Class / Patent application number | Description | Number of patent applications / Date published |
714021000 | State validity check | 19 |
20090006892 | METHOD AND SYSTEM TO DETECT ERRORS IN COMPUTER SYSTEMS BY USING STATE TRACKING - Disclosed are a method and system for detecting errors in a computer system including a processing unit to perform tasks to change items. The method comprises the steps of assigning a task control block to the processing unit, and using the task control block to keep track of items being changed by the processing unit. The method comprises the further steps of at defined times, checking the task control block to identify items being changed by the processing unit, and checking the states of said identified items to determine if those states are correct. The preferred embodiment of the invention detects an error when it arises (where possible), and utilizes an infrastructure that allows simple and periodic consistency checks (for example, at designated code points) that detect the error before it causes follow-on problems. | 01-01-2009 |
20090077419 | Monitoring System with Trusted Corrective Actions - A system and computer program product for monitoring a data processing system is proposed. The system and computer program product involve the measuring of state parameters of the system. Indicators of the performance of the system are then inferred from the state parameters by applying fuzzy-logic rules. The proposed solution is based on the idea of estimating a trust value, based on the effectiveness of the corrective actions. If the previous corrective actions prove to be effective than the trust value is enhanced and the system is allowed a higher level of autonomy. Otherwise the intervention of an operator might be invoked. | 03-19-2009 |
20090113241 | METHOD, SYSTEM, AND APPARATUS FOR PROVIDING ALERT SYNTHESIS IN A DATA PROTECTION SYSTEM - A method for diagnosing problems with protection of a data source and recovery of the same. The method includes diagnosing a copy of data located at the storage location and diagnosing a temporal version of the copy of data. Based on the diagnosis it is determined whether an error or a warning was detected. If either were detected a response is provided with a suggested solution. | 04-30-2009 |
20100011245 | FAULT TOLERANT ROUTING IN A NON-HOT-STANDBY CONFIGURATION OF A NETWORK ROUTING SYSTEM - Methods and systems for facilitating fault tolerance in a non-hot-standby configuration of a network routing system are provided. According to one embodiment, a method is provided for replacing an active processing engine with a non-hot-standby processing engine. Multiple processing engines within a network routing system are configured. The processing engines include an active processing engine having one or more software contexts, representative of a set of objects implementing a virtual router, for example, and a non-hot-standby processing engine having no pre-created software contexts corresponding to the one or more software contexts. Responsive to determining a fault associated with the active processing engine, the active processing engine is dynamically replaced with the non-hot-standby processing engine by creating replacement software contexts within the non-hot-standby processing engine corresponding to the one or more software contexts. | 01-14-2010 |
20100131797 | METHOD AND SYSTEM FOR ASSESSING AND REMEDYING ACCESSIBILITY OF WEBSITES - A system and method for assessing and remedying accessibility of websites is provided. The method includes receiving a website address for assessment, an accessibility guideline and level of assessment to be performed from the user. The method further includes crawling the website for extracting information. The information comprises HTML tags used in designing a webpage. Thereafter, the website is scanned for checking conformance to one or more accessibility parameters. Finally, one or more assessment reports are provided to the user. | 05-27-2010 |
20100218042 | UNIVERSAL SERIAL BUS HUB WITH WIRELESS COMMUNICATION TO REMOTE PERIPHERAL DEVICES - A wireless USB hub for connecting a plurality of remote peripheral devices to a computer for communication therewith without the need to physically connect the peripheral devices to the hub via a cable connection. The wireless USB hub includes a receiver for receiving wireless data transmissions from one or more remote peripheral devices. The wireless USB hub further includes a hub controller for passing appropriate peripheral device information to a USB upstream port and then to a computer. | 08-26-2010 |
