write access is executed to a global area of the main memory. It is then determined whether another write access to a corresponding access destination address in the global area occurred in the past with referring to an access list. Such a configuration can efficiently provide individual advantages of the determination methods using both the access flag table and the address list. The presence or absence of the past saving execution can be efficiently determined at the time of write access. | 10-30-2008 |
20080276125 | Data Processing Method - The invention relates to a data processing method comprising generating meta-data for each data file stored by back-up servers of a set of back-up servers on a storage medium of a plurality of storage media. The meta-data of a data file comprises the file name of the data file, a content-specific identifier and an access path for the data file. The content-specific identifier relates to the data content comprised in the data file and the access path specifies on which storage medium on the plurality of storage media the data file is stored. The method further comprises storing the meta-data of each data file in a database, wherein the database enables the identification of data files having the same data content by use of the content-specific identifiers of the data files as these data files have identical content-specific identifiers. | 11-06-2008 |
20080288817 | Gorbadey's Method for Ensuring the Reliable Operation of the Program Computing Means - The invention relates to the computer engineering, and its usage ensures the possibility to recognize in due time the failures being occurred during operation of the program computing means, and to response respectively for the failure of each type. The method is realized in a program computing means (PCM) comprising a processor operating under the control of a predetermined operating system and intended for processing data under the control of at least one program being executed; a core memory intended for storing said at least one program being executed and data being processed; time interval sequence generators. The technical result is achieved owing to performing steps of: defining in advance the states of the program being executed different from the start and end states thereof, hereinafter referred to as the restart points, for resuming the operation of the program being executed after a failure during execution thereof; in the case of failure occurrence, determining the following failures in the PCM operation: a) an error in storing the core memory content, determined by checking a respective part of the core memory content; b) a control transfer to a wrong command, determined by monitoring the correctness of every control transfer in the processor; and c) various time interruptions determined by monitoring a run duration of a respective part of the program being executed and predetermined operating system; while processing a respective interruption and upon occurrence of anyone of the failures being recognizable, in the case of allowable conditions for continuing the operation, restarting the execution of said program being executed beginning with the nearest restart point preceding to this interruption. | 11-20-2008 |
20080288818 | Method and System for Protecting Information between a Master Terminal and a Slave Terminal - In an application system of a liquid crystal display, for protecting transmissions between a master terminal and a slave terminal, effects caused by an unstable power source of the slave terminal have to be reduced to a lowest degree. When the application system is reset or under normal operations with the power source having a suddenly-decreased or suddenly-unstable voltage level, the transmission between the master terminal and the slave terminal have to be terminated, and related data of the terminated transmission is temporarily stored. When the voltage of the slave terminal is confirmed to reach to a stable voltage over a predetermined duration, the transmission may be restored by the stored data. | 11-20-2008 |
20080294937 | DISTRIBUTED PROCESSING METHOD - According to an aspect of the embodiment provides a method for controlling a processing device for distributing jobs among a plurality of job processing devices for executing the jobs, respectively. The method comprises the steps of: transmitting a job to one of the job processing devices to have the job executed by the one of the job processing devices; generating a procedure information for transmitting a continuation data from the one of the job processing devices before completion of execution of the job back to the processing device, the continuation data enabling another job processing device to continue execution of the job; and transmitting the procedure information to and receiving the continuation data from the one of the job processing devices. | 11-27-2008 |
20080307256 | Method for Fault Handling in a Co-operative Workflow Environment - Embodiments herein provide a fault-handling scheme based on forward recovery for cooperative workflow environments. The fault handling scheme relies on the correct placement of transaction scopes and their associated fault and compensation handlers for maintaining correct application semantics, a fault propagation scheme for forwarding faults to a workflow component that has the corresponding fault handler, and a distributed mechanism for collecting data of completed workflow components to facilitate recovering from faults. The fault handling scheme makes use of control flow messages to facilitate compensation of nested transaction scopes (residing in different components). The workflow components are also modified with additional code for aiding with fault propagation and fault recovery. | 12-11-2008 |
20080307257 | SYSTEM AND METHOD FOR STORING AND RESTORING A DATA FILE USING SEVERAL STORAGE MEDIA - A system and method for storing and restoring a data file using several storage media. The method begins with the step of generating several identical copies of the data file. The identical copies are stored on different storage media. The identical copies are subdivided into data portions according to a predetermined scheme. Selected data portions are simultaneously read out via different data channels from at least two different storage media. The data file is restored from the selected data portions. | 12-11-2008 |
20080313496 | Gracefully degradable versioned storage systems - Multiple versions of data on different sets of machines allow a system to degrade gracefully even when experiencing excessive failures. When excessive failures cause the latest versions to be unavailable, the system becomes degraded, but still offers an old version if available. A most recent coherent set of the available older versions is found and provided. The degree of degradation increases gradually as the system experiences more and more failures. Graceful degradation is desirably complementary to fault tolerance. | 12-18-2008 |
20080313497 | Data processing system - A data processing system has a plurality of storage systems. In this system, data replication is performed at high speed and efficiency while maintaining data integrity. In addition, when failure has occurred in a configuration element, the time necessary to resume the data replication is reduced. In accordance with an instruction from first host computer, updating of replication-target data and creation of a journal are performed in a storage system A; and updating of replication data and creation of a journal are performed in a storage system B. A storage system C retrieves a journal from the storage system B in asynchronization with the updating, and performs updating of replication data. When failure has occurred in the storage system B, a journal-retrieving end is altered to the storage system, and the replication data is updated in accordance with the retrieved journal. | 12-18-2008 |
20090037769 | DYNAMIC MODIFICATION OF SCHEMAS IN STREAMING DATABASES - A method for dynamically modifying a database schema in a streaming database management system receives a new database schema, compares the new schema to an existing schema, identifies the differences between the new schema and the existing schema, and applies the identified differences to the database in a single transaction, thereby producing a database organized according to the new database schema. | 02-05-2009 |
20090044050 | WATCHDOG MECHANISM WITH FAULT RECOVERY - A method for handling watchdog events of an electronic device includes detecting a watchdog fault in a normal mode, which is a watchdog event in which a watchdog trigger is not correctly serviced; entering from the normal mode into a first escalation level of nx escalation levels upon detection of the watchdog fault, wherein nx is an integer equal to or greater than 1; detecting correct watchdog events, which are watchdog events in which a watchdog trigger is correctly serviced; and concurrently detecting watchdog faults, leaving the first escalation level if a first escalation condition is met, and recovering in a recovering step back from any of the nx escalation levels to a previous level or mode, if a de-escalation condition is met. An electronic device embodiment includes a CPU and program instructions for carrying out the method. | 02-12-2009 |
20090055683 | Method of restoring previous computer configuration - A method of handling and storing data in a computer by establishing a plurality of zones or sessions with different levels of write protection, writing attempted changes to data stored in a protected zone to a temporary zone, creating representative maps of some or all of the zones or sessions to track such attempted changes, reading the changes from the temporary zone such that it seems as though the changes were successful, and erasing the temporary zone when the computer is restarted, thereby allowing for “restoring” the data, or, more generally, the computer's configuration, to a state prior to the attempted change. One of the zones may contain working files which are relatively frequently changed, and such changes are treated, e.g., saved, in a substantially conventional manner and not affected by restarting the computer. Access to specific non-temporary zones may be restricted. | 02-26-2009 |
20090070627 | SYSTEM AND ARTICLE OF MANUFACTURE FOR TRANSPARENT FILE RESTORE - Provided is a system and program for automatically handling an error when retrieving a file for an application. An error is detected while the application retrieves a file from the storage device. A user defined policy is checked to determine whether a backup copy should be restored, and the file is restored from the backup copy if the user defined policy indicates that the backup copy should be used. | 03-12-2009 |
20090077417 | METHOD, DATA PROCESSING APPARATUS AND WIRELESS DEVICE - Embodiments of the invention relate generally to a method, to a data processing apparatus and to a wireless device. In an embodiment of the invention a data processing apparatus is provided. The data processing apparatus may include a chip-integrated unit to select a check location of an external memory and to generate a check value, an internal memory associated with the chip-integrated unit, the internal memory to save the check location and the check value, and an external memory coupled to the chip-integrated unit, the external memory to store the check value at the check location. | 03-19-2009 |
20090089614 | DATA RESTORING METHOD AND AN APPARATUS USING JOURNAL DATA AND AN IDENTIFICATION INFORMATION - A host and a storage system each keep a shared identifier indicating a state of a system. The storage system acquires, at update of data, a data pair including data for a change through processing of the host and data before the update. The storage system relates the data pair to a shared identifier. When the host indicates an identifier, the storage system restores data using the data pair. | 04-02-2009 |
20090094482 | Data restoration in case of page-programming failure - The present invention discloses systems and methods for restoring data in flash memory after an operational failure. The method includes: setting bits of a data buffer in accordance with the data; programming a plurality of memory cells in accordance with the data buffer; and upon failure of the programming step, restoring the data buffer to be set in accordance with the data, wherein the restoring is based only on a present state of the data buffer and on a present state of the plurality of memory cells. A memory device includes: at least one cell; and a controller operative to store data in at least one cell by steps including those described in the method above. The system includes: a memory device that includes at least one cell; and a processor operative to store data in at least one cell by steps including those described in the method above. | 04-09-2009 |
20090094483 | METHOD OF MAINTAINING TASK SEQUENCE WITHIN A TASK DOMAIN ACROSS ERROR RECOVERY - Tracks of data or other data units are copied from a primary storage system to a secondary storage system. For multiple-track or multiple-data unit transfers, a group of tracks or data units which are sequentially related are transferred. A respective task is defined at the primary storage system for monitoring a progress of the transfer of each of the respective data units in a group. A state is maintained for monitoring a progress of the transfer of the group responsive to the progress of each of the tasks. A normal state is selected when there are no failed tasks. A recovery state is selected when there is a failure, and the status of the remaining tasks is being ascertained. A retry state is selected following the recovery state to retry the failed tasks. A failed state indicates an unrecoverable failure. | 04-09-2009 |
20090106587 | Software Recovery Method for Flash Media with Defective Formatting - A method and software program for recovering data from corrupted flash media. In one aspect, the method employs a low-level access scheme that enables data to be recovered when high-level interfaces, such as file systems, are damaged. The type of flash media is determined, and a corresponding access scheme is employed. Depending on the type of damage to the media, a physical-to-logical table may be built and employed to sequentially access the flash media in search of indicia from which selectable file-types can be identified, or the media may be accessed using normal operating system commands. Once the file indicia are found, the location of corresponding file data is identified, whereupon the file data are read and stored. The software program employs an application program interface (API) comprising one or more sets of pass-through commands to enable low-level access to the flash media and to build the physical-to-logical table. | 04-23-2009 |
20090113239 | METHOD AND APPARATUS FOR INSTRUCTION TRACE REGISTERS - A computer implemented method, apparatus, and computer usable program product for utilizing instruction trace registers. In one embodiment, a value in a target processor register in a plurality of processor registers is updated in response to executing an instruction associated with program code. In response to updating the value in the target processor register, an address for the instruction is copied from an instruction address register into an instruction trace register associated with the target processor register. The instruction trace register holds the address of the instruction that updated the value stored in the target processor register. | 04-30-2009 |
20090125755 | System and method for detection and recovery of malfunction in mobile devices - A method for recovering malfunction of at least one resource of a mobile device in response to a malware attack and a mobile device thereof. The method comprises diagnosing at least one malfunction of at lest on resource of the mobile device without identifying a reason of the attack, and, in response to said diagnosing, recovering at least one resource of the mobile device. The mobile device comprises one or more resources operatively coupled to at least one sensor directly or indirectly coupled to a recovery block, wherein said sensor is configured to monitor at least one of said resources for information, possibly indicative of at least one affected resource, and to report, directly or indirectly this information and/or derivative thereof to the recovery block; and said recovery block is configured to initiate at least one recovery-related action in respect of at least one of said resources in case the received information and/or derivative thereof meets a certain criterion. | 05-14-2009 |
20090132852 | PORTABLE ELECTRONIC DEVICE AND CONTROL METHOD THEREOF - A portable electronic device includes a storage unit in which information indicating correct process contents is stored. A reception unit of the portable electronic device receives a command for requesting a process from an external device, and the portable electronic device determines whether or not process contents to be executed according to the received command are matched with process contents stored in the storage unit. When it is determined that process contents according to the received command are matched with process contents stored in the storage unit, the portable electronic device executes a process according to the command received by the reception unit. | 05-21-2009 |
20090150722 | Recovering from errors in streaming dsp applications - A data processing system is provided in which processing circuitry performs at least one of a series of data processing operations in dependence upon a set of data values and control circuitry controls execution of the data processing operations. Control path error detection circuitry is provided for detecting a control path error associated with an error in operation of the control circuitry and data path error handling circuitry is arranged to handle recovery from errors in the data values. The control path error detection circuitry is configured to cause the data path error handling circuitry to perform recovery from detected control path errors enabling the series of data processing operations to continue despite the occurrence of the control path error. An associated method and computer program product are also provided. | 06-11-2009 |
20090158089 | METHOD FOR RECOGNIZING A POWER FAILURE IN A DATA MEMORY AND RECOVERING THE DATA MEMORY - To detect a power failure in a volatile data memory containing useful data units and test data units associated with the useful data units, the associated test data unit is also read when the useful data unit is read-accessed, and a decision is made as to whether the useful data unit is corrupted based on the test data unit. A power failure is identified when at least two read useful data units within a predefined number of successive read accesses are found to be corrupted. | 06-18-2009 |
20090158090 | DATA ENTRY RETRIEVAL - The present invention provides for the recovery of characters entered into at least one data entry zone of a data entry window. A method in accordance with an embodiment includes: storing a first image of the data entry window during data entry; subtracting a reference image from the first image to obtain a delta image, wherein the reference image is an image of the data entry window without data entered; identifying at least one non empty zone of the delta image and the location of the at least one data entry zone on the data entry window from the location of the at least one non empty zone on the delta image; extracting at least one character by applying optical character recognition to the least one non empty zone; and inputting the at least one character into the location of the at least one data entry zone. | 06-18-2009 |
20090164843 | VIBRATION-AWARE DATA REASSIGNMENT - An aspect of the present disclosure relates to implementing a temporary reassignment of data based on a vibration condition. An exemplary method includes implementing a data operation for a portion of data and detecting a data error during the data operation. The method further includes obtaining an indication of a vibration condition associated with a device with which the data operation is performed and implementing a temporary reassignment of the portion of data based on the vibration condition. | 06-25-2009 |
20090177920 | Automated Configuration of Medical Practice Management Systems - A user (e.g., medical office manager, medical office insurance administrator, doctor) utilizes a medical practice configuration interface (e.g., web page) to input information about the user's medical practice (e.g., address, insurance plans, doctors, hospitals that the doctors utilize). Based on this information and/or rules associated with the insurance plans accepted at the user's medical practice, additional information is requested from the user about the user's medical practice (e.g., information needed for an insurance plan, information needed for a hospital). The user inputs the requested additional information utilizing the medical practice configuration interface. Configuration information for the user's medical practice is generated based on the information and/or the additional information inputted by the user. A user interface (e.g., web pages interfacing with the medical practice management server) and/or rules for the medical practice can be generated based on the configuration information. | 07-09-2009 |
20090193292 | Methods And Computer Program Products For Defing Synchronous Replication Devices In A Subchannel Set Other Than Subchannel Set Zero - Exemplary embodiments of the present invention define PPRC devices within subchannel sets other than subchannel set zero. Further, for all PPRC paired n devices an additional N/2 PPRC primary device numbers and subchannels are provided within subchannel set zero by moving PPRC secondary devices to any subchannel set other than subchannel set zero. | 07-30-2009 |
20090210743 | METHOD AND DEVICE FOR REALIZING IP MULTIMEDIA SUBSYSTEM DISASTER TOLERANCE - A method for realizing an Internet protocol (IP) multimedia subsystem (IMS) disaster tolerance includes the steps as follows. An S-CSCF receives a user registration, and backs up necessary data which is required when a user service processing is restored on a storage entity in a network. An I-CSCF of user's home domain receives a service request of the user, and if it is found that the S-CSCF currently providing a service for the user fails, assigns a new S-CSCF to the user, and forwards the service request to the newly assigned S-CSCF. The newly assigned S-CSCF interrogates and acquires subscription data of the user and the necessary data backed up by the original S-CSCF from the storage entity, and then restores the user service processing according to the subscription data and the backup data. A device for realizing an IMS disaster tolerance is also provided. | 08-20-2009 |
20090217089 | METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR CONNECTION STATE RECOVERY AFTER FAULT - A method, system, and computer program product for connection state recovery of a connection after fault in a networked channel-to-channel computer system are provided. The method includes identifying essential data in response to detecting a state change in a channel of the computer system, the essential data including connection state information used in performing a recovery operation. The method also includes separating the essential data from transient or incidental data, augmenting the essential data with validation data, and storing the augmented essential data in a memory location of a control unit in communication with the channel. In response to initiation of a recovery operation, the method includes retrieving the augmented essential data and validating contents of persistent data fields containing the essential data. The method further includes using the contents to restore the connection to an operational state when it is determined that the contents of the persistent data fields are valid. | 08-27-2009 |
20090222690 | AUTOMATED COMPUTING APPLIANCE DISASTER RECOVERY - A system and method for automatic disaster recovery of a computing appliance including reconstruction of its previous operational state. A configuration bundle that includes configuration data, software revision level and a list of system updates is used to recover the device's operation state. The system and method can also be utilized to recover a not fully functional member of a clustered computing system from the configuration information stored on other members of the cluster. | 09-03-2009 |
20090235116 | Systems and Methods for Regenerating Data from a Defective Medium - Various embodiments of the present invention provide systems and methods for data regeneration. For example, a system for data regeneration is disclosed that includes a data input derived from the medium. A data detector and a data recovery system receive the data input. The data detector provides a first soft output, and the data recovery system provides a second soft output. The first soft output and the second soft output are provided to a multiplexer. A media defect detector performs a media defect detection process, and provides a defect flag that indicates whether the data input is derived form a defective portion of the medium. The defect flag is provided to the multiplexer where it is used to select whether the first soft output or the second soft output is provides as an extrinsic output. | 09-17-2009 |
20090249119 | USING VOLUME SNAPSHOTS TO PREVENT FILE CORRUPTION IN FAILED RESTORE OPERATIONS - Restore software executing in a computer system may invoke a snapshot of a target volume before restoring a plurality of files from a backup image to the target volume. If the restore operation fails before all the files are restored to the target volume then the restore software may use the snapshot to return one or more of the files to their original states as they existed before the restore operation was initiated. | 10-01-2009 |
20090249120 | REMOTE FIRMWARE RECOVERY - Embodiments of the present invention provide methods, systems, and apparatus for instantiating, by a computing system, a firmware recovery module in response to a detected firmware failure during a system startup. The firmware recovery module establishes access to a remotely disposed recovery server and retrieves from it a replacement or update firmware to address the firmware failure. | 10-01-2009 |
20090259886 | APPARATUS AND METHODS FOR RESTORING SYSTEM OPERATION STATES - A process for restoring an operational state of a portable handheld device is provided. The device may include multiple computing units and persistent storage. The operational state may be generated by a sequence of events. The operational state may receive signals corresponding to a plurality of event types. The process may include selecting an event type for storage, storing in the persistent storage events corresponding to the selected event type, receiving a signal indicating an interruption of operation, and transmitting the stored events to restore the device to the operational state. | 10-15-2009 |
20090259887 | SELF-SERVICE TERMINAL EQUIPMENT AND GUIDANCE SCREEN PROCESSING METHOD - A self-service terminal equipment includes at least one input/output device, a display device, a storage unit, and a control unit, wherein the storage unit includes a guidance information storage unit that stores recovery information in association with guidance information, the control unit includes a user program executing unit, and an input/output interface control unit, and the input/output interface control unit includes a command information control unit that outputs command information to the input/output device such that the input/output device is controlled, a recovery information control unit that inputs the recovery information output from the input/output device controlled, and a guidance screen control unit that obtains the guidance information stored in the guidance information storage unit corresponding to the recovery information input by control of the recovery information control unit and displays a guidance screen that displays the guidance information on the display device. | 10-15-2009 |
20090265579 | INFORMATION PROCESSING APPARATUS AND ERROR CORRECTION METHOD - According to one embodiment, a memory interface module is configured to read one of instructions stored in a memory in accordance with a memory address designated by a fetch request issued from a processor. An error detection module is configured to detect an error in the read instruction. An instruction transmission module is configured to send to the processor, upon detection of an error in the read instruction, a first instruction to hold on a stack the same memory address as the one designated by the fetch request and a second instruction to jump to an error correction routine for correcting an error of the read instruction. | 10-22-2009 |
20090271660 | MOTHERBOARD, A METHOD FOR RECOVERING THE BIOS THEREOF AND A METHOD FOR BOOTING A COMPUTER - A motherboard, a method for recovering a BIOS thereof, and a method for booting a computer are provided. In the method for booting the computer, a first boot block of a first BIOS unit is executed first, and then a second boot block of a second BIOS unit is executed. Afterwards, BIOS main program codes of the second BIOS unit are executed. When the second BIOS unit is down, a recovery mechanism of the first boot block is used to overwrite data in the second BIOS unit with a backup file. | 10-29-2009 |
20090276659 | Method and apparatus for handling failure in address line - An address line failure handling apparatus includes a failed address line specifying unit that examines the address line connected to each bit and specifies a failed address line, an address line substituting unit in which an upper address line connected to an upper bit of the memory is connected with a branch address line branched off from a lower address line connected to a lower bit other than the upper bit, and that switches between an input from the upper address line and an input from the branch address line, and outputs any of the inputs to the upper bit, and an address line substitution instructing unit that instructs the address line substituting unit to switch from the upper address line to the branch address line branched off from the failed address line when the failed address line is specified. | 11-05-2009 |
20090292946 | REPAIR MODULE FOR MEMORY, REPAIR DEVICE USING THE SAME AND METHOD THEREOF - A repair module for repairing one of n bit lines through m bit bus in a memory, a repair device using the same, and a method thereof are provided herein, wherein m≧n. In the repair method, a switching control signal and a selecting control signal are generated according to an index value of the one of n bit lines. A dummy line is switched to the one of n bit lines by shifting from 1 | 11-26-2009 |
20090307527 | DATA RETRIEVAL AND HANDLING SYSTEMS, VIRTUAL WAREHOUSING, PRICE COMPARISON, PRICE AGGREGATION AND STOCK AVAILABILITY ENGINE - Systems in accordance with this invention obtain data over a plurality of networks from a plurality of sources which enable accurate analysis of data so obtained and subsequent manipulation and storage of the data. In particular, but not exclusively, systems in accordance with this invention relate to virtual warehousing of products as well as price comparison, price aggregation, and stock availability engines. | 12-10-2009 |
20090313501 | METHOD AND ARRANGEMENT FOR PROCESSING TRANSACTIONS IN A FLASH TYPE MEMORY DEVICE - The invention relates to a method and arrangement for processing transactions in a flash type memory device, wherein the transaction is a data update and/or changing operation consisting of one or more suboperations, all of which must be successfully executed in order to regard the discussed transaction as having been successfully completed in its entirety. In the solution according to the invention, memory-block specific status information ( | 12-17-2009 |
20090327805 | MINIMIZING DATA LOSS IN ASYNCHRONOUS REPLICATION SOLUTION USING DISTRIBUTED REDUNDANCY - Architecture that reduces data loss resulting from failover in an asynchronous log shipping deployment, but leveraging mid-tier and frontend servers to fill in lost data. In an asynchronous log shipping operation, a replication component asynchronously replicates messaging data to a backend server in accordance with one or more replication operations, which can be updates to databases on the backend server. These databases can include messaging data, such as email address books, mailboxes, etc. A history component maintains a history of replication operations on a frontend server. In the event of a lossy failover, a replay component is used for replaying the replication operations from the history to the backend server. | 12-31-2009 |
20090327806 | METHOD OF HANDLING TRANSACTION IN A SERVICE ORIENTED ARCHITECTURE ENVIRONMENT - A method of handling transactions in a plurality of organization embracing Service Oriented Architecture (SOA) is disclosed. The method includes invoking the transaction when at least one application registers for the transaction, by recognizing one or more services associated to the registered transaction context. The method also includes identifying one or more operations which needs to be initiated for executing each of the respective service. The method further includes revoking the transaction when an error is encountered during the transaction. The process of revoking the transaction includes rolling back the executed operations of the respective services when at least one of the identified operations of the recognized services encounters an error during the transaction. | 12-31-2009 |
20090327807 | TRANSPARENT CHECKPOINTING AND PROCESS MIGRATION IN A DISTRIBUTED SYSTEM - A distributed system for creating a checkpoint for a plurality of processes running on the distributed system. The distributed system includes a plurality of compute nodes with an operating system executing on each compute node. A checkpoint library resides at the user level on each of the compute nodes, and the checkpoint library is transparent to the operating system residing on the same compute node and to the other compute nodes. Each checkpoint library uses a windowed messaging logging protocol for checkpointing of the distributed system. Processes participating in a distributed computation on the distributed system may be migrated from one compute node to another compute node in the distributed system by re-mapping of hardware addresses using the checkpoint library. | 12-31-2009 |
20100011243 | Methods, systems and media for software self-healing - Methods, systems, and media for enabling a software application to recover from a fault condition, and for protecting a software application from a fault condition, are provided. In some embodiments, methods include detecting a fault condition during execution of the software application, restoring execution of the software application to a previous point of execution, the previous point of execution occurring during execution of a first subroutine in the software application, and forcing the first subroutine to forego further execution and return to a caller of the first subroutine. | 01-14-2010 |
20100017653 | REFERENCE STATE INFORMATION GENERATION - A method for generating reference state information, the method includes: comparing between at least one sequence of block identifiers that are accessed during a test period and at least one corresponding reference sequence of block identifiers to provide a comparison result; determining whether to generate reference state information in response to the comparison result; and generating reference state information if determining to generate the reference state information. | 01-21-2010 |
20100017654 | Device-to-Device Communication Bus for Distributed Power Management - A Device-to-Device Communication Bus protocol may facilitate transmission of a two to four byte packet by any device sharing the bus. All devices on the bus may monitor the bus, receiving all packets transmitted by other devices and recognizing when they may initiate transmission. The first byte of the packet may be an Address byte uniquely identifying the sender and allowing hardware arbitration to uniquely select one of any number of senders who may wish to transmit and begin transmission simultaneously. Arbitration may take place during transmission of the Address byte, with the transmitting device monitoring a bus bit value as it is transmitting the Address byte. If the data value observed by the transmitting device doesn't match the transmitting device's desired transmit value, the transmitting device may recognize loss of arbitration and suspend transmission to retry once the packet is complete. The receive function in every device may accept the packet as a normal received packet. The arbitration scheme may also include a fairness mechanism to insure one or several devices cannot monopolize the bus. | 01-21-2010 |
20100023805 | METHOD AND SYSTEM FOR DISASTER RECOVERY BASED ON JOURNALING EVENTS PRUNING IN A COMPUTING ENVIRONMENT - A method and system for automated disaster recovery in an information technology computing system including computing resources, is provided. One implementation involves logging system events in a journaling log file, filtering the events of the log file for each resource and storing the filtered log file, reading the filtered log file, and restarting from a backup file by applying the filtered events to a backup file for recovery. | 01-28-2010 |
20100023806 | TR-069 savepoints - A method for improving the security of actions performed by Remote Procedure Calls RPC invoked during a TR-069 Remote Management Protocol session between an Auto-Configuration Server ACS and a Customer Premises Equipment CPE of a DSL telecommunication system. The TR-069 session comprises several RPC's executing actions on parameters of an object model and the method comprises the steps of
| 01-28-2010 |
20100031085 | METHOD FOR REDUCING HOST DEVICE TO ELECTRONIC DEVICE COMMUNICATION ERRORS - This invention is directed to allowing an electronic device with a failed file system to dynamically direct a host device to reformat it, by making the storage component appear to be in its unformatted state. Upon detection of file system failure, the device writes changes to its disk to make it appear as factory-new to a host device. The host device treats the electronic device as if it is a brand new device that has never been connected to a host device before, and reformats it. By reformatting the device's storage component, the host device thereby provides a way to maintain communication between the host device and electronic device, allowing a more sophisticated application to then diagnose and recover the contents of the storage component, without the involvement of the user or a specialist. This avoids returns of devices with failed file systems, thereby improving the overall user experience. | 02-04-2010 |
20100031086 | REPAIR OF A CORRUPT DATA SEGMENT USED BY A DE-DUPLICATION ENGINE - In a method for repairing a corrupt data segment used by a de-duplication engine, a data segment indexed by a de-duplication index is identified as being as a corrupt data segment. A search is made to find a duplicate data segment with which to replace the corrupt data segment, where the duplicate data segment comprises an uncorrupted version of the data segment. The corrupt data segment is replaced with the duplicate data segment. | 02-04-2010 |
20100031087 | METHOD OF CONTROL IN A SYSTEM HAVING A MEDIA READER - A method of control in a system, which includes a media reader and a host unit, includes configuring the host unit to detect whether the media reader is responding, and configuring the host unit to reset the media reader when it is detected that the media reader stops responding. A system that includes the media reader and the host unit is also disclosed. | 02-04-2010 |
20100031088 | METHOD AND SYSTEM FOR PROCESSING INFORMATION - A method and system for processing information. An apparatus divides target information into N pieces of divided data using a secret sharing scheme in which a predetermined number (K) of pieces of the N pieces of divided data is required to restore the target information, wherein N>K. The apparatus is an information processing device or an external storage device. The apparatus selects M pieces from the N pieces, wherein K≦MM−K. | 02-04-2010 |
20100037094 | Application Failure Recovery - A method, apparatus, and article of manufacture to dynamically address and resolve an improper shut-down of an application. Internal state data of the application is stored in persistent memory. New internal state data is dynamically created and authenticated following an improper shut-down of the application. Responsive to the authentication, the application is re-started with the authenticated new internal state data, without being subject to an immediate improper shut-down. | 02-11-2010 |
20100037095 | SYSTEM AND METHOD FOR AUTOMATED AND ASSISTED RESOLUTION OF IT INCIDENTS - A computer implemented method for assisted and automated resolving of Information Technology (IT) incidents is provided. The method facilitates one or more users to define repair workflows to resolve the IT incidents. The defined repair workflows are stored in a flow repository. The stored repair workflows are accessed and invoked by the one or more users. The invoked repair workflows are interactively executed for a user assisted resolution of the IT incident. The invoked repair workflows are executed automatically for the automated resolution of the IT incident. | 02-11-2010 |
20100050017 | Intelligent Field Oil and Gas Field Data Acquisition, Delivery, Control, and Retention Based Apparatus, Program Product and Related Methods - An apparatus, program product, and methods for data management, are provided. An exemplary apparatus includes one or more PDHMS surface units each having a serial interface to provide a continuous real-time data stream of captured data, a data storage medium for storing collected downhole process data during a downstream communication link failure, a controller configured to cause the PDHMS surface unit to store recovery data during the downstream communication failure, and a broadband interface to provide recovery file transmission of recovery data stored during the downstream communication link failure. The apparatus can also include a RTU configured to collect the continuous real-time data collected by the PDHMS surface unit and to transmit the collected data to a SCADA system, which can function as a time synchronization master for the RTU and PDHMS surface units, and which can forward the collected data to other systems. | 02-25-2010 |
20100050018 | SATA primitive prediction and correction - A method of correcting corrupted primitives transmitted between a serial advanced technology attachment (SATA) host and a SATA device includes analyzing a current state, a previously transmitted primitive, or a previously received primitive; selecting at least one candidate primitive according to at least one of the current state, the previously transmitted primitive and the previously received primitive; predicting the identity of a current primitive according to at least one candidate primitive and a received current primitive; and replacing the corrupted primitive with the predicted primitive when the predicted primitive is different from the current primitive. | 02-25-2010 |
20100064171 | TARIFF MANAGEMENT DEPLOYMENT AUTOMATION - A method for an operator to deploy tariff and/or billing configurations represented by computer program code, the deployment being effected by operation of a user interface, the method including the steps of the operator identifying at least one configuration to be deployed, selecting the at least one configuration by use of the user interface, and associating the at least one configuration with at least one environment in which the computer program code representing the configuration must be executed to effect the configuration. | 03-11-2010 |
20100064172 | APPARATUS AND METHOD FOR MACRO OPERATION INVOLVING A PLURALITY OF SESSION PROTOCOL TRANSACTIONS - An apparatus and method for macro operation involving a plurality of session protocol transactions is disclosed. In accordance with an embodiment of the disclosure, a mobile device generates a binary encoded message having an indication from which a server can determine a plurality of session protocol transactions to be performed. The binary encoded message is sent from the mobile device and received by the server. In accordance with an embodiment of the disclosure, the server determines the plurality of session protocol transactions to be performed based on the indication in the binary encoded message and attempts the plurality of session protocol transactions. By reducing the number of messages between the mobile device and the server, and by reducing the message size compared to SIP messages, communication resources for the mobile device can be conserved. Also battery power for the mobile device can be conserved. | 03-11-2010 |
20100077254 | METHOD AND APPARATUS FOR REPLACING A DEVICE IN A NETWORK - The invention relates to a method for replacing a device in a network comprising a plurality of devices. The method includes a step of storing ( | 03-25-2010 |
20100083041 | FILE UPDATE SYSTEM AND BOOT MANAGEMENT SYSTEM OF MOBILE COMMUNICATION TERMINAL, METHOD OF UPDATING FILE IN MOBILE COMMUNICATION TERMINAL, AND METHOD OF BOOTING MOBILE COMMUNICATION TERMINAL - Disclosed are a file update system of a mobile communication terminal which is capable of recovering Same Owner ID Error caused by damage of a file header in an EFS (Embedded File System) area of the mobile communication terminal, a boot management system of a mobile communication terminal which is capable of preventing a fatal error caused by damage of a file header in an EFS area of the mobile communication terminal, a method of updating a file in the mobile communication terminal, and a method of booting the mobile communication terminal which is capable of preventing a fatal error caused by damage of a file header in an EFS area of the mobile communication terminal. | 04-01-2010 |
20100088543 | Restarting Mehtod Using a Snapshot - The active server A | 04-08-2010 |
20100107006 | Method and Semiconductor Memory With A Device For Detecting Addressing Errors - A semiconductor memory and a data processing system having hardware for carrying out a method for the improved internal monitoring of addressing circuits in semiconductor memories or in a data processing system, in which logic levels addressing lines are tapped off, the actually selected address or subaddress is represented by additional address bit lines, the actually accessed address/subaddress is recovered using the address bit lines, and the actually selected address/subaddress is compared with the applied address/subaddress, obtained from the additional address bit lines, in order to recognize an error in the addressing circuit. | 04-29-2010 |
20100107007 | SYSTEM RECOVERY IN A HEATING, VENTILATION AND AIR CONDITIONING NETWORK - The disclosure provides a system and method of retrieving data for an active subnet controller of a subnet in an HVAC network. In an embodiment, a device on said subnet reports a loss of internal memory settings to said active subnet controller. The device is recognized by the active subnet controller. At least one list of parameters is requested from the device by the active subnet controller. An order of said at least one list of parameters is employed to convey corresponding stored values of these parameters from the active subnet controller to the coupled device. | 04-29-2010 |
20100115333 | DYNAMIC DRIVER LOADING FOR RECOVERY BOOT MEDIA - In one embodiment a computing device comprises at least one storage media, at least one storage media, a processor, and a memory module comprising logic instructions stored on a computer-readable medium which, when executed by a computer processor, configure the processor to detect, in the computing device, at least one file to support a communication connection with the computing device, store the at least one file on a persistent storage media, and link the at least one file to a restore library. | 05-06-2010 |
20100115334 | Lightweight application-level runtime state save-and-restore utility - Embodiments of the present invention are directed to computer-management tools and utilities that allow computer users to save and restore current application-level runtime states of computational environments created by users on computer systems. Certain embodiments of the present invention are particularly directed to time-and-memory efficient state-saving and state-restoring tools and utilities that allow a user to save snapshots of the user's application-level runtime environment, to manage and review stored snapshots, and to subsequently restore the application-level runtime state of a computer system from a previously saved snapshot. | 05-06-2010 |
20100131796 | System and Method for Detecting and Recovering from Errors in an Instruction Stream of an Electronic Data Processing System - A system and method are provided for detecting and recovering from errors in an Instruction Cache RAM and/or Operand Cache RAM of an electronic data processing system. In some cases, errors in the Instruction Cache RAM and/or Operand Cache RAM are detected and recovered from without any required interaction of an operating system of the data processing system. Thus, and in many cases, errors in the Instruction Cache RAM and/or Operand Cache RAM can be handled seamlessly and efficiently, without requiring a specialized operating system routine, or in some cases, a maintenance technician, to help diagnose and/or fix the error. | 05-27-2010 |
