Entries |
Document | Title | Date |
20110035621 | Systems and Methods for Facilitating Storage Operations Using Network Attached Storage Devices - A system and method for communicating, browsing, verifying and routing data in storage operation systems using network attached storage devices is provided. In some embodiments, the system may include a management module and a media management component connected to the management server, which interoperate with network attached storage devices to provide the communicating, browsing, verifying and routing functions. | 02-10-2011 |
20110066877 | METHOD FOR ACCESSING FLASH MEMORY AND ASSOCIATED MEMORY DEVICE - A method for accessing a flash memory includes: writing a data stream into at least a page of at least one data block of the flash memory, where each page of the data block includes an identity code; reading at least one identity code of the page; and determining a specific page according to at least the identity code, where the specific page is a last page that the data stream is written to before the flash memory is disconnected from a power source. | 03-17-2011 |
20110066878 | NON-VOLATILE SEMICONDUCTOR STORAGE DEVICE - A semiconductor storage device includes a memory cell array including memory cells arranged at respective intersections between first wirings and second wirings. Each of the memory cells includes a rectifier element and a variable resistance element connected in series. A control circuit is configured to apply a first voltage to a selected first wiring and a second voltage lower than the first voltage to a selected second wiring so that a certain potential difference is applied to a selected memory cell positioned at an intersection between the selected first wiring and the selected second wiring. | 03-17-2011 |
20110072299 | LEAK MONITORING SYSTEM AND ASSOCIATED METHODS - A system to check for memory leaks in storage may include a data processing application executing via a computer processor, and storage to store data generated by the data processing application. The system may also include a monitor executing via the computer processor that checks the storage over different time intervals in order to identify a particular sized memory leak in the storage based upon each time interval's length. | 03-24-2011 |
20110072300 | TEARING-PROOF METHOD FOR WRITING DATA IN A NONVOLATILE MEMORY - A method for writing and reading data in memory cells, comprising, when writing a data in a block of a first memory zone, a step consisting of writing in a second memory zone a temporary information structure metadata comprising a start flag, an identifier of the temporary information structure, an information about the location of the block in the first memory zone, and a final flag, and, after a power on of the first memory zone, searching for an anomaly in temporary information structures present in the second memory zone. | 03-24-2011 |
20110072301 | SYSTEMS AND METHODS FOR RECOVERING MEMORY - A system includes a group of devices and a shared memory that is partitioned into blocks that are capable of being allocated to the group of devices using linked lists. The system also includes check logic configured to store a group of bits, where each bit corresponds to one of the blocks, and counter logic configured to count for a predetermined period of time. The system further includes logic configured to clear the group of bits stored in the check logic, cause the counter logic to count for the predetermined period of time, monitor a de-allocation of the blocks in the shared memory, set, for each of the blocks that is de-allocated during the predetermined period of time, the corresponding bit in the check logic, identify, after the predetermined period of time, one or more bits that have not been set, and mark the blocks corresponding to the one or more bits as available for allocation. | 03-24-2011 |
20110093741 | METHOD FOR RECOVERING BIOS AND COMPUTER SYSTEM THEREOF - A method for recovering basic input/output system (BIOS) in a computer system is disclosed. The computer system includes a host unit, a control unit, and a first storage device. The control unit is utilized for controlling system power provided for the host unit. The host unit is utilized for accessing a BIOS code stored in the first storage device to perform a boot process. The method includes turning the system power off when the computer system has a recovery requirement, restoring a backup BIOS code into the first storage device, and turning the system power on to make the host unit access the restored BIOS code in the first storage device for performing the boot process. | 04-21-2011 |
20110093742 | STORAGE APPARATUS AND CONTROL METHOD FOR STORAGE APPARATUS - A storage apparatus connected to a storage device includes a storage module, a memory for storing data to be copied to the storage device, buffers for temporarily saving the data, redundantly, the saved data stored in one of the buffers being recoverable by the data stored in the rest of the buffers, and a control module for executing, storing the data of write request to the storage module and the memory, copying the data to the storage device, saving the data to the buffer when an using rate of the memory is greater than a predetermined rate, writing the saved data stored in the buffer to the memory when an using rate of the memory is not greater than the predetermined rate, detecting a failure of the buffers, and rebuilding the saved data stored in the one of the buffers based on an using state of the buffers. | 04-21-2011 |