20110087920 | COMPUTING DEVICE WITH RECOVERY MODE - Methods and apparatus for implementing a recovery mode procedure for a computing device are disclosed. An example method includes determining, by a computing device, that a recovery mode procedure is to be executed on the computing device. The example method further includes, determining whether a trusted recovery image is accessible to the computing device and, in the event the trusted recovery image is accessible to the computing device, executing the recovery mode procedure to repair or replace a current image of the computing device using the trusted recovery image. In the event the trusted recovery image is not accessible to the computing device, the example method includes, providing instructions for obtaining the trusted recovery image, determining the obtained trusted recovery image is accessible to the computing device and executing the recovery mode procedure to repair or replace the current image of the computing device using the obtained trusted recovery image. | 04-14-2011 |
20110283139 | METHOD AND APPARATUS TO MAINTAIN DATA INTEGRITY IN DISK CACHE MEMORY DURING AND AFTER PERIODS OF CACHE INACCESSIBILITY - A volatile or nonvolatile cache memory can cache mass storage device read data and write data. The cache memory may become inaccessible, and I/O operations may go directly to the mass storage device, bypassing the cache memory. A log of write operations may be maintained to update the cache memory when it becomes available. | 11-17-2011 |
20120266019 | METHOD AND SYSTEM FOR VIRTUAL ON-DEMAND RECOVERY - A data management system (“DMS”) provides an automated, continuous, real-time, substantially no downtime data protection service to one or more data sources. A host driver embedded in an application server captures real-time data transactions, preferably in the form of an event journal. The driver functions to translate traditional file/database/block I/O and the like into a continuous, application-aware, output data stream. The host driver includes an event processor that can perform a recovery operation to an entire data source or a subset of the data source using former point-in-time data in the DMS. The recovery operation may have two phases. First, the structure of the host data in primary storage is recovered to the intended recovering point-in-time. Thereafter, the actual data itself is recovered. The event processor enables such data recovery in an on-demand manner, by allowing recovery to happen simultaneously while an application accesses and updates the recovering data. | 10-18-2012 |
20130055019 | Pilot Process Method for System Boot and Associated Apparatus - A pilot process method for system boot and an associated are provided. An environment variable is read from a NAND flash memory. When an irrevocable error exists in an environment variable, the environment variable is read successively for a predetermined threshold number of times. A backup variable of the environment variable is read when the irrevocable error is still present in the environment variable that is read for a predetermined threshold number of times, and the environment variable is restored according to the backup variable. Therefore, when it is confirmed that the environment variable is damaged, a backup variable is utilized and the damaged environment variable is restored according to the backup variable, so as to ensure a normal boot-up process of the system to significantly enhance system reliability as well as user experience. | 02-28-2013 |
20140006859 | STORAGE SYSTEM AND DATA MANAGING METHOD THEREOF | 01-02-2014 |
20140053022 | VIRTUAL MACHINE FAULT TOLERANCE - One or more techniques and/or systems are provided for hosting a virtual machine from a snapshot. In particular, a snapshot of a virtual machine hosted on a primary computing device may be created. The virtual machine may be hosted on a secondary computing device using the snapshot, for example, when a failure of the virtual machine on the primary computing device occurs. If a virtual machine type (format) of the snapshot is not supported by the secondary computing device, then the virtual machine within the snapshot may be converted to a virtual machine type supported by the secondary computing device. In this way, the virtual machine may be operable and/or accessible on the secondary computing device despite the failure. Hosting the virtual machine on the secondary computing device provides, among other things, fault tolerance for the virtual machine and/or applications comprised therein. | 02-20-2014 |
20140157049 | System and method for enhancing availability of a distributed object storage system during a partial database outage - An “operate with missing region” feature allows a cluster to continue servicing reads for available regions even when some regions are missing. Upon a given node failure condition, the cluster is placed in an effective read-only mode for all regions. The node failure condition typically is one where there has been a failure of an authoritative region copy and no backup copy is then available. Typically, “read-only” means no client write or update requests succeed while the cluster is in this state. Those requests should fail with an error message that indicates failure because of the read-only status. Preferably, such requests are re-tried. In this mode, regions are only allowed to perform read operations but the cluster continues to operate with missing regions, and missing regions are entered on a region map. The cluster then automatically recovers returning missing regions, after which it leaves the read-only state. | 06-05-2014 |