20100138692 | ELECTRONIC DEVICE AND METHOD FOR RESTORING FUNCTION SETTINGS - An electronic device and method for restoring personalized function settings include setting a restoring function, relating the restoring function to one or more function settings of the electronic device, and creating a backup file including retrieved personalized function settings of a designated function setting. The electronic device and method further include determining a backup file, and restoring the personalized function settings of a determined function setting corresponding to the determined backup file. | 06-03-2010 |
20100146334 | FAULT TOLERANT UPDATE PROPAGATION TO VIEWS - In a database system, derived data (often called view data or view tables) depends on other data, often called base data (or base tables). When base data on which derived data depends is updated, including changes, additions, and/or deletions, those updates need to be propagated to derived data. Some types of updates, if repeated, result in an incorrect view data state; these updates are termed non-idempotent. To avoid repeating non-idempotent view data updates, signatures are computed that are repeatable, but yet unique to base data on which the view data is based, the view data being updated, and sequence information for updates to the base data (where applicable) and sequence data for multiple changes to the view being updated. The signatures allow detection of view updates that were committed prior to a failure, but which were not confirmed as having been committed to a process that computes the view updates. | 06-10-2010 |
20100153776 | USING SAFEPOINTS TO PROVIDE PRECISE EXCEPTION SEMANTICS FOR A VIRTUAL MACHINE - One embodiment of the present invention provides a system that provides precise exception semantics for a virtual machine. During operation, the system receives a program comprised of instructions that are specified in a machine instruction set architecture of the virtual machine, and translates these instructions into native instructions for the processor that the virtual machine is executing upon. While performing this translation, the system inserts one or more safepoints into the translated native instructions. The system then executes these native instructions on the processor. During execution, if the system detects that an exception was signaled by a native instruction, the system reverts the virtual machine to a previous safepoint to ensure that the virtual machine will precisely emulate the exception behavior of the virtual machine's instruction set architecture. The system uses a gated store buffer to ensure that any stores that occurred after the previous safepoint are discarded when reverting the virtual machine to the previous safepoint. | 06-17-2010 |
20100153777 | PROGRAM UPDATING SYSTEM HAVING CORRECTION STORAGE UNITS AND METHOD THEREOF - A program updating system having correction storage units and methods thereof are described. The control unit checks the first setting section of the first storage unit to determine whether the first setting data associated with the second storage unit is stored in the first setting section. When the first setting data is stored in the first setting section, the control unit reads the first setting data and writes the first setting data to the second storage unit. The first setting data includes a first correcting address and a first correcting code corresponding to the first correcting address. The second storage unit stores a first setting data transmitted from the first setting section. The control unit compares an executed address of the original program with the first correcting address. When the executed address is identical to the first correcting address, the control unit replaces a first error code corresponding to the executed address with the first correcting code. | 06-17-2010 |
20100169708 | METHOD AND APPARATUS TO PROFILE RAM MEMORY OBJECTS FOR DISPLACMENT WITH NONVOLATILE MEMORY - A memory profiling system profiles memory objects in volatile memory and identifies memory objects as candidates to be stored and read directly from nonvolatile memory. The profiling system monitors memory accesses via page faults and identifies a memory object to be loaded in volatile memory. The profiling system uses page faults to determine a page fault type and a write frequency for the memory object, and determines the memory object's memory access type. The profiling system determines whether the object's memory access type meets the capabilities of the nonvolatile memory technology. If the memory access type meets the nonvolatile memory technology capabilities, the profiling system identifies the memory object as a candidate to be transitioned to and read directly from nonvolatile memory (e.g., NOR and PCM). The profiling system stores the memory object candidates in nonvolatile memory such that the memory objects are read directly from nonvolatile memory. | 07-01-2010 |
20100174941 | FILE REPLACEMENT IN SHARED FILE SYSTEM - A method for replacing a first root file system comprising, retrieving a second root file system, mounting the second root file system on a first system in a sysplex as the sysplex root file system, replacing sysplex root mount information associated with the first root file system with sysplex root mount information associated with the mounted second root file system, updating a root on the first system to point to the mounted second root file system, invalidating the first root file system on the first system, updating a first file system to point to the mounted second root file system in the first system, updating an active process with the sysplex root mount information associated with the mounted second root file system, and unmounting the first root file system from the first system. | 07-08-2010 |
20100174942 | Systemic reset of a mote network - A method may include and/or involve a mote network receiving a signal to reset and applying the signal to reset to place the mote network into a reset condition. | 07-08-2010 |
20100174943 | METHOD FOR RESTORING CLIENT OPERATING SYSTEM-BASED SYSTEM, VIRTUAL MACHINE MANAGER AND SYSTEM USING THE SAME - The present invention provides a method for restoring a client operating system-based system, a virtual machine manager and a virtual machine manager system using the same. The method comprises steps of: receiving a restoration instruction for the client operating system and suspending running the client operating system after receiving the restoration instruction, the restoration instruction including a preset restoration point; determining a first memory snapshot and a first incremental file corresponding to the restoration point, the first memory snapshot being a memory snapshot for the client operating system, which is created when setting the restoration point, and the first incremental file being an incremental file, which is mapped as the first hard disk when setting the restoration point; re-mapping the first incremental file as the first hard disk; and performing a snapshot recovery based on the first memory snapshot. With the present invention, system restoration may be performed rapidly. | 07-08-2010 |
20100192011 | COMPUTER SYSTEM AND METHOD HAVING ISOLATABLE STORAGE FOR ENHANCED IMMUNITY TO VIRAL AND MALICIOUS CODE INFECTION - An apparatus and method of supporting the backup and recovery of a computing device. The computing device typically includes both a user computing environment and a supporting environment which enhances the stability and functionality of the user computing environment. | 07-29-2010 |
20100218041 | END USER CONTROL CONFIGURATION SYSTEM WITH DYNAMIC USER INTERFACE - An end user control configuration (EUC) system with dynamic user interface provides a user friendly tool for consumers to self-provision and manage network services such as Voice over Internet Protocol (VoIP) services. The EUC system dynamically generates graphical user interface (GUI) renderings that assist users in the completion of tasks related to provisioning, and managing network services. The EUC system allows telecommunication service providers to effectively hide the complexity of operational support systems (OSS) and the network elements that deliver the network services. The EUC system solves the technical problems of reducing the cycle-time to self-provision network services, assisting users to complete the tasks required to activate, and manage network services, and actually activating and managing the network services. | 08-26-2010 |
20100223498 | OPERATING SYSTEM-BASED APPLICATION RECOVERY - Methods, systems, and computer-readable media are disclosed for operating system-based application recovery. A particular method saves an application state of an application executing at a computer. When a failure of the application is detected, the operating system provides an option to initiate recovery of the application by reverting to the saved application state. When the option to initiate recovery is selected by a user of the computer, the operating system recovers the application by reverting to the saved application state. | 09-02-2010 |
20100229035 | SYSTEMATIC ERROR CORRECTION FOR MULTI-LEVEL FLASH MEMORY - In accordance with exemplary embodiments, a multi-level flash memory employs error correction of systematic errors when reading multi-level flash memory. Error correction includes i) detection of each systematic error, ii) feedback of the systematic error to circuitry within the memory, and iii) subsequent adjustment within that circuitry to cause a correction of systematic error in the output signal of the multi-level flash memory. | 09-09-2010 |
20100235680 | Microprocessor System for Controlling or Regulating at least partly Safety-Critical Processes - A microprocessor system ( | 09-16-2010 |
20100235681 | STREAM RECOVERY METHOD, STREAM RECOVERY PROGRAM AND FAILURE RECOVERY APPARATUS - Stream data is structured including data tuples as a query process target and a recovery point tuple for indicating a position of the data tuples in the stream data. Upon detection of a failure at a computer, another computer reads position information in the stream data indicating a position of data tuples already subjected to the query process by a stream processing apparatus from a recovery points, uses the recovery point positioned lastly among the read recovery points as a reenter point of the input stream, and instructs a stream distribution apparatus to reenter the input stream starting from the reenter position into the other computer. | 09-16-2010 |
20100241900 | SYSTEM TO DETERMINE FAULT TOLERANCE IN AN INTEGRATED CIRCUIT AND ASSOCIATED METHODS - A system to determine fault tolerance in an integrated circuit may include a programmable logic device carried by the integrated circuit. The system may also include a configurable memory carried by the programmable logic device to control the function and/or connection of a portion of the programmable logic device. The system may further include user logic carried by said programmable logic device and in communication with a user and/or the configurable memory. The user logic may identify corrupted data in the configurable memory based upon changing user requirements. | 09-23-2010 |
20100251016 | Issuing Instructions In-Order in an Out-of-Order Processor Using False Dependencies - A mechanism is provided for issuing instructions. An instruction dispatch unit receives an instruction for dispatch to one of a plurality of execution units. The instruction dispatch unit analyzes a tag register to determine whether a previous tag associated with a previous instruction has been stored in the tag register. Responsive to the previous tag associated with the previous instruction failing to be stored in the tag register, the instruction dispatch unit storing a tag corresponding to the instruction in the tag register. The instruction dispatch unit dispatches the instruction to an issue queue for issue to the one of the plurality of execution units. | 09-30-2010 |
20100251017 | Soft error processing for multiprocessor - The data processor having CPUs each capable of accessing memories enables the processing of a memory error according to the processing mode of the data processor. The CPUs have a memory, and each include a first storing unit capable of storing CPU-identifying information which enables identification of CPU having accessed the memory. At the time of occurrence of a soft error owing to access to the memory, the CPU, having the memory, stores the CPU-identifying information for identifying the CPU having accessed the corresponding memory in the first storing unit, and notifies the interrupt controller of occurrence of a soft error of the memory. After having received an interruption of the memory soft error from the interrupt controller, the CPU uses information stored in the first storing unit to identify the CPU having made the access, and performs the error processing. | 09-30-2010 |
20100251018 | MEMORY ACCESS CONTROL DEVICE, MEMORY ACCESS CONTROL METHOD AND MEMORY ACCESS CONTROL PROGRAM - A memory access control device has a memory control unit and a software execution unit executing software. The memory control unit has: a data transmission unit configured to perform multicast transfer that reads a data from the memory and transmits the data to data transfer destinations through a network; a data reception unit configured to receive multicast transfer data from the network; and a reception data counter configured to indicate a number of multicast transfer data received by the data reception unit. The software execution unit instructs the memory control unit to perform a plurality of multicast transfers and then reads respective reception data counters of the data transfer destinations for each checkpoint in sequence of the software to determine completion of the plurality of multicast transfers. | 09-30-2010 |
20100251019 | CONTROL DEVICE - A control device includes: memory diagnosis means for setting a power-on status when an electric power is turned on and diagnosing an ECC memory; restarting means for restarting the control device when the memory diagnosis means detects a correctable error of the ECC memory during the power-on status of the ECC memory; and operation processing means for resetting the power-on status and performing a normal operation when the memory diagnosis means does not detect a correctable error of the ECC memory, while performing the normal operation when a correctable error of the ECC memory is detected because of the restart of the control device by soft reset after the reset of the power-on status but when the control device is not in the power-on status. | 09-30-2010 |
20100275059 | PRESERVING REFERENCES TO DELETED DIRECTORY ENTRIES - A method, system, and computer usable program product for preserving references to deleted directory entries are provided in the illustrative embodiments. An instruction to delete an entry is received. A second entry referencing the entry is identified. The second entry is marked as a ghost reference to the entry. The entry is converted to a deleted entry. A ghost attribute with a value of “false” may be added to the entry. A ghost attribute or tag with a value of “false” may be added to the second entry. The ghost tag may correspond to an attribute of the second entry that references the entry. An entry may be deleted by setting a value of a ghost attribute in the entry to true. The second entry may be marked as the ghost reference by setting a value of a ghost attribute or a ghost tag in the second entry to true. | 10-28-2010 |
20100275060 | SYSTEM AND METHOD FOR PROTECTING WINDOWS SYSTEM STATE - A method and system for protecting computer system state in one aspect generates signatures associated with system dump data, compares the signatures with those of the previous system dump data. Only those system dump data whose signatures are different from the previous dump are transferred for storing. | 10-28-2010 |
20100281299 | FILE SYSTEM RECOGNITION STRUCTURE - A set of file system data structure and file system recognition APIs are disclosed that may allow an operating system to identify a partition of a storage device as having a valid file system, even if the operating system does not know how to access the file system a priori. File systems implement these data structures in a standardized, known location within a partition on the storage device such that an operating system may use APIs or other functions to examine that known location for the presence of these data structures. Information on how to interpret the data structure may be obtained using a network or other source. | 11-04-2010 |
20100281300 | IMAGE EXCHANGE WITHOUT FULL MICR QUALIFICATION - A system and related methods of correcting errors during check or financial document processing by a bank of first deposit or other entity receiving a paper check or financial document, or by a second bank on whose accounts the checks were written. These corrections can be performed by the computer system of the bank of first deposit, the computer system of the second bank, or both. MICR or other data may be sent in electronic format from the bank of first deposit or other entity without qualification. | 11-04-2010 |
20100287409 | STATE VARIABLE-BASED DETECTION AND CORRECTION OF ERRORS - Embodiments provide methods and apparatuses for detecting errors in a computation using state variables. In various embodiments, corrections of the errors through the state variables are also provided. In various embodiments, the disclosed techniques may be used for power and/or energy minimization/reduction, and debugging, among other goals. Other embodiments and/or applications may be disclosed and/or claimed. | 11-11-2010 |
20100299559 | METHOD FOR PROCESSING THE VOLUME OF INFORMATION HANDLED DURING THE DEBUGGING PHASE OF OPERATIONAL SOFTWARE ONBOARD AN AIRCRAFT AND DEVICE FOR IMPLEMENTING THE SAME - A method for processing the volume of information handled during the debugging phase of an operational software onboard an aircraft includes: dividing the execution path of the operational software into functional intervals by placing progression points at each function of the program; placing control points associated with each progression point; normal execution of the program that includes: storing the execution state of the program at the location of each progression point, wherein the storage of an execution state results in the suppression of the execution state previously stored for said progression point; upon the detection of an error, searching the progression point corresponding to a faulty function; searching for a software start execution state; regenerating the start execution state; correcting the error in the faulty function; and re-executing the program. | 11-25-2010 |
20100299560 | COMPUTER SYSTEM WITH DAMAGED BIOS DATA RECOVERING FUNCTION AND RECOVERING METHOD THEREOF - A computer system with a damaged BIOS data recovering function is disclosed. When BIOS data in the computer are damaged, the computer system may update and recover the BIOS of the storage unit of the computer system in a standby mode via an external electronic device (another computer or a USB flash disk). The computer system includes a storage unit, a data transferring interface, a power supply unit, and a control unit. The computer system is electrically connected with the external electronic device via the data transferring interface. The power supply unit provides standby power (in the standby mode) when the computer system is shut down. The control unit is electrically connected with the power supply unit and the data transferring interface, respectively. The control unit is actuated via the standby power, receives the external BIOS stored in the external electronic device. | 11-25-2010 |
20100306584 | CONTROLLER AND CONTROL METHOD FOR A CONTROLLER - A controller and a control method for a controller can simplify application development and can improve the performance of device control processes. When a request is received from an application | 12-02-2010 |
20100313069 | COMPUTER SYSTEM AND FAILURE RECOVERY METHOD - A computer system, comprising: a server machine; a storage system, which is coupled to the server machine; and a management computer for managing the server machine and the storage system, wherein the server machine has at least one or more programs running therein, wherein the logical storage area provided by storage system stores information about the at least one program, and wherein the computer system further includes: an access recording module for recording storage areas within the logical storage area provided by storage system storing information about the storage areas as storage area information; a boot information storing module for storing the identified boot information; a boot processing monitoring module for monitoring the processing of booting up the programs; and a program recovering module for executing recovery of one of the programs in the server machine. | 12-09-2010 |
20100318845 | MEMORY FAILURE RECOVERY METHOD, INFORMATION PROCESSING APPARATUS, AND PROGRAM - Upon occurrence of a memory error which is difficult to correct, CPU interrupts a process under execution in response to interrupt signal output from error detection device, and transfers the control to the OS. The OS references attributes of a page stored in a page frame which has suffered the memory error. When read-only is indicated, physical memory management table is updated to set the page frame, which has suffered the error, into a disabled state. Then, page table is updated such that a virtual page stored in the page frame which has suffered the error is not assigned to any page frame, followed by resumption of the execution of the process. After execution of the process is resumed, a page fault process is invoked to store the virtual page which has encountered the memory error in another normal page frame. | 12-16-2010 |
20100325485 | SYSTEMS AND METHODS FOR STATEFUL SESSION FAILOVER BETWEEN MULTI-CORE APPLIANCES - The present disclosure presents systems and methods for maintaining operation of stateful sessions by a secondary multi-core appliance upon failover of a first multi-core appliance. A stateful session failover module of primary appliance may receive session states from each of the cores of the primary appliance. The stateful session failover module may communicate the session states of the cores of the primary appliance to a stateful session failover module of the secondary appliance. The stateful session failover module of the secondary appliance may update each of the cores of the secondary appliance with the session states. Upon failover, cores of the secondary appliance may maintain operation and features of the sessions handled by the primary appliance prior to failover using the received state sessions for each session maintained. | 12-23-2010 |
20100332898 | NONVOLATILE MEMORY DEVICE AND COPYBACK PROGRAM METHOD THEREOF - A nonvolatile memory device includes a plurality of memory blocks each configured to include a plurality of pages, a plurality of page buffers configured to correspond to the plurality of memory blocks and send copyback data, a controller configured to send the copyback data to a page buffer selected from among the page buffers, and a register configured to store an address of a page that has been failed, from among the pages, during a copyback program operation. | 12-30-2010 |
20100332899 | Quality Management in a Data-Processing Environment - A method, system and computer program for quality management of a plurality of documents associated with a data-processing operation of an organization is provided. The documents include several fields, the organization has employees, and the method comprises determination of error rates. Errors are reduced in the plurality of documents by focusing on critical fields. The occurrence of errors is predicted by determining a correlation between the errors and a set of attributes, which is updated. Reducing and predicting errors control the error rate. A method for measuring the quality of a plurality of documents is also provided. The measurement is based on the relative operational impact of the errors and the frequency of errors associated with each field. | 12-30-2010 |
20110010583 | ERROR DETECTION, DOCUMENTATION, AND CORRECTION IN A FLASH MEMORY DEVICE - A memory device has an error documentation memory array that is separate from the primary memory array. The error documentation memory array stores data relating to over-programmed bits in the primary array. When the over-programmed bits in the primary array are erased, the error documentation memory array is erased as well, deleting the documentation data relating to the over-programmed bits. | 01-13-2011 |
20110016353 | SYSTEMS AND METHODS FOR DISTRIBUTED SYSTEM SCANNING - Systems and methods are provided for scanning files and directories in a distributed file system on a network of nodes. The nodes include metadata with attribute information corresponding to files and directories distributed on the nodes. In one embodiment, the files and directories are scanned by commanding the nodes to search their respective metadata for a selected attribute. At least two of the nodes are capable of searching their respective metadata in parallel. In one embodiment, the distributed file system commands the nodes to search for metadata data structures having location information corresponding to a failed device on the network. The metadata data structures identified in the search may then be used to reconstruct lost data that was stored on the failed device. | 01-20-2011 |
20110022890 | CLOCK AND DATA RECOVERY CIRCUIT WITH ELIMINATING DATA-DEPENDENT JITTERS - The present invention relates to a clock and data recovery circuit (CDR), and in particular, to a CDR circuit in a full digital scheme which cancels the data-dependent jitter. A DDJ cancellation circuit according to the present invention efficiently cancels the data-dependent jitter, making it possible to configure the reliable clock and data recovery circuit in the serial link data communication through the channel of the predetermined bandwidth. | 01-27-2011 |
20110035622 | DETECTION AND CORRECTION OF FUSE RE-GROWTH IN A MICROPROCESSOR - A microprocessor includes a first plurality of fuses selectively blown with control values, a second plurality of fuses selectively blown collectively with an error correction value computed from the control values, control hardware that receives the control values and provides them to circuits of the microprocessor for controlling operation thereof. A state machine, serially coupled to the control hardware and to the fuses, serially scans the control values from the first fuses to the control hardware and serially scans the control values and the error correction value to a first register. The microprocessor reads the control values and error correction value from the first register, detects and corrects an error in the control values using the error correction value, writes the corrected control values to a second register, and causes the state machine to serially scan the corrected control values from the second register to the control hardware. | 02-10-2011 |
20110035623 | DETECTION OF FUSE RE-GROWTH IN A MICROPROCESSOR - A microprocessor includes a first plurality of fuses, a predetermined number of which are selectively blown. Control values are provided from the fuses to circuits of the microprocessor to control operation thereof. A second plurality of fuses are blown with the predetermined number of the first plurality of fuses that are blown and a Boolean complement of the predetermined number. In response to being reset, the microprocessor: reads the predetermined number and the Boolean complement of the predetermined number from the second plurality of fuses, Boolean complements the predetermined number read from the second plurality of fuses to generate a result, compares the result with the Boolean complement of the predetermined number read from the second plurality of fuses, and prevent itself from fetching and executing user program instructions if the result does not equal the Boolean complement of the predetermined number read from the second plurality of fuses. | 02-10-2011 |
20110035624 | INTELLIGENT POWER CONTROL - In accordance with the techniques discussed herein, a smart monitor module (SMM) can apply the rules to information gathered about a device to determine whether a device has entered a failed state. Upon entry into the failed state, the system reboots the device to restore the device to the active state. | 02-10-2011 |
20110041007 | Controller For Reading Data From Non-Volatile Memory - The present disclosure includes systems and techniques relating to solid state drive controllers. In some implementations, a device includes a buffer that holds a block of data corresponding to a command from a host. The command identifies the block of data and a logical sequence in which the identified block of data is to be transmitted. In response to the command, a data retriever included in the device retrieves the portions of the block of data from non-volatile memory units in a retrieval sequence that is different from the logical sequence. When the device receives multiple commands identifying multiple blocks of data, the device services the commands in parallel by retrieving portions of blocks of data identified by both commands. | 02-17-2011 |
20110041008 | Clock Data Recovery System - A clock data recovery system is described. It includes a high pass filter for transmitting a filtered data signal in response to receiving an input data signal; an adder for summing the filtered data signal with a feedback signal, wherein the adder produces a summed input signal; a plurality of clocked data comparators for receiving the summed input signal, wherein the clocked data comparators determine an input data bit value; a plurality of clocked error comparators for receiving an error signal associated with clock recovery; an equalization and adaptation logic for selecting an error sample such that a phase associated with the error sample is locked at a second post cursor; and a phase mixer for transmitting a delay in response to receiving the phase and the delay is transmitted to the clocked-data comparators and the clocked-error comparators. | 02-17-2011 |
20110047413 | METHODS AND DEVICES FOR DETECTING SERVICE FAILURES AND MAINTAINING COMPUTING SERVICES USING A RESILIENT INTELLIGENT CLIENT COMPUTER - Intelligent client computing devices track and record the changes they make to data, applications, and services. Systems, devices, and computer readable media for detecting service tier failures and maintaining application services provide a resilient client architecture that allows a client application on an intelligent client to automatically detect the unavailability of server tiers or sites and re-route requests and updates to secondary sites to maintain application services at the client tier in a manner that is transparent to a user. The resilient client architecture understands the level of currentness of secondary sites in order to select the best secondary site and to automatically and transparently bring this secondary site up to date to ensure no data updates are missing from the secondary site. | 02-24-2011 |
20110055627 | Seamless Application Session Reconstruction Between Devices - A first device captures session data for each application session that is executing on a first device, and provides the session data to a second device in order for the second device to reconstruct the application sessions. A first device identifies one or more application sessions currently executing on the first device. Each of the application sessions include a media object and session data, which includes a media object identifier that corresponds to the media object and a first device media session position. The first device captures the session data transmits the captured session data to one or more second devices. The second devices are adapted to reconstruct at least one of the application sessions using the received session data and positions the application sessions at a second device media session position that corresponds to the received first device media session position. | 03-03-2011 |
20110055628 | Method for Determining a State Associated with a Transaction - A computer implemented method, apparatus, and computer program product for determining a state associated with a transaction for use with a transactional processing system comprising a transaction coordinator and a plurality of grouped and inter-connected resource managers, the method comprising the steps of: in response to a communications failure between the transaction coordinator and a first resource manager causing a transaction to have an in doubt state, connecting to a second resource manager; in response to the connecting step, sending by the transaction coordinator to the second resource manager, a query requesting data associated with the in doubt transaction; obtaining at the first resource manager, by the second resource manager, a shared lock to data associated with the in doubt transaction; and in response to the obtaining step, collating, by the second resource manager, data associated with the in doubt transaction associated with the first resource manager. | 03-03-2011 |
20110055629 | COMPUTER SYSTEM, CONTROL METHOD THEREOF AND RECORDING MEDIUM STORING COMPUTER PROGRAM THEREOF - A computer system, a control method thereof and a recording medium storing a computer program thereof are provided to recover a program efficiently and be resistant to viruses, worms, and user error. The control method of computer system receives a user's request for a recovery of a program which is installed in a first storage unit. A file system of a second storage unit is determined which stores therein a recovery program corresponding to the program for which the recovery is requested. The recovery program is read from the second storage unit with reference to the determined file system, and the program in the first storage unit is recovered by using the read recovery program. | 03-03-2011 |
20110078497 | AUTOMATED RECOVERY FROM A SECURITY EVENT - In embodiments of the present invention improved capabilities are described for automated recovery from a security event. Automated recovery includes detecting a security event, using metadata to select a target backup for recovery, bringing the recovered environment online in a quarantine mode, initiating automated recovery of the environment, and running at least one of a generic remediation process and a specific remediation process in the quarantine mode prior to releasing the environment from quarantine mode. Related user interfaces, applications, and computer program products are disclosed. | 03-31-2011 |
20110078498 | RADIATION-HARDENED HYBRID PROCESSOR - A method of providing radiation hardening for a modular computational component having a first memory and a second memory and being connectable to an external platform comprises providing a radiation tolerant field programmable gate array having a pair of processors, processing data from the external platform according to instructions stored in the first memory, and executing instructions stored in the second memory to provide radiation hardening by software. The instructions comprise instructions to execute identical processing operations for the data of the external platform in each of the pair of processors, instructions to identify a data corruption indicia for each of the identical processing operations, instructions to compare the identified data corruption indicia, and instructions to repeat the identical processing operations if the data corruption indicia show corrupted data. | 03-31-2011 |
20110078499 | BUSINESS PROCESS ERROR HANDLING THROUGH PROCESS INSTANCE BACKUP AND RECOVERY - According to one embodiment of the present invention, a method for business process error handling through process instance backup and recovery includes the step of creating a backup profile of selected one or more portions of a business process model at modeling stage. The method also includes the steps of deploying the backup profile into a runtime environment, and upon occurrence of an error in execution instances of the business process model, re-executing at least one of the one or more portions of the backup profile to recover from the error. | 03-31-2011 |
20110078500 | PROCESSING TRANSACTIONS IN GRAPH-BASED APPLICATIONS - A graph-based computation has a plurality of nodes representing graph components connected by one or more links representing data flows between the components. Preparing the computation includes: identifying at least a first set of components to process a plurality of transactions in the computation; and associating with a first transaction a first group of one or more data records and data operations corresponding to the data records, and associating with a second transaction a second group of one or more data records and data operations corresponding to the data records. Executing the computation to process at least the first and second transactions includes delaying execution by the first set of components of a data operation corresponding to an initial data record of the second group until after execution by the first set of components of a data operation corresponding to a final data record of the first group. | 03-31-2011 |
20110078501 | System and Methods for Remotely Recovering and Purging Data From a Wireless Device in a Communications Network - A system and methods are provided for remotely recovering and purging data from a wireless device in a communications network. The system includes a wireless device capable of executing a data recovery/purge application program for receiving a message from a communications device in the network. The application program retrieves the data in the wireless device, purges the data from the wireless device, and sends a return message, including the data retrieved from the wireless device, to the communications device. | 03-31-2011 |
20110083041 | MEMORY SYSTEM WITH REDUNDANT DATA STORAGE AND ERROR CORRECTION - A system comprises at least two random access memory (RAM) elements arranged to store data redundantly. The system further comprises RAM routing logic comprising comparison logic operably coupled to the at least two RAM elements and arranged to compare redundant data read from the at least two RAM elements, and check and validation logic, independent of the RAM routing logic, operably coupled to the at least two RAM elements and arranged to additionally detect an error in the redundant data read from the at least two RAM elements and provide an error indication signal to the RAM routing logic in response thereto. The RAM routing logic further comprises selection logic arranged to dynamically select redundant data from one of the at least two RAM elements based on the comparison of the redundant data and the error indication signal. | 04-07-2011 |
20110099422 | CONTINUOUS INTEGRATION OF BUSINESS INTELLIGENCE SOFTWARE - A method for automatically testing a business intelligence artifact includes receiving business metric data from a business intelligence system, creating a business intelligence artifact derived from the received business metric data, executing the business intelligence artifact to generate a business intelligence output populated with information related to the business metric data, creating at least one test case for the business intelligence artifact, the test case having at least one assertion associated with the business intelligence output to verify the proper functioning of the business intelligence artifact, testing, with an automated agent interfaced with the business intelligence system, the business intelligence artifact for errors by determining whether the output generated by the current version of the business intelligence artifact satisfies the conditions of the assertion after execution of the business intelligence artifact; and if errors are detected, correcting the errors to create a subsequent version of the business intelligence artifact. | 04-28-2011 |
20110107142 | ULTRASONIC DIAGNOSTIC METHOD AND SYSTEM FOR SUPPORTING SELF DIAGNOSIS AND RESTORATION FUNCTION - An ultrasonic diagnostic method and system are provided. The ultrasonic diagnostic method includes performing booting of a system using a kernel, after a Basic Input/Output System (BIOS) is executed and an error is not recorded in a memory; recording an error in the memory when the error occurs in executing an ultrasonic diagnostic program; transmitting the recorded error to a server via a network; and receiving, from the server, a recovery file used to restore the ultrasonic diagnostic program, and restoring the ultrasonic diagnostic program using the received recovery file. | 05-05-2011 |
20110107143 | CACHE SYSTEM - A write-back cache system includes: a dirty bit section configured to store a dirty indication data indicating that cache data is in a dirty state; and an OR calculation circuit connected with a front-stage to the dirty bit section. The OR calculation circuit includes: a first input node configured to receive a write request signal indicating a write request of a cache data; a second input node configured to receive a correctable error determination signal of the cache data indicating that a correctable error is present in the cache data; and an output node configured to output a signal such that the dirty indication data is stored in the dirty bit section, when receiving at least, one of the write request signal and the correctable error determination signal. | 05-05-2011 |
20110113283 | Apparatus and Method for Reloading Software Images - An apparatus and method are disclosed for reloading software images. A copy module copies application metadata for an application image to an application metadata copy. The application metadata and application image are stored on a writable memory of a data processing device. The application metadata copy is stored remotely from the data processing device. A detection module detects an operational anomaly. An erasure module erases at least the application image on the writeable memory in response to detecting the operational anomaly. An identification module identifies the application image from the application metadata copy. A reload module reloads the application image to the writable memory using the application metadata copy. | 05-12-2011 |
20110119525 | CHECKPOINTING IN MASSIVELY PARALLEL PROCESSING - One embodiment is a method that performs a local checkpoint at a processing node in a massively parallel processing (MPP) system that executes a workload with a plurality of processing nodes. The local checkpoint is stored in local memory of the processing node. While the workload continues to execute, a global checkpoint is performed from the local checkpoint stored in the local memory. | 05-19-2011 |
20110126047 | SYSTEM AND METHOD FOR MANAGING INFORMATION TECHNOLOGY MODELS IN AN INTELLIGENT WORKLOAD MANAGEMENT SYSTEM - The system and method described herein for managing information technology models in an intelligent workload management system may include a computing environment having a model-driven, service-oriented architecture for creating collaborative threads to manage workloads. In particular, the management threads may converge information for managing planned changes and recovery processes for version-controlled snapshots of the information technology models. For example, a discovery engine may enrich models of an infrastructure with identity information obtained from an identity vault and the infrastructure itself, and a management infrastructure may then manage planned changes to the infrastructure model. In particular, the management infrastructure may construct implementation plans that coordinate interaction between managed entities to implement the planned changes, and may further detect drifts between operational states and planned states for the infrastructure models. | 05-26-2011 |
20110126048 | METHOD FOR RECOVERING BASIC INPUT OUTPUT SYSTEM AND COMPUTER DEVICE THEREOF - A method for recovering a basic input output system (BIOS) and a computer device thereof are disclosed. The computer device includes a motherboard, a power button, a BIOS storage unit, and an embedded controller. The BIOS storage unit is disposed on the motherboard, and it stores a first boot block code and a second boot block code. When the computer device is connected with a power supply to supply standby power to the motherboard, and the power button is not pressed, the embedded controller detects whether the first boot block code is damaged. If the first boot block code is damaged, the embedded controller recovers the first boot block code via the second boot block code. | 05-26-2011 |
20110138224 | METHOD AND SYSTEM FOR TRACEPOINT-BASED FAULT DIAGNOSIS AND RECOVERY - A system for tracepoint-based fault diagnosis and recovery includes: a system state tracing model unit for storing state tracing models which are obtained by a modeling technique and are required for fault diagnosis and recovery; a state diagnosis unit for determining whether or not an action event is executable with reference to the state tracing models when the action event is received from a specific tracepoint among multiple tracepoints which exist in each of components within an operating system of the system, and generating a fault recovery command when it is determined that the action is not executable, that is, a fault has occurred; and a fault recovery unit for performing a fault recovery processing based on the state tracing models in response to the generated fault recovery command. | 06-09-2011 |
20110138225 | Self-Managed Processing Device - A processing device may automatically provide protective services and may provide backup services for backing up and restoring user files, system files, configuration files, as well as other information. The processing device may be configured to check one or more performance conditions and perform an action to improve performance based on the one or more performance conditions. The processing device may monitor configuration and file changes and provide a user with a capability to persist or discard configuration changes and/or file changes made by an application during a session. The processing device may include a recovery button or switch, which when selected or pressed may cause the processing device to be restored to an operational state. The processing device may automatically detect instabilities and may automatically attempt to repair possible causes of the instabilities. The processing device may also include an additional chipset, which may perform backup and recovery services. | 06-09-2011 |
20110145635 | Failure Detection and Fencing in a Computing System - A method, computer program product, and system for detecting and fencing off a failed entity instance so that failover time in the computing system is reduced. Upon detection of a failed entity, for example a failed process, a signal handler invokes an operating system interface to fence off the failed instance from modifying its persistent state, so that the entity may be re-instantiated prior to termination of the failed instance. This approach reduces failover time and eliminates split-brain problems without compromising access to the failed instance to obtain diagnostic information, core dumps, and the like. | 06-16-2011 |
20110145636 | SYSTEMS AND METHODS FOR IMPORTING DATA FROM DATA SOURCES OVER A NETWORK WHILE CORRECTING AND TRANSFORMING THE DATA - Systems and methods for importing data from data sources over a network while correcting and transforming the data are described. A data migration server receives data from various data sources. The data migration server repairs and transforms the received data before transmitting the data to a new data server. In some embodiments, the data migration server repairs data before formatting the data, and in other embodiments, the data migration server formats data before repairing the data. The data migration server also verifies the accuracy of the data, either by comparing the data against data requested and received from third-party servers or in reference to other data from the data sources. | 06-16-2011 |
20110145637 | Performing Mode Switching In An Unbounded Transactional Memory (UTM) System - In one embodiment, the present invention includes a method for selecting a first transaction execution mode to begin a first transaction in a unbounded transactional memory (UTM) system having a plurality of transaction execution modes. These transaction execution modes include hardware modes to execute within a cache memory of a processor, a hardware assisted mode to execute using transactional hardware of the processor and a software buffer, and a software transactional memory (STM) mode to execute without the transactional hardware. The first transaction execution mode can be selected to be a highest performant of the hardware modes if no pending transaction is executing in the STM mode, otherwise a lower performant mode can be selected. Other embodiments are described and claimed. | 06-16-2011 |
20110161730 | SYSTEMS, METHODS, AND APPARATUS TO DEBUG A NETWORK APPLICATION - Methods and apparatus to debug a network application are described. A described example network includes a live control network to collect control messages to create a history of network states, the history of network states reflecting an order in which control messages are processed, the live control network to roll back from a current state to a past state upon detection of an improper sequence of messages and to process the messages in a corrected sequence, the corrected sequence to be stored in the history. The described example network further includes a virtualized network corresponding to the live control network, the virtualized network responsive to a command from an operator to step through the history to facilitate debugging. | 06-30-2011 |
20110161731 | RELOCATING BAD BLOCK RELOCATION (BBR) DIRECTORY UPON ENCOUNTERING PHYSICAL MEDIA DEFECT ON A DISK - Apparatus, method and program product for relocating Bad Block Relocation Directory (BBRD) on a disk storage pre-allocate a number of areas for BBRD in different locations of the disk storage. The locations for the BBRD are calculated based upon the size of the disk and BBRD count. If the update of BBRD fails due to defective media at the location to be updated, that location is abandon and the next pre-allocated location is used. A copy of the BBRD is stored in RAM and maintained by the kernel. By so doing, when a bad block in the BBRD is detected the kernel causes the BBRD to be written in a good one of the locations reserved for BBRD. When the number of alternate BBRD locations used hits a pre-defined threshold, this indicates a situation where many sections of the disk are going bad and the disk needs replacement. If all BBRD locations are used, the disk is presumed bad and all future I/O activities to the disk is suspended. An administrator may be notified that the disk is going bad and needs to be replaced. | 06-30-2011 |
20110161732 | SEMICONDUCTOR DEVICE AND SEMICONDUCTOR SYSTEM INCLUDING THE SAME - A semiconductor device includes an internal circuit configured to perform a specified operation in response to a predetermined command; a normal data input/output section configured to input/output a normal data synchronized with a center of a source clock, in response to data input/output commands; and a data recovery information signal input/output block configured to receive and store a data recovery information signal synchronized with an edge of the source clock and having a predetermined pattern, in response to either a command of the data input/output commands or the predetermined command upon entry to a data recovery operating mode, and to output the data recovery information signal after the passage of a predetermined time period. | 06-30-2011 |
20110167296 | REGISTER FILE SOFT ERROR RECOVERY - Register file soft error recovery including a system that includes a first register file and a second register file that mirrors the first register file. The system also includes an arithmetic pipeline for receiving data read from the first register file, and error detection circuitry to detect whether the data read from the first register file includes corrupted data. The system further includes error recovery circuitry to insert an error recovery instruction into the arithmetic pipeline in response to detecting the corrupted data. The inserted error recovery instruction replaces the corrupted data in the first register file with a copy of the data from the second register file. | 07-07-2011 |
20110167297 | CLOCK-DATA-RECOVERY TECHNIQUE FOR HIGH-SPEED LINKS - A receiver circuit is described. In the receiver circuit, an analog-to-digital converter (ADC) generates first samples of a data signal based on a first clock signal, and a clock-data-recovery (CDR) error-detection circuit generates second samples of the data signal based on a second clock signal. In addition, the CDR error-detection circuit estimates intersymbol interference (ISI) at a current sample in the second samples from an adjacent, subsequent sample in the second samples. Based on the second samples and the estimated ISI, a CDR circuit generates the first clock signal and the second clock signal, which involves modifying the skews of either or both of these clock signals so that the current sample is associated with a zero crossing of a pulse response of a communication channel from which the data signal was received, thereby reducing or eliminating the ISI from the adjacent, subsequent sample. | 07-07-2011 |
20110197092 | A METHOD FOR REQUESTING A FILE REPAIR DISTRIBUTION MODE - The present invention concerns a receiver terminal and method at the receiver for requesting a missing symbol from a repair service, the method comprising the steps of receiving from a first server a list of at least one repair server and at least one transmission mode used by the at least one repair server, receiving from a second server a file comprising a plurality of symbols, checking the correct reception of the symbols, and if a missing has been identified, selecting a repair server and a transmissions mode and requesting the repair server to transmit missing symbols using the transmission mode. | 08-11-2011 |
20110197093 | REDUCED WIRELESS INTERNET CONNECT TIME - A method for reducing the connect time for server access by wireless devices connecting to the server via a gateway is described. A connection from the wireless device to the gateway is established and a request for information on the server is received from the wireless device and transmitted to the server. A determination is made that a response from the server is not forthcoming and a busy indicator response is transmitted to the wireless device. The connection between the wireless device and the gateway is terminated and the request to the server is retransmitted. In another embodiment, a response is received from the server and a determination is made that the received server response is not the requested information and a response is transmitted to the wireless device. The connection between the wireless device and the gateway is terminated and the request to the server is retransmitted. | 08-11-2011 |
20110202793 | FAILURE SYSTEM FOR DOMAIN NAME SYSTEM CLIENT - A method performed by a domain name service client includes storing DNS entries in a local cache; sending a DNS query to another device to obtain an update to one of the DNS entries; determining whether a DNS response is received; and resetting a time-to-live (TTL) timer associated with the one of the DNS entries when the DNS response is not received. | 08-18-2011 |
20110202794 | METHOD OF RESTORING MASTER BOOT RECORD OF STORAGE MEDIUM, STORAGE MEDIUM DRIVING DEVICE, AND STORAGE MEDIUM - A storage medium driving device including a storage medium having a user area and a non-user area, and to record master boot record information that is backed up in the non-user area, and a controller to compare the backup master boot record information with master boot record information read from the user area, and to restore master boot record information recorded in the user area according to the comparison results. | 08-18-2011 |
20110208999 | Method Of Storing Data On A Secondary Storage Device - A backup method relies on a single secondary storage device, such as a tape storage device, which emulates multiple secondary storage devices. The emulated secondary storage devices are coupled to data sources. Data which is received from the data sources is tagged with respective unique identifiers, interleaved and stored on a removable storage medium, such as a tape. This facilitates maximum usage of the media access bandwidth of the single secondary storage device. | 08-25-2011 |
20110214013 | Data Transfer and Recovery Process - A backup image generator can create a primary image and periodic delta images of all or part of a primary server. The images can be sent to a network attached storage device and a remote storage server. In the event of a failure of the primary server, the failure can be diagnosed to develop a recovery strategy. Based on the diagnosis, at least one delta image may be applied to a copy of the primary image to generate an updated primary image at either the network attached storage or the remote storage server. The updated primary image may be converted to a virtual server in a physical to virtual conversion at either the network attached storage device or remote storage server and users may be redirected to the virtual server. The updated primary image may also be restored to the primary server in a virtual to physical conversion. As a result, the primary data storage may be timely backed-up, recovered and restored with the possibility of providing server and business continuity in the event of a failure. | 09-01-2011 |
20110214014 | MICROPROCESSOR AND METHOD FOR DETECTING FAULTS THEREIN - A method for detecting microprocessor hardware faults includes sending at least one input signal to a logic block within the microprocessor, collecting an output response to the input signal from the logic block, and determining whether the output response matches an expected output response of the logic block. | 09-01-2011 |
20110214015 | NETWORK HANG RECOVERY - A method of detecting a network hang and restoring an application that communicates on a connection giving rise to the network hang. A user experience may be improved by providing the user with an option to restore the hung application without losing unsaved data or state information. The network hang may be detected when the user tries to terminate the application. The method may include determining whether the network hang is recoverable, which may involve diagnosing a type of the hang. If recoverable, a network connection reset mechanism may be triggered by instructing a network stack of the computer to terminate the network connection. | 09-01-2011 |
20110225453 | SYSTEM AND METHOD FOR OPTIMIZING REDUNDANCY RESTORATION IN DISTRIBUTED DATA LAYOUT ENVIRONMENTS - The present disclosure is directed to a system and a method for optimizing redundancy restoration in distributed data layout environments. The system may include a plurality of storage devices configured for providing data storage. The system may include a prioritization module communicatively coupled to the plurality of storage devices. The prioritization module may be configured for determining a restoration order of at least a first data portion and a second data portion when a critical data failure occurs. The system may include a restoration module communicatively coupled to the plurality of storage devices and the prioritization module, the restoration module configured for restoring at least the first data portion and the second data portion based upon the restoration order. | 09-15-2011 |
20110225454 | METHOD, RECORDING TERMINAL, SERVER, AND SYSTEM FOR REPAIRING MEDIA FILE RECORDING ERRORS - A method, a recording terminal, a server, and a system for repairing media file recording errors are disclosed in embodiments of the present invention. The method includes: generating description information about a recording error when a recording terminal identifies the recording error in live recording of a media file; sending a recording error repair request that carries the description information to a network device; and repairing the media file recorded by the recording terminal according to repair information when receiving the repair information sent by the network device according to the description information. With the present invention, the recording errors are repaired through a bidirectional network between the recording terminal and the network device, and reliability of repairing the recording errors is ensured. | 09-15-2011 |
20110225455 | DATA RESTORING METHOD AND AN APPARATUS USING JOURNAL DATA AND AN IDENTIFICATION INFORMATION - The storage system is coupled to a computer and includes a plurality of physical storages being used to configure a first logical storage and a second logical storage, a control unit receiving a read request and a write request from the computer; and a cache memory storing data which is sent to the computer. The control unit determines whether a request from the computer is a write request or a read request. If it is a read request, the control unit reads data from the cache memory or at least one of the plurality of physical storages based on the read request. If it is a write request, the control unit determines whether destination of the write request is the first logical storage. | 09-15-2011 |
20110231700 | Management device, correction candidate output method, and computer product - A management device includes a storage unit which stores both an attribute value before correction and an attribute value after correction concerning a configuration item as a management target and type information of the configuration item or relationship information between the configuration item and another configuration item; a determination unit which, when an attribute value input for a new configuration item coincides with the attribute value before correction stored in the storage unit, determines a degree of coincidence between type information or relationship information input for the new configuration item and the type information stored in the storage unit or the relationship information stored in the storage unit; and an output unit which outputs the attribute value after correction based on the determination result of the determination unit. | 09-22-2011 |
20110231701 | INFORMATION PROCESSING SYSTEM, MANAGEMENT APPARATUS, INFORMATION PROCESSING APPARATUS, AND COMPUTER PROGRAM PRODUCT - A management apparatus is connected to an information processing apparatus via a network, and includes: a determining unit that, when receiving a failure notification that installation of software fails from the information processing apparatus, determines a cause of failure based on the notification; a storing processing unit that, when the determining unit determines that the cause of the failure cannot be solved by remote control, stores registration information in which identifying information of the information processing apparatus and information indicating to-be-installed software which has not been installed on the information processing apparatus are associated with each other, in a storage unit; and a reinstallation instruction unit that, when receiving an inquiry as to whether there is the to-be-installed software from the information processing apparatus, searches the registration information in the storage unit, and instructs the information processing apparatus to install the to-be-installed software thereon if there is the to-be-installed software. | 09-22-2011 |
20110239044 | MANAGEMENT AND TRACKING OF COMPLEX ENTITLEMENT BENEFITS - Methods and systems for management and tracking of complex entitlement benefits are disclosed. For example, a method can include identifying a processing error within a distributed transaction processing system, assessing an impact of the processing error, and determining a recovery strategy to minimize the impact of the processing error. The processing error can be associated with the application of an entitlement to a plurality of transactions. The entitlement can include a defined benefit and a benefit counter. The benefit counter can control a quantity of transactions allowed to receive the entitlement. The impact of the processing error can be assessed in regard to the plurality of transactions. | 09-29-2011 |
20110246821 | RELIABILITY SCHEME USING HYBRID SSD/HDD REPLICATION WITH LOG STRUCTURED MANAGEMENT - In one embodiment, a method of storing data includes storing a first copy of data in a solid state memory and storing a second copy of the data in a hard disk drive memory substantially simultaneously with the storing the first copy. In another embodiment, a system for storing data includes a solid state memory, at least one hard disk drive memory, and a controller for controlling storage of data in the solid state memory and the hard disk drive memory. Other methods, systems, and computer program products are also described according to various embodiments. | 10-06-2011 |
20110252275 | METHOD AND SYSTEM FOR PARTITIONING DATA FILES FOR EFFICIENT PROCESSING - An approach is provided for fast processing of data files. A plurality of records are received from a source system. The records are validated against a predetermined data source. An error notification is generated based on the validation. The validated records are partitioned based on a unique parameter. The partitioned records are transformed according to a format specified by a target system. The transformed records are selectively corrected. | 10-13-2011 |
20110258486 | RESTORING PROGRAMS AFTER OPERATING SYSTEM FAILURE - A state restoration unit tracks opening and closing of programs within a computer operating system. Responsive to detecting opening and closing of programs, a state restoration structure is updated. After the computer operating system restarts from a failure, the state restoration structure is accessed. The state restoration unit restores those of the programs indicated as open in the state restoration structure. | 10-20-2011 |
20110258487 | NAND POWER FAIL RECOVERY - Techniques to recover data from an indirected non-volatile memory system after unexpected power failure, as, e.g., NAND memory in electronic devices are disclosed. | 10-20-2011 |
20110258488 | Server Failure Recovery - A metadata server configured to maintain storage assignment mappings in non-persistent storage is described herein. The tract storage assignment mappings associate servers with storage assignments, the storage assignments representing the data stored on the servers. Responsive to a failure, the metadata server receives the storage assignments from the servers and rebuilds the storage assignment mappings from the storage assignments. The metadata server is also configured to enable clients to operate during a recovery process for a failed server by providing the storage assignment mappings to the clients during the recovery process. Also during the recovery process, the replacement server for the failed server conditionally overwrites stored data with other data received from other servers as part of the recovery process. The replacement server conditionally overwrites based on version information associated with the data and version information associated with the other data, the version information being associated with one or more versions of the storage assignment mappings | 10-20-2011 |
20110264953 | Self-Healing Failover Using a Repository and Dependency Management System - Systems, devices, methods, and articles of manufacture employing repair modules are provided. The modules may be automatically deployed in conjunction with dependency mechanisms upon identifying a malfunctioning application. The modules may be specifically tailored for certain diagnosis or repair and may be selected for deployment to a second application using information regarding the malfunction of a first application. | 10-27-2011 |
20110264954 | DISASTER-PROOF DATA RECOVERY - A recovery unit ( | 10-27-2011 |
20110276825 | DEVICE AND METHOD FOR COORDINATING AUTOMATIC PROTECTION SWITCHING OPERATION AND RECOVERY OPERATION - The present invention relates to a device and a method for coordinating an APS operation and a recovery operation. The device includes a working channel detection unit, a protection channel detection unit, a protection protocol unit and a recovery protocol unit. The method comprises: when the working channel of current service fails, the working channel detection unit reporting a working channel alarm to the protection protocol unit and a recovery protocol unit of current node; the recovery protocol unit starting up a timer after receiving the working channel alarm, and the protection protocol unit determining whether the recovery operation needs to be started up immediately after receiving the working channel alarm, and if yes, the protection protocol unit notifying the recovery protocol unit to start up the recovery operation immediately; the recovery protocol unit starting up the recovery operation immediately after receiving the notification. The present invention reduces the damage time of the service in the case of the APS function failure. | 11-10-2011 |
20110283138 | Change Tracking and Management in Distributed Applications - A monitoring and management system for distributed and interacting systems stores configuration settings after a successful installation or modification and compares values to the stored configuration settings. When a discrepancy is found, a messaging system may relay the information to a console where the issue may be dispositioned. In some cases, the configuration settings may be updated, while in other cases, the monitored setting may be restored to the stored configuration setting. A set of wizards or other user interface mechanisms may be used to restore the system to order. | 11-17-2011 |
20110296237 | SELECTING A DATA RESTORE POINT WITH AN OPTIMAL RECOVERY TIME AND RECOVERY POINT - Embodiments of the invention relate to selecting a data restore point with an optimal recovery time and recovery point. An exemplary embodiment includes generating a problem search criterion for an entity with corrupted data. Dependencies relied on by the entity to function are determined. At least one event signature match is found that comprises information for an event being logged in a event log, and is associated with the dependencies. At least one data restore point created prior to an occurrence of a particular event in the at least one event signature match is selected. The particular event having caused the data to be corrupted. The at least one data restore point is selected to restore data to a storage system with the corrupted data. | 12-01-2011 |
20110302449 | COLLECTION ORDERING FOR REPLICATED STATE MACHINES - A replicated state machine with N replica servers may be configured to tolerate a count of F faults. A first operation (of a first ordering type) executes when a first quorum of correctly functioning replicas is available. A second operation (also of the first operation type) executes when a second quorum of correctly functioning replicas is available. A third operation (of a second ordering type) executes when a third quorum of correctly functioning replicas are available. The operations are executed by the replicated state machine such that: (1) the replicated state machine does not guarantee operational ordering between the first operation and the second operation; (2) the replicated state machine guarantees ordering between the first operation and the third operation; and (3) the replicated state machine guarantees ordering between the second operation and the third operation. | 12-08-2011 |
20110307737 | STATE DISPLAY APPARATUS, PROGRAM AND STATE DISPLAY SYSTEM - According to one embodiment, a state display apparatus comprises a receiving module configured to receive measurement files includes item data representing items executed by an object device to be measured, state-change data representing changes in the state of the items and time data, a storage module configured to store the states of the items of the object device in a form of a stack structure for each items, based on the measurement files received by the receiving module, a display module configured to display the states of the items, which are stored in the storage module, and a display controller configured to erase the state of at least one of the states of the items, stored in the form of the stack structure by the storage module, when the measurement files received by the receiving module comprise error data. | 12-15-2011 |
20110314327 | DETERMINING THE CAUSE OF SERIALIZATION FAILURES - A method, computer program product, and system determining the cause of serialization failures is described. A method may comprise, if a first object that has been serialized with all references to member fields by the first object removed passes deserialization, restoring, via at least one of a client electronic device and a server computer, a first reference to a first member field by the first object. The method may further comprise serializing, via at least one of the client electronic device and the server computer, the first object with the restored first reference to the first member field. The method may also comprise, if the serialized first object with the restored first reference to the first member field fails deserialization, determining, via at least one of the client electronic device and the server computer, that the first reference to the first member field by the first object causes the failure. | 12-22-2011 |
20110320866 | DYNAMIC PIPELINE CACHE ERROR CORRECTION - Dynamic pipeline cache error correction includes receiving a request to perform an operation that requires a storage cache slot, the storage cache slot residing in a cache. The dynamic pipeline cache error correction also includes accessing the storage cache slot, determining a cache hit for the storage cache slot, identifying and correcting any correctable soft errors associated with the storage cache slot. The dynamic cache error correction further includes updating the cache with results of corrected data. | 12-29-2011 |
20110320867 | METHOD AND APPARATUS FOR TRAINING A MEMORY SIGNAL VIA AN ERROR SIGNAL OF A MEMORY - Described herein is a method and an apparatus for training a memory signal via an error signal of a memory. The method comprises transmitting from a memory controller a command-address (C/A) signal to a memory module; determining by the memory controller an error in the memory module via an error signal from an error pin of the memory module, the error associated with the C/A signal transmitted to the memory module; and modifying by the memory controller the C/A signal in response to determining an error in the memory module, wherein the error pin is a parity error pin of the memory module, and wherein the memory module comprises a Double Data Rate 4 (DDR4) interface. | 12-29-2011 |
20110320868 | DATA STORAGE APPARATUS AND METHOD FOR WRITING DATA - According to one embodiment, a data storage apparatus includes a read module, an error detector and a controller. The read module is configured to read data from a flash memory, more precisely from a rewrite area and a write-back area, both provided in the flash memory. The error detector is configured to detect errors, if any, in the data read. The controller is configured to keep rewriting data, without correcting the errors the error detector has detected in the rewrite area of the flash memory. | 12-29-2011 |
20120005526 | Storage Device and Method and for Storage Device State Recovery - A storage device and method for storage device state recovery are provided. In one embodiment, a storage device commences an authentication process to authenticate a host device. The authentication process comprises a plurality of phases, and the storage device stores the state of the authentication process, wherein the state indicates the phase(s) of the authentication process that have been successfully completed. After a power loss, the storage device retrieves the state of the authentication process and resumes an operation with the host device without re-performing the phase(s) of the authentication process that have been completed. | 01-05-2012 |
20120005527 | APPARATUS AND METHODS FOR DATA COLLECTION AND VALIDATION - Methods and apparatus for collection, validation, analysis, and automated error correction of data regarding user interaction with content. In one embodiment, statistical methods are used to arrive at expected values for the collected data. The data is compared to the expected value and must meet one or more acceptance criteria (e.g., be within a prescribed range) to be considered valid. The prescribed range is determined by the network operator, or a computer program adapted to generate this value. The invention enables a network operator to assess a large volume of data without requiring significant amounts of manual monitoring and/or error correction. The ability to collect, validate and analyze data across multiple platforms is also provided. Still further, an automated system capable of learning evaluation and error correction patterns is disclosed. | 01-05-2012 |
20120005528 | DATA SET INDEX RECORD PRESERVATION - Various embodiments for preserving data set information in a computing storage environment are provided. In one such embodiment, at least one of a selected portion of an index record of the dataset is stored as a record in a subindex data set. The at least one component of the subindex data set is recoverable into the index record in an event of an error detected within the index record. | 01-05-2012 |
20120011397 | Computer apparatus, non-transitory computer-readable medium storing an error recovery control program, and error recovery control method - A computer apparatus includes a managing unit realizing virtual computers including device driver virtual computers and user virtual computers, the user virtual computers communicating with various devices via the device driver virtual computers. Error detection information is received from one of the virtual computers upon detection of error in one of the device drivers used for communication with one of the devices in one of the virtual computers. One or more types of the virtual computers and the contents of recovery process corresponding to the type of device driver and the type of error indicated in the received error detection information are acquired from error recovery control information. A recovery instruction is transmitted to one or more of the virtual computers identified by the one or more acquired types of virtual computers in order to cause the one or more identified virtual computers to perform the acquired contents of the recovery process. | 01-12-2012 |
20120011398 | FAILURE RECOVERY USING CONSENSUS REPLICATION IN A DISTRIBUTED FLASH MEMORY SYSTEM - Data replication in a distributed node system including one or more nodes. A consensus protocol for failure recovery is implemented. Data items and information relating to consensus protocol roles of participant nodes are stored in at least some of the plurality of nodes. Logical logs stored in at least some of the plurality of nodes are created. The logical logs contain additional consensus protocol information including container metadata and replicated data. | 01-12-2012 |
20120017113 | Control Device - The control device has a receiving device, an output stage, a checking device and a reset device. The receiving device is used to receive at least one data block including control commands from a data bus, the output stage is used to output an output signal in response to the control commands, the checking device is used to output an error signal if the at least one received data block is faulty and/or if no data block is received within a predetermined time, and the reset device is used to reset the output stage in a predefined state if the checking device outputs the error signal. The control device is thus able to react automatically to faultily transmitted data blocks without having to wait for return messages from a transmitting central processor unit. | 01-19-2012 |
20120017114 | Systems, Methods, and Computer Program Products for Instant Recovery of Image Level Backups - Systems, methods, and computer program products are provided for instant recovery of a virtual machine (VM) from a compressed image level backup without fully extracting the image level backup file's contents to production storage. The method receives restore parameters and initializes a virtual storage. The method attaches the virtual storage to a hypervisor configured to launch a recovered VM. The method stores virtual disk data changes inflicted by a running operating system (OS), applications, and users in a changes storage. The method provides the ability to migrate the actual VM disk state (taking into account changed disk data blocks accumulated in changes storage) so as to prevent data loss resulting from the VM running during the recovery and accessing virtual storage, to production storage without downtime. In embodiments, the method displays receives restore parameters in an interactive interface and delivers the recovery results via an automated message, such as an email message. | 01-19-2012 |
20120017115 | APPARATUS AND METHOD FOR OPERATING A COMPUTING PLATFORM WITHOUT A BATTERY PACK - An application control engine computing platform having a shut-down mechanism that permits the platform to adequately start up and operate upon return of power after a power interruption, without a need of a battery pack. The mechanism may target the saving of control object runtime values and operational settings of those objects, rather than the saving of the complete set of objects, and all unsaved alarm and history records upon a power interruption. | 01-19-2012 |
20120023366 | TECHNIQUE FOR ACCURATELY DETECTING SYSTEM FAILURE - An apparatus, method and program for dividing a conversational dialog into utterance. The apparatus includes a computer processor; a word database for storing spellings and pronunciations of words; a grammar database for storing syntactic rules on words; a pause detecting section which detects a pause location in a channel making a main speech among conversational dialogs inputted in at least two channels; an acknowledgement detecting section which detects an acknowledgement location in a channel not making the main speech; a boundary-candidate extracting section which extracts boundary candidates in the main speech, by extracting pauses existing within a predetermined range before and after a base point that is the acknowledgement location; and a recognizing unit which outputs a word string of the main speech segmented by one of the extracted boundary candidates after dividing the segmented speech into optimal utterance in reference to the word database and grammar database. | 01-26-2012 |
20120030511 | EFFICIENT FAILURE RECOVERY IN A DISTRIBUTED DATA STORAGE SYSTEM - A method is provided for efficiently recovering information in a distributed storage system where a list of values that should be stored on a storage device is maintained. A first convergence round is scheduled to be performed on the list of values to bring each value to an At Maximum Redundancy (AMR) state. A second convergence round is scheduled to be performed on the list by selecting a wait time interval from a predefined range of wait time intervals between starts of convergence rounds. | 02-02-2012 |
20120036395 | DETECTING DATA-WRITE ERRORS - An embodiment of a data read path includes recovery and decoder circuits. The recovery circuit is operable to recover coded data from a storage medium, and the decoder circuit is operable to detect, in the recovered data, a write error that occurred during a writing of the coded data to the storage medium. For example, such an embodiment may allow detection of a write error that occurred while writing data to a bit-patterned storage medium. | 02-09-2012 |
20120042206 | SAVING OPERATIONAL STATE OF OPEN APPLICATIONS WHEN UNEXPECTED SHUTDOWN EVENTS OCCUR - A method, system, and computer program product for saving the state of at least one open application on a data processing system when an event forces open applications to close. The method preferably includes a step of monitoring data processing system activities to detect an event indicative of a forthcoming system shutdown action, the system shutdown action including a command which forces closing of running applications. Responsive to detecting the event, execution of said shutdown action is suspended and the state of the at least one open application is recorded. An indication that a state of the at least one running application has been recorded for reuse is stored and, following the recording and storing steps, execution of said shutdown action is restored. | 02-16-2012 |
20120060056 | SEMICONDUCTOR MEMORY DEVICE AND METHOD OF OPERATING THE SAME - A method of operating a semiconductor memory device according to an aspect of the present disclosure includes performing a program loop, including a program operation and a program verification operation, in order to store input data in selected memory cells, performing a first error bit check operation for comparing the number of error bits of data not identical with the input data, with the number of correctable error bits, if the number of error bits is equal to or smaller than the number of correctable error bits, performing a second error bit check operation for comparing the number of error bits with the reference number of bits for replacement determination, and if the number of error bits is greater than the reference number of bits for replacement determination, updating failed column address information by adding the column address of a memory cell, having the error bits, to the failed column address information. | 03-08-2012 |
20120066546 | SYSTEM RECOVERY METHOD AND COMPUTING APPARATUS HAVING SYSTEM RECOVERY FUNCTION - A system recovery method and a computing apparatus having a system recovery function. The computing apparatus includes a first memory unit to store a general operating system (OS) in a system partition where a primary anti-virus program operates, and to store a recovery OS in a recovery partition where a secondary anti-virus program operates; a second memory unit to store firmware determining a booting partition of the computing apparatus; and a processor to control execution of the firmware to, when the system partition is infected by a virus and thus the computing apparatus does not boot to the general OS, boot the computing apparatus to the recovery OS, and to control recovery of the system partition. | 03-15-2012 |
20120072769 | REPAIR-POLICY REFINEMENT IN DISTRIBUTED SYSTEMS - In a distributed system a plurality of devices (including computing units, storage and communication units) are monitored by an automated repair service that uses sensors and performs one or more repair actions on computing devices that are found to fail according to repair policies. The repair actions include automated repair actions and non-automated repair actions. The health of the computing devices is recorded in the form of states along with the repair actions that were performed on the computing devices and the times at which the repair actions were performed, and events generated by both sensors and the devices themselves. After some period of the time, the history of states of each device, the events, and the repair actions performed on the computing devices are analyzed to determine the effectiveness of the repair actions. A statistical analysis is performed based on the cost of each repair action and the determined effectiveness of each repair action, and one or more of the policies may be adjusted, as well as determining from the signals and events from the sensors whether the sensors themselves require adjustment | 03-22-2012 |
20120072770 | Data Corruption Diagnostic Engine - A computer is programmed to execute a diagnostic procedure either on a pre-set schedule or asynchronously in response to an event, such as an error message, or a user command. When executed, the diagnostic procedure automatically checks for integrity of one or more portions of data in the computer, to identify any failure(s). In some embodiments, the failure(s) may be displayed to a human, after revalidation to exclude any failure that no longer exists. | 03-22-2012 |
20120084601 | COMPUTER SYSTEM RESCUE METHOD - A computer system rescue method uses the AMtek iTablet Recovery to diagnose, unfold, restore an operating system with a Windows Pre-install Environment (WinPE) component and back up or recover an operating system or data with a Windows APIs image component. Firstly, in the low-level disk formatting, a disk area is selectively partitioned into three primary sectors and n logical partitions, or is unconfigured for installation of Linux. After installing the Windows system and the operating system used by the user in one primary sector, the AMtek iTablet Recovery is particularly installed in another sector or a mass storage device such as a plug-and-play portable hard drive, and then all the old data of the user is moved to the Windows.old directory through the AMtek iTablet Recovery, thus separating the booting system from the operating system, in which manner, when the computer of the user is infected with a virus, the operating system is unstable or the computer fails to boot normally, the AMtek iTablet Recovery can reinstall or recover the operating system. | 04-05-2012 |
20120084602 | FAULT RESTORATION APPARATUS AND METHOD FOR USE IN A VIRTUAL ENVIRONMENT - A fault restoration technique for use in a virtual environment is provided. The fault restoration technique includes monitoring fault state values of a plurality of domains, detecting a faulty domain, if any, from the plurality of, and restoring the faulty domain by reloading the OS of the faulty domain. | 04-05-2012 |
20120096310 | REDUNDANCY LOGIC - A network system provides network device having a secondary memory that mirrors the content of a primary memory maintaining data structure parameters entries. The integrity of each data structure parameter entry is tested as the entry is output from the primary memory, such as by using a parity test. If an error is detected in the entry, a corresponding entry from the second memory structure is select for use instead of the entry from the primary memory. The corresponding entries in each memory are then flushed, updated, synchronized, or overwritten from the each memory and processing continues using the new entries or other entries from the primary memory. In the rare instance that corresponding entries from both memories exhibit an error, then an error notification is issued. | 04-19-2012 |
20120102357 | METHOD AND APPARATUS FOR PROCESSING LOAD INSTRUCTIONS IN A MICROPROCESSOR HAVING AN ENHANCED INSTRUCTION DECODER AND AN ENHANCED LOAD STORE UNIT - A method and microprocessor are described for efficiently executing load instructions out-of-order (speculatively). The microprocessor includes an enhanced load store unit (LSU) and an enhanced instruction decoder. The enhanced LSU receives a plurality of out-of-order value addresses, and sends a resync signal to the enhanced instruction decoder when an execution error associated with a particular load instruction occurs. The enhanced instruction decoder stores a specific address associated with the particular load instruction, and increments a counter value that indicates how many times the resync signal was sent by the resync predictor. When the counter value reaches a predetermined threshold, subsequent load instructions from the specific address are executed in order (non-speculatively). When a future execution of the particular load instruction indicates that the probability of an execution error has been reduced, the counter value is decremented, facilitating newer load instructions associated with the same address to again be executed speculatively. | 04-26-2012 |
20120110378 | FIRMWARE RECOVERY SYSTEM AND METHOD OF BASEBOARD MANAGEMENT CONTROLLER OF COMPUTING DEVICE - A firmware recovery method of a baseboard management controller (BMC) of a computing device detects whether a firmware of a default firmware memory of the BMC is damaged by sending a detection command to the BMC at a regular interval. When the firmware of the default firmware memory of the BMC is damaged, the method recovers the firmware according to firmware data of a backup firmware memory of the BMC. | 05-03-2012 |
20120110379 | FIRMWARE RECOVERY SYSTEM AND METHOD - A firmware recovery system includes a baseboard management controller (BMC) module, a south bridge, a basic input and output system (BIOS) module, a multiplexer and a storage module. The BIOS module is connected to the BMC module by the south bridge and determines whether a firmware file of the BMC module is corrupt. The multiplexer selectively connects the BIOS module or the BMC module to the south bridge. The storage module stores a new firmware file. When the firmware file of the BMC module is corrupt, the BIOS module controls the multiplexer to select the BMC module to connect to the south bridge. The BIOS module reads the new firmware file from the storage module to recover the corrupt firmware file from the BMC module. | 05-03-2012 |
20120117420 | PROCESSOR AND METHOD IMPLEMENTED BY A PROCESSOR TO IMPLEMENT MASK LOAD AND STORE INSTRUCTIONS - A method of implementing a mask load or mask store instruction by a processor is provided. The method may include receiving the mask load or mask store instruction, a location of a memory operand and a location of corresponding mask bits associated with the memory operand, breaking the received memory operand into a plurality of sub-operands and executing the mask load or mask store instruction on each of the plurality of sub-operands using a fastpath operation or using microcode, wherein the respective mask load or mask store instruction loads or stores each of the plurality of sub-operands based upon the corresponding mask bits. | 05-10-2012 |
20120117421 | SYSTEM AND METHOD FOR REMOTE RECOVERY WITH CHECKPOINTS AND INTENTION LOGS - Accurate recovery of a primary server at a recovery server is accomplished with reduced network overhead by maintaining at the recovery server checkpoints taken over time of the primary server and an intention log of logical transactions pending and complete by the primary server. The recovery server is brought to the operational state of the primary server as of failure at the primary server by recovering the most recent checkpoint and then executing the transactions indicated by the intention log as received but not complete as of the time that the checkpoint was taken. | 05-10-2012 |
20120117422 | DISASTER RECOVERY IN A NETWORKED COMPUTING ENVIRONMENT - In general, embodiments of the present invention provide a DR solution for a networked computing environment such as a cloud computing environment. Specifically, a customer or the like can select a disaster recovery provider from a pool (at least one) of disaster recovery providers using a customer interface to a DR portal. Similarly, using the interface and DR portal, the customer can then submit a request for DR to be performed for a set (at least one) of applications. The customer will then also submit (via the interface and DR portal) DR information. This information can include, among other things, a set of application images, a set of application files, a set of recovery requirements, a designation of one or more specific (e.g., application) components for which DR is desired, dump file(s), database file(s), etc. Using the DR information, the DR provider will then generate and conduct a set of DR tests and provide the results to the customer via the DR portal and interface. In one embodiment, a temporary DR environment can be created (e.g., by the DR provider or the customer) in which the DR tests are conducted. | 05-10-2012 |
20120137173 | MULTI-RPO DATA PROTECTION - A system for disaster recovery including a controller (i) for controlling bandwidth usage of a disaster recovery system in accordance with a plurality of recovery point objectives (RPOs), each RPO designating a maximal time loss constraint for data recovery for an enterprise production system, and a corresponding bandwidth allocation for the disaster recovery system to use in replicating data for the enterprise production system, wherein the RPOs are applied in accordance with a calendar-based schedule of dates and times, and (ii) for issuing an RPO alert when the RPO maximal time loss constraint for a current date and time is not satisfied. | 05-31-2012 |
20120137174 | METHOD AND SYSTEM FOR FLEXIBLE AUTOMATED INTERACTIONS - A computer platform provides a method and system for establishing scenarios for interactions between users (both individually and as a group) and a web site or other software application over a network. The interactions are described in terms of events, actions, and conditions, where a single mechanism may be used to describe events, actions, and conditions for both individuals and a group. One portion of a scenario may apply to the group, while another portion applies to individuals. Time elements and branches also can be employed to describe the scenario. The scenario may describe a non-deterministic process, but be modeled as a deterministic state machine for execution. | 05-31-2012 |
20120151256 | Partial fault tolerance in an embedded appliance - A system and method for partial fault tolerance in an embedded appliance is disclosed. The method comprises providing an embedded appliance having first and second digital storage locations, with the second location including a boot manager and a recovery operating system. An image instance of the operational section of the first digital storage location can be copied at a selected frequency to a selected location on the second digital storage location. Files in the image instance can be re-mapped to operate at the second digital storage location. The embedded appliance can be rebooted from the second digital storage location using the boot manager to load an operating system in the image instance to operate the embedded appliance from the image instance at the selected location on the second digital storage location when the operational section of the first digital storage location is inaccessible. | 06-14-2012 |
20120151257 | Hardware turnkey mobiltity - A system and method for producing a factory build of an embedded appliance is disclosed. The method comprises providing an embedded appliance having first and second digital storage locations, with the second location including a boot manager and a recovery operating system. A factory image of operational software is copied to the secondary digital storage location. The embedded appliance is configured to boot from the second digital storage location at an initial startup and load a recovery operating system to copy the factory image to the primary digital storage location to enable the embedded appliance to operate from the operational section using the operational software. | 06-14-2012 |