20140281711 | MANAGED RUNTIME ENABLING CONDITION PERCOLATION - A method, apparatus, and/or computer program product protects a managed runtime from stack corruption due to native code condition handling. A native condition handler, which is associated with a managed runtime, percolates a condition. A condition handler of the managed runtime receives notification of the condition in a native code portion, and the condition handler of the managed runtime marks a thread associated with the condition. Responsive to a determination by the native code handler to resume execution of the marked thread by either call back into or a return to the managed runtime, the managed runtime determines whether a request is associated with the marked thread. Responsive to a determination that the request is associated with the marked thread, the managed runtime performs diagnostics and the managed runtime is terminated. | 09-18-2014 |
20140304550 | Error Detection for Files - Aspects of the subject matter described herein relate to error detection for files. In aspects, before allowing updates to a clean file, a flag marking the file as dirty is written to non-volatile storage. Thereafter, the file may be updated as long as desired. Periodically or at some other time, the file may be marked as clean after all outstanding updates to the file and error codes associated with the file are written to storage. While waiting for outstanding updates and error codes to be written to storage, if additional requests to update the file are received, the file may be marked as dirty again prior to allowing the additional requests to update the file. The request to write a clean flag regarding the file may be done lazily. | 10-09-2014 |
20140372801 | IMPLEMENTING SHARED ADAPTER CONFIGURATION UPDATES CONCURRENT WITH MAINTENANCE ACTIONS IN A VIRTUALIZED SYSTEM - A method, system and computer program product are provided for implementing shared adapter configuration updates concurrent with maintenance actions for a Single Root Input/Output Virtualization (SRIOV) adapter in a computer system. A configuration of the adapter is decoupled from the state of the adapter during a recovery period. When a configuration request is received, the configuration request is validated. Responsive to a valid configuration request, the saved configuration state of the adapter is updated. Once the adapter completes recovery, the adapter is restored to the new configuration instead of the configuration prior to failure. | 12-18-2014 |
20140380097 | RECOVERING A VOLUME TABLE AND DATA SETS - Provided are a computer program product, system, and method for recovering a volume table and data sets from a volume. Content from a backup volume table comprising a valid backup of a volume table from backup of the volume is processed to generate a recovery volume table for a recovery volume. The data sets in the volume are processed to determine whether they are valid. The valid data sets are moved to the recovery volume. A data recovery operation is initiated for the data sets determined not to be valid. | 12-25-2014 |
20150033074 | DEADLOCK DETECTION AND RECOVERY IN SAS - Systems and methods herein provide for managing devices through a Serial Attached Small Computer System Interface (SAS) expander. The SAS expander includes a processor adapted to detect deadlock conditions in a SAS environment. In one embodiment, the SAS expander is operable to detect an Open Address Frame associated with a connection request from a source device to a destination device. The Open Address Frame includes a source address and a destination address associated with the source device and the destination device, respectively. The expander receives an arbitration in progress status on a partial pathway that is associated with the connection request. The expander is further operable to modify the Open Address Frame to include a deadlock indicator and forward the modified Open Address Frame on the partial pathway. When the modified Open Address Frame is received, the expander initiates pathway recovery upon determination that the deadlock indicator is valid. | 01-29-2015 |
20150309803 | METHOD AND APPARATUS FOR BOOTING PROCESSOR - A fail-safe booting system suitable for a system-on-chip (SOC) automatically detects and rectifies failures in power-on reset (POR) configuration or boot loader fetch operations. If a failure due to a boot loader fetch occurs, a POR configuration and boot loader are fetched from a different non-volatile memory. The reloading takes place from further different non-volatile memory sources if the boot loader fetch fails again. The automated system operates in accordance with a state machine, and does not involve any manual, on-board switch selection or manual re-programming. | 10-29-2015 |