20120151258 | SYSTEM RESET - Some embodiments of the invention provide techniques whereby a user may perform a system reset (e.g., to address system performance and/or reliability degradation, such as which may be caused by unused applications that unnecessarily consume system resources, an attempted un-install of an application that left remnants of the application behind, and/or other causes). In some embodiments, performing a system reset replaces a first instance of an operating system on the system with a new instance of the operating system, and removes any applications installed on the system, without disturbing the user's data. | 06-14-2012 |
20120151259 | Nor Flash Memory Controller - A mobile device includes a NOR flash memory for storing settings of the mobile device, a NOR flash memory controller having a memory storing data and/or program code for controlling operations of the NOR flash memory; and a processor coupled to the memory and the NOR flash memory for executing the program code. The program code when executed by the processor causes the memory controller to sequentially write to a sequentially first block of each sector of the NOR flash memory, then write to a sequentially second block of each sector of the NOR flash memory, and when all blocks of all sectors of the NOR flash memory have been written, the memory controller erases a sequentially first sector and then writes to the sequentially first block of the sequentially first sector. | 06-14-2012 |
20120159242 | Method and System For Spinlock Fault Recovery - A method including requesting access to a resource governed by a spinlock; determining an allocation of the resource to a further requester; determining an expiration of a time limit for the spinlock, if the resource is allocated to the further requester; and initiating a fault recovery, if the time limit is expired. | 06-21-2012 |
20120159243 | Proactive Error Scan And Isolated Error Correction - Processing for file system volume error detection and processing for resultant error correction are separated to support system availability and user satisfaction. File system volumes for storing data structures are proactively scanned while the volumes remain online to search for errors or corruptions thereon. Found errors are scheduled to be corrected, i.e., spot corrected, dependent on the severity of the identified errors, error correction scheduling and/or at the determination of a file system administrator and/or user, to assist in maintaining minimal user and file system impact. When spot correction is initialized, one file system volume at a time is taken offline for correction. Spot correction verifies prior logged corruptions for the offline volume, and if independently verified, attempts to correct the prior noted corruptions. Volumes are retained offline only for the time necessary to verify and attempt to correct prior noted volume corruptions. | 06-21-2012 |
20120159244 | MEMORY SYSTEM - According to one embodiment, a memory system includes a data manager and a data restorer. The data manager multiplexes difference logs by a parallel writing operation and stores them in a second storage area, the difference logs being difference logs indicating difference information before and after update of a management table; and thereafter multiplexes predetermined data as finalizing logs and stores them in the second storage area. The data restorer determines a system status at startup of the memory system, by judging whether irregular power-off occurs or data destruction occurs in the second storage area, based on a data storage state of the difference logs and the finalizing logs stored in the second storage area. | 06-21-2012 |
20120166869 | PREDICTING, DIAGNOSING, AND RECOVERING FROM APPLICATION FAILURES BASED ON RESOURCE ACCESS PATTERNS - Technologies are described herein for differentiating normal operation of an application program from error conditions to predict, diagnose, and recover from application failures. Access to resources by the application program is monitored, and resource access events are logged. Resource access patterns are established from the logged resource access events utilizing computer pattern recognition techniques. If subsequent access to resources by the application program deviates from the established patterns, then a user and/or administrator of the application program is notified of a potential error condition based on the detected deviation. In addition, sequences of resource access events that deviate from the established resources access patterns are correlated with an error condition based on a temporal proximity to the time of occurrence of the error to provide diagnostic information regarding the error. | 06-28-2012 |
20120166870 | METHOD AND APPARATUS FOR RECOVERING ERRORS IN A STORAGE SYSTEM - Apparatus and method for recovering errors from erroneous files in a storage system. In order to recover the errors from the erroneous files, each of at least three erroneous files stored in the storage system may be divided in half to form three sets of divided files. Three corresponding, portions from each of the three sets of divided files may be compared. A determination may be made as to whether at least two portions among the three corresponding portions are substantially identical. Based on the determination, substantially identical portions are determined to be non-erroneous portions. Then, a non-matched portion that is not substantially identical to the two substantially identical portions may be replaced with one of the non-erroneous portions. | 06-28-2012 |
20120173923 | ACCELERATING THE PERFORMANCE OF MATHEMATICAL FUNCTIONS IN HIGH PERFORMANCE COMPUTER SYSTEMS - Enabling application instructions to access mathematical functions from an accelerated function library to perform instructions. In the performance of the instructions, applying a predefined test instruction on a value, the value being at least one of an input argument, an intermediate result or a final result to determine if the value is a general-case or a predetermined special-case. Responsive to a determination that the value is a special-case, performing a predetermined set of special-case instructions for the performance of the mathematical function. | 07-05-2012 |
20120173924 | DUAL ENDIANESS AND OTHER CONFIGURATION SAFETY IN LOCK STEP DUAL-CORE SYSTEM, AND OTHER CIRCUITS, PROCESSES AND SYSTEMS - An electronic circuit includes a microcontroller processor ( | 07-05-2012 |
20120173925 | METHOD AND A STORAGE SERVER FOR DATA REDUNDANCY - A method and a storage server for backing up data involves mass storage devices of users of the service that connect to the storage server of the service provider over a public data network. The customers store the data with their terminals. The data is stored to the file system of the mass storage device which encrypts the stored data and transfers the data in encrypted form over the public data network to the storage server. The storage server calculates error correction data from the encrypted data. The error correction data is stored in the mass memory of the storage server. When recovering the stored data of the users, the storage server requests the stored data of all the users whose data was used for the error correction data calculation over the public data network to be used for the recovery calculation. | 07-05-2012 |
20120185727 | COMPUTING SYSTEM RELIABILITY - Systems, methods, and computer-readable and executable instructions are provided for computing system reliability. A method for computing system reliability can include storing, on one of a plurality of devices, a checkpoint of a current state associated with the one of the plurality of devices. The method may further include storing the checkpoint in an erasure-code group across the plurality of devices. | 07-19-2012 |
20120192008 | OPERATION MANAGEMENT DEVICE AND OPERATION MANAGEMENT METHOD - An operation management device includes a collecting unit to receive management data of elements provided in a plurality of management target devices, an analyzing unit to obtain a dependency relation of problematic data defined as data of devices with occurrence of the problem in the received management data according to definition information which defines a dependency relation between the elements and to obtain a dependency relation of non-problematic data defined as data of the devices with non-occurrence of the problem in the received management data according to the definition information, and a comparing unit to obtain management data of a common element by comparing the problematic data with the non-problematic data and to extract a difference between the problematic data and the non-problematic data with respect to management data of elements dependent on the common element. | 07-26-2012 |
20120198274 | HOME APPLIANCE DIAGNOSIS SYSTEM, AND METHOD FOR OPERATING SAME - The present invention relates to a home appliance diagnosis system and to a method for operating same, wherein product information is output in a predetermined signal sound by a home appliance product, and the signal sound is transmitted via a communication network connected to a remote service center to enable the service center to easily check the state of the home appliance product. In addition, the product information is encoded into a predetermined format and modulated to enable sound to be outputted by the home appliance product, thereby preventing noise or signal errors. The present invention enables stable signal modulation and accurate sound output, and enables the easy recovery of the sound transmitted to the service center via the communication network. | 08-02-2012 |
20120204060 | PROVIDING RESTARTABLE FILE SYSTEMS WITHIN COMPUTING DEVICES - In general, techniques are described for enabling a restartable file system. A computing device comprising a processor that executes an operating system may implement the techniques. The processor executes kernel and file system functions of the operating system to perform an operation, where both types of functions call each other to perform the operation. The operating system stores data identifying those of the kernel functions that called the file system functions. In response to determining that one of the file system functions that was called has failed, the operating system accesses the data to identify one of the kernel functions that most recently called one of the file system functions, and returns control to the identified one of the kernel functions without executing any of the file system functions called after the identified one of the kernel functions and prior to the one of the file system functions that failed. | 08-09-2012 |
20120204061 | METHOD AND SYSTEM FOR ENABLING CHECKPOINTING FAULT TOLERANCE ACROSS REMOTE VIRTUAL MACHINES - A checkpointing fault tolerance network architecture enables a backup computer system to be remotely located from a primary computer system. An intermediary computer system is situated between the primary computer system and the backup computer system to manage the transmission of checkpoint information to the backup VM in an efficient manner. The intermediary computer system is networked to the primary VM through a first connection and is networked to the backup VM through a second connection. The intermediary computer system identifies updated data corresponding to memory pages that have been least recently modified by the primary VM and transmits such updated data to the backup VM through the first connection. In such manner, the intermediary computer system holds back updated data corresponding to more recently modified memory pages, since such memory pages may be more likely to be updated again in the future. | 08-09-2012 |
20120210165 | SYSTEM AND METHOD FOR AUTO-FAILOVER AND VERSION MATCHING OF BOOTLOADER IN AN ACCESS CONTROLLER - In accordance with embodiments of the present disclosure, an information handling system may include a processor and an access controller communicatively coupled to the processor. The access controller may include a memory having a bootloader portion including a first memory address and a second memory address a second processor communicatively coupled to the memory. The second processor may be configured to: (i) attempt to execute the a first copy of a bootloader stored at the first memory address; (ii) in the event of a failure to execute the first copy of the bootloader, copy a second copy of the bootloader stored at the second memory address to the first memory address; and (iii) subsequent to copying the second copy to the first memory address, attempt to execute the second copy of the bootloader stored at the first memory address. | 08-16-2012 |
20120216072 | HANG RECOVERY IN SOFTWARE APPLICATIONS - Various embodiments provide a guard mechanism that is configured to prevent transmission of synchronous function calls to hung application components. In at least some embodiments, a hang resistance application layer intercepts a synchronous function call that is intended for an application component. Before permitting the synchronous function call to be transmitted to the application component, the hang resistance application layer determines whether the application component is hung by transmitting a message other than the synchronous function call to the application component that requests that a response be received before transmission of the synchronous function call to the application component is permitted. Responsive to determining that the component is hung, a hung component recovery process is initiated. | 08-23-2012 |
20120221890 | MECHANISM FOR MANAGING KERNEL APPLICATION BINARY INTERFACE/APPLICATION PROGRAMMING INTERFACE-BASED DISCREPANCIES RELATING TO KERNEL PACKAGES - A method for managing kernel interface-based discrepancies may include finding a software package having a first version of a kernel package, and retrieving a first kernel interface information from a first file within the kernel package. The first kernel interface information relates to kernel interfaces associated with the kernel package, wherein the interfaces include kernel application binary interface (kABI). The method may further include forming a first dataset including the first kernel interface information relating to the first version of the kernel package, and detecting kernel discrepancies by comparing the first dataset with a second dataset relating to a second version of the kernel package. | 08-30-2012 |
20120221891 | PROGRAMMABLE CONTROLLER - A CPU saves a portion of device data stored in a device memory into a save memory every time a scanning process is performed so that the device data can be reliably saved even if a voltage holding time is shortened due to degradation of an electrolytic capacitor, and when a power-failure detecting circuit detects power failure of a main power supply, the CPU saves a remaining portion of the device data stored in the device memory using a power supply held by the electrolytic capacitor. When a capacity of the electrolytic capacitor detected by a capacitor-capacity detecting circuit is reduced, the CPU changes a size of the device data to be saved by a saving process performed every time the scanning process is performed according to the capacity of the electrolytic capacitor detected by the capacitor-capacity detecting circuit such that the size of the device data to be saved every time the scanning process is performed is increased. | 08-30-2012 |
20120221892 | COMPUTER SYSTEM, CONTROL METHOD THEREOF AND RECORDING MEDIUM STORING COMPUTER PROGRAM THEREOF - A computer system, a control method thereof and a recording medium storing a computer program thereof are provided to recover a program efficiently and be resistant to viruses, worms, and user error. The control method of computer system receives a user's request for a recovery of a program which is installed in a first storage unit. A file system of a second storage unit is determined which stores therein a recovery program corresponding to the program for which the recovery is requested. The recovery program is read from the second storage unit with reference to the determined file system, and the program in the first storage unit is recovered by using the read recovery program. | 08-30-2012 |
20120226937 | DISASTER RECOVERY REPLICATION THROTTLING IN DEDUPLICATION SYSTEMS - Communication is arrested between a source data entity and a replicated data entity at a location declared in a DR mode. The DR mode is negotiated to a central replication management component as a DR mode entry event. The DR mode entry event is distributed, by the central replication management component, to each member in a shared group. The DR mode is enforced using at least one replication policy. | 09-06-2012 |
20120239971 | MITIGATING KNOWN SOFTWARE DEFECTS - A method, system, and computer program product for mitigating known software defects are provided in the illustrative embodiments. A code containing the defect is executed in a data processing system. An error caused by the defect is detected. A function implemented external to the code is called, where the function is a part of a library accessible to the code, and where the function is called for the code for a purpose other than to correct the error. A corrective code embedded in the function is executed, the corrective code attempting to correct the error. Executing the code is continued after the corrective code has corrected the error. | 09-20-2012 |
20120239972 | SYSTEM AND METHOD FOR CURING A READ INABILITY STATE IN A MEMORY DEVICE - A system and method for correcting a boot error is disclosed. The system comprises a solid-state nonvolatile memory device, the solid-state nonvolatile memory device storing a boot loader at a predetermined block having a first address on the solid-state nonvolatile memory device. The system further comprises a main controller that retrieves the boot loader from the predetermined block upon powering up. The system also includes a monitoring module configured to monitor an initial boot sequence of the main controller and to determine when the predetermined block has a read inability error. The main controller obtains a backup boot loader from a backup block when the monitoring module determines that the predetermined block is corrupted. | 09-20-2012 |
20120239973 | Managing Errors In A Data Processing System - A method of managing errors in a data processing system ( | 09-20-2012 |
20120239974 | DISASTER RECOVERY FAILBACK - Pursuant to execution of a predetermined failback policy, if a storage device is not preexistent in a source storage system operable in the computing environment, and an owner of the storage device is one of a DR storage system and a storage system having previously withdrawn from a replication grid, and the DR storage system has authorization to transfer ownership of the storage device by a replacement operation, an instance of the storage device is replicated to the source storage system to generate a replicated instance of the storage device on the source storage system, and ownership of the storage device is designated as the source storage system for each of the instance and the replicated instance of the storage device. | 09-20-2012 |
20120239975 | Reducing Application Downtime During Failover - Reducing application downtime during failover including identifying a critical line in the startup of an application, the critical line comprising the point in the startup of the application in which the application begins to use dependent resources; checkpointing the application at the critical line of startup; identifying a failure in the application; and restarting the application from the checkpointed application at the critical line. | 09-20-2012 |
20120254658 | MICROCOMPUTER AND METHOD OF OPERATION THEREOF - Disclosed is a microcomputer such that even when a program cannot be executed in a CPU of the microcomputer due to an external noise, an unstable power-supply voltage, and other causes, and an fatal error such as runaway occurs, returning to the original state is possible within an extremely short time while preferably avoiding initialization of the entire system. During execution of normal software processing, an interrupt signal and a reset signal are output at an arbitrary time, and if it is determined that a CPU of a microcomputer gets into a runaway state, data which has been stored in a RAM as recovery information is read out, and the CPU is recovered to the state before the runaway. Because such recovery from a fatal error occurs within a short time, software which is being executed can continue its processing as if the fatal error had not occurred. | 10-04-2012 |
20120260128 | METHOD FOR CONTROLLING CHANGES OF REPLICATION DIRECTIONS IN A MULTI-SITE DISASTER RECOVERY ENVIRONMENT FOR HIGH AVAILABLE APPLICATION - A running of an application resource of a first site of at least two sites is stopped from accessing a storage device of the first site. A running of a replication resource is brought to a stop. The replication resource is configured to control a replication of data between the storage device on the first site on which data from the running application resource on the first site are stored to the storage device on the second site. A replication request is submitted to the automation engine for changing a replication direction to run from the second site to the first site. The application resource is started on the second site only after changing the replication direction to start from the storage device on the second site instead of from the storage device of the first site. | 10-11-2012 |
20120290875 | METHODS AND STRUCTURE FOR STORING ERRORS FOR ERROR RECOVERY IN A HARDWARE CONTROLLER - Methods and structure for providing methods and structure for recovering errors in a hardware controller after an overwrite event, such as the detection of another error. In this regard, a link layer of the hardware controller is configured with a register that persistently stores errors until a processor can address them. The link layer is adapted to establish a connection between an initiator and a target and detect errors associated with the connection. As each detected error is overwritten by a subsequently detected error, the link layer register persistently stores the detected errors associated with the connection for recovery after the detected error has been overwritten in the link layer at least until the error can be handled. | 11-15-2012 |
20120290876 | System and Method for Delivering Content Over a Multicast Network - A system for delivering content over a network includes a server. The server is configured to divide the content into multiple segments, to create multiple data streams using the segments of the content, and to transmit each of the data streams via a respective multicast session, wherein a copy of each of the multiple segments is transmitted during a single time slot of the multicast session. | 11-15-2012 |
20120290877 | ADJUSTING A DATA STORAGE ADDRESS MAPPING IN A MAINTENANCE FREE STORAGE CONTAINER - A maintenance free storage container includes a plurality of storage servers, wherein the maintenance free storage container allows for multiple storage servers of the plurality of storage servers to be in a failure mode without replacement. The maintenance free storage container further includes a container controller operable to establish a first mapping of a plurality of virtual storage servers to at least some of the plurality of storage servers and facilitate storage of encoded data slices in the at least some of the plurality of storage servers. The container controller is further operable to when evaluation of storage server utilization information triggers an adjustment, adjust the first mapping to produce a second mapping, facilitate storage of new encoded data based on the second mapping, and facilitate modification of storage of the encoded data slices stored in accordance with the first mapping based on the data storage adjustment criteria. | 11-15-2012 |
20120297245 | Bad Column Management with Bit Information in Non-Volatile Memory Systems - Column based defect management techniques are presented. Each column of the memory has an associated isolation latch or register whose value indicates whether the column is defective, but in addition to this information, for columns marked as defective, additional information is used to indicate whether the column as a whole is to be treated as defective, or whether just individual bits of the column are defective. The defective elements can then be re-mapped to a redundant element at either the appropriate bit or column level based on the data. When a column is bad, but only on the bit level, the good bits can still be used for data. | 11-22-2012 |
20120297246 | System And Method for High Performance Enterprise Data Protection - High performance, enterprise-level data protection system and method provides efficient block-level incremental snapshots of primary storage devices, and instant availability of such snapshots in immediately mountable form that can be directly used in place of the primary storage device. Related systems and applications are described, including an “Enterprise Image Destination” (EID) for backup images; a mirroring technique whereby a replacement physical primary facility may be created while working with a second storage unit as the primary source file system; and a technique for eliminating redundant data in backup images when multiple systems with partially common contents (e.g., operating system files, common databases, application executables, etc.) are being backed up. A number of examples showing “Fast Application Restore” (FAR) with the use of the invention are also provided. | 11-22-2012 |
20120297247 | RECOVERING TRANSACTIONS OF FAILED NODES IN A CLUSTERED FILE SYSTEM - Systems. Methods, and Computer Program Products are provided for recovering transactions of failed nodes using a recovery procedure in a clustered file system (CFS). A data segment is determined that the data segment should be copied to a final storage location by validating that an ownership of the data segment is not associated with any other operational node, via a distributed shared memory (DSM) agent. The ownership of the data segment is set to a local DSM agent. | 11-22-2012 |
20120304002 | MANAGING ROLLBACK IN A TRANSACTIONAL MEMORY ENVIRONMENT - A system and technique for managing rollback in a transactional memory environment is disclosed. The system includes a processor, a transactional memory, and a transactional memory manager (TMM) configured to perform a rollback on the transactional memory. The TMM is configured to, responsive to detecting a begin transaction directive by the processor, detect an access of a first memory location of the transactional memory not needing rollback and indicate that the first memory location does not need to be rolled back while detecting an access to a second memory location of the transactional memory and indicating that a rollback will be required. The TMM is also configured to, responsive to detecting an end transaction directive after the begin transaction directive and a conflict requiring a rollback, omit a rollback of the first memory location while performing rollback on the second memory location. | 11-29-2012 |
20120304003 | OPERATOR STATE CHECKPOINTS - A checkpoint marker can be received at a first operator. The first operator can process the checkpoint marker by sending the checkpoint marker to a second operator and sending state checkpoint information representing a state of the first operator to a checkpoint writer. The checkpoint information can be used to rehydrate the state of one or more operators. For example, after a system failure, system shutdown, etc., checkpoint information can be received from a reader unit at a checkpoint information input queue of the first operator. A state of the first operator can be rehydrated using the checkpoint information. Processing of information in a data input queue of the first operator can be suspended while the checkpoint information is used to rehydrate the state of the first operator. Other operators in a system with the first operator (e.g., the second operator) may be checkpointed and rehydrated in the same manner as the first operator. | 11-29-2012 |
20120304004 | RECOVERY OF A FAILED REGISTRY - A system, method, and computer-readable medium, is described that enables a registry recovery service to retrieve zone files from a target registry, archive the zone files, publish the zone files to a managed DNS server, reconcile ownership of the zone files, and publish the zone files to a provisioning DNS server. The registry recovery service may also implement a WHOIS server for the zone and ownership information and may also implement zone specific features particular to the target registry's TLD. The registry recovery service may also enable DNSSEC extensions on the recovered registry DNS services. | 11-29-2012 |
20120317440 | COMPILER INTERNAL FAULT HANDLING AND REPORTING - Embodiments of the invention provide systems and methods for handling internal compiler errors encountered during compilation of a computer program without breaking the compilation. Implementations of a computer-implemented compiler system include a compiler driver, configured to compile a computer program according to a set of compiler settings, and a number of compiler components, each corresponding to a portion of the computer program. Each compiler component is configured to detect an internal compiler error during compilation of the component; identify a recovery plan having a recovery target and at least one recovery setting; and direct the driver to continue compiling the computer program according to the recovery plan, such that the compilation recompiles from the recovery target and according to a modified set of compiler settings according to the at least one recovery setting. | 12-13-2012 |
20120317441 | NON-FAULTING AND FIRST FAULTING INSTRUCTIONS FOR PROCESSING VECTORS - The described embodiments include a processor that handles faults during execution of a vector instruction. The processor starts by receiving a vector instruction that uses at least one vector of values that includes N elements as an input. In addition, the processor optionally receives a predicate vector that includes N elements. The processor then executes the vector instruction. In the described embodiments, when executing the vector instruction, if the predicate vector is received, for each element in the vector of values for which a corresponding element in the predicate vector is active, otherwise, for each element in the vector of values, the processor performs an operation for the vector instruction for the element in the vector of values. While performing the operation, the processor conditionally masks faults encountered (i.e., faults caused by an illegal operation). | 12-13-2012 |
20120324279 | Method and Apparatus of Backing up Subversion Repository - The present disclosure provides a method and apparatus for backing up a subversion repository. In one embodiment, a method of backing up a subversion repository wherein a version attribute of a backup repository is preset and identifies a latest version of the backup repository, the method comprises: synchronizing the backup repository based on the version attribute of the backup repository; in an event of successful synchronization, updating the version attribute of the backup repository with an identification of a synchronized version; and in an event of unsuccessful synchronization, determining that a current version to be a non-synchronizable version, backing up an original repository by duplicating a copy of the original repository, and updating the version attribute of the backup repository with an identifier of the non-synchronizable version. | 12-20-2012 |
20120324280 | SYSTEM AND METHOD FOR DATA DISASTER RECOVERY - A system includes a production computer machine that includes an operating system and a driver stack. The driver stack includes a file system layer, a recovery driver, a storage layer, a driver layer, a bus driver layer, and a storage device. The system also includes a backup computer processor coupled to the production computer machine via the recovery driver. The recovery driver is configured to commence a recovery of data from the backup computer processor, receive a disk access request from the file system layer, determine if the disk access request accesses data that has not yet been recovered from the backup computer processor, and initiate an on-demand recovery request from the backup computer processor when the data has not been recovered from the backup computer processor. | 12-20-2012 |
20120324281 | Recovery Node Testing - There is disclosed a recovery node testing system and method. The system and method include copying a protected server image associated with a protected server to a test node and creating a test environment for the test node, the test environment including at least one of the network characteristics of the protected server. The test node may then be activated using the protected server image which may then be connected to the virtual network. Once connected, at least one test is performed on the test node to confirm that the protected server image operating on the test node responds in the same manner as the protected server. | 12-20-2012 |
20120331339 | CONTROL SYSTEM SOFTWARE EXECUTION DURING FAULT DETECTION - An example method for uninterrupted execution of control software in an aircraft control system includes creating a plurality of static data copies. A first parity bit is determined for each of the plurality of static data copies. A second parity bit is determined for a first static data copy. A parity fault is detected in the first static data copy if the first parity bit does not match the second parity bit. The system switches to read a second static data copy in response to detecting a parity fault in the first static data copy. | 12-27-2012 |
20120331340 | Method and Arrangement for Fault Handling in a Distributed IT Environment - An improved method for fault handling in a distributed IT environment. The distributed IT environment executes at least one workflow application interacting with at least one application by using interface information about the at least one application. The method comprises: storing at least one fault handling description in a implementation-independent meta language associated with the at least one application; associating the interface information with the at least one fault handling description based on at least one defined fault handling policy, created based on at least one service definition; and the workflow application if a fault response from the at least one application is received: retrieving at least one associated fault handling description based on at least one fault handling policy, and interpreting and executing a particular meta language code of the at least one associated fault handling description in order to continue the defined workflow application. | 12-27-2012 |
20120331341 | SCALAR READXF INSTRUCTION FOR POROCESSING VECTORS - The described embodiments include a processor that handles faults. The processor first receives an input vector, a control vector, and a predicate vector, each vector comprising a plurality of elements. Then, for a first element of the input vector for which corresponding elements of the control vector and the predicate vector are active, the processor performs a scalar read operation using an address from the element of the input vector. When a fault condition is encountered while performing the read operation, the processor determines if the element is a first element where a corresponding element of the control vector is active. If so (i.e., if the element is a first element where a corresponding element of the control vector is active), the processor processes the fault. Otherwise, the processor masks the fault for the element. | 12-27-2012 |
20130007516 | ADAPTIVE VOLTAGE SCALING BASED ON THE RESULTS OF FORWARD ERROR CORRECTION PROCESSING - In one implementation, a device may include a voltage regulator circuit, a data processing circuit, and an error correction circuit, where the error correction circuit may correct errors in data processed by the data processing circuit to obtain error-corrected data and output an error-corrected version of the processed data. Additionally, an error monitor circuit may output an error signal indicative of a level of the errors in the processed data. A control circuit may receive the error signal and control the voltage regulator circuit to adjust, based on the error signal, the supply voltage to the data processing circuit. In some implementations, the control circuit may also base its decision to control the voltage regulator circuit based on available timing margins in the data processing circuit. | 01-03-2013 |
20130007517 | Checkpoint Recovery Utility for Programs and Compilers - Systems and methods may provide for conducting a recursive dependency analysis of an application file to identify a set of original libraries associated with the application file, and creating a set of interceptor libraries based on the set of original libraries. In addition, an execution environment may be prepared to support the execution of the interceptor libraries in conjunction with the execution of the original libraries, and the application file may be executed. Moreover, one or more execution characteristics of the interceptor libraries can be recorded and output via a utility interface. | 01-03-2013 |
20130013961 | REBUILDING A DATA SLICE OF A MAINTENANCE FREE STORAGE CONTAINER - A method begins by a dispersed storage (DS) processing module detecting a storage error of an encoded data slice associated with a storage server within a maintenance free storage container. The method continues with the DS processing module determining failure mode information for the storage server and other storage servers and determining a rebuilding protocol for the encoded data. When the determined rebuilding protocol is a zero information gain (ZIG) protocol, the method continues with the DS processing module identifying a decode threshold number of storage servers from the other storage servers of the maintenance free storage container and from storage servers of another maintenance free storage container, retrieving zero information gain (ZIG) partial encoded data slices from the decode threshold number of storage servers, and decoding the ZIG partial encoded data slices utilizing a ZIG dispersed storage error coding function to reproduce the encoded data slice. | 01-10-2013 |
20130024725 | OUT OF ORDER MILLICODE CONTROL OPERATION - Instructions within a processor are managed by receiving, at a recovery unit of the processor, an instruction that modifies a control register residing within the recovery unit. The recovery unit receives a first set of data associated with the instruction from a general register. A second set of data associated with the instruction is retrieved from the control register by the recovery unit. The recovery unit performs at least one binary logic operation on the first set of data and the second data. | 01-24-2013 |
20130024726 | SYSTEM AND METHOD FOR REMOVABLE NETWORK ATTACHED STORAGE ENABLING SYSTEM RECOVERY FROM BACKUP - A system and method for enabling recovery from backup is disclosed. The removable system may include a processor, a memory, a network interface, a backup management module configured to backup data associated with an information handling system communicatively coupled together. The system may be further configured to boot and restore data associated with the information handling system to which the memory is locally attached. The method may include copying data from an information handling system via the network to memory. The method may further include booting and restoring copied data to the information handling system from the locally attached memory. The system and method may further include an article of manufacture including a computer-readable medium and computer-executable instructions operable to copy data, determine the identity of, boot and restore copied data to an information handling system. | 01-24-2013 |
20130031407 | IDENTIFYING A SLICE ERROR IN A DISPERSED STORAGE NETWORK - A method begins by a dispersed storage (DS) processing module identifying a set of collections of records corresponding to a data segment that is stored in a dispersed storage network (DSN) as a set of encoded data slices, wherein a collection of records includes an event record including information regarding an event, a first record including information regarding a dispersed storage (DS) processing module processing an event request to produce a plurality of sub-event requests, and a plurality of records including information regarding a set of DS units processing the plurality of sub-event requests. The method continues with the DS processing module determining whether an error exists for one of the set of encoded data slices based on at least some of the set of collections of records and when the error exists, flagging the one of the set of encoded data slices for potential rebuilding. | 01-31-2013 |
20130036328 | MANAGING CONTINUOUS SOFTWARE DEPLOYMENT - Concepts and technologies are described herein for managing continuous software deployment. A deployment controller can manage deployment of code to a data center. The deployment controller can execute workflows for checking in, verifying, deploying the code, or other processes. The code can be deployed using a differencing disk that includes data indicating changes between software hosted by the data center and a version of software resulting from deployment of the code. The differencing disk can be linked to the disk or virtual resource hosting the software and executed collectively to provide an updated version of the software. Traffic to one or more virtual machines of the data center can be controlled by the deployment controller. If errors are detecting during deployment or after updating, the update can be rolled back. | 02-07-2013 |
20130047031 | SECURE RECOVERY APPARATUS AND METHOD - A system and method is disclosed for recovering a boot image from a secure location. Hardware instructions initiate a sequence of boot cycles to launch a computer operating system on a computer-enabled device. During the boot cycles, multiple levels of boot code are verified and a determination is made whether each level is usable by the device. If a level of boot code is determined to be unusable, a secure copy of the boot code is loaded from a secure read-only location to repair the unusable code to launch the computer operating system. | 02-21-2013 |
20130047032 | DATA SET AUTORECOVERY - An approach to providing auto recovery of data sets in volumes. When an error condition results from an attempt to access an unintentionally deleted data set, an event is generated and sent to other systems with access to the volume in which the data set existed. The volume is also locked to prevent corruption during the recovery process. A system that has the unintentionally deleted data set open retrieves location information for the data set from control blocks in the system's memory. This location information is used to build a new entry for the data set in the VTOC for the volume. When the data set is thus recovered, the data set is validated, the lock removed, and the data set is made available to the systems sharing the volume. | 02-21-2013 |
20130047033 | INDICATION OF A DESTRUCTIVE WRITE VIA A NOTIFICATION FROM A DISK DRIVE THAT EMULATES BLOCKS OF A FIRST BLOCK SIZE WITHIN BLOCKS OF A SECOND BLOCK SIZE - A disk drive receives a request to write at least one block of a first block size, wherein the disk drive is configured to store blocks of a second block size that is larger in size than the first block size. The disk drive stores a plurality of emulated blocks of the first block size in each block of the second block size. The disk drive generates a read error, in response to reading a selected block of the second block size in which the at least block of the first block size is to be written via an emulation. The disk drive performs a destructive write of selected emulated blocks of the first block size that caused the read error to be generated. The disk drive writes the at least one block of the first block size in the selected block of the second block size. | 02-21-2013 |
20130055015 | METHOD FOR REPAIRING COMMUNICATION ABNORMALITY BETWEEN DATA CARD AND HOST AND DATA CARD - An embodiment of the present invention provides a method for repairing a communication abnormality between a data card and a host. when an abnormality occurs on communication between a data card and a host, executing repair data in the data card to repair the operating system of the host; resetting the data card and reporting an optical disk descriptor; and detecting, by the data card, the type of the operating system of the host according to a received minicomputer system interface command. According to the embodiments of the present invention, in a process of communication between the data card and the host, when an abnormality occurs on the communication between the data card and the host and therefore the data card can no longer be used, the abnormality is able to be automatically repaired, thereby greatly improving repair efficiency and reducing a repair duration and repair complexity. | 02-28-2013 |
20130055016 | Session recovery during virtual mobile management - Disclosed is a method to enable wireless remote session recovery for a wireless device. Should a wireless device encounter a broken communication link during a virtual mobile management (VMM) operation, a method of automatic session recovery is disclosed which executes from a management console through a communication end-point gateway server in order to reconnect the mobile device. Under control of the session reconnection method, the device client listener and tools of wireless device re-establishes the signal and bearer links with a management console, over the air through the communication end-point gateway server (CEG). The communication utilizing the session recovery algorithm enables the wireless device to receive session information from the communication end-point gateway server, including the respective tools. | 02-28-2013 |
20130055017 | DEVICE AND METHOD FOR RESTORING INFORMATION IN A MAIN STORAGE UNIT - Disclosed is an device for restoring information in a main storage unit, wherein, if a malfunction occurs in a microcomputer, the microcomputer is made able to recover from the malfunction. The device comprises: a central processing unit comprising one or more registers; a rewritable first storage unit; a rewritable second storage unit; and storage unit management means. The storage unit management means stores restoration information consisting of storage unit information stored in the first storage unit and register information into the second storage unit, and then the storage unit management means restores the information in the first storage unit and the information in the corresponding one or more registers on the basis of the restoration information stored in the second storage unit. | 02-28-2013 |
20130061089 | EFFICIENT APPLICATION-AWARE DISASTER RECOVERY - Embodiments are directed to efficiently backing up portions of data and to performing a scoped data recovery. In an embodiment, a computer system preloads data images with data corresponding to various different software applications or operating systems. The computer system chunks the data images, so that each data image is divided into multiple data chunks, and where each data chunk is represented by a hash value. The computer system then receives, from a user, portions of delta data representing data differences between the received user data and the data in the preloaded data images. The computer system also generates a logical backup representation that includes the data chunk hash values for the preloaded data images as well as the delta data received from the user. This logical representation allows restoration of the user's data using only the hash values and the delta data. | 03-07-2013 |
20130067276 | SOFTWARE AND METHODS FOR RECOVERING A NETWORK NODE THAT HAS EXPERIENCED A FAULT - A method and system of recovering a system that has experienced a fault includes a backup device to enable access of a network through the interface in response to the fault. The system includes a main operational portion that controls operation of the system under normal conditions. However, if a fault occurs, then the backup device can be selected to take over control of the system so that data can be retrieved from a backup storage to recover the system. The backup device includes software and/or hardware components to enable the system to access a network even though the main operational portion may not be functioning properly. | 03-14-2013 |
20130073902 | FILE HANDLING FOR NAMING CONFLICTS - A file operations engine is provided that manages many user interactions with their files via a computer system. The operation engine may provide a user with the option to keep both files that have a file name conflict. It may further permit the user to rename a file involved with a file name conflict. The operations engine may also automatically rename one of the files of a file name conflict by appending a character to a root of the filename. The character may include the lowest integer available for the root in a destination for the files. The operations engine may provide the option to keep both files as part of a pre-calculation of potential errors for a requested operation. The operations engine may place file name conflicts in an error queue and permit the user to select an option to keep both files after the conflict is encountered. | 03-21-2013 |
20130073903 | EXCEPTION NOTIFICATION SYSTEM AND METHOD - A system and method for distributing prepaid cash alternatives and resolving exceptions related to the sale of prepaid cash alternatives such as traveler's cheques or prepaid cards. Reports of sales may be reviewed to identify exceptions, and information explaining the exceptions may be made available electronically. Sellers may be notified of exceptions by e-mail, which may include a link or address to information explaining the exceptions. The information may be provided in real time through a secure site on a network, such as the Internet. A company may contract with business partners to sell the prepaid cash alternatives to customers, and the business partners may report the sales to the company via reports. After being notified of exceptions, business partners may provide corrected information or new information to resolve the exceptions. | 03-21-2013 |
20130080830 | SETTING DATA STORAGE FOR SEMICONDUCTOR DEVICES INCLUDING MEMORY DEVICES AND SYSTEMS - A setting data storage circuit includes a setting data storage block configured to store setting data; an access unit configured to access the setting data of the setting data storage block; an error detection unit configured to detect an error in the setting data; and an error recovery unit configured to recover an error in the setting data storage block when the error detection unit detects an error. | 03-28-2013 |
20130080831 | STORAGE APPARATUS, SYSTEM, AND CONTROL METHOD - A storage apparatus includes a storage drive which writes and reads out a block of data with respect to a storage medium loaded on the storage apparatus, a processor which executes access control on a plurality of volumes assigned to the storage medium and a memory which stores a piece of management information that includes a piece of information indicating a usage frequency of each of the volumes. The processor executes a procedure including: determining a reallocation target volume from among a plurality of volumes assigned to the storage medium based on the management information, and moving the data of the reallocation target volume to a reallocation destination storage medium which is different from the storage medium. | 03-28-2013 |
20130086418 | DATA PROCESSING FAILURE RECOVERY METHOD, SYSTEM AND PROGRAM - When reproducing the running state after a failure has occurred in stream data processing, all window operations are used while minimizing the storage amount necessary for obtaining backup data. While an operator is performing stream data processing in response to a query, a query analysis unit analyzes the operator, which holds the running state of the window, etc., and the recovery points of said operator. When obtaining backup data, a backup data management unit manages the capacity necessary to obtain snapshots of the analyzed recovery points, calculates the storage area capacity needed for backing up input data up to each recovery point and the storage area capacity needed to obtain a snapshot for a window that cannot be reproduced in that way, and records the execution state by selecting a recovery point which minimizes the total value of necessary storage capacity. | 04-04-2013 |
20130091381 | TERMINAL RECOVERY METHOD, TERMINAL RECOVERY SYSTEM, AND PROGRAM FOR THE SAME - The operator terminal receives input of the terminal status of the recovery target terminal | 04-11-2013 |
20130117605 | CORRECTIVE ACTIONS BASED ON PROBABILITIES - Techniques for taking corrective action based on probabilities are provided. Request messages may include a size of a data packet and a stated issue interval. A probability of taking corrective action based on the size of the data packet, the stated issue interval, and a target issue interval may be retrieved. Corrective action may be taken with the retrieved probability. | 05-09-2013 |
20130117606 | DATA PROTECTION FROM WRITE FAILURES IN NONVOLATILE MEMORY - A method includes calculating redundancy information over a set of data items, and sending the data items for storage in a memory. The redundancy information is retained only until the data items are written successfully in the memory, and then discarded. The data items are recovered using the redundancy information upon a failure in writing the data items to the memory. | 05-09-2013 |
20130132771 | METHOD AND APPARATUS FOR PROVIDING INFORMATION CONSISTENCY IN DISTRIBUTED COMPUTING ENVIRONMENTS - An approach is provided for providing information consistency in distributed computing environments. An information consistency platform determines one or more finite state machines based, at least in part, on one or more states of one or more respective steps of at least one update operation operating on one or more data items, wherein the one or more finite state machines executes, at least in part, the at least one update operation, one or more other operations, or a combination thereof on the one or more data items. | 05-23-2013 |
20130132772 | EMBEDDED MEMORY WITH SYSTEM REPAIR DATA AND SYSTEM REPAIR METHOD THEREFOR - An embedded memory with system repair data is provided. The embedded memory includes a flash memory unit, a storage unit, and a control unit. The flash memory unit stores an in-system programming (ISP) code. The storage unit stores a system repair code. The system repair code is used for rebuilding the ISP code. The control unit is electrically connected to the flash memory unit and the storage unit. The control unit determines whether the ISP code has been broken and reads the system repair code to rebuild the ISP code when the ISP code has been broken. A system repair method for the embedded memory is also provided, which comprises the steps of determining that the ISP code stored in the flash memory unit has been broken, reading the system repair code stored in the memory unit, and rebuilding the ISP code according to the system repair code. | 05-23-2013 |
20130132773 | FAST RESOURCE RECOVERY AFTER THREAD CRASH - A resource recovery system may maintain a counter in memory that indicates a number of times one or more threads of execution, which use shared resources, have crashed. The system may associate a first value of the counter with a resource allocated to a thread of the one or more threads, and may set an indicator associated with the thread to indicate whether the thread has crashed. The system may determine whether to re-allocate the resource to the thread based on the first value of the counter associated with the resource and based on the indicator associated with the thread. | 05-23-2013 |
20130151893 | CUSTOMER PREMISES EQUIPMENT DIAGNOSTIC, RECOVERY, AND REPORTING SYSTEMS AND METHODS - Exemplary customer premises equipment (“CPE”) diagnostic, recovery, and reporting systems and methods are disclosed herein. An exemplary method includes a technical support server subsystem aggregating, over time, technical support data representing technical issues of CPE devices and operations performed to resolve the technical issues, identifying a subset of the technical support data, and providing the identified subset of the technical support data to a CPE device for local storage by the CPE device, locally stored technical support data configured to be used by the CPE device to self-recover from a future technical issue associated with the CPE device. In certain embodiments, the CPE device may be configured to function as a media server device and/or as an intermediary technical support device at a customer premises. Corresponding methods and systems are also disclosed. | 06-13-2013 |
20130159767 | CLIENT SELECTABLE SERVER-SIDE ERROR RESOLUTION - An illustrative embodiment of a computer-implemented process for client selectable server-side data error resolutions receives a request from a client to perform an action on a server, identifies a data error during performance of the action of the request and generates a response including an error description and a resolution subset for the identified error. The computer-implemented process further sends a response to the client, receives a selected resolution returned from the client, and responsive to a determination the selected resolution associated with the token returned executes on the server, executes the selected resolution, associated with the token returned, on the server to correct the data error. | 06-20-2013 |
20130166948 | UNFUSING A FAILING PART OF AN OPERATOR GRAPH - Techniques for managing a fused processing element are described. Embodiments receive streaming data to be processed by a plurality of processing elements. Additionally, an operator graph of the plurality of processing elements is established. The operator graph defines at least one execution path and wherein at least one of the processing elements of the operator graph is configured to receive data from at least one upstream processing element and transmit data to at least one downstream processing element. Embodiments detect an error condition has been satisfied at a first one of the plurality of processing elements, wherein the first processing element contains a plurality of fused operators. At least one of the plurality of fused operators is selected for removal from the first processing element. Embodiments then remove the selected at least one fused operator from the first processing element. | 06-27-2013 |
20130166949 | SEMICONDUCTOR MEMORY DEVICE AND METHOD FOR OPERATING THE SAME - A semiconductor memory device includes, a memory cell array configured to include a plurality of memory cells each having a plurality of logic pages, an error detector configured to detect a recovery target data among the data stored in the memory cell array, and output a logic page information of the recovery target data, a data recoverer configured to recover the recovery target data by using adjustment of a read reference voltage in response to the logic page information of the recovery target data, and a page buffer configured to read the recovery target data output from the memory cell array and write a recovered data output from the data recoverer in the memory cell array. | 06-27-2013 |
20130173957 | Peripheral Component Interconnect Express Root Port Mirroring - An information handling system includes a peripheral component interconnect express root complex, a basic input output system, and a root complex mirroring block. The peripheral component interconnect express root complex includes a plurality of peripheral component interconnect express ports. The basic input output system is in communication with the peripheral component interconnect express root complex, and is configured to detect a peripheral component interconnect express adaptor configuration, and to set a peripheral component interconnect express mirroring setting based on the peripheral component interconnect express adaptor configuration. The root complex mirroring block is in communication with the basic input output system, and is configured to mirror data between a first peripheral component interconnect express adaptor and a second peripheral component interconnect express adaptor based on the peripheral component interconnect express mirroring setting. | 07-04-2013 |
20130179728 | REPAIR METHOD AND DEVICE FOR ABNORMAL-ERASE MEMORY BLOCK OF NON-VOLATILE FLASH MEMORY - A repair method for an abnormal-erase memory block of a non-volatile flash memory is provided. The method includes steps of: sequentially scanning bit data in a page of a block when reading data in a NAND flash; determining whether the page is an abnormal-erase page; setting logic “0” bit data in the page to logic “1” when the page is an abnormal-erase page; and re-erasing the block. | 07-11-2013 |
20130185590 | Method in a Gaming Machine for Providing Data Recovery - Disclosed is a gaming machine capable of data restoration. | 07-18-2013 |
20130191685 | PER-RANK CHANNEL MARKING IN A MEMORY SYSTEM - Channel marking is provided in a memory system that includes a memory channel with a plurality of memory devices. The memory devices are arranged into a first group of memory devices and a second group of memory devices. The memory system is configured to perform a method that includes determining that more than a threshold number of memory devices in the first group are failing. An error correction code (ECC) is configured to compensate for errors associated with memory devices in the first group on the memory channel and to perform error correction on errors associated with memory devices in the second group on the memory channel. | 07-25-2013 |
20130191686 | MOBILE TERMINAL AND CONTROLLING METHOD THEREOF - A mobile terminal and controlling method thereof are disclosed, by which restoration and backup operations are performed for the mobile terminal. The present invention includes backing up data for at least one application included in a backup target terminal and restoring the data for the at least one application in a restoration target terminal, the restoring including the performing a basic restoration operation on the data related to the at least one application, determining whether a previously provided restoration error occurs in a data restoring process for a specific application among the at least one or more applications, and performing a restoration operation corresponding to the restoration error in accordance with a result of the determining. | 07-25-2013 |
20130212430 | ELECTRONIC DEVICE WITH FIRMWARE RECOVERY FUNCTION AND METHOD FOR RECOVERING FIRMWARE - An electronic device with firmware recovery function includes a connecting port to connect the electronic device to an external device and a BMC. The BMC includes a firmware memory storing firmware data of the BMC and a microprocessor. The microprocessor determines whether the BMC is able to execute the firmware data in the firmware memory, and determines whether a download command for downloading firmware data is received from the external device when the BMC is not able to execute the firmware data in the firmware memory. The microprocessor further reads the firmware data from the external device into a memory space of the microprocessor upon receiving the download command, and recovers the firmware data in the firmware memory by writing the firmware data from the memory space of the microprocessor into the firmware memory. A related method is also provided. | 08-15-2013 |
20130212431 | METHOD AND SYSTEM FOR PROVIDING A SMART MEMORY ARCHITECTURE - A smart memory system preferably includes a memory including one or more memory chips, and a processor including one or more memory processor chips. The processor may include a common address/data/control memory bus that is configured to provide an asynchronous handshaking interface between the memory array and the memory processor. The processor can offload error data from the memory chip for analysis, and can store poor retention bit address information for memory refreshing in a non-volatile error retention memory. Program logic can also be included for memory address re-configuration. Power management logic can also be included, which may have a process-voltage-temperature compensation voltage generator for providing stable and constant read currents. An asynchronous handshaking interface is provided between the memory array and the memory processor. Write error tagging and write verification circuits can also be included. | 08-15-2013 |
20130227347 | STORAGE DEVICE - A storage device is provided which includes a nonvolatile memory device and a controller configured to write meta information, indicating that a transfer of unit data is completed, in a buffer memory when the unit data is transferred to the buffer memory from the nonvolatile memory device. | 08-29-2013 |
20130238931 | NONVOLATILE SEMICONDUCTOR STORAGE DEVICE HAVING ENCRYPTING ARITHMETIC DEVICE - According to one embodiment, a nonvolatile semiconductor storage device includes an encrypting circuit for operating in a predetermined encrypting system, a memory cell array preliminarily storing complementary data to be used in the operation, and a page buffer having a first region for storing the data being read out from the memory cell array, and a second region used when executing the operation. | 09-12-2013 |
20130246843 | METHOD AND SYSTEM FOR PROVIDING HIGH AVAILABILITY TO DISTRIBUTED COMPUTER APPLICATIONS - Method, system, apparatus and/or computer program for achieving transparent integration of high-availability services for distributed application programs. Loss-less migration of sub-programs from their respective primary nodes to backup nodes is performed transparently to a client which is connected to the primary node. Migration is performed by high-availability services which are configured for injecting registration codes, registering distributed applications, detecting execution failures, executing from backup nodes in response to failure, and other services. High-availability application services can be utilized by distributed applications having any desired number of sub-programs without the need of modifying or recompiling the application program and without the need of a custom loader. In one example embodiment, a transport driver is responsible for receiving messages, halting and flushing of messages, and for issuing messages directing sub-programs to continue after checkpointing. | 09-19-2013 |
20130246844 | CONTROLLER AND CONTROL METHOD FOR A CONTROLLER - A controller and a control method for a controller can simplify application development and can improve the performance of device control processes. When a request is received from an application | 09-19-2013 |
20130262923 | EFFICIENT APPLICATION MANAGEMENT IN A CLOUD WITH FAILURES - A method of deploying a software application on the Internet cloud that is failure-tolerant includes identifying those aspects of a software application that need to be persisted in the event of failure, and those aspects of the application that do not need to be persisted, and deploying the application where aspects that need to be persisted are deployed to persistent storage and aspects that aspects that do not need to be persisted are deployed ton non-persistent virtual partitions, where when a virtual partition or an application component fails, an instance of the application is recreatable from those application aspects that were deployed to persistent storage. | 10-03-2013 |
20130262924 | METHOD AND SYSTEM FOR STORAGE MANAGEMENT - Multiple storage apparatuses are provided, at least part of which are individually incorporated into one of storage groups. Each of multiple control apparatuses is configured to, when assigned one or more of the storage groups each including one or more of the storage apparatuses, control data storage by storing data designating each assigned storage group redundantly in the storage apparatuses of the assigned storage group. An information processing apparatus is configured to, when a storage group with data redundancy being lost is detected, make a change in control apparatus assignment for the storage groups in such a manner that a storage group different from the detected storage group is not assigned to a control apparatus with the detected storage group assigned thereto. Subsequently, the information processing apparatus causes the control apparatus to execute a process of restoring the data redundancy of the detected storage group. | 10-03-2013 |
20130268805 | MONITORING SYSTEM AND METHOD - A remote computer monitors virtual machines in cloud servers of a data center. The remote computer sends a monitoring program to cloud servers according to a configuration file and consists of a cloud server cluster using the monitoring program. The remote computer obtains parameters of each cloud server from the cloud server cluster by the monitoring program. The remote computer searches for an image file corresponding to a virtual machine installed in the cloud server from the remote computer, if the cloud server works abnormally. The remote computer sends the searched image file to another cloud server in the cloud server cluster and installs the virtual machine in another cloud server according to the searched image file. | 10-10-2013 |
20130268806 | SYSTEM, METHOD, AND APPARATUS FOR PERFORMING FAULT DIAGNOSIS FOR AN ELECTRONIC APPLIANCE - A fault diagnosis system, method, and apparatus are provided that diagnose a broken appliance and repair the broken appliance using voice communication. The method includes generating monitoring information, based on a current state of the appliance; generating first mix data by mixing the monitoring information and sound data; outputting the first mix data to a mobile communication terminal; receiving second mix data from the mobile communication terminal, when the monitoring information indicates that the appliance has a fault; extracting recovery data from the second mix data; and repairing the fault of the appliance using the recovery data. | 10-10-2013 |
20130275803 | INFORMATION GOVERNANCE CROWD SOURCING - A method, computer program product, and system for information governance crowd sourcing by, responsive to receiving a data quality exception identifying one or more data quality errors in a data store, identifying a performance level required to correct the data quality errors, selecting, from a crowd hierarchy, a first one or more crowds meeting the defined performance level, wherein the crowd hierarchy ranks the performance of one or more crowds, and routing, by operation of one or more computer processors, the one or more data quality errors to the selected crowds for correction. | 10-17-2013 |
20130275804 | NoC-Based Adaptive Error Correction Apparatus - An NoC-based error correction apparatus capable of supporting a network interface that transmits a flit between Tx and Rx IP-elements includes: an encoder configured to receive a k-bit flit from the Tx IP-element and encodes the k-bit flit into n-bit data; and a decoder configured to receive the n-bit data, decode the n-bit data into the k-bit flit, and output the k-bit flit, the decoder having an error correction circuit for correcting an error in the n-bit data, wherein a t-bit adaptive error correction code having a variable error correction capability depending on the number of bits (n) of the received data is applied to the error correction circuit, the error correction capability is proportional to the number of bits (n) of the received data, and the t-bit error correction code has the number of bits proportional to the number of bits (n) of the received data. | 10-17-2013 |
20130283096 | MECHANISM FOR FACILITATING CONVERSION AND CORRECTION OF DATA TYPES FOR DYNAMIC LIGHTWEIGHT OBJECTS VIA A USER INTERFACE IN AN ON-DEMAND SERVICES ENVIRONMENT - In accordance with embodiments, there are provided mechanisms and methods for facilitating conversion and correction of data types for dynamic lightweight objects via a user interface in an on-demand services environment. In one embodiment and by way of example, a method includes receiving a first data file at a first computing device, identifying data types in the first data file that correspond to dynamic custom objects associated with the first data file, and linking the data types to their corresponding dynamic custom objects. | 10-24-2013 |
20130290777 | STORAGE SYSTEM AND STORAGE CONTROL APPARATUS - A storage system has a RAID group configured by storage media, a system controller with a processor, a buffer memory coupled to storage devices and the processor by a communication network, and a cache memory coupled to the processor and the buffer memory by the network. A processor that stores first data, which is related to a write request from a host computer, in a cache memory, specifies a first storage device for storing data before update, which is data obtained before updating the first data, and transfers the first data to the specified first storage device. A first device controller transmits the first data and second data based on the data before update, from the first storage device to the system controller. The processor stores the second data in the buffer memory, specifies a second storage device, and transfers the stored second data to the specified second storage device. | 10-31-2013 |
20130290778 | RESTORING FROM A LEGACY OS ENVIRONMENT TO A UEFI PRE-BOOT ENVIRONMENT - Restoring from a legacy OS environment to a Unified Extensible Firmware Interface (UEFI) pre-boot environment, including: storing, under the UEFI pre-boot environment, context in the UEFI pre-boot environment that needs to be preserved, where the context in the UEFI pre-boot environment that needs to be preserved includes CPU execution context; restoring a first portion of the CPU execution context in response to the UEFI pre-boot environment failing to load the legacy OS; making a CPU associated with the UEFI pre-boot environment enter into System Management Mode, and restoring a second portion of the CPU execution context under the System Management Mode; and exiting from CPU System Management Mode, thereby returning to the UEFI pre-boot environment. | 10-31-2013 |
20130297968 | NONVOLATILE MEMORY CONTROLLER AND A NONVOLATILE MEMORY SYSTEM - A nonvolatile memory (NVM) controller that includes a command decoder that receives a command from a host and outputs an index in response to the command, a program memory that stores a command mapping table including address information for accessing a program corresponding to the command and a processor that receives an index from the command decoder and controls the address information to be output in response to the index. | 11-07-2013 |
20130297969 | FILE MANAGEMENT METHOD AND APPARATUS FOR HYBRID STORAGE SYSTEM - The present invention relates to a method of improving file write performance and providing availability in a hybrid storage system. When a file writing target server information request signal is received from a client, any one cache server is selected in consideration of storage spaces of cache servers, information about the selected cache server to the client is transmitted so that the client stores the file in the selected cache server. When a duplicate writing target server information request is received from the selected cache server, any one first data server is selected in consideration of storage spaces of respective data servers, information about the selected first data server is transmitted to the cache server so that the cache server stores a duplicate of the file in the first data server. Information about storage of the file and the duplicate is received, and then file metadata is stored. | 11-07-2013 |
20130297970 | FAULT TOLERANCE AND FAILOVER USING ACTIVE COPY-CAT - Fault tolerant operation is disclosed for a primary instance, such as a process, thread, application, processor, etc., using an active copy-cat instance, a.k.a. backup instance, that mirrors operations in the primary instance, but only after those operations have successfully completed in the primary instance. Fault tolerant logic monitors inputs and outputs of the primary instance and gates those inputs to the backup instance once a given input has been processed. The outputs of the backup instance are then compared with the outputs of the primary instance to ensure correct operation. The disclosed embodiments further relate to fault tolerant failover mechanism allowing the backup instance to take over for the primary instance in a fault situation wherein the primary and backup instances are loosely coupled, i.e. they need not be aware that they are operating in a fault tolerant environment. | 11-07-2013 |
20130297971 | DISASTER RECOVERY FAILBACK - Pursuant to execution of a predetermined failback policy, if a storage device is not preexistent in a source storage system operable in the computing environment, and an owner of the storage device is one of a DR storage system and a storage system having previously withdrawn from a replication grid, and the DR storage system has authorization to transfer ownership of the storage device by a replacement operation, and an instance of the storage device is replicated to the source storage system to generate a replicated instance of the storage device on the source storage system. | 11-07-2013 |
20130297972 | DEPENDABILITY MAINTENANCE SYSTEM, CHANGE ACCOMMODATION CYCLE EXECUTION DEVICE, FAILURE RESPONSE CYCLE EXECUTION DEVICE, METHOD FOR CONTROLLING DEPENDABILITY MAINTENANCE SYSTEM, CONTROL PROGRAM, AND COMPUTER-READABLE STORAGE MEDIUM STORING THE CONTROL PROGRAM - A workspace computer and/or a runtime computer of the present invention determines a D value quantitatively indicative of a value of dependability of a target system, in accordance with dependability description data indicative of a requirement and specification regarding the dependability of the target system. | 11-07-2013 |
20130305087 | METHOD AND SYSTEM FOR REAL-TIME ERROR MITIGATION - A method of organizing on-chip data memory in an embedded system-on-chip platform whereon a deterministic application needs to meet a guaranteed constraint on its functional system behavior is disclosed. In one aspect, the method includes: a) dividing the deterministic application into blocks one of which corresponds to a part of a subtask of the application, the block receiving input data and/or generating output data and including internal intermediate data for transforming the input data into the output data, b) splitting the internal intermediate data into state and non-state data, and c) putting the non-state data and a part of the state data in a protected buffering module being part of the data memory and being provided with an error detection and correction module, so that they are available for mitigating the effect of faults on the functional system behavior on-line while meeting the at least one guaranteed constraint. | 11-14-2013 |
20130311823 | RESILIENCY TO MEMORY FAILURES IN COMPUTER SYSTEMS - A resiliency system detects and corrects memory errors reported by a memory system of a computing system using previously stored error correction information. When a program stores data into a memory location, the resiliency system executing on the computing system generates and stores error correction information. When the program then executes a load instruction to retrieve the data from the memory location, the load instruction completes normally if there is no memory error. If, however, there is a memory error, the computing system passes control to the resiliency system (e.g., via a trap) to handle the memory error. The resiliency system retrieves the error correction information for the memory location and re-creates the data of the memory location. The resiliency system stores the data as if the load instruction had completed normally and passes control to the next instruction of the program. | 11-21-2013 |
20130311824 | METHOD AND SYSTEM FOR CLUSTER RESOURCE MANAGEMENT IN A VIRTUALIZED COMPUTING ENVIRONMENT - Methods and systems for cluster resource management in virtualized computing environments are described. VM spares are used to reserve (or help discover or otherwise obtain) a set of computing resources for a VM. While VM spares may be used for a variety of scenarios, particular uses of VM spares include using spares to ensure resource availability for requests to power on VMs as well as for discovering, obtaining, and defragmenting the resources and VMs on a cluster, e.g., in response to requests to reserve resources for a VM or to respond to a notification of a failure for a given VM. | 11-21-2013 |
20130318393 | SOLID-STATE MASS STORAGE DEVICE AND METHODS OF OPERATION - A volatile memory-based solid-state mass storage device adapted for use in a host system as a storage tier. The storage device includes a substrate on which is mounted a system interface, a control circuitry, and a plurality of substantially identical random access memory components that define at least one memory array. Each memory component of the memory array has associated therewith an input/output path, a width of the input/output path, and a burst length. The storage device is connected to the host system and uses parity information to provide redundancy data sufficient to correct a catastrophic failure of one of the memory components. The number of correctable bits to correct the catastrophic failure of one of the memory components equals the product of the width of the input/output path thereof and the burst length thereof. | 11-28-2013 |
20130318394 | EMBEDDED CONTROLLER FIRMWARE MANAGEMENT - An embedded controller includes and a microprocessor coupled to the memory. The memory includes a working area for storing embedded controller firmware and a recovery area for storing a copy of the embedded controller firmware. When the embedded controller firmware stored in the working area is corrupt, the microprocessor retrieves the copy of the embedded controller firmware from the recovery area and restores the embedded controller firmware to the working area. The microprocessor can then read and execute the embedded controller firmware from the working area. An embedded controller firmware management method is also provided. | 11-28-2013 |
20130318395 | RECONSTRUCTING CODEWORDS USING A SIDE CHANNEL - Embodiments of the present disclosure describe device, methods, computer-readable media and system configurations for decoding codewords using a side channel. In various embodiments, a memory controller may be configured to determine that m of n die of non-volatile memory (“NVM”) have failed iterative decoding. In various embodiments, the memory controller may be further configured to generate a side channel from n-m non-failed die and the m failed die other than a first failed die. In various embodiments, the memory controller may be further configured to reconstruct, using iterative decoding, a codeword stored on the first failed die of the m failed die based on the generated side channel and on soft input to an attempt to iteratively decode data stored on the first failed die. In various embodiments, the iterative decoding may include low-density parity-check decoding. Other embodiments may be described and/or claimed. | 11-28-2013 |
20130326271 | HANDLING OF INITIALLY UNEXECUTABLE INSTRUCTIONS - According to example configurations, a monitor resource monitors hardware executing a software program. In response to detecting occurrence of a failure associated with an attempted execution of a given software instruction in the software program, the hardware generates a notification. The monitor resource receives the signal generated by the hardware. In response to receiving the signal, the monitor resource initiates computation of the data value associated with the given software instruction. For example, via a communication from the monitor resource to the hardware executing the software program, the monitor resource initiates computation of the value associated with the given instruction by directing the hardware to initiate execution of a specific routine. By way of example, the monitor resource can initiate a lazy computation based on execution of a fault handling function or subroutine to compute a value for the failed instruction. | 12-05-2013 |
20130326272 | STORAGE SYSTEM AND METHOD OF OPERATING THEREOF - Storage system(s) for storing data in physical storage in a recurring manner, method(s) of operating thereof, and corresponding computer program product(s). For example, a possible method can include: upon start of a storage recurrence, destaging dirty data which had been accommodated in the cache memory prior to the start of said storage recurrence thus giving rise to destaged data group, wherein destaging is provided with no overwriting of at least superseded data destaged before starting said storage recurrence whilst enabling retaining metadata indicative of location of said superseded data in the physical storage space; accommodating data obtained in said cache memory subsequent to the start of said storage recurrence whilst preventing said data from being destaged during said storage recurrence, thus giving rise to accommodated data group; and registering a point-in-time indicative of successful destaging of the destaged data group, thereby providing an order-preservation consistency indication corresponding to said recurrence. | 12-05-2013 |
20130326273 | VIRTUAL REPAIR OF DIGITAL MEDIA - Embodiments described herein are directed to a virtual repair of digital media using a virtual repair service. Digital media stored on a digital media device is read using a media player. A request is received by a virtual repair unit from the media player to perform a virtual repair of a segment of unreadable digital content of the digital media. The virtual repair unit retrieves a readable copy of the digital content corresponding to the segment of unreadable digital content identified in the request from a media repository using the virtual repair unit. The virtual repair unit transmits the readable copy of the digital content to the media player for insertion into a buffer of the media player. | 12-05-2013 |
20130332770 | ACTIVE/PASSIVE DATABASE MANAGEMENT ACROSS CLUSTERS - A primary active manager can manage a first copy of a database in a first computer system cluster according to a set of management rules that provide for an active copy and one or more passive copies of the database at a given time. The primary active manager can also manage a second copy of the database in a second computer system cluster according to the rules. The rules can allow the first copy of the database or the second copy of the database to be the active copy if one or more criterion in the rules is met for that active copy. The first copy can be designated as the active copy and the second copy can be designated as a passive copy. A failure of the first copy can be detected, and in response, the second copy can be automatically designated as the active copy. | 12-12-2013 |
20130332771 | METHODS AND APPARATUS FOR VIRTUAL MACHINE RECOVERY - Methods and apparatus for recovery of virtual machine failure. A succession of data images is captured, with each of the data images comprising an operating system of the virtual machine. The data images are images of data elements chosen based at least in part on their suitability for virtual machine restoration. Upon detection of a virtual machine failure, an attempt is made to restore the virtual machine using the highest ranked. If the attempt fails, further attempts are made using lower ranked data images, until an attempt is successful or all available data images have been used. | 12-12-2013 |
20130332772 | Registration Status Management for Endpoint Devices - A registration status manager may poll a user device, such as a session initiation protocol (SIP) endpoint device, for a registration state value indicative of its registration state. The registration status manager may receive the registration state value and determine that it indicates a registration state error such as an out-of-service no dial tone (NDT) condition. The registration status manager may determine a possible cause for failure associated with the registration state error. Subsequently, the registration status manager may determine a possible solution associated with the possible cause for failure. | 12-12-2013 |
20130339787 | SYSTEMATIC FAILURE REMEDIATION - Aspects of the present invention provide a tool for analyzing and remediating an update-related failure. In an embodiment, a failure state of a computer system that has been arrived at as a result of an update is captured. A semantic diff that includes the difference between the failure state and at least one of an original state or a completion state is then computed. This semantic diff is transformed into a feature vector format. Then the transformed semantic diff is analyzed to determine a remediation for the update. Failure and/or resolution signatures can be constructed using the semantic diff and contextual data, and these signatures can be used in comparison and analysis of failures and resolutions. | 12-19-2013 |
20130346796 | INFORMATION PROCESSING APPARATUS, PROGRAM UPDATE METHOD, AND PROGRAM - There is provided an information processing apparatus which is equipped with: an identifying unit configured to identify an update-object program which is an object of an update; an acquiring unit configured to, in preparation for a failure of the update of the update-object program, acquire from an external device a restoration program for restoring a state of the update-object program to a state before the update; an update unit configured to update the update-object program after the acquiring unit acquired the restoration program from the external device; and a restoring unit configured to, in the case of the failure of the update of the update-object program by the update unit, restore the state of the update-object program to the state before the update, on the basis of the restoration program acquired by the acquiring unit. | 12-26-2013 |
20140006853 | RECOVERING A VOLUME TABLE AND DATA SETS FROM A CORRUPTED VOLUME | 01-02-2014 |
20140006854 | Resolution of System Hang due to Filesystem Corruption | 01-02-2014 |
20140006855 | INFORMATION PROCESSING METHOD AND APPARATUS FOR RECOVERYING STATE OF SYSTEM | 01-02-2014 |
20140006856 | OPTIMIZED RECOVERY | 01-02-2014 |
20140013155 | System and method for facilitating recovery from a document creation error - A system and method for facilitating recovery from an error occurring during creation or alteration of a target document from a form or template. The method may involve gathering some or all input collateral (e.g., the document template, input data, instructions for creating the document) and adding it to the target document. If the target document is not created, the input collateral may be placed in an error document. The target or error document is dispatched to the user and may also be sent to support personnel (e.g., help desk, technical support personnel) or forward to such personnel by the user. Capturing the document creation conditions and parameters in the target or error document allows the support personnel (or user) to diagnose and/or recover from the error without expending the time and effort that would be required to gather the separate input collateral items, log files, configuration parameters, etc. | 01-09-2014 |
20140032962 | System and Methods for Self-Healing From Operating System Faults in Kernel/Supervisory Mode - A method, apparatus, and computing system are provided for self-healing from a fault in an operating system (OS) without crashing the OS. In one example, the method includes detecting, isolating, and repairing a faulty kernel code module without affecting the run-time operation of other, properly function, portions of the OS. In another example, the apparatus comprises a variety of modules, including, for instance, a kernel level fault detector and a kernel level fault manager, that are configured to execute steps of the method. In another example, the computing system includes an OS that has at least some modularized kernel code sections, and a self-healing code for detecting, isolating, and repairing failures occurring in one or more of the modularized kernel code sections without crashing the OS. | 01-30-2014 |
20140032963 | MESSAGE SEQUENCE GENERATION METHOD AND MESSAGE SEQUENCE GENERATION DEVICE - A message sequence generation method and a message sequence generation device, by which a message sequence with an error handling added thereto can be efficiently generated. The method includes setting an action for a specific phenomenon in the phenomenon causal relationship model, associating each element included in the message sequence information with each phenomenon to generate element/phenomenon correspondence information, storing the element/phenomenon correspondence information into a memory device, and acquiring the action set for the phenomenon corresponding to each element and the action set for another phenomenon caused by the phenomenon, from the element/phenomenon correspondence information, and adding the actions to the element as an error handling. | 01-30-2014 |
20140040664 | METHOD OF CONTROLLING A SEMICONDUCTOR STORAGE DEVICE - A method of controlling a nonvolatile semiconductor memory includes patrolling a first pool including a plurality of blocks/units with a first frequency, and when a first block/unit in the first pool satisfies a first condition, assigning the first block/unit to a second pool. The method includes patrolling the second pool with a second frequency, the second frequency being higher than the first frequency, and when a second block/unit in the second pool satisfies a second condition, moving data stored in the second block/unit to a free block/unit. | 02-06-2014 |
20140047267 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR RECONSTRUCTING DATA RECEIVED BY A COMPUTER IN A MANNER THAT IS INDEPENDENT OF THE COMPUTER - A data reconstruction system, method and computer program product are provided. In use, one of a plurality of computers receiving data over a network is identified. In addition, the data received by the computer is reconstructed in a manner that is independent of the computer. | 02-13-2014 |
20140047268 | Systems, Methods, and Computer Program Products for Instant Recovery of Image Level Backups - Systems, methods, and computer program products are provided for instant recovery of a virtual machine (VM) from a compressed image level backup without fully extracting the image level backup file's contents to production storage. The method receives restore parameters and initializes a virtual storage. The method attaches the virtual storage to a hypervisor configured to launch a recovered VM. The method stores virtual disk data changes inflicted by a running operating system (OS), applications, and users in a changes storage. The method provides the ability to migrate the actual VM disk state (taking into account changed disk data blocks accumulated in changes storage) so as to prevent data loss resulting from the VM running during the recovery and accessing virtual storage, to production storage without downtime. In embodiments, the method displays receives restore parameters in an interactive interface and delivers the recovery results via an automated message, such as an email message. | 02-13-2014 |
20140053020 | SYSTEM FOR AND METHOD OF IMPROVING TRANSACTION PROCESSING AND FLOW-THROUGH - A system for and method improving order and transaction flow-though and processing. The method may include receiving an order request from a user corresponding to the order. The method may further include determining a set of order particulars associated with the user and the order for resolution against an external system for order fulfillment, and determining if any order particular is incorrect or missing. The method may also include identifying the missing or correct order particular, and updating the set of order particulars to include the missing or correct order particular without requesting missing or correct order particular from the user. The method may include transmitting the updated order particulars to the external system for order fulfillment. | 02-20-2014 |
20140053021 | AUTOMATIC CLASSIFICATION ADJUSTMENT OF RECORDED ACTIONS FOR AUTOMATION SCRIPT - A method for automatic revision of an automation script includes obtaining a sequence of at least one classified recorded action and an automation script, the automation script including a sub-sequence of the sequence of classified recorded actions, wherein each action is included in the automation script in accordance with the classification of that action. At least a portion of the automation script is executed. Upon failure of an action of the portion of the automation script to execute, an action of the sequence of classified recorded actions is reclassified, it is verified if the action that failed to execute executes successfully after the reclassifying, and the automation script is revised. Relating computer program product and data processing system are also disclosed. | 02-20-2014 |
20140059378 | METHOD OF SYSTEM RECOVERY OF CLIENT DEVICE, WIRELESS CONNECTION DEVICE AND COMPUTER PROGRAM - The present disclosure provides a technique of easily enabling recovering of a client device via wireless communication. In one embodiment, the configuration includes a wireless connection device that establishes wireless communication with the client device; obtains restoration data that is stored in advance in a specified storage; and sends the obtained restoration data via the wireless communication to the client device. | 02-27-2014 |
20140059379 | PROACTIVE RESOURCE RESERVATION FOR PROTECTING VIRTUAL MACHINES - A system for proactive resource reservation for protecting virtual machines. The system includes a cluster of hosts, wherein the cluster of hosts includes a master host, a first slave host, and one or more other slave hosts, and wherein the first slave host executes one or more virtual machines thereon. The first slave host is configured to identify a failure that impacts an ability of the one or more virtual machines to provide service, and calculate a list of impacted virtual machines. The master host is configured to receive a request to reserve resources on another host in the cluster of hosts to enable the impacted one or more virtual machines to failover, calculate a resource capacity among the cluster of hosts, determine whether the calculated resource capacity is sufficient to reserve the resources, and send an indication as to whether the resources are reserved. | 02-27-2014 |
20140059380 | PROTECTING PAIRED VIRTUAL MACHINES - A system for monitoring virtual machines includes a master host and a slave host. The slave host includes a primary virtual machine and a secondary virtual machine. The slave host is configured to identify a failure that impacts an ability of at least one of the primary virtual machine and the secondary virtual machine to provide service. If the failure is a Permanent Device Loss failure, the slave host is configured to terminate each impacted virtual machine. If the failure is an All Paths Down failure, the master host is configured to apply one of the following: a first remedy if the primary virtual machine is impacted and the secondary virtual machine is not impacted; a second remedy if the secondary virtual machine is impacted and the primary virtual machine is not impacted; or a third remedy if both the primary virtual machine and the secondary virtual machine are impacted. | 02-27-2014 |
20140068325 | TEST CASE RESULT PROCESSING - A computer-implemented method for test case result processing includes receiving, by a test case result processing logic in a processor of a computer, a test result from a test case that executes on the computer; determining, by the test case result processing logic based on a result description file, whether a result description corresponding to the received result exists in the result description file; based on the result description corresponding to the received result existing in the result description file, determining an action description associated with the result description based on an action definition file; and executing an action corresponding to the determined action description. | 03-06-2014 |
20140068326 | Systems and Methods for Automated Memory and Thread Execution Anomaly Detection in a Computer Network - Systems and methods are provided for detecting an anomaly in a computer that is part of a population of networked computers. Snapshots are received from a plurality of computers within the population of computers, where individual snapshots include a state of assets and runtime processes of a respective computer. An asset normalization model is generated from the snapshots and serves as a baseline model for detecting an anomaly in the state of assets and runtime processes of a respective computer. A snapshot from at least one of the computers is compared to the asset normalization model in order to determine whether an anomaly is present in a state of static assets and runtime processes of the at least one of the computers. | 03-06-2014 |
20140068327 | APPARATUS AND METHOD FOR MANAGING A HANG STATE OF A MOBILE TERMINAL - An apparatus and a method for managing a hang state of a mobile terminal are provided. The apparatus and method receives an input signal from a through an input device, such as a chip, independent of an Application Processor (AP) and detects and resolves the hang state. The apparatus includes an AP; an input device configured to receive an input and transmitting an input signal; an input processor configured to receive the input signal and transmit a notification signal to the AP; and a hang-state processor configured to determine that the AP is in a hang-state as the AP is not processing the input signal and the hang-state processor is further configured to remedy the hang-state of the AP, wherein upon receiving the notification signal the AP requests the input signal from the input processor. | 03-06-2014 |
20140068328 | SYSTEM AND METHOD FOR SYNCHORNISATION OF DATA AND RECOVERY OF FAILURES DURING SYNCHRONIZATION BETWEEN TWO SYSTEMS - The embodiments herein provide a system and method for synchronization of data and recovery of failures during synchronization between two systems. The system for executing synchronization between the source and target systems comprises a connector framework, a process framework, a mapping manager, a recovery manager, a conflict manager and a failure manager. A method for bidirectional data synchronizing and integrating involves keeping information about integration user in integration database for each entity and update along with update time and audit id, only when the system does not keep information about the created and updated entity. A method of synchronizing only the entities qualifying a criterion, a method for failure recovery from a correct point during integration process, a method for handling recovery for changes coming from multiple end points and a method for recovery during server shutdown are also provided. | 03-06-2014 |
20140075241 | RECOVERY CODE MANAGEMENT METHOD AND MEMORY SYSTEM USING SAME - A method managing execution of recovery code in a memory system includes; upon detecting a read error using a CPU and firmware to execute recovery code defining a read recovery operation including a read retry operation, during execution of the recovery code, generating a read request directed to the read retry operation, and immediately thereafter terminating execution of the recovery code, and thereafter, only upon receiving an asynchronous interrupt from the memory controller following completion of the read retry operation, the CPU resumes execution of the recovery code by the firmware, otherwise the CPU performs another task unrelated to execution of the recovery code. | 03-13-2014 |
20140082414 | Data Re-Protection in a Distributed Replicated Data Storage System - Data re-protection in a distributed replicated data storage system is disclosed. The method may be implemented on a server or controller. A method includes storing first data in a first zone and storing a replica of the first data in a second zone. The zones are at different, separate locations. When an actual or impending failure with the first data in the first zone is detected, the system automatically initiates transitioning to a copy of impacted data at the first zone obtained from the second zone. The transitioning includes creating a remote copy of the impacted data at the second zone within a local area network before transferring the copy to the first zone over a wide area network. The methods allow the system to return to a fully protected state faster than if the impacted data was transferred from the second zone to the first zone without making a copy at the second zone. | 03-20-2014 |
20140082415 | Invalidation Of Metadata Buffers - A quick buffer validity check can optionally be performed when a potential invalidity of the content of a buffer is identified. The identifying of the potential invalidity condition can include determining that a most recent lifecycle management event timestamp is more recent than a most recent buffer validity check timestamp for the buffer. To determine whether the buffer contents need to be refreshed, a list of the last changed timestamps for the constituent elements of the buffer can be compared to a new list. If the new list and the old list are not identical, the buffer can be rebuilt. | 03-20-2014 |
20140089733 | FILE RECORDING APPARATUS, FILE SYSTEM MANAGEMENT METHOD, FILE RECOVERY METHOD, AND CHANGER DRIVE - A file recording apparatus includes a drive and a control unit. The drive is configured to use, as a removable recording medium, a cartridge on which a non-volatile memory is mounted and in which one of a disk-shaped recording medium and a tape-shaped recording medium is stored. The control unit is configured to handle the drive as a storage device, and the control unit records a file unique number of a file in which a read error is caused in the non-volatile memory. | 03-27-2014 |
20140095928 | STORAGE CONTROL APPARATUS AND COMPUTER-READABLE RECORDING MEDIUM RECORDED WITH CONTROL PROGRAM - A storage control apparatus includes a detection unit that detects a soft error of a memory for setting information included in a programmable logic circuit, when the soft error is detected, a communication control unit that changes a state of a communication path between the communication device and an upper device to a busy state, and a recovery processing unit that performs recovery processing of the memory for setting information of the programmable logic circuit, thereby efficiently resolving a soft error of the programmable logic circuit. | 04-03-2014 |
20140101481 | PER-RANK CHANNEL MARKING IN A MEMORY SYSTEM - Channel marking is provided in a memory system that includes a memory channel with a plurality of memory devices. The memory devices are arranged into a first group of memory devices and a second group of memory devices. The memory system is configured to perform a method that includes determining that more than a threshold number of memory devices in the first group are failing. An error correction code (ECC) is configured to compensate for errors associated with memory devices in the first group on the memory channel and to perform error correction on errors associated with memory devices in the second group on the memory channel. | 04-10-2014 |
20140101482 | Systems and Methods for Repairing System Files - Systems and methods are provided for repairing system files. For example, a list of system files including file information of one or more first repairable system files are updated in real time; file information of a target file sent from a terminal is received; whether the target file is in need of repair is detected based on at least information associated with the list of system files; in response to the target file being in need of repair, a first repair strategy for the target file is determined based on at least information associated with a predetermined database of repair strategies and a file type of the target file; and the target file is repaired based on at least information associated with the first repair strategy. | 04-10-2014 |
20140108862 | CONFIRMING STORE-TO-LOAD FORWARDS - A processor includes a store queue that stores information representing store instructions. In response to retirement of a store instruction, the processor invalidates the corresponding entry in the store queue, thereby indicating that the entry is available to store a subsequent store instruction. The store address is not removed from the queue until the subsequent store instruction is stored. Accordingly, the store address is available for comparison to a dependent load address. | 04-17-2014 |
20140108863 | HANDLING FAILED TRANSACTION PEERS IN A DISTRIBUTED HASH TABLE - Data storage systems and methods for storing data are described herein. The storage system includes at least two data storage nodes for storing portions of a distributed hash table and related data. After a first node attempts to complete a write request at a second node and is unable to complete the request, the first node ceases responses to interactions from other nodes. Once the first node's failure to respond has caused a sufficient number of nodes to cease responding, the nodes enter a service mode to resolve the live lock. While in live lock, the nodes determine the oldest, unfulfilled request using a system-wide logical timestamp associated with write requests. Once the oldest request is determined, a removal vote to remove the non-responsive node from the group is initiated and, if other nodes agree, the non-responsive node is removed from the group of nodes. | 04-17-2014 |
20140115385 | SOLVABLE EXCEPTIONS - A task unit included in an application is executed. The task unit includes instructions for executing an application task. An exception is thrown by the task unit. A program fragment for resolving the exception is identified and used to obtain user input to resolve the exception. | 04-24-2014 |
20140115386 | SERVER AND METHOD FOR MANAGING SERVER - In a method for managing a server, when the server malfunctions, a present abnormality of the server is determined according to data from a memory of the server. A reason of the present abnormality is determined according to a preset reason list, in response to determining that the present abnormality is a hardware abnormality. Use of the abnormal hardware is stopped and an operating system of the server is controlled to restart. Information of the abnormal hardware is acquired from a field replace unit (FRU) chip of the server. The present abnormality of the server, the reason of the present abnormality, and the information of the abnormal hardware is transmitted to the computing device. | 04-24-2014 |
20140115387 | IDENTIFYING A SLICE NAME INFORMATION ERROR IN A DISPERSED STORAGE NETWORK - A method begins by a processing module sending list digest requests to a set of dispersed storage (DS) units. The method continues with the processing module receiving list digest responses from at least some of the set of DS units and determining whether an inconsistency exists between first and second list digest responses of the list digest responses. The method continues with the processing module requesting at least a portion of each of the slice name information lists from first and second DS units of the set of DS units and identifying a slice name information error associated with the inconsistency based on the at least a portion of each of the slices name information lists of the first and second DS units when the inconsistency exists between first and second list digest responses of the list digest responses. | 04-24-2014 |
20140115388 | COMPUTING CORE APPLICATION ACCESS UTILIZING DISPERSED STORAGE - A computing core includes a processing module, main memory, and a memory controller. The memory controller receives a request to fetch an instruction from the processing module and determines whether the instruction is currently stored in the main memory. When the instruction is not currently stored in the main memory, the memory controller determines whether the instruction is stored in a distributed storage network (DSN) memory as one or more sets of encoded instruction slices; and, when it is, the memory controller addresses the DSN memory to retrieve the one or more sets of encoded instruction slices. When at least a threshold number of encoded instruction slices are retrieved for each of the one or more sets of encoded instruction slices, the one or more sets of encoded instruction slices are decoded using a dispersed storage error coding function to reconstruct the instruction, which is provided to the processing module. | 04-24-2014 |
20140115389 | METHOD FOR CORRECTING MEMORY ERROR OF APPLICATION PROGRAM - A method for correcting a memory error of an application program are provided, which includes : when an error occurs in a memory occupied by an application program, suspending a process of the application program; waking up an error correction program that corresponds to the application program, where the error correction program is created when the application program is started; performing, by the error correction program, correction processing on the memory in which the error occurs; if the correction processing performed on the memory in which the error occurs fails, closing, by the error correction program, the application program after saving key data of the application program; and if the correction processing performed on the memory in which the error occurs succeeds, restoring, by the error correction program, the process of the application program that is suspended. Thus reliability and security can be improved when the application program is applied. | 04-24-2014 |
20140122926 | SIMULATION ENGINE FOR USE IN DISASTER RECOVERY VIRTUALIZATION - An approach is provided for determining disaster recovery capacity. A simulation hypervisor receives streaming metric data, which represents the current production workload of a primary site, from the primary site. The metric data is combined with production data of the backup site by the simulation hypervisor to simulate a recovery event. Using data from the simulating, disaster recovery planning can be performed. | 05-01-2014 |
20140122927 | METHOD AND SYSTEM FOR PROVIDING IMMUNITY TO COMPUTERS - A method and system for providing immunity to a computer system wherein the system includes an immunity module, a recovery module, a maintenance module, an assessment module, and a decision module, wherein the immunity module, the recovery module, the maintenance module and the assessment module are each linked to the decision module. The maintenance module monitors the system for errors and sends an error alert message to the assessment module, which determines the severity of the error and the type of package required to fix the error. The assessment module sends a request regarding the type of package required to fix the error to the recovery module. The recovery module sends the package required to fix the error to the maintenance module, which fixes the error in the system. | 05-01-2014 |
20140136889 | DIRECTORY-LEVEL RAID - A method and system for reducing replication factor in a file system are provided. In some embodiments, two or more requested files may be grouped together under a leaf directory for RAID process. All data under the directory are grouped into one or more data stripes, each of which comprises a plurality of data blocks. One or more parity data blocks may be generated for each data stripe according to a computing algorithm, such as an exclusive OR (XOR) code or a Reed-Solomon (RS) code. Parity blocks corresponding to the one or more data stripes are concatenated into one parity file. Data blocks of the two or more requested files and their corresponding parity blocks are stored in separate partitions and/or separate storage drives of the file system. | 05-15-2014 |
20140136890 | CORE FILE LIMITER FOR ABNORMALLY TERMINATING PROCESSES - Computer program product and system to limit core file generation in a massively parallel computing system comprising a plurality of compute nodes each executing at least one task, of a plurality of tasks, by: upon determining that a first task executing on a first compute node has failed, performing an atomic load and increment operation on a core file count; generating a first core file upon determining that the core file count is below a predefined threshold; and not generating the first core file upon determining that the core file count is not below the predefined threshold. | 05-15-2014 |
20140136891 | MANAGING POTENTIALLY INVALID RESULTS DURING RUNAHEAD - Embodiments related to managing potentially invalid results generated/obtained by a microprocessor during runahead are provided. In one example, a method for operating a microprocessor includes causing the microprocessor to enter runahead upon detection of a runahead event. The example method also includes, during runahead, determining that an operation associated with an instruction referencing a storage location would produce a potentially invalid result based on a value of an architectural poison bit associated with the storage location and performing a different operation in response. | 05-15-2014 |
20140136892 | VIRTUAL TAPE LIBRARY DEVICE AND DATA RECOVERY METHOD - The present invention provides a VTL device and a data recovery method. The method includes: receiving a data recovery instruction from a user equipment, and sending the data recovery instruction to a file drive unit; responding, by a file drive unit to the data recovery instruction, acquiring virtual tape configuration information corresponding to to-be-recovered backup data from a VTL configuration unit, wherein the virtual tape configuration information is generated by the VTL configuration unit during completion of data backup and comprises an offset position of a data block used for storing the backup data and a size of the data block in a virtual tape; reading, by an input/output management unit, recovery data from a storage medium according to the virtual tape configuration information, and sending the recovery data to the NAS interface unit; and returning, by the NAS interface unit, the recovery data to the user equipment. | 05-15-2014 |
20140136893 | SYSTEM FILE REPAIR METHOD AND APPARATUS - A method and an apparatus for repairing a system file are provided. The computer-implemented method for repairing a system file, comprises: detecting, by a processor, a corrupted system file in an operating system; sending identification information of the operating system and an identifier of the corrupted system file to a server; receiving an integrity identifier of an intact system file to be used in repairing the corrupted system file, wherein the intact system file is determined by the server according to the identification information of the operating system and the identifier of the corrupted system file; verifying, by the processor, the received integrity identifier with a locally stored integrity identifier of the corrupted system file; and if the received integrity identifier passes the verification, obtaining, from the server, the intact system file corresponding to the verified integrity identifier and repairing the corrupted system file with the obtained intact system file. | 05-15-2014 |
20140143597 | COMPUTER SYSTEM AND OPERATING METHOD THEREOF - A computer system and an operating method thereof are disclosed herein. The computer system includes at least one monitored device and a logic control device. The logic control device is connected to the monitored device, and is configured to monitor status signals from the monitored device so as to determine whether the monitored device is in an error state. When the monitored device is in the error state, the logic control device monitors a predetermined time period, and determines whether the monitored device recovers to normal after the predetermined time period, and determines whether the monitored device has been reset during the predetermined time period. If the monitored device does not recover to normal and the monitored device has not been reset during the predetermined time period, then the logic control device resets the monitored device. | 05-22-2014 |
20140149789 | DISPLAY APPARATUS AND SOFTWARE RECOVERY METHOD - Provided are an image processing apparatus and a software recovery method. The image processing apparatus, which is driven by software, includes: a storage which stores reference software; and a software recoverer which recovers current software with the reference software according to a predetermined command signal. Accordingly, recovering software, even in circumstances where a broadcasting signal may not be received, is provided. | 05-29-2014 |
20140149790 | FRAMEWORKS FOR PROVIDING BACKUP FUNCTIONALITIES TO DIFFERENT APPLICATIONS - Example embodiments provide various techniques for providing a backup functionality to a particular application. In one example, a plug-in module is selected for activation from a number of different plug-in modules. This selected plug-in module is adapted to interface with the particular application. It should be noted that each plug-in module is adapted to interface with a different application. The particular application is quiesced using the selected plug-in module. After the application has been quiesced, the backup functionality is initiated. | 05-29-2014 |
20140149791 | REMOTE DATA PROTECTION IN A NETWORKED STORAGE COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for protecting and restoring data within a networked (e.g. cloud) storage computing environment through asynchronous replication and remote backup of data and its associated metadata. Under embodiments of the present invention, data backup and recovery functionality provides data backups by detecting incremental updates to the data and its associated metadata at specific points in time determined by policies. The policies are configurable based on user requirements. Multiple copies of the data backups can be made and stored in separate compressed files at backup/disaster recovery locations. The backups of data and its associated metadata, which includes file system configuration information can be used to restore the state of a computer file system to that of a given point-in-time. Accordingly, a data protection approach is disclosed for protecting data at both the file system level and application level. | 05-29-2014 |
20140149792 | METHOD AND SYSTEM FOR FREQUENT CHECKPOINTING - A virtualization platform provides fault tolerance for a primary virtual machine by continuously transmitting checkpoint information of the primary virtual machine to a collector process, such as a backup virtual machine. When implemented on a hardware platform comprising a multi-processor that supports nested page tables, the virtualization platform leverages the nested page table support to quickly identify memory pages that have been modified between checkpoints. The backup virtual machine provides feedback information to assist the virtualization platform in identifying candidate memory pages for transmitting actual modifications to the memory pages rather than the entire memory page as part of the checkpoint information. The virtualization platform further maintains a modification history data structure to identify memory pages that can be transmitted simultaneous with the execution of the primary virtual machine rather than while the primary virtual machine has been stunned. | 05-29-2014 |
20140164828 | CONSISTENCY OF DATA IN PERSISTENT MEMORY - Consistency of data stored in persistent memory is maintained using separate commit and harden operations for a transaction. A transaction is committed with a processing device, the committing including marking an end of an atomic operation on a modified object from the transaction, creating a new copy of the modified object, and storing a mapping of the modified object to the new copy of the modified object in a recorded log. A checksum identifying the modified object is created and stored in the recorded log. The transaction is hardened by storing the modified object and the recorded log from cache into persistent memory. | 06-12-2014 |
20140164829 | RECOVERY FOR LONG RUNNING MULTITHREADED PROCESSES - In response to receiving a checkpoint request from a first task for a process executing in parallel with at least a second task for the process, checkpoint data from the first task is stored to establish a restart point for the first task, wherein the checkpoint data records a current state of the first task, and the checkpoint data from the first task is merged with previously received checkpoint data for the at least second task to create a checkpoint file. In response to restarting the process, the first task and the at least second task are restarted using the checkpoint data in the checkpoint file. | 06-12-2014 |
20140164830 | USING A VIRTUAL BOOT DEVICE TO ACCESS A SYSTEM RECOVERY IMAGE - A technique that includes presenting a virtual cartridge including a system recovery image to a computer system. The technique includes using a virtual boot device to access the system recovery image. | 06-12-2014 |
20140173338 | COMMUNICATION CHANNEL FAILOVER IN A HIGH PERFORMANCE COMPUTING (HPC) NETWORK - A method, apparatus and program product implement a failover of a communication channel in a cluster fabric that transfers a state of the communication channel between windows resident in a hardware fabric interface device. The failover is desirably implemented by updating a plurality of mappings between memory resources in a host memory and hardware resources in the fabric interface device, and typically without modifying the memory resources such that involvement of a client that utilizes the communication channel in the failover is minimized or eliminated. | 06-19-2014 |
20140173339 | TRANSFORMER SUBSTATION AUTOMATION SYSTEM - An SC includes a determination database storing determination data. The SC includes a specific-event-occurrence detection unit that detects an occurrence of a transformer substation specific event, a data-compression-instruction output unit, a specific-event-recovery detection unit that detects an end of the specific event, and a data-compression-termination-instruction output unit. An MU and an IED each include a data compression flag setting unit and a data compression unit. The data compression flag setting unit sets a data compression flag to be ON when the MU and the IED receive a data compression instruction, and sets the data compression flag to be OFF when the MU and the IED receive a data compression termination instruction. | 06-19-2014 |
20140173340 | INCIDENT HANDLING - A first future time occurs sooner than a second future time. The first future time indicates when the first and second future times are to be evaluated. The second future time provides a boundary between schedules occurring sooner and schedules occurring later. A schedule is generated and added to a database stored in a non-volatile storage. The schedule is for executing, in relation to an incident, an incident-handling action corresponding to a condition matching the incident. The schedule has an execution time at which to execute the incident-handling action in relation to the incident. Where the execution time is sooner than the second future time, the schedule is added to a queue stored in a volatile memory. Upon a current time equaling the execution time, the schedule is removed from the queue and correspondingly executing the incident-handling action in relation to the incident. | 06-19-2014 |
20140181579 | SYSTEMS AND METHODS FOR ON-LINE BACKUP AND DISASTER RECOVERY - A data recovery system includes a plurality of customer computers to be backed-up, each customer computer running a client software to communicate back-up data files; a system management platform coupled to the client software over the Internet, the system management platform receiving inputs from a web user portal to control operations of the client software and the system management platform to back up the customer computer; and two or more data storage silos, each including: a plurality of storage directors communicating with the client software; and a clustered data storage array. | 06-26-2014 |
20140181580 | SPECULATIVE NON-FAULTING LOADS AND GATHERS - According to one embodiment, a processor includes an instruction decoder to decode an instruction to read a plurality of data elements from memory, the instruction having a first operand specifying a storage location, a second operand specifying a bitmask having one or more bits, each bit corresponding to one of the data elements, and a third operand specifying a memory address storing a plurality of data elements. The processor further includes an execution unit coupled to the instruction decoder, in response to the instruction, to read one or more data elements speculatively, based on the bitmask specified by the second operand, from a memory location based on the memory address indicated by the third operand, and to store the one or more data elements in the storage location indicated by the first operand. | 06-26-2014 |
20140181581 | ERROR RECOVERY WITHIN INTEGRATED CIRCUIT - An integrated circuit includes one or more portions having error detection and error correction circuits and which is operated with operating parameters giving finite non-zero error rate as well as one or more portions formed and operated to provide a zero error rate. | 06-26-2014 |
20140189426 | APPARATUS AND METHOD FOR FAST FAILURE HANDLING OF INSTRUCTIONS - A processor is described comprising: instruction failure logic to perform a plurality of operations in response to a detected instruction execution failure, the instruction failure logic to be used for instructions which have complex failure modes and which are expected to have a failure frequency above a threshold, wherein the operations include: detecting an instruction execution failure and determining a reason for the failure; storing failure data in a destination register to indicate the failure and to specify details associated with the failure; and allowing application program code to read the failure data and responsively take one or more actions responsive to the failure, wherein the instruction failure logic performs its operations without invocation of an exception handler or switching to a low level domain on a system which employs hierarchical protection domains. | 07-03-2014 |
20140189427 | LIVE ERROR RECOVERY - A packet is identified at a port of a serial data link, and it is determined that the packet is associated with an error. Entry into an error recovery mode is initiated based on the determination that the packet is associated with the error. Entry into the error recovery mode can cause the serial data link to be forced down. In one aspect, forcing the data link down causes all subsequent inbound packets to be dropped and all pending outbound requests and completions to be aborted during the error recovery mode. | 07-03-2014 |
20140189428 | QUERYING AND REPAIRING DATA - Aspects of the subject matter described herein relate to querying and repairing data. In aspects, a component may detect that data on storage has become corrupted. In response, the component may request data from one or more redundant copies of the data and may determine which of the redundant copies, if any, are not corrupted. If a non-corrupted copy is found, the component may send a request that the corrupted data be repaired and may identify the non-corrupted copy to use to repair the corrupted data. | 07-03-2014 |
20140195848 | METHODS AND SYSTEMS FOR INSTANT RESTORE OF SYSTEM VOLUME - Techniques are disclosed for restoring a system volume on a computing system without requiring the system volume to be fully restored prior to being used or requiring the use of a dedicated recovery environment (e.g., the WinPE or BartPE environments). Instead, the computing system is booted directly from the restore image or by redirecting I/O interrupts to the restore image. That is, when user initiates a restore process, the system boots from the backup itself. Once booted, a background process can complete the restore process. | 07-10-2014 |
20140195849 | PROTECTION AGAINST A FAILURE IN A COMPUTER NETWORK - It is disclosed a method for protecting a computer network against a failure. The method comprises: identifying a number of possible failures which might occur within the computer network, the number of possible failures comprising at least one possible failure; and, based on detected availability of resources in the computer network, determining a protection state of the computer network allowing to circumvent the possible failure and dynamically updating the determined protection state based on changes of the detected availability. The method further comprises, upon occurrence of the failure, if the occurred failure corresponds to the possible failure, bringing the computer network into an operative protection state corresponding to the determined and dynamically updated protection state. | 07-10-2014 |
20140201568 | Flash Memory-Hosted Local and Remote Out-of-Service Platform Manageability - A method, apparatus, and system are disclosed. In one embodiment, the method determines whether one or more manageability conditions are present in a computer system, and then invokes an out-of-service manageability remediation environment stored within a portion of a flash device in the computer system when one or more manageability conditions are present. | 07-17-2014 |
20140208157 | METHOD AND APPARATUS FOR REDUNDANCY IN AN ATM USING HOT SWAP HARDWARE UNDERLYING A VIRTUAL MACHINE - A method and apparatus for providing redundancy in an Automatic Teller Machine (ATM) is provided. Application software may be run on top of a virtual environment such as a virtual machine and/or a virtual disk environment. Should a software component fail, the virtual environment will “crash” but the ATM hardware and operating system will remain intact. If the software is fatally flawed—e.g., due to a faulty “upgrade” the older version may be “rolled back” from a previously stored virtual environment. | 07-24-2014 |
20140215265 | DATA BACKUP AND RECOVERY - Techniques for data backup and recovery are described. In one implementation, at least one storage device storing original data which has failed is determined. Once the failed storage device is determined, backup related information corresponding to the failed at least one storage device is determined. Based on the backup related information at least one backup of the original data from a storage unit is identified. The backup as identified is eventually used for recovering data corresponding to the original data. | 07-31-2014 |
20140215266 | DATA RECOVERY SYSTEM AND STORAGE MEDIUM WITH RECOVERY FUNCTION AND DATA RECOVERY METHOD - A data recovery system for recovering at least one system parameter of an electronic device. The electronic device comprises a first storage module for storing a check parameter and the system parameter, and a second storage module for storing a first default value corresponding to the check parameter and at least one second default value corresponding to the system parameter. The data recovery system comprises an obtaining module for obtaining a check parameter when the electronic device starts up, a determining module for determining whether the check parameter matches the first default value, and a recovery module for recovering the system parameter to a second default value when the check parameter is not the first default value. A storage medium with a recovery function and a data recovery method applied in the data recovery system are also disclosed. | 07-31-2014 |
20140223226 | APPARATUS AND METHOD FOR DETECTING AND RECOVERING FROM DATA FETCH ERRORS - An apparatus and method are described for detecting and correcting data fetch errors within a processor core. For example, one embodiment of an instruction processing apparatus for detecting and recovering from data fetch errors comprises: at least one processor core having a plurality of instruction processing stages including a data fetch stage and a retirement stage; and error processing logic in communication with the processing stages to perform the operations of: detecting an error associated with data in response to a data fetch operation performed by the data fetch stage; and responsively performing one or more operations to ensure that the error does not corrupt an architectural state of the processor core within the retirement stage. | 08-07-2014 |
20140223227 | METHOD, SYSTEM, AND APPARATUS FOR PROVIDING ALERT SYNTHESIS IN A DATA PROTECTION SYSTEM - A method for diagnosing problems with protection of a data source and recovery of the same. The method includes diagnosing a copy of data located at the storage location and diagnosing a temporal version of the copy of data. Based on the diagnosis it is determined whether an error or a warning was detected. If either were detected a response is provided with a suggested solution. | 08-07-2014 |
20140223228 | MEMORY SYSTEM AND ERROR CORRECTION METHOD - Disclosed is an error correcting method which includes detecting an error of meta data having a seed used to randomize user data; correcting the error of the meta data when the error is detected from the meta data; receiving the user data based upon seed confirmation information associated with an error existence of the seed or an error correction result of the seed; detecting an error of the user data; and correcting the error of the user data when the error is detected from the user data. | 08-07-2014 |
20140223229 | DATA PROCESSING APPARATUS AND METHOD FOR ANALYSING TRANSIENT FAULTS OCCURRING WITHIN STORAGE ELEMENTS OF THE DATA PROCESSING APPARATUS - A data processing apparatus has a plurality of storage elements residing at different physical locations within the apparatus, and fault history circuitry for detecting local transient faults occurring in each storage element, and for maintaining global transient fault history data based on the detected local transient faults. Analysis circuitry monitors the global transient fault history data to determine, based on predetermined criteria, whether the global transient fault history data is indicative of random transient faults occurring within the data processing apparatus, or is indicative of a coordinated transient fault attack. The analysis circuitry is then configured to initiate a countermeasure action on determination of a coordinated transient fault attack. This provides a simple and effective mechanism for distinguishing between random transient faults that may naturally occur, and a coordinated transient fault attack that may be initiated in an attempt to circumvent the security of the data processing apparatus. | 08-07-2014 |
20140245064 | INFORMATION PROCESSING APPARATUS, METHOD, AND PROGRAM - An information processing apparatus includes: a similar-data detection section configured to detect similar data having a similarity with target data to be a target of processing in a main storage; and a difference saving section configured to extract a difference between criterial data selected from the similar data detected by the similar-data detection section and the target data, and to write the extracted difference in a save area. | 08-28-2014 |
20140250324 | SMARTPHONE DATA BACKUP AND RESTORATION SYSTEM - A Smartphone data backup and restoration system on a physical layer is connected to a Smartphone through a data transmission line, and the data backup and restoration system and the Smartphone are identified and paired by a datalink layer and a network layer, and then a transport layer transmits an identification program to the Smartphone, and a session layer completes a trusted connection according to a TCP communication and transmission protocol such as USBMUXD, ADB, MTP, and PTP, so that the Smartphone is capable of performing a data transmission operation including data backup and restoration at a presentation layer and an application layer to improve the convenience of operation and use. | 09-04-2014 |
20140281697 | Cooperative Data Recovery In A Storage Stack - In one embodiment, a method of coordinating data recovery in a storage stack with a hierarchy of layers includes, upon an input/output (I/O) request from a layer of the stack, issuing a help response to recover the data from a higher layer in hierarchy order. The method further includes processing the help response, at the higher layer, by issuing a return code of success or further help response to an even higher layer. | 09-18-2014 |
20140281698 | METHOD AND APPARTUS FOR DETECTING ANOMALIES WITHIN INDOOR INFORMATION - Methods, systems, computer-readable media, and apparatuses for detection of anomalies within indoor map information are presented. In some embodiments, the method includes receiving a digital map. The method may further include identifying one or more anomalies within the digital map using a software-based anomaly detection tool. The method may also include displaying one or more suggested corrections to a user based on the one or more identified anomalies. The method may additionally include correcting the one or more identified anomalies within the digital map. | 09-18-2014 |
20140281699 | Avoiding Restart On Error In Data Integration - According to one embodiment of the present invention, a system avoids restart on an error in a data integration process. The system processes data received from a data source in accordance with a parallel processing pipeline and partitioning scheme and submits said processed data to a destination. In response to an indication of an error, the system pauses receiving of data and saves unprocessed data received from the source. After correction of the error, the system resumes processing of the received and saved data in an order of the parallel processing pipeline and partitioning scheme. Embodiments of the present invention further include a method and computer program product for avoiding restart on an error in a data integration process in substantially the same manners described above. | 09-18-2014 |
20140281700 | COORDINATING FAULT RECOVERY IN A DISTRIBUTED SYSTEM - In various embodiments, methods and systems for coordinating, between a host and a tenant, fault recovery of tenant infrastructure in a distributed system is provided. A fault occurrence is determined for a tenant infrastructure in the distributed system. The fault occurrence may be a software failure or hardware failure of the tenant infrastructure supporting a service application of the tenant. A fault recovery plan is communicated to the tenant to notify the tenant of the fault occurrence and actions taken to restore the tenant infrastructure. It is determined whether a fault recovery plan response is received from the tenant; the fault recovery plan response is an acknowledgement from the tenant of the fault recovery plan. Upon receiving the fault recovery plan response or at the expiration of a predefined time limit, the fault recovery plan is executed to restore the tenant infrastructure. | 09-18-2014 |
20140281701 | ENHANCED FAILOVER MECHANISM IN A NETWORK VIRTUALIZED ENVIRONMENT - An embodiment of the invention is associated with a virtualized environment that includes a hypervisor, client LPARs, and virtual servers that each has a SEA, wherein one SEA is selected to be primary SEA for connecting an LPAR and specified physical resources. A first SEA of a virtual server sends a call to the hypervisor, and in response the hypervisor enters physical adapter capability information, contained in the call and pertaining to the first SEA, into a table. Further in response to receiving the call, the hypervisor decides whether or not the first SEA of the virtual server should then be the primary SEA. The hypervisor sends a return call indicating its decision to the first SEA. | 09-18-2014 |
20140281702 | DATA ERROR RECOVERY FOR A STORAGE DEVICE - A storage device is described that detects a data error and then notifies a distributed file system, for example, of such error. A data recovery can then be initiated in many ways, one way by the storage device. | 09-18-2014 |
20140281703 | Local Repair Signature Handling for Repairable Memories - A method is disclosed for independent repair signature load into a repairable memory within a chip set of a design without halting operation of other repairable memories within the design. At initial power up, the repair signature is received from nonvolatile memory and parallelly stored within a memory repair register and within a local memory repair shadow register. During intermediate power ups after an operational power savings scheme shut down, the method avoids serially re-loading the signature from the nonvolatile memory and loads the repair signature from the local memory repair shadow register. During local repair signature loading, the method disables the chip select for the memory to prevent memory operations until the repair signature is fully loaded. | 09-18-2014 |
20140281704 | DEPLOYING PARALLEL DATA INTEGRATION APPLICATIONS TO DISTRIBUTED COMPUTING ENVIRONMENTS - System, method, and computer program product to process parallel computing tasks on a distributed computing system, by computing an execution plan for a parallel computing job to be executed on the distributed computing system, the distributed computing system comprising a plurality of compute nodes, generating, based on the execution plan, an ordered set of tasks, the ordered set of tasks comprising: (i) configuration tasks, and (ii) execution tasks for executing the parallel computing job on the distributed computing system, and launching a distributed computing application to assign the tasks of the ordered set of tasks to the plurality of compute nodes to execute the parallel computing job on the distributed computing system. | 09-18-2014 |
20140289556 | PROCESSING UNIT AND ERROR PROCESSING METHOD - A processing unit of the embodiments includes an instruction memory that holds a plurality of instructions specified by addresses, and that cannot execute read and write operations concurrently, an error correction circuit that detects and corrects an error in the instruction, a program counter, an instruction buffer that holds the instruction corrected as a corrected instruction, a program counter buffer that holds an address of the instruction where an error has been detected, a selector that selects and outputs any of the output of the error correction circuit and the output of the instruction buffer, and a control unit that controls the read and write of the instruction specified by the address from and into the instruction memory. The control unit writes the corrected instruction in the instruction memory using an address held in the program counter buffer when a predetermined condition is satisfied after the occurrence of the error. | 09-25-2014 |
20140298091 | Fault Tolerance for a Distributed Computing System - In one embodiment, a method detects a failure of a container in a controller node where the container includes a service being performed and isolated from other services being performed in other containers on the controller node. The controller node terminates the container including the service and determines a known state for the service. The known state is known to be operational without including a cause of the failure and the service operated from the known state saving changes to the known state during operation separately from the known state. The controller node restarts the service in a new container that replaces the terminated container where the restarted service starts from the known state without using the changes. | 10-02-2014 |
20140304549 | RECOVERING A FAILURE IN A DATA PROCESSING SYSTEM - A technique of recovering a failure in a data processing system comprises recording a number of input channels and sequence numbers for a number of input tuples transferred to a recipient task, recording a number of output channels and sequence numbers for a number of output tuples, and if a failure occurs, resolving the input and output channels. | 10-09-2014 |
20140317448 | INCREMENTAL CHECKPOINTS - A method and system on failure recovery in a storage system are disclosed. In the storage system, user data streams (e.g., log data) are collected by a scribeh system. The scribeh system may include a plurality of Calligraphus servers, HDFS and Zookeeper. The Calligraphus servers may shard the user data streams based on keys (e.g., category and bucket pairs) and stream the user data streams to Puma nodes. Sharded user data streams may be aggregated according to the keys in memory of a specific Puma node. Periodically, aggregated user data streams cached in memory of the specific Puma node, together with a Incremental checkpoint, are persisted to HBase. When a specific process on the specific Puma node fails, Ptail retrieves the Incremental checkpoint from HBase and then restores the specific process by requesting user data streams processed by the specific process from the scribeh system according to the Incremental checkpoint. | 10-23-2014 |
20140317449 | APPARATUS AND METHOD FOR ALLOCATING PROCESSING REQUESTS - A system stores at least one item of connection information for each of a plurality of processing systems. The system receives a request from the requesting apparatus and, in response to receiving the request, sets a status related to one item of the connection information stored in the storage unit for connection to one of the processing systems. The system transmits the received request to the one processing system by using the one item of connection information and receives a response denoting a result of the processing from the one processing system. Responsive to receiving the response, the system releases the status related to the one item of connection information, and transmits the response to the requesting apparatus. | 10-23-2014 |
20140325267 | SYSTEM AND METHOD FOR HIGH PERFORMANCE ENTERPRISE DATA PROTECTION - High performance, enterprise-level data protection system and method provides efficient block-level incremental snapshots of primary storage devices, and instant availability of such snapshots in immediately mountable form that can be directly used in place of the primary storage device. Related systems and applications are described, including an “Enterprise Image Destination” (EID) for backup images; a mirroring technique whereby a replacement physical primary facility may be created while working with a second storage unit as the primary source file system; and a technique for eliminating redundant data in backup images when multiple systems with partially common contents (e.g., operating system files, common databases, application executables, etc.) are being backed up. A number of examples showing “Fast Application Restore” (FAR) with the use of the invention are also provided. | 10-30-2014 |
20140325268 | METHOD AND SYSTEM OF INTELLIGENT ERROR CORRECTION FOR HARDWARE DATA STORAGES - Methods and systems for correction of errors on a hardware data storage are provided. An example method for correction of errors on a hardware data storage can include receiving input data. The input data may include at least error statistics data and reliability data. The method can further include creating a set of matrices with predefined properties. The set of matrices can be created based on the input data. The set of matrices may include at least a generating matrix, a parity check matrix, and a decoding matrix. The method can continue with detecting the errors using the set of matrices. Upon detection of the errors, the method may further include correcting the errors using the set of matrices. | 10-30-2014 |
20140325269 | REMEDYING IDENTIFIED FRUSTRATION EVENTS IN A COMPUTER SYSTEM - A data processing system comprising: a constantly updating database of a plurality of processes having a plurality of operation times, relating to a plurality of applications, relating to at least one user activity, and using a plurality of computing resources; a monitor arranged to identify a plurality of clashes between the processes, a plurality of frustration events and to correlate between the frustration events and the clashes between the processes; a cause identifier arranged to identify, for each frustration event, a cause for the correlated clash of processes; a remedy generator arranged to generate, for each cause, a remedy arranged to solve the frustration event; a communication module arranged to provide the remedies to users in relation to respective user activities in view of their frustration events; and an analyzer arranged to monitor an efficacy of the remedies in respect to their corresponding frustration events. | 10-30-2014 |
20140325270 | METHOD AND A DEVICE FOR MANAGING AN APPLICATION REFERENCED BY A DEVICE - This method of managing at least one application referenced by a device (TRM) comprises a step of deleting execution data of said application, said execution data including at least some of the execution context of said application and said execution data that have been stored on remote equipment (SRV), and a step of downloading execution data of said application from said remote equipment. | 10-30-2014 |
20140331086 | PRIORITIZING REBUILDING OF STORED DATA IN A DISPERSED STORAGE NETWORK - A method begins by a dispersed storage (DS) processing module of a dispersed storage network (DSN), when in a rebuilding mode, determining a level of rebuilding urgency, where the level of rebuilding urgency is based on an inversely proportional function of a level of error encoded redundancy for error encoded data giving rise to the rebuilding mode. When the level of rebuilding urgency is at or above a critical level, the method continues with the DS processing module placing a set of storage units of the DSN in a critical rebuilding mode, where, when in the critical rebuilding mode, the set of storage units prioritize rebuilding of the error encoded data giving rise to the rebuilding mode over other error encoded data operations. | 11-06-2014 |
20140337667 | MANAGING ERRORS IN A RAID - An apparatus, system, and method are disclosed for configuring a plurality of storage devices for a RAID and setting a time-out value for the plurality of storage devices, determining whether a response time for a storage device of the plurality of storage devices exceeds the time-out value, and recovering data from the RAID in response to the storage device exceeding the time-out value. | 11-13-2014 |
20140337668 | Method And Apparatus For Coordinating Fault Recovery Techniques Among Domains - In a telecommunications/data network, it is common to have multiple recovery domains each employing its own technique for recovering a fault that may be different from a technique employed by another domain. Permitting multiple recovery domains to recover a fault without coordination among the domains can result in adverse interactions, such as rapid and repeated changes in the actions taken or “flapping,” and repeated hits to traffic. A method and corresponding apparatus for coordinating fault recovery in a network, according to an embodiment of the present invention, notifies a first recovery domain that a second recovery domain is or is not taking action to recover a fault in the network. Coordinating the recovery efforts of the first and second recovery domains reduces fault recovery time and allows concurrent actions to be taken. | 11-13-2014 |
20140351634 | Transparent Parity-Based Recovery System and Method for Storage Devices - A transparent parity-based data recovery system and method is presented. Particularly, the system and method includes a data recovery management controller disposed in a communicative relation with a plurality of data storage devices and at least one parity storage device, wherein each of the plurality of data storage devices are independent of one another and wherein each include a complete and independent file system. The said data recovery management controller is transparent or otherwise unknown to the host system and configured to intercept or otherwise process read and/or write operations associated with a target data storage device. Parity data for said target data storage device is computed and stored. | 11-27-2014 |
20140351635 | Method and Apparatus for Dynamically Objectifying Cloud Deployment State for Backup and Restore - Method and Apparatus for rapid scalable unified infrastructure system management platform are disclosed by discovery of compute nodes, network components across data centers, both public and private for a user; assessment of type, capability, VLAN, security, virtualization configuration of the discovered unified infrastructure nodes and components; configuration of nodes and components covering add, delete, modify, scale; and rapid roll out of nodes and components across data centers both public and private. | 11-27-2014 |
20140351636 | METHOD, DEVICE, AND SYSTEM FOR DATA RECONSTRUCTION - A method for data reconstruction includes: obtaining a data migration list, where the data migration list indicates a partition with data to be migrated on a storage node with data to be migrated; generating a data migration task according to the data migration list and routing table information, where the routing table information indicates correspondence between a storage node in a cluster and a partition; and concurrently executing data migration tasks of a storage node in the cluster to reconstruct data. In addition, a device for data reconstruction and a storage system are further provided accordingly. | 11-27-2014 |
20140359352 | EMBEDDED RESTORATION MEMORY - Example embodiments relate to embedded restoration memory. In one example implementation according to aspects of the present disclosure, a computing device may include a processor for executing instructions, a memory for storing instructions, a storage device having a user operating system, and a restoration memory embedded in the computing device and having a restoration module and a restoration image. The restoration operating system may exist independently of the user operating system and may be inaccessible to the user operating system. Additionally, the restoration module may cause the computing device to install the restoration image from the restoration memory onto the storage device upon the occurrence of a trigger event. | 12-04-2014 |
20140359353 | INCREASING RESILIENCY OF A DISTRIBUTED COMPUTING SYSTEM THROUGH LIFEBOAT MONITORING - A method and associated systems for increasing resiliency of a distributed computing system. A processor creates a first virtual machine and a second virtual machine, each of which monitor the other. When the first virtual machine identifies that the second virtual machine has become unavailable or is otherwise compromised, the first virtual machine automatically requests that a system-management entity restart the unavailable machine. If a certain number of restart attempts fails to restore the second virtual machine to desired functionality, the first virtual machine automatically requests that the system-management entity recreate or reprovision the second virtual machine from a prior backup. If a certain number of such recreations or reprovisionings attempts fails, a system administrator is automatically notified that further action is needed. | 12-04-2014 |
20140359354 | METHOD AND SYSTEM FOR PROVIDING HIGH AVAILABILITY TO COMPUTER APPLICATIONS - A system and method for distributed fault detection. In an exemplary method, unplanned application exits and crashes may be detected at a node local level. Further, application hangs may be detected using at least one of a script and a binary at the node local level. Also, node crashes and operating system crashes may be detected using node to node heart-beating. | 12-04-2014 |
20140365822 | VIRTUAL INFRASTRUCTURE RECOVERY CONFIGURATOR - Systems, methods and procedures to capture, format and process configuration information needed for a Managed Recovery Program (MRP) solution that supports orderly handling of virtual machines in an information technology production environment. An MRP automation package is portable and contains all of the required configuration data to bring virtual infrastructure on line in a recovery environment as well as associated scripts that can be executed to automatically process the configuration data. | 12-11-2014 |
20140372794 | IMPLEMENTING CONCURRENT DEVICE DRIVER MAINTENANCE AND RECOVERY FOR AN SRIOV ADAPTER IN A VIRTUALIZED SYSTEM - A method, system and computer program product are provided for implementing concurrent adapter driver maintenance and recovery for a Single Root Input/Output Virtualization (SRIOV) adapter in a computer system. An adapter driver at start up time performs configuration of the adapter and each of a set of virtual functions (VFs). The adapter driver writes critical adapter and VF configuration data to a scratchpad buffer. When device driver maintenance is needed, such as to load updated adapter driver firmware, all VF drivers are held off temporarily, current adapter driver is detached, and then the adapter driver is reloaded with the updated driver firmware. Then the adapter driver is restarted with the updated adapter driver firmware, and performs a reinitialization process. The adapter driver performs adapter and VF configuration restoring existing configuration using values read from the scratchpad buffer. | 12-18-2014 |
20140372795 | IMPLEMENTING DISTRIBUTED DEBUG DATA COLLECTION AND ANALYSIS FOR A SHARED ADAPTER IN A VIRTUALIZED SYSTEM - A method, system and computer program product are provided for implementing distributed debug data collection and analysis for a hardware I/O adapter, such as, a Single Root Input/Output Virtualization (SRIOV) adapter in a virtualized system. A predetermined event triggers a base error collection sequence. Adapter driver data is collected and virtual function (VF) device drivers are locked out responsive to triggering the base error collection sequence. Adapter debug data is collected and the adapter is reinitialized including an indication to VF drivers if VF error data is to be collected. The virtual function (VF) device drivers are unlocked allowing the VF device drivers to commence recovery of a respective virtual function (VF). | 12-18-2014 |
20140372796 | CHECKPOINTING A COMPUTER HARDWARE ARCHITECTURE STATE USING A STACK OR QUEUE - Various embodiments relating to saving and recovering a hardware architecture state are provided. In one embodiment, during a first mode of operation, entries in a first portion of a random-access memory (RAM) are manipulated. A current version of less than all of the entries of the first portion is saved to a checkpointed version in response to a checkpoint event that triggers operation in a second mode of operation. During the second mode of operation, entries in a second portion of the RAM are manipulated. The checkpointed version of less than all of the entries of the first portion is recovered as the current version in response to a restore event that triggers resumption of operation in the first mode. | 12-18-2014 |
20140372797 | PULSED-LATCH BASED RAZOR WITH 1-CYCLE ERROR RECOVERY SCHEME - Systems and methods for error recovery include determining an error in at least one stage of a plurality of stages during a first cycle on a hardware circuit, each of the plurality of stages having a main latch and a shadow latch. A first signal is transmitted to an output stage of the at least one stage to stall the main latch and the shadow latch of the output stage during a second cycle. A second signal is transmitted to an input stage of the at least one stage to stall the main latch of the input stage during the second cycle and to stall the main latch and the shadow latch of the input stage during a third cycle. Data is restored from the shadow latch to the main latch for the at least one stage and the input stage to recover from the error. | 12-18-2014 |
20140372798 | SECURITY SURVEILLANCE APPARATUS WITH NETWORKING AND VIDEO RECORDING FUNCTIONS AND FAILURE DETECTING AND REPAIRING METHOD FOR STORAGE DEVICE THEREOF - A security surveillance apparatus with a networking function and a video recording function and a failure detecting and repairing method for a storage device are provided. The failure detecting and repairing method includes the following steps. First, the storage device is powered and detected. Then, whether a file system of the storage device is abnormal is determined. When the file system is abnormal, the file system is repaired by a file system repairing procedure. Next, whether a multimedia file is abnormal is determined. When the multimedia file is abnormal, the multimedia file is repaired by a file repairing procedure. Finally, the storage device is mounted on the security surveillance apparatus. | 12-18-2014 |
20140380094 | AVOIDING RESTART ON ERROR IN DATA INTEGRATION - According to one embodiment of the present invention, a system avoids restart on an error in a data integration process. The system processes data received from a data source in accordance with a parallel processing pipeline and partitioning scheme and submits said processed data to a destination. In response to an indication of an error, the system pauses receiving of data and saves unprocessed data received from the source. After correction of the error, the system resumes processing of the received and saved data in an order of the parallel processing pipeline and partitioning scheme. Embodiments of the present invention further include a method and computer program product for avoiding restart on an error in a data integration process in substantially the same manners described above. | 12-25-2014 |
20150012777 | DATA PROCESSING APPARATUS AND DATA PROCESSING METHOD - A data processing apparatus includes a storage unit configured to store plural data processing programs and a corresponding error processing program for when an error occurs with a first data processing program; and a processor configured to record to memory before executing the first data processing program, information of the error processing program that corresponds to the first data processing program; update and record in the memory after the first data processing program ends, information of a second data processing program scheduled to be executed next; and switch to any one among the first data processing program that corresponds to information recorded in the memory and the error processing program, when program processing is started next. | 01-08-2015 |
20150019908 | PROVIDING NON-VOLATILE MEMORY FOR SUSPEND-TO-RANDOM ACCESS MEMORY - A mechanism for providing non-volatile memory for suspend-to-RAM in a computer system. A method includes searching for a checkpoint message in a memory upon receipt of notification of restoring of power in a system. The checkpoint message is a confirmation of storing of state of a storage device prior to loss of the power in the system. The method also includes determining whether the checkpoint message indicates that the system reached the power integrity checkpoint. The power integrity checkpoint is a confirmation of the storing of the state of other device prior to the loss of the power in the system. The other device is different from the storage device. The method further includes restoring operating conditions of the system when it is determined that the system has reached the power integrity checkpoint | 01-15-2015 |
20150019909 | SPECULATIVE RECOVERY USING STORAGE SNAPSHOT IN A CLUSTERED DATABASE - A system, and computer program product for recovery in a database are provided in the illustrative embodiments. A failure is detected in a first computing node, the first computing node serving the database in a cluster of computing nodes. A snapshot is created of data of the database. A subset of log entries is applied to the snapshot, the applying modifying the snapshot to result in a modified snapshot. An access of the first computing node to the data of the database is preserved. Responsive to receiving a signal of activity from the first computing node during the applying and after a grace period has elapsed, the applying is aborted such that the first computing node can continue serving the database in the cluster. | 01-15-2015 |
20150026517 | ALLOCATION OF REPLICA-SETS IN A STORAGE CLUSTER - A data storage system may be configured to allocate replica-sets in a balanced manner and mark some of these balanced replica-sets as being spares. As one or more drives or machines fail, the data storage system may move all copies of an affected replica-set to a marked spare replica-set and mark the affected replica-set as being inactive or invalid. As the failed drives are replaced, the data storage system may reconfigure those inactive replica-sets and use them as new spares. The data storage system may implement a coordinator module that handles the balancing and allocation of spares within a sub-cluster. The coordinator may also reallocate entire replica-sets across sub-clusters to maintain balance at the cluster level. | 01-22-2015 |
20150033072 | MONITORING HIERARCHICAL CONTAINER-BASED SOFTWARE SYSTEMS - A computer receives a heartbeat message that includes both program reset information and at least one segment, of the heartbeat message, that is configured to indicate whether or not a first program is functioning correctly. The computer determines if the heartbeat message includes the indication that the first program is functioning correctly. If the computer determines that the heartbeat message indicates that the first program is functioning correctly, then the computer sends a data stream to the first program. | 01-29-2015 |
20150033073 | METHOD AND APPARATUS FOR PROCESSING ERROR EVENT OF MEDICAL DIAGNOSIS DEVICE, AND FOR PROVIDING MEDICAL INFORMATION - A method and an apparatus for processing an error event of a medical diagnosis device is provided that includes detecting an error event at a medical diagnosis system, determining an error correcting mode from among a first mode for restarting a diagnosis process at which the error event occurred, a second mode for informing the error event to components of the medical diagnosis system at which the error event did not occur, and a third mode for stopping operation of the medical diagnosis system, based on information regarding the error event, and processing the error event based on the determined error correcting mode. There is also provided a method for providing medical information that includes receiving medical data, providing a diagnosis process a first region, providing log data at a second region, and providing video data at a third region of the screen image. | 01-29-2015 |
20150039938 | Systems and Methods for Retiring and Unretiring Cache Lines - The systems and methods described herein may provide a flush-retire instruction for retiring “bad” cache locations (e.g., locations associated with persistent errors) to prevent their allocation for any further accesses, and a flush-unretire instruction for unretiring cache locations previously retired. These instructions may be implemented as hardware instructions of a processor. They may be executable by processes executing in a hyper-privileged state, without the need to quiesce any other processes. The flush-retire instruction may atomically flush a cache line implicated by a detected cache error and set a lock bit to disable subsequent allocation of the corresponding cache location. The flush-unretire instruction may atomically flush an identified cache line (if valid) and clear the lock bit to re-enable subsequent allocation of the cache location. Various bits in the encodings of these instructions may identify the cache location to be retired or unretired in terms of the physical cache structure. | 02-05-2015 |
20150046749 | INFORMATION DEVICE, STORAGE MEDIUM AND INITIAL STATE RESTORATION METHOD - An information device has a storage medium storing information items which includes a first program provided on a first partition, a second program and data provided on a second partition to restore the first program on the first partition to a predetermined state, a boot block which causes system activation from one of the first partition and the second partition, and an active-partition switching program which indicates, to the boot block, one of the first and second partitions. An input/output system activates the active-partition switching program when a specific operation is performed. The active-partition switching program indicates to the boot block that system activation is to be executed from the second partition. | 02-12-2015 |
20150052391 | AUTOMATED MONITORING OF SERVER CONTROL AUTOMATION COMPONENTS - Systems and methods for automated monitoring of automated server control components are provided. Embodiments may include transmitting a request for state information associated with a component of the automated server control system. At least one of a reception of the state information for the component and a threshold time period without reception of the state information for the component may be detected. Some embodiments may include determining if the received state information for the component comprises an error condition. In some instances, an alert may be output based on at least one of detecting the threshold time period without reception of the state information for the component and determining that the received state information comprises an error condition. | 02-19-2015 |
20150052392 | Disconnected Operation for Systems Utilizing Cloud Storage - While connected to cloud storage, a computing device writes data and metadata to the cloud storage, indicates success of the write to an application of the computing device, and, after indicating success to the application, writes the data and metadata to local storage of the computing device. The data and metadata may be written to different areas of the local storage. The computing device may also determine that it has recovered from a crash or has connected to the cloud storage after operating disconnected and reconcile the local storage with the cloud storage. The reconciliation may be based at least on a comparison of the metadata stored in the area of the local storage with metadata received from the cloud storage. The cloud storage may store each item of data contiguously with its metadata as an expanded block. | 02-19-2015 |
20150052393 | FAST DATA BACK-UP AND RESTORE BETWEEN VOLATILE AND FLASH MEMORY - Back-up of data to flash memory. Data to back up is written into stripes, which are sets of pages across flash memory backup devices having the same block and page address. First metadata is embedded in each stripe indicating any blocks of the flash memory known to be bad. In response to encountering a new error in a block of flash memory during writing data to back up to a stripe, re-writing the stripe starting at the next available stripe excluding pages on the block of flash memory having the new error, writing subsequent stripes excluding pages on the block of flash memory having the new error, and embedding second metadata in the re-written and subsequent stripes indicating the location of the block having the new error. Responsive to finding no bad blocks indicated in the first metadata, initiating a write to two or more stripes simultaneously. | 02-19-2015 |
20150067390 | LIVE SNAPSHOT OF A VIRTUAL MACHINE - The subject matter of this specification can be implemented in, among other things, a method including receiving a request to create a live snapshot of a state of a virtual machine at a reference point-in-time. The virtual machine can have a memory and an original disk file. The method further includes creating, at the reference point-in-time, an overlay disk file to copy data from the original disk file. Data modifications after the reference point-in-time are performed in the original disk file but not in the overlay disk file. The method also includes creating a memory snapshot at the reference point-in-time. The method includes providing the live snapshot corresponding to the reference point-in-time. The live snapshot includes the overlay disk file and the memory snapshot. | 03-05-2015 |
20150067391 | CORRECTING OPERATIONAL STATE AND INCORPORATING ADDITIONAL DEBUGGING SUPPORT INTO AN ONLINE SYSTEM WITHOUT DISRUPTION - Techniques are provided for correcting the operational state of a multi-process system without disrupting any running processes. A library providing error correction and logging functionality is statically linked to modules in the system. A script in the library loads a package file having a patch for returning an error state to a normal state. The script issues commands to invoke functions in the patch. Once the error state has returned to a normal state, the script issues commands to remove the package file from the system. | 03-05-2015 |
20150067392 | CLOCK DATA RECOVERY DEVICE AND DISPLAY DEVICE INCLUDING THE SAME - A clock data recovery device includes a clock recovery device for separating a recovery clock signal and a data signal from an input signal and generating a clock fail signal in response to noise of the input signal; a clock generator for receiving a control voltage to generate one or more delay clock signals, delaying the recovery clock signal to generate the delay clock signals in a first mode, delaying the generated delay clock signal to generate the delay clock signal in a second mode, and switching the first mode to the second mode in response to the clock fail signal; and a phase frequency detector for comparing at least one of the delay clock signals with the recovery clock signal to generate a voltage adjusting signal; and a control voltage generator for receiving the voltage adjusting signal to generate the control voltage. | 03-05-2015 |
20150067393 | METHOD AND APPARATUS TO REMOTELY TAKE A SNAPSHOT OF A COMPLETE VIRTUAL MACHINE FROM A SOFTWARE DEFINED CLOUD WITH BACKUP AND RESTORE CAPACITY - Method and Apparatus for rapid scalable unified infrastructure system management platform are disclosed by discovery of compute nodes, network components across data centers, both public and private for a user; assessment of type, capability, VLAN, security, virtualization configuration of the discovered unified infrastructure nodes and components; configuration of nodes and components covering add, delete, modify, scale; and rapid roll out of nodes and components across data centers both public and private. | 03-05-2015 |
20150067394 | METHOD AND APPARATUS FOR PROCESSING VIRTUAL MACHINE INSTANCES IN REAL TIME EVENT STREAM FOR ROOT CAUSE ANALYSIS AND DYNAMICALLY SUGGESTING INSTANCE REMEDY - Method and Apparatus for rapid scalable unified infrastructure system management platform are disclosed by discovery of compute nodes, network components across data centers, both public and private for a user; assessment of type, capability, VLAN, security, virtualization configuration of the discovered unified infrastructure nodes and components; configuration of nodes and components covering add, delete, modify, scale; and rapid roll out of nodes and components across data centers both public and private. | 03-05-2015 |
20150067395 | METHODS AND STRUCTURE FOR HARDWARE SERIAL ADVANCED TECHNOLOGY ATTACHMENT (SATA) ERROR RECOVERY IN A SERIAL ATTACHED SCSI (SAS) EXPANDER - Methods and structure for enhanced SAS expander functionality to store and forward buffered information transmitted from an initiator device to a target device and to process errors in control circuits of the expander without intervention from the general purpose programmable processor of the expander. A PHY of an expander is associated with control circuits that comprise buffering of commands to be forwarded to an end device directly coupled to the PHY. The control circuits locally process errors detected from the end device. The control circuits comprise a SATA host circuit adapted to communicate with a SATA end device to detect and clear error conditions and a SATA target circuit to communicate with one or more STP initiator devices to report and clear error conditions reported by the end device. The structures and methods may also service SAS connections (in addition to STP connections). | 03-05-2015 |
20150074455 | Method for maintaining file system of computer system - A method for maintaining a file system of a computer system is disclosed. An operating system is loaded to the computer system when the computer system is booted, such that the file system of the computer system is monitored in real time after the computer system is booted. When occurrence of an error in the file system is detected, a number of times the error has occurred is accumulated. When the number of times the error has occurred reaches a predetermined threshold, a notification message is generated and displayed on an electronic apparatus. Accordingly, a manager of the computer system may be notified immediately when the occurrence of the error in the file system is detected. | 03-12-2015 |
20150074456 | VERSIONED MEMORIES USING A MULTI-LEVEL CELL - Versioned memories using a multi-level cell (MLC) are disclosed. An example method includes comparing a global memory version to a block memory version, the global memory version corresponding to a plurality of memory blocks, the block memory version corresponding to one of the plurality of memory blocks. The example method includes determining, based on the comparison, which level in a multi-level cell of the one of the plurality of memory blocks stores checkpoint data. | 03-12-2015 |
20150074457 | RECEIVING AN UPDATE MODULE BY ACCESSING A NETWORK SITE - Fault of a particular module in an electronic device is detected. In response to detecting the fault, an update module is retrieved from a network site over a network to update the particular module, where the network stack is independent of a network stack associated with an operating system in the electronic device. | 03-12-2015 |
20150082084 | ENHANCED DATA RECOVERY FROM DATA STORAGE DEVICES - Systems, methods, and firmware for recovery of data from storage devices are provided herein. In one example, a data storage device is provided. The data storage device includes a storage portion and a cache portion which caches data intended for storage in the storage portion. Responsive to a recovery read command identifying requested data, the data storage device retrieves stored data corresponding to the requested data from the storage portion without retrieving cached data corresponding to the requested data from the cache portion that supersedes at least a portion of the stored data. Responsive to a cache block list command, the data storage device transfers a list identifying one or more cached blocks of the cached data. Responsive to a read command that identifies at least one cached block, the data storage device retrieves the at least one cached block. | 03-19-2015 |
20150082085 | MULTI-TRANSACTIONAL SYSTEM USING TRANSACTIONAL MEMORY LOGS - Techniques are disclosed for generating a multi-transactional system using transactional memory techniques. According to certain embodiments, a device may include a memory, one or more processing entities, and a transactional memory system for maintaining a plurality of transactional memory (TM) logs in a first portion of the memory. Each TM log may be associated with one transaction from a plurality of transactions sequentially executed by the one or more processing entities and each transaction comprises a plurality of operations. Furthermore, each TM log associated with each transaction comprises information associated with changes to a second portion of the memory caused by execution of operations from the transaction using the one or more processing entities. The TM logs for completed transactions may be used for error detection and recovery and maintaining high availability of the device. | 03-19-2015 |
20150082086 | METHOD AND APPARATUS FOR IMPLEMENTING CHANGES WITHIN A DATA SYSTEM - The present invention provides a method of and apparatus for implementing changes within a data system. The method receiving a request including one or more objects to be imported into a data system, creating a back up request comprising a copy of the objects included within the request, implementing the back up request in the system to generate a modified back up request including a log of the objects modified in the request, storing the modified back up request. This allows a log of changes to objects in the data system to be generated using a copy of a request including a list of changes to the objects. Once the modified back up request has been generated the request may be imported into the system. | 03-19-2015 |
20150089285 | CHECKPOINTING USING FPGA - Methods, systems, and computer-readable and executable instructions are provided for checkpointing using a field programmable gate array (FPGA). Checkpointing using FPGA can include checkpointing data within a region of a server's contents to memory and monitoring the checkpointed data using the FPGA. | 03-26-2015 |
20150113321 | COMPUTER SYSTEM AND METHOD FOR RECOVERING BIOS OF COMPUTER SYSTEM - In a method for recovering a BIOS of a computer system, the computer system includes a serial peripheral interface (SPI) ROM and a storage device. The SPI ROM stores a BIOS booting block and a main BIOS, and the storage device stores a backup BIOS. The BIOS booting block of the SPI ROM is locked in a normal operating state of the computer system, and the main BIOS is checked to determine whether the main BIOS is damaged when the computer system is powered on. The BIOS booting block of the SPI ROM is unlocked when the main BIOS is damaged, and the BIOS booting block is enable to recover the main BIOS according to a backup BIOS stored in the storage device. After the main BIOS has been recovered successfully, the computer system boots normally and enters an operating system (OS) successfully. | 04-23-2015 |
20150113322 | DATA STORING SYSTEM AND OPERATING METHOD THEREOF - A data storing system includes a semiconductor device suitable for repeatedly performing a read operation by changing a level of a read voltage according to read voltages listed on a read retry table when a read operation on a selected page is passed, in response to a command and an address, and a controller suitable for controlling the read operation of the semiconductor device by generating the command and the address, wherein a read voltage to be used for performing the read operation is determined among the read voltages listed on the read retry table when the semiconductor device performs the read operation based on data read as a result of a predetermined number of read operations. | 04-23-2015 |
20150121135 | VIRTUAL MACHINE INTROSPECTION FACILITIES - Run-time, event-driven virtual machine introspection of the target guest virtual machine is facilitated as described herein. A component can specify events that are of interest to the component for introspection of a target guest virtual machine of a hypervisor. The hypervisor detects an introspection event generated by a target guest virtual machine and determines whether the introspection event is of interest for handling by a component coupled to the hypervisor. If so, the hypervisor alerts the component about the introspection event and provides information associated with the introspection event to the component. The component thereby receives notification of occurrence of the introspection event from the hypervisor and may obtain information associated with the introspection event. | 04-30-2015 |
20150121136 | SYSTEM AND METHOD FOR AUTOMATICALLY MANAGING FAULT EVENTS OF DATA CENTER - Disclosed are an automated management system and method for fault events of a data center. A fault event monitoring unit is configured to check statuses of servers to detect occurrence of a fault event, and if a fault event occurs, determine whether an automated action is possible. A fault event related action recommending unit is configured to, with respect to a fault event that is newly detected by the fault event monitoring unit or determined to be difficult to be resolved by an action stored in a fault event related action storage unit, search for and extract information related to the fault event determined to be difficult to be resolved from information accumulated in a fault event information knowledge storage unit, and based on the extracted information, generate and output a group of automated action candidates for the fault event determined to be difficult to be resolved. A fault event action unit is configured to automatically take an action against a fault event detected by the fault event monitoring unit by use of the action accumulated in the fault event related action storage. | 04-30-2015 |
20150121137 | STORAGE DEVICE INTERFACE AND METHODS FOR USING SAME - A memory system controller includes one or more sockets for accommodating NVDIMM cards produced by different NVDIMM providers; a PCIe interface for coupling the memory system controller to a host; and a controller coupled to the PCIe interface over a PCIe-compliant connection and to the one or more sockets over respective DDR2 connections. The controller is configured to manage data transfers between the host and a specified one of the NVDIMM sockets in which an NVDIMM card is accommodated as DMA reads and writes, format data received from the PCIe interface for transmission to the specified NVDIMM socket over the corresponding one or more DDR2 interfaces, and initiate save and restore operations on the NVDIMM card accommodated within the specified NVDIMM socket in response to power failure and power restoration indications. | 04-30-2015 |
20150127975 | Distributed virtual array data storage system and method - Embodiments of a distributed virtual array data storage system and method are disclosed. Storage nodes made up of relatively unsophisticated disks with associated processors are scalable to store very large amounts of data. The storage nodes communicate with servers directly over a network through, for example, an Ethernet connection. Control of the storage nodes and access to the storage nodes is handled entirely on the server side of the system by distributed virtual array (DVA) software running on the server side and employing a particular protocol over the standard network connection. In an embodiment, server-side virtual machine (VM) hosts host application VMs that are associated with vDisks. The DVA software distributes data for the vDisk over the storage nodes. In the case of failure of one or more of the storage nodes, the DVA software reconstructs the data, for example by reading redundant data from surviving storage nodes. | 05-07-2015 |
20150127976 | Method and Apparatus for Failure Recovery in a Machine-to-Machine Network - According to one aspect of the teachings herein, a Network Services Capability Layer or NSCL is configured to initiate failure recovery responsive to detecting an abnormal reset at the NSCL. Failure recovery operations exploit recovery information that is maintained by the NSCL in a persistent data store during normal operation, e.g., on an ongoing basis, in real-time as new M2M registrations or other M2M information changes occur at the NSCL. Such operations advantageously permit the NSCL to recover missing or corrupted information after the abnormal reset, from M2M entities identified from the recovery information. | 05-07-2015 |
20150127977 | SYSTEM FOR AND METHOD FOR DATA REFLOW IN A STATELESS SYSTEM - Embodiments provide systems and methods having an engine that gives stateless applications attributes of a ‘stateful’ process. To accomplish this end, a ‘snapshot’ of a transaction at a given point is taken and persisted until receiving confirmation that the transaction is completed. The snapshot may be a snapshot of data flowing in a stateless messaging system. The snapshot is maintained until confirmation that all intended recipients to which the transaction relates to have completed the steps they need to for the given transaction. The snapshot may be formed into a message and reflowed to an intended recipient to ensure that the recipient receives the message in the event that the initial delivery is unsuccessful. | 05-07-2015 |
20150127978 | METHOD AND SYSTEM FOR ROBUST PRECISION TIME PROTOCOL SYNCHRONIZATION - A method and system for maintaining clock synchronization in a communication network having multiple clocks are disclosed. According to one aspect, the invention provides a first precision time protocol (PTP) instance and second PTP service instance. Dynamic PTP parameters and tuning PTP parameters are periodically cloned from the first PTP service instance to the second PTP service instance substantially in real time. | 05-07-2015 |
20150127979 | TRIAGING COMPUTING SYSTEMS - Methods and systems are provided for automatically triaging a server cluster of the type including a plurality of linked servers each running a plurality of processes. The method includes: detecting at least one failed process; automatically transmitting an electronic alert message embodying a first error code indicative of the failed process to a unified triage module including a processor and an updatable index table; applying, by the processor, the first error code to the index table. If a matching error code corresponding to the first error code is found in the index table, retrieving a solution code from the index table associated with the matching error code and automatically restarting the failed process using the solution code without human intervention. | 05-07-2015 |
20150127980 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR SYNCHRONIZING DATA WRITTEN TO TAPE INCLUDING WRITING AN INDEX INTO A DATA PARTITION - Disclosed is a system, method and computer program product for synchronizing data written to tape with improved data recovery. When writing data to tape, an index is kept in memory and updated to reflect change(s) to a file system mounted on tape. After a predetermined amount of data is written to a tape, a device may perform a sync operation, causing the index to be written into a data partition of the tape. If the sync operation is successful, the index in the index partition of the tape can be updated using a copy of the index in the data partition of the tape next time the tape is mounted. If the sync operation is not successful, the device may write the data to a different location on the same or another tape, update the index, and force another sync operation. This process can be repeated. | 05-07-2015 |
20150127981 | FAILURE RESILIENCY PROVISIONING - Aspects of provisioning computing units based on improved failure resiliency are described. In one embodiment, an infrastructure component shared between a pair of computing units is identified. A failure rate for the infrastructure component is obtained, and a failure probability for a class of assigned computing units is computed based in part on the failure rate. A spread request related to the class of assigned computing units is also received. In response to the spread request, an altered composition of computing units is determined, and a difference between a failure probability for the altered composition of computing units and the failure probability for the class of assigned computing units is computed. In one embodiment, when a spread score improvement value associated with the difference meets a spread criteria of the spread request, the altered composition of computing units may be provisioned for use. | 05-07-2015 |
20150143170 | STORAGE DEVICE FAILURE RECOVERY SYSTEM - A storage device failure recovery system includes a storage IHS and a user IHS coupled together over a network. The user IHS includes a storage system having a storage device, and a storage repair function that periodically provides a storage device image over the network to the storage IHS using data from the storage device. The storage repair function detects a failure of the storage device and streams an operating system on the user IHS using the storage device image stored on the storage IHS. While streaming the operating system on the user IHS using the storage device image stored on the storage IHS, the storage repair function analyzes the failure of the storage device, determines a storage system failure recovery procedure, and performs the storage system failure recovery procedure to restore the storage system while a user remains productive on the user IHS via the streamed operating system. | 05-21-2015 |
20150143171 | METHOD, ELECTRONIC DEVICE AND CONTROLLER FOR RECOVERING ARRAY OF MEMORY CELLS - A method, an electronic device and a controller for recovering an array of memory cells are provided. The method comprises the following steps. Whether a recovery control signal is received or not is determined. A retention checking procedure is executed for identifying whether a threshold voltage distribution of at least one bit of the memory cells in high threshold state is shifted or not, if the recovery control signal is received. A retention writing procedure is executed on the memory cells, if the memory cells in high threshold state do not pass the retention checking procedure. | 05-21-2015 |
20150143172 | COMPUTING DEVICE AND METHOD FOR AUTOMATICALLY RECOVERING BIOS OF COMPUTING DEVICE - In a method for automatically recovering a basic input-output system (BIOS) of a computing device, the computing device includes a serial peripheral interface (SPI) ROM, a storage device, and a supper I/O (SIO) controller. The SPI ROM stores a first BIOS booting block and a main BIOS, and the SIO controller stores a second BIOS booting block. An integrity of the main BIOS stored in the SPI ROM is checked when the computing device is powered on. The first BIOS booting block boots the computing device when the main BIOS is partially damaged, and the second booting block powers on the computing device when the main BIOS is fully damaged. A backup BIOS is obtained from the storage device, and is written into the SPI ROM to update data of the main BIOS. | 05-21-2015 |
20150143173 | DETERMINING PERFORMANCE STATES OF PARENT COMPONENTS IN A VIRTUAL-MACHINE ENVIRONMENT BASED ON PERFORMANCE STATES OF RELATED CHILD COMPONENTS DURING A TIME PERIOD - Techniques promote monitoring of hypervisor systems by presenting dynamic representations of hypervisor architectures that include performance indicators. A reviewer can interact with the representation to progressively view select lower-level performance indicators. Higher level performance indicators can be determined based on lower level state assessments. A reviewer can also view historical performance metrics and indicators, which can aid in understanding which configuration changes or system usages may have led to sub-optimal performance. | 05-21-2015 |
20150149822 | EVENT HANDLING IN STORAGE AREA NETWORKS - Storage area network (SAN) components contain a processor configured to provide a first event handling module that can receive an error event at a first hardware component of the storage area network. A database is accessed that contains associations between error event data and potential sources of errors. A plurality of hardware components are identified using the database and error event data. The hardware components are ranked and one is selected based on the ranking. An error notification is sent to a second event handling module of the hardware component. Based upon the response of the second event handling module, an error handling procedure is carried out. | 05-28-2015 |
20150149823 | METHODS FOR PRESERVING STATE ACROSS A FAILURE AND DEVICES THEREOF - A method, non-transitory computer readable medium, and host device that receives one or more transactions. A state is stored in a transaction log in a volatile memory wherein the state includes information associated with the one or more transactions. The transaction log is stored in a stable storage device when a failure is determined to a have occurred. The transaction log can then be retrieved and replayed subsequent to a reboot. Thereby, state can be preserved and transactions pending, but not yet committed to storage server devices, can be replayed and proceed with minimal or no impact on the client devices originating the write transactions. | 05-28-2015 |
20150301904 | MANAGING BACK UP OPERATIONS FOR DATA - Backup operations for data resources can be managed as follows. At least one data resource residing on at least one data storage device is identified. An information processing system automatically determines that the at least one data resource fails to be associated with a backup policy. In response to the at least one data resource failing to be associated with a backup policy, at least one backup policy is associated with the at least one data resource. | 10-22-2015 |
20150309848 | MEMORY EFFICIENT THREAD-LEVEL SPECULATION - A processor device executes program code in one or more threads. The processor device detects a call of a function in one of the threads and executes the function in a further thread. Further, the processor device performs a selection between saving a state of the processor device when starting execution of the function in the further thread and not saving the state of the processor device when starting execution of the function in the further thread. In response to a conflict related to the execution of the function in the further thread, the processor device may perform a rollback to a last saved state of the processor device and execute the function in the thread in which it was called. | 10-29-2015 |
20150317199 | SYSTEM-LEVEL ISSUE DETECTION AND HANDLING - Issue detection and handling technology in which issue definitions that enable detection of issues at different devices of an enterprise level system that operate different applications are maintained. Solution definitions that relate to resolving issues detected based on the issue definitions are also maintained. Issue detection logic based on the issue definitions is provided to each of the different devices of the enterprise level system. Issue detection information collected based on the issue detection logic is received from at least one of the different devices of the enterprise level system. Based on the issue detection information, an issue at the at least one device is determined. A solution definition related to resolving the determined issue is accessed from the solution definitions. Based on the accessed solution definition, an operation directed to handling the determined issue is performed. | 11-05-2015 |
20150317200 | Methods, Systems, Devices, and Products for Error Correction in Computer Programs - Access to personal information is restricted when analyzing errors in computer programs. Variables are named with prefixes to identify data that must be transformed before disclosure. If a variable has a name that requires transformation, the associated data must be transformed before resolving an error. | 11-05-2015 |
20150331753 | METHOD AND APPARATUS OF DISASTER RECOVERY VIRTUALIZATION - Systems and methods described herein involve a virtual storage utilized to virtualize the storage of storage systems across multiple sites. The virtual storage is associated with a virtual multipath control. The virtual multipath control manages the virtual path state of the inter-physical storage, the remote copy volume state which has primary volume or secondary volume state, and the volume copy operation mode such as synchronous copy mode journal copy mode, or bitmap resync mode. The virtual multipath control of the virtual storage facilitates choices from the host for a preferred site, path, state, and volume by utilizing a virtual multipath state from a get virtual multipath information command. | 11-19-2015 |
20150347234 | RECOVERY METHOD FOR PORTABLE TOUCH-CONTROL DEVICE AND PORTABLE TOUCH-CONTROL DEVICE USING THE SAME - A recovery method used by a portable touch-control device is disclosed. The portable touch-control device comprises a storage for storing a program The recovery method comprises: executing the program by the portable touch-control device; detecting an exception condition when an exception occurred during executing the program; analyzing the exception condition to determine at least one module corresponding to the exception condition; determining a predetermined exception processing logic according to the module; and performing a recovery process according to the predetermined exception processing logic to recovery the portable touch-control device by itself. | 12-03-2015 |
20150347238 | RESTORING COMPUTING ENVIRONMENTS, SUCH AS AUTORECOVERY OF FILE SYSTEMS AT CERTAIN POINTS IN TIME - A method and system for restoring a computing environment from a secondary data store, and facilitating such restoration, is described. In some examples, the system copies the configuration parameters of a computing environment, such as a file system, as well as the data within the file system, and transfers the copies to secondary storage for later restoration. For example, the system may generate an xml file of the configuration parameters of the computing environment when a backup operation of the computing environment is performed, and store the xml file along with copies of the data from the computing environment in secondary storage. | 12-03-2015 |
20150355962 | MALFUNCTION ESCALATION - A data processing apparatus | 12-10-2015 |
20150355972 | SALVAGING HARDWARE TRANSACTIONS - A transactional memory system salvages a partially executed hardware transaction. A processor of the transactional memory system saves state information in a first code region of a first hardware transaction, the state information useable to determine whether the first hardware transaction is to be salvaged or to be aborted. The processor detects an about to fail condition in the first code region of the first hardware transaction. The processor, based on the detecting, executes an about-to-fail handler, the about-to-fail handler using the saved state information to determine whether the first hardware transaction is to be salvaged or to be aborted. The processor executing the about-to-fail handler, based on the transaction being to be salvaged, uses the saved state information to determine what portion of the first hardware transaction to salvage. | 12-10-2015 |
20150355974 | REBUILDING DATA ACROSS STORAGE NODES - A method for proactively rebuilding user data in a plurality of storage nodes of a storage cluster is provided. The method includes distributing user data and metadata throughout the plurality of storage nodes such that the plurality of storage nodes can read the user data, using erasure coding, despite loss of two of the storage nodes. The method includes determining that one of the storage nodes is unreachable and determining to rebuild the user data for the one of the storage nodes that is unreachable. The method includes reading the user data across a remainder of the plurality of storage nodes, using the erasure coding and writing the user data across the remainder of the plurality of storage nodes, using the erasure coding. A plurality of storage nodes within a single chassis that can proactively rebuild the user data stored within the storage nodes is also provided. | 12-10-2015 |
20150363278 | VIRTUAL RESOURCE-BASED BACKUP - A device may receive a virtual image of a first state of a first virtual machine. Session information of the state of the first virtual machine may be synchronized with a second state of a second virtual machine. The second state of the second virtual machine may become active when the first virtual machine becomes unavailable. The device may identify that the first virtual machine is unavailable; and output, based on the identifying, the virtual image of the first state to a particular third virtual machine, to cause the particular third virtual machine to restore the first state of the first virtual machine. The second state of the second virtual machine may become inactive when the first state is restored to the third virtual machine. | 12-17-2015 |
20150370640 | MODELING THE TOPOLOGY OF MANAGEMENT SERVERS IN A DISTRIBUTED SYSTEM - Techniques disclosed herein enable efficient creation of models that represent connection topology of virtual machine (VM) management servers and site recovery manager (SRM) servers configured to provide VM recovery services across multiple locations. In operation, an SRM topology unit initializes a model to represent a VM management server. The SRM topology unit expands the model to represent a first SRM server that is logically connected to the VM management server and supports VM recovery at a first location. The SRM topology unit further expands the model to reflect a pairing relationship between the first SRM server and a second VM management server that supports VMs at a second location. Creating an easily-comprehended model in this hierarchical and automated fashion improves on conventional techniques where holistically evaluating the connection topology is predominantly a tedious and error-prone manual process. | 12-24-2015 |
20150370642 | IMPLEMENTING CONCURRENT ADAPTER FIRMWARE UPDATE FOR AN SRIOV ADAPTER IN A VIRTUALIZED SYSTEM - A method, system and computer program product are provided for implementing concurrent adapter firmware update of a Single Root Input/Output Virtualization (SRIOV) adapter in a virtualized system. An adapter driver is used to update adapter firmware concurrent with normal I/O operations. When configuration is stored in a scratchpad buffer, the adapter driver detects virtual functions (VFs) configured and operating. An enhanced error handling (EEH) process is initiated, freezing the VFs, and an updated adapter firmware image is loaded to the adapter. The adapter driver completes the EEH recovery, the adapter is restarted using the new updated adapter firmware. The VFs device drivers unfreeze the VFs, and complete the EEH recovery. | 12-24-2015 |
20150370655 | MEMORY MODULE CONTROLLER SUPPORTING EXTENDED WRITES - Example methods and apparatus disclose supporting extended writes to a memory. An example method disclosed herein includes storing recovery information associated with a write request in a memory without processor intervention, the recovery information to facilitate redoing or undoing a write requested by the write request in the event that the write is interrupted, the write request received from a processor and comprising a destination address and new data; and if the write is not interrupted, writing the new data to the destination address in the memory without processor intervention | 12-24-2015 |
20150370657 | PROTECTING VIRTUAL MACHINES FROM NETWORK FAILURES - Systems and techniques are described for protecting virtual machines from network failures. A described technique includes running a virtual machine on a first source host; replicating, over a first network, data related to the virtual machine to a destination host; determining that the destination host has become unreachable, over the first network, from the first source host; determining whether a second source host can reach the destination host over the first network or a second network; determining whether the virtual machine can run on the second source host; and running the virtual machine on the second source host. | 12-24-2015 |
20150378746 | SELF-HEALING USING AN ALTERNATE BOOT PARTITION - Methods, apparatus and computer program products implement embodiments of the present invention that enable a computer system comprising networked computers to self-heal from a boot failure of one of the computers. In some embodiments, upon detecting a first computer failing to successfully load a first boot image, a second computer configures the first computer to boot a second boot image. Upon power cycling, the first computer loads the second boot image. | 12-31-2015 |
20150378758 | Processing Virtual Machine Objects through Multistep Workflows - Techniques to process virtual machine objects through multistep workflows in a computer system are described. In an example, a method of processing virtual machine objects through a workflow having a plurality of ordered steps in a computer system includes executing the workflow on computing resources of the computer system using the virtual machine objects as parametric input, where the computing resources: divide the virtual machine objects into workgroups; perform instances of a step of the workflow in parallel on the workgroups as the workgroups complete a prior step in the workflow; and execute an agent to delegate the workgroups to, and receive results from, the instances of the step as the workflow is executed. | 12-31-2015 |
20150378809 | METHODS FOR IMPLEMENTING ERROR DETECTION AND RECOVERY AND DEVICES THEREOF - A method, device and non-transitory computer readable medium that implements error detection and recovery includes receiving from one or more agents monitoring one or more subsystem processes of a business process operating in a cloud based architecture an identification of an error condition in at least one of the subsystem processes. Additionally, any associated information or data necessary to execute the at least one of the subsystem processes with the identified error condition is received. An error recovery process for the at least one of the subsystem processes with the identified error condition is executed by the application management computing device. The recovered at least one of the subsystem processes with the identified error condition is reinitiated using the received information or data corresponding to the at least one of the subsystem processes with the identified error condition. | 12-31-2015 |
20150378829 | RESOURCE PRE-CONFIGURATION - In an embodiment, a method of resource pre-configuration includes obtaining, at a target system, configuration information about a resource that is predicted to be used by a transaction which will be executed on the target system. The resource is configured, at the target system, based on the configuration information. The configuring is before the transaction requests use of the resource | 12-31-2015 |
20150378831 | USING A RECOVERY SNAPSHOT DURING LIVE MIGRATION - Examples perform live migration of VMs from a source host to a destination host using destructive consistency breaking operations. The disclosure makes a record of a consistency group of VMs on storage at a source host as a fail-back in the event of failure. The source VMs are live migrated to the destination host, disregarding consistency during live migration, and potentially violating the recovery point objective. After live migration of all of the source VMs, consistency is automatically restored at the destination host and the live migration is declared a success. | 12-31-2015 |
20150378850 | VIRTUAL MACHINE FAULT TOLERANCE - One or more techniques and/or systems are provided for hosting a virtual machine from a snapshot. In particular, a snapshot of a virtual machine hosted on a primary computing device may be created. The virtual machine may be hosted on a secondary computing device using the snapshot, for example, when a failure of the virtual machine on the primary computing device occurs. If a virtual machine type (format) of the snapshot is not supported by the secondary computing device, then the virtual machine within the snapshot may be converted to a virtual machine type supported by the secondary computing device. In this way, the virtual machine may be operable and/or accessible on the secondary computing device despite the failure. Hosting the virtual machine on the secondary computing device provides, among other things, fault tolerance for the virtual machine and/or applications comprised therein. | 12-31-2015 |
20160004582 | MANAGEMENT SYSTEM AND MANAGEMENT PROGRAM - A management system manages a plurality of management target devices. A storage device stores one or more rules, plan information, and plan history information. A control device specifies a first cause event that is a candidate of a cause of the event that has occurred in any one of the management target devices based on the one or more rules, specifies a plurality of first plans that can be executed in the case in which the first cause event is a cause based on the plan information, calculates an index value indicating a possibility of succeeding in a failure recovery in the case in which the plan is executed for each of the plurality of first plans based on the plan history information, and displays data indicating any one or more plans of the plurality of first plans according to a display mode decided based on the index value. | 01-07-2016 |
20160004586 | DELAYED DISK RECOVERY - A method of recovering content stored on a computer readable medium transported by a vehicle comprises identifying, by one or more computer processors, an error on the computer readable medium, storing, by the one or more computer processors, an indication of the error, and detecting, by the one or more computer processors, an interval of travel of the vehicle during which the computer readable medium has access to stable power. The method further includes, during the detected interval of travel, initiating, by the one or more computer processors, a recovery of the computer readable medium based on the indication of the error. | 01-07-2016 |
20160004588 | PROBLEM MANAGEMENT SOFTWARE - Computer systems are managed by providing systems programmers with visual displays and user interfaces that identify certain issues and allow the system programmer to readily apply fixes, patches, and other updates without tediously sifting through a mountain of information and manually addressing those issues. The systems herein, provide a more streamlined approach for the system programmer by reducing the possibility of overlooking a particular issue that may adversely affect the system. | 01-07-2016 |
20160004590 | SALVAGING HARDWARE TRANSACTIONS WITH INSTRUCTIONS - A transactional memory system salvages a hardware transaction. A processor of the transactional memory system executes a first salvage checkpoint instruction in a code region during transactional execution of the code region, and based on the executing the first salvage checkpoint instruction, the processor records transaction state information comprising an address of the first salvage checkpoint instruction within the code region. The processor detects a pending point of failure in the code region during the transactional execution, and based on the detecting, determines that the transaction state information been recorded, and further based on the detecting, executes an about-to-fail handler. Based on executing the about-to-fail handler, the processor returns to the execution of the code region of the transaction at the address of the checkpoint instruction. | 01-07-2016 |
20160004608 | METHOD AND DEVICE FOR SYNCHRONOUSLY RUNNING AN APPLICATION IN A HIGH AVAILABILITY ENVIRONMENT - A method for synchronously running an application in a high availability environment including a plurality of calculating modules interconnected by a very high-speed broad band network, includes: configuring the modules into partitions including a primary and a secondary partition and a monitoring partition; running the application on each running partition, inputs-outputs processed by the primary partition transmitted to the secondary running partition via the monitoring partition; synchronizing the runnings via exploiting microprocessor context changes; transmitting a catastrophic error signal to the monitoring partition; continuing the running by switching to a degraded mode, the running continuing on a single partition. | 01-07-2016 |
20160011930 | METHOD FOR PREVENTING READ-DISTURB ERRORS, MEMORY CONTROL CIRCUIT UNIT AND MEMORY STORAGE APPARATUS | 01-14-2016 |
20160011931 | INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING METHOD | 01-14-2016 |
20160011932 | Method for Monitoring Software in a Road Vehicle | 01-14-2016 |
20160026518 | RECOVERY PROGRAM USING DIAGNOSTIC RESULTS - Techniques for recovering an enclosure are provided. A recovery program is retrieved from a recovery program repository. Results from a plurality of diagnostic tests are retrieved. The diagnostic test results are analyzed with the recovery program. The recovery program determines an enclosure recovery action. The enclosure is recovered using the determined recovery action. | 01-28-2016 |
20160026521 | EXCEPTION WRAPPING SYSTEM - The described technology is directed towards handling errors in an application program that allows for a taxonomy and precedence order of errors. Exception wrapping includes preserving relevant information with an exception, and consolidates a series of errors into a single dominant exception instance that is handled appropriately depending on the exception type. Also described is a centralized exception manager that outputs an interactive dialog based upon the exception type, and takes a recovery action based upon user interaction with the dialog. | 01-28-2016 |
20160026547 | GENERATING PREDICTIVE DIAGNOSTICS VIA PACKAGE UPDATE MANAGER - Embodiments relate to generating predictive diagnostics via a package update manager. A processing device can identify a set of package updates available to update a set of installed software packages on a client machine. Using a diagnostic database and an event log, the processing device identifies a potential fault condition related to the set of package updates. The event log can include a state of the client machine. The processing device can generate a repair action in view of the potential fault condition and generate a modified set of package updates in view of the repair action. The processing device can send the modified set of package updates to the client machine. | 01-28-2016 |
20160036719 | DYNAMIC SCALING OF REDUNDANCY ELIMINATION MIDDLEBOXES - Systems and methods for dynamic scaling of RE middleboxes in a communication network are described. According to the present subject matter, the method comprises determining a load of incoming data at an encoding middlebox in the communication network. Further, the method comprises modifying a number of encoder instances in the encoding middlebox and a number of decoder instances in a decoding middlebox based on the load of incoming data. | 02-04-2016 |
20160041866 | PROCESSING RUN-TIME ERROR MESSAGES AND IMPLEMENTING SECURITY POLICIES IN WEB HOSTING - A user administers web hosting on user's server from his computer remotely. When a run time error is generated, an error message is sent to a server connected to a knowledge database. If the error matches the known error form the knowledge database, the user is provided an article with a solution to the run-time error. Statistics of occurrence of the errors are saved in the knowledge database. The frequently occurring errors are provided to developers for creating hosting application updates. Additionally, security policies of the user's server can be updated based on the data from the knowledge database. | 02-11-2016 |
20160041867 | SYSTEMS AND METHODS FOR REMOTE MONITORING IN A COMPUTER NETWORK - Systems and methods for providing automated problem reporting in elements used in conjunction with computer networks are disclosed. The system comprises a plurality of elements that perform data migration operations and a reporting manager or monitor agent which monitors the elements and data migration operations. Upon detection of hardware or software problems, the reporting manager or monitor agent automatically communicates with elements affected by the problem to gather selected hardware, software, and configuration information, analyzes the information to determine causes of the problem, and issues a problem report containing at least a portion of the selected information. The problem report is communicated to a remote monitor that does not possess access privileges to the elements, allowing automated, remote monitoring of the elements without compromising security of the computer network or elements. | 02-11-2016 |
20160041886 | DATA STORAGE UPON DATABASE FAILURE - Data values stored in a primary database are synchronized to a reading database in M seconds. In the event of a failure of the primary database, a transaction processing server determines a transaction request in M seconds and performing a transaction processing of the transaction request to acquire a corresponding transaction identification and a data variation value, determines whether a data value corresponding to the transaction identification is stored in a standby database or not; if not, determines an accurate data value corresponding to the transaction identification by using the data value stored in the reading database and the data variation value; and stores the transaction identification and the accurate data value in the standby database to provide a service based on the data value stored in the standby database. The techniques of the present disclosure prevent the transaction from being interrupted and improve user experience. | 02-11-2016 |
20160055063 | PROGRESS RECORDING METHOD AND RECOVERING METHOD FOR ENCODING OPERATION ON STORAGE DEVICE - A recovering method is adapted to an encoding operation performed on a storage area of a storage device. The recovering method includes: reading a variable set, wherein the encoding operation comprises a plurality of sub-operations, and each of the sub-operations is corresponding to at least one flag variable in the variable set; determining whether any one of the sub-operations is interrupted according to the variable set; when one of the sub-operations is interrupted, recovering the sub-operation according to the at least one flag variable corresponding to the sub-operation; and carrying on the encoding operation according to a process recorded by the flag variables in the variable set. | 02-25-2016 |
20160055068 | Recovering from Compromised System Boot Code - In a state of a system in which a processor of the system is not accessing a first memory, a controller in the system determines whether system boot code from the first memory in the system is compromised, wherein the first memory is accessible by the processor and the controller over a bus. In response to determining that the system boot code is compromised, the controller retrieves system boot code from a second memory in the computing device to replace the system boot code in the first memory, where the second memory is electrically isolated from the bus and is inaccessible by the processor. | 02-25-2016 |
20160055069 | Repairing Compromised System Data in a Non-Volatile Memory - A first non-volatile memory stores a redundant copy of system data that relates to a configuration of at least one physical component of a system, where the first non-volatile memory is accessible by a controller in the system and inaccessible to a processor in the system. It is determined whether system data in a second non-volatile memory accessible by the processor is compromised. In response to determining that the system data in the second non-volatile memory is compromised, the compromised system data in the second non-volatile memory is repaired. | 02-25-2016 |
20160062849 | Recording Device and Control Method of a Recording Device - A recording device | 03-03-2016 |
20160070619 | METHOD AND APPARATUS FOR CONFIGURING I/O CELLS OF A SIGNAL PROCESSING IC DEVICE INTO A SAFE STATE - A peripheral integrated circuit (IC) device for providing support to a data processing IC device. The peripheral IC device comprises a fault detection component arranged to detect an occurrence of fault conditions within the data processing IC device. The peripheral IC device further comprises a safe state control component. Upon detection of a fault condition occurring within the data processing IC device by the fault detection component, the safe state control component is arranged to cause at least one I/O cell of the data processing IC device to be configured into at least one scan-chain, and cause at least one predefined control signal to be scanned into the at least one scan-chain to configure the at least one I/O cell into a state corresponding to the predefined control signal. | 03-10-2016 |
20160077917 | DATA RECOVERY USING BITMAP DATA STRUCTURE - Examples of the present disclosure describe implementing bitmap-based data replication when a primary form of data replication between a source device and a target device cannot be used. According to one example, a temporal identifier may be received from the target device. If the source device determines that the primary replication method is unable to be used to replicate data associated with the temporal identifier, a secondary replication method may be initiated. The secondary replication method may utilize a recovery bitmap identifying data blocks that have changed on the source device since a previous event. | 03-17-2016 |
20160077919 | METHODS AND APPARATUS TO PERFORM SITE RECOVERY OF A VIRTUAL DATA CENTER - Methods, apparatus, systems and articles of manufacture to perform site recovery of a virtual data center are disclosed. An example method includes discovering a work item to be included in a protection group associated with a recovery plan. The work item is not included in the protection group prior to execution of the site recovery workflow and the work item is discovered during execution of a site recovery workflow. The method also includes causing an operation of the site recovery workflow to be performed on the work item, and storing, in a persistable data container, a work item identifier identifying the work item. A result indicating the outcome of the operation performed on the work item is also stored. In some examples, the persistable data container is accessible to a status output device. | 03-17-2016 |
20160085637 | DATA FORWARDING USING MULTIPLE DATA PIPELINES - In accordance with implementations of the present disclosure, a computer-implemented method for forwarding data includes generating a backup of received live data. The backup of the received live data may be generated on non-volatile storage. The method further includes providing the received live data to a first data buffer for forwarding of the received live data, where a portion of the received live data is dropped prior to being forwarded. Based on the portion of the received live data being dropped, the portion of the received live data is recovered from the backup and the recovered portion of the received live data is provided to a second data buffer for forwarding of the recovered portion of the received live data. | 03-24-2016 |
20160085640 | METHODS, APPARATUS AND SYSTEM FOR SELECTIVE DUPLICATION OF SUBTASKS - A method for selective duplication of subtasks in a high-performance computing system includes: monitoring a health status of one or more nodes in a high-performance computing system, where one or more subtasks of a parallel task execute on the one or more nodes; identifying one or more nodes as having a likelihood of failure which exceeds a first prescribed threshold; selectively duplicating the one or more subtasks that execute on the one or more nodes having a likelihood of failure which exceeds the first prescribed threshold; and notifying a messaging library that one or more subtasks were duplicated. | 03-24-2016 |
20160092297 | API Gateway System and Method - An API gateway provides a failure policy for services that fail when presented with a request. An API definition includes a policy for controlling subsequent calls to a server once failures are detected. The policy provides a threshold number of failures before requests are failed-fast. After a timeout period, requests are again presented to the service in an attempt to reset the system. The first request is allowed to pass and subsequent calls are either allowed to pass, if the requests succeed, or fail fast if the requests fail. When the requests succeed, the system follows a procedure to ramp up the use of the service in order to allow the system time to recover, by looping through stages configured by the service and set out in the API definition. | 03-31-2016 |
20160092314 | HIGH AVAILABILITY PROTECTION FOR ASYNCHRONOUS DISASTER RECOVERY - A computer-implemented method, carried out by one or more processors, for a modified asynchronous replication session. In an embodiment, the method comprises the steps of acquiring a lock on a volume configuration, where the lock prevents changes to the volume configuration between a first volume and a second volume at a remote site. Internal control block information is updated, where the update includes at least a volume serial number of the first volume matching a volume serial number of the second volume. Responsive to updating internal control block information, the acquired lock is released to allow changes to the volume configuration. | 03-31-2016 |
20160092318 | RESOURCE MANAGER FAILURE HANDLING IN A MULTI-PROCESS TRANSACTION ENVIRONMENT - A processor receives a request to perform a transaction, wherein each activity of the transaction is respectively associated with an application server process. The processor creates an entry in a mapping file, which includes at least information regarding the transaction, one or more resource managers to perform activities of the transaction, and the resources managed by the one or more resource managers. In response to detection of a failure of a resource manager of the one or more resource managers, the processor receives a notification from a call-back function of an XA specification switch of the resource manager associated with the failure. The processor identifies an application server process associated with the failure of the resource manager, and sends an event to terminate the application server process associated with the failure of the resource manager. | 03-31-2016 |
20160103729 | Memory Fault Patching Using Pre-Existing Memory Structures - A computer architecture addresses intermittent memory faults by exploiting redundancy inherent in a hierarchical memory structure, for example, as data moves through various cache levels and registers before use by the processor. Accesses to data from faulted memory areas is diverted to a secondary memory structure holding that data and the secondary memory structure is flagged to increase the persistence of the stored data used for patching against normal updating policies. | 04-14-2016 |
20160103737 | BUFFERED CLONED OPERATORS IN A STREAMING APPLICATION - A streams manager clones a portion of a primary flow graph to a virtual machine with a buffer to assure no data is lost if the corresponding portion of the primary flow graph fails. The buffer can be on the input of the cloned portion or on the output of the cloned portion. Cloning a portion of a primary flow graph with a buffer assures no data is lost when the corresponding portion of the primary flow graph fails. When the primary flow graph recovers from the failure, the processing may be switched back to the primary flow graph, which causes the buffer to begin buffering once again. | 04-14-2016 |
20160110268 | APPARATUS AND SUPPORT METHOD FOR STATE RESTORATION - A storing unit stores therein information indicating a chronological order of a plurality of states of an apparatus; information indicating an amount of time needed to execute each of a plurality of commands, causing a forward or backward transition between two of the states; and information indicating an amount of time needed for restoration to, among the states, each state for which a snapshot has been taken, using the snapshot. Based on the information stored in the storing unit, a calculating unit calculates shortest operation paths, each for restoring the apparatus from a restoration origin state to one of the remaining states, and determines one or more snapshots not used in any of the shortest operation paths as deletion targets. | 04-21-2016 |
20160117225 | MOBILE FLASH STORAGE BOOT PARTITION AND/OR LOGICAL UNIT SHADOWING - Embodiments of the inventive concept include computer-implemented method for shadowing one or more boot images of a mobile device. The technique can include duplicating boot images to shadow partitions in a user area of a non-volatile memory device such as a flash memory. The technique can include detecting boot image corruption, and causing a mobile device to boot from the shadow partitions. The technique can include dynamically shadowing and releasing blocks used by the shadow partitions. The technique can include boot failure recovery and bad image preservation through firmware flash translation layer (FTL) logical to physical mapping updates. Boot image corruption failures can be recovered from and/or debugged using the shadow partitions. | 04-28-2016 |
20160124799 | TARGETED CRASH FIXING - Client devices having deployed an application may experience a crash of the application. For example, a first client device may experience a first crash having a first crash signature of the application. After experiencing the first crash, a first device identification of the first client device may be assigned to a first bucket designating one or more device identifications of client devices having experienced the first crash. Client devices having device identifications in the first bucket are provided with a first crash fix for the first crash, while a second client device is not provide with the first crash fix, where the application is deployed on the second client device and the second client device was not assigned to the first bucket. | 05-05-2016 |
20160124801 | COMPONENT STATE MANAGEMENT METHOD FOR COMPONENT BASED SOFTWARE AND APPARATUS THEREOF - Exemplary embodiments of the present invention relate to component state management method for component-based software and apparatus thereof A component state management method for component-based software according to an embodiment of the present invention comprises: detecting state transition of at least one property component while in a running state an upper component and property components which are referred by the upper component are driving; when state transition of the at least one property component is detected, determining whether the state transitioned property component is essential to drive the upper component; determining, based on the determined result, whether state transition of the upper component is to be made. According to exemplary embodiments of the present invention, even though some of components do not operate due to a failure, a system may operate without interruption. | 05-05-2016 |
20160124816 | COMPUTING DEVICE AND METHOD FOR RECOVERING BIOS OF COMPUTING DEVICE - In a method and system for recovering a basic input-output system (BIOS) of a computing device, the computing device includes a serial peripheral interface (SPI) read-only memory (ROM) and a super I/O (SIO) controller. The SPI ROM stores a BIOS booting block and a main BIOS. The SIO controller connects to an universal serial bus (USB) storage that stores a | 05-05-2016 |
20160132372 | Cognitive Analysis for Healing an IT System - A cognitive computing hardware system receives an error log from an IT system. The error log comprises a record of errors currently being detected by sensors in the IT system. The cognitive computing hardware system receives an error history log, which describes a history of past errors that have occurred in the IT system. The cognitive computing hardware system receives a listing of alternative IT systems that have been predetermined to have a same functionality as the IT system that is currently experiencing the errors. The cognitive computing hardware system receives a record of real-time events that are external to the IT system, and generates a prioritized set of solutions to heal the IT system, based on the error history log, the listing of alternative IT systems, and the record of real-time events. The cognitive computing hardware system transmits a highest prioritized solution to the IT system. | 05-12-2016 |
20160132401 | SYSTEMS AND METHODS FOR SECURE REMOTE STORAGE - Systems and methods are provided for transmitting data to at least one storage system. A request is received to store a data set in a storage location. In response, a first plurality of shares is generated, each containing a distribution of data from the data set, and at least one share is stored in a local memory configured for backup in at least one remote storage system. At least one share is transmitted to the at least one remote storage system. Systems and methods are also provided for improving data availability. In response to a restoration event, if insufficient shares of data are available to reconstruct a data set, a read instruction in a journaling message is transmitted to a remote storage system requesting an additional share. The additional share is received and stored in a local storage, and the data set is reconstructed. | 05-12-2016 |
20160139992 | SEGMENT DEDUPLICATION SYSTEM WITH ENCRYPTION AND COMPRESSION OF SEGMENTS - A system for storing encrypted compressed data comprises a processor and a memory. The processor is configured to determine whether an encrypted compressed segment has been previously stored. The encrypted compressed segment was determined by breaking a data stream, a data block, or a data file into one or more segments and compressing and then encrypting each of the one or more segments. The processor is further configured to store the encrypted compressed segment in the event that the encrypted compressed segment has not been previously stored. The memory is coupled to the processor and configured to provide the processor with instructions. | 05-19-2016 |
20160139994 | FAULT MANAGEMENT SYSTEM, FAULT MANAGEMENT SERVER, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM IN WHICH FAULT MANAGEMENT PROGRAM IS STORED - In a fault management system, each of one or more image forming apparatuses includes an agent unit that transmits, upon occurrence of a fault, a notice that the fault has occurred and service call information indicative of details of the fault to a fault management server. The fault management server includes a manager unit that transmits a reboot command to the agent unit of the image forming apparatus in which the fault has occurred, upon reception of the notice and the service call information from the agent unit of the image forming apparatus in which the fault has occurred. The agent unit of the image forming apparatus in which the fault has occurred reboots the image forming apparatus in which the fault has occurred, according to the reboot command. | 05-19-2016 |
20160147591 | METHOD AND SYSTEM FOR EFFICIENT TRANSITION OF INFORMATION TECHNOLOGY OPERATIONS - This disclosure relates generally to computing devices, and more particularly to transition of IT operations. In one embodiment, a method and system is provided for generating an efficient transition plan for IT operations while addressing aspects such as coverage, risk, time, and cost. The IT operations are modeled through graphs and use well-defined problems in graph theory to build solutions. Heavy hitter issues are identified to maximize coverage. To minimize risk, severity of an issue is determined, wherein the severity is based on the instability caused or penalties associated with the issue. Further, transition time is minimized by finding issue-communities for parallel transition by finding maximum cliques. Yet further, the bin-packing algorithm is used to optimize the teams of resolvers and thus minimize cost. Finally, a transition plan is generated by systematically identifying issue communities for transition using the minimum hitting set and minimum vertex cover problem. | 05-26-2016 |
20160147605 | SYSTEM ERROR RESOLVING METHOD - The present invention provides a system error resolving method including the following steps. In a resolving period of a first system error, determine whether a second system error occurs. When the second system error occurs, a system status is identified. A second error type corresponding to the second system error is identified, wherein a first error type of the first system error and the second error type of the second system error are in association with a first priority value and a second priority value, respectively. According to the first priority value of the first error type and the second priority value of the second error type, the first system error and the second system error are sorted into a resolving sequence. | 05-26-2016 |
20160147639 | Redundant Transactions for Detection of Timing Sensitive Errors - A method for detecting a software-race condition in a program includes copying a state of a transaction of the program from a first core of a multi-core processor to at least one additional core of the multi-core processor, running the transaction, redundantly, on the first core and the at least one additional core given the state, outputting a result of the first core and the at least one additional core, and detecting a difference in the results between the first core and the at least one additional core, wherein the difference indicates the software-race condition. | 05-26-2016 |
20160147705 | IMPLEMENTING HEALTH CHECK FOR OPTICAL CABLE ATTACHED PCIE ENCLOSURE - A method, system and computer program product are provided for implementing health check for optical cable attached Peripheral Component Interconnect Express (PCIE) enclosures in a computer system. System firmware is provided for implementing health check functions. One or more optical cables are connected between a host bridge and a PCIE enclosure. A PCIE link to the PCIE enclosure is reset responsive to a predefined event. After a set delay, a PCIE link health check is performed verifying PCIE link width and speed. | 05-26-2016 |
20160154695 | SIGNAL AUTO-TUNING SYSTEM AND METHOD OF USING THE SAME | 06-02-2016 |
20160154700 | Startup Method and Apparatus and Computer System | 06-02-2016 |
20160170825 | DEVICE MANAGEMENT SYSTEM AND METHOD | 06-16-2016 |
20160179622 | ENERGY CONSCIOUS MOBILE DEVICE REDUNDANCY AND RECOVERY | 06-23-2016 |
20160179623 | ENERGY CONSCIOUS MOBILE DEVICE REDUNDANCY AND RECOVERY | 06-23-2016 |
20160188413 | VIRTUAL MACHINE DISTRIBUTED CHECKPOINTING - A method, system and computer program product for checkpointing virtual machines (VMs). The system includes a primary computer hosting a hypervisor and a primary VM. The hypervisor is configured instantiate the primary VM, divide the state of the primary VM into a plurality of memory blocks, and generate an error correction block based on the plurality of memory blocks. The system further includes a plurality of secondary computers. Each of the secondary computers stores a secondary VM and one of either the memory blocks or the error correction block. | 06-30-2016 |
20160196161 | SALVAGING HARDWARE TRANSACTIONS | 07-07-2016 |
20160196177 | Second Failure Data Capture in Co-Operating Multi-Image Systems | 07-07-2016 |
20160196185 | EXERCISE HISTORY INFORMATION MANAGING METHOD AND ELECTRONIC DEVICE SUPORTING THE SAME | 07-07-2016 |
20160196191 | SALVAGING HARDWARE TRANSACTIONS | 07-07-2016 |
20160198123 | Architecture for High Availability Conferencing | 07-07-2016 |
20160203062 | PRIORITY BASED FAILOVER FOR DATABASES | 07-14-2016 |
20160378588 | Error Recovery within Integrated Circuit - An integrated circuit includes one or more portions having error detection and error correction circuits and which is operated with operating parameters giving finite non-zero error rate as well as one or more portions formed and operated to provide a zero error rate. | 12-29-2016 |
20160378608 | OPERATING METHOD FOR APPLICATION PROGRAM AND ELECTRONIC DEVICE SUPPORTING THE SAME - An electronic device including a memory storing an application program that provides a guide about a user action, collects information on a performance of the user action, or collects information on a user state. A processor connected to the memory is configured to execute the application program, to detect a cause by which the application program is stopped, and to automatically reexecute the application program or to provide a user interface for receiving a user input for the reexecution of the application program on the basis of at least a portion of the detected cause. | 12-29-2016 |
20170235610 | SYSTEM FOR DISTRIBUTED DATA PROCESSING WITH AUTO-RECOVERY | 08-17-2017 |
20180024203 | DETECTION OF ELECTRIC POWER SYSTEM ANOMALIES IN STREAMING MEASUREMENTS | 01-25-2018 |
20180024889 | AUTOMATIC RESTARTING OF CONTAINERS | 01-25-2018 |
20190146879 | METHODS AND SYSTEMS FOR POWER FAILURE RESISTANCE FOR A DISTRIBUTED STORAGE SYSTEM | 05-16-2019 |
20190146885 | RECREATING A COMPUTING ENVIRONMENT USING TAGS AND SNAPSHOTS | 05-16-2019 |