20110126043 | Operating System-Firmware Interface Update Recovery - Operating system (‘OS’)-firmware interface update recovery including determining, for each of a plurality of available OS-firmware interface images for booting a computer, whether each available OS-firmware interface image is corrupted or uncorrupted; setting, for each corrupted OS-firmware interface image, a predictive failure analysis (‘PFA’) bit in nonvolatile memory available to the OS-firmware interface update recovery module; selecting an uncorrupted OS-firmware interface image; initiating a boot for the computer with the selected OS-firmware interface image; determining whether a previous update to one of the available OS-firmware interface images was interrupted; and notifying a user that the previous update was interrupted if the previous update to one of the available OS-firmware interface images interrupted. | 05-26-2011 |
20110131444 | SYSTEMS AND METHODS FOR LOW WEAR OPERATION OF SOLID STATE MEMORY - This disclosure is related to systems and methods for low wear operation of solid state memory, such as a flash memory. In one example, a controller is coupled to a memory and adapted to dynamically adjust programming thresholds over the course of usage of the data storage device such that a signal-to-noise ratio from reading data stored in the data storage cells is no less than a minimum amount needed to recover the data using an enhanced error detection capability. | 06-02-2011 |
20110138221 | Controller for disk array device, data transfer device, and method of power recovery process - In a controller of a disk array device, when recovery from a power failure is detected, the controller instructs a reading section to transfer data in a burst mode using a large prefetch amount. When an error is detected, the controller causes the data to be transferred again for an area where the error is detected. Further, the controller designates different access ports for the reading section and an erasing section, and causes these sections to operate in parallel. The reading section reads cache data from a flash memory and stores the cache data in a cache memory. The erasing section uses the access port different from the access port of the reading section, to erase data that is stored in the flash memory and has been transferred by the reading section. | 06-09-2011 |
20110145633 | Blocking Write Acces to Memory Modules of a Solid State Drive - Described are embodiments of an invention for blocking write access to memory modules of a solid state drive. The solid state drive includes a controller access module or a memory access module that controls write access to the solid state drive and the memory modules of the solid state drive. Upon determining that a memory module has failed, the failed memory module or the entire solid state memory device is configured to be read only to prevent an errant write of data over critical data. Further, a failed memory module, or solid state device memory having a failed memory module, may be replaced upon failure. | 06-16-2011 |
20110154102 | INFORMATION SYSTEM, DATA TRANSFER METHOD AND DATA PROTECTION METHOD - Availability of an information system including a storage system that performs remote copy between two or more storage apparatuses and a host computer using such storage system is improved. A third storage apparatus including a third volume is coupled to a first storage apparatus, a fourth storage apparatus including a fourth volume is coupled to a second storage apparatus, the first and third storage apparatuses perform remote copy of copying data stored in a first volume to the third volume, the first and second storage apparatuses perform remote copy of copying data stored in the first volume to a second volume, and the third and fourth storage apparatuses perform remote copy of copying data stored in the third volume to the fourth volume. | 06-23-2011 |
20110225450 | FAILSAFE DIRECTORY FILE SYSTEM IN A DISPERSED STORAGE NETWORK - A file directory system comprises a directory file, a directory address for the directory file, and a directory address failsafe mechanism. The directory file includes one or more directory entries and one or more corresponding addresses for the one or more directory entries. The directory address failsafe mechanism functions to dispersed storage error encode the directory address to produce a plurality of encoded components of the directory address and transmit the plurality of encoded components of the directory address to a plurality of agent modules. | 09-15-2011 |
20110239041 | METHOD TO ESTABLISH HIGH LEVEL OF REDUNDANCY, FAULT TOLERANCE AND PERFORMANCE IN A RAID SYSTEM WITHOUT USING PARITY AND MIRRORING - An apparatus comprising a logically contiguous group of at least two drives, a loop and a compression/decompression circuit. Each of the drives comprises (i) a first region configured to store compressed data of a previous drive and (ii) a second region configured to store uncompressed data of the drive. The loop may be connected to the next drive in the logically contiguous group. The compression/decompression circuit may be configured to compress and decompress the data stored on each of the drives. | 09-29-2011 |
20110246817 | SYSTEMS AND METHODS FOR SECURING DATA IN MOTION - Systems and methods for reading and writing a set of data using a journaling service are provided. The journaling service may be used to identify and record data storage operations associated with one or more shares of data stored in one or more share locations. The journaling service may use logs to record each of the read and write requests to the share locations. In some embodiments, the log may be a queue data structure that stores information associated with failed data storage operations. In some embodiments, the journaling service may leverage both memory and disk storage in order to maintain the journaling queue. In some embodiments, the journaling queue may maintain information associated with the state of each share location. In some embodiments, this information may be used by the journaling service to determine when to monitor and record information regarding data storage operations associated with the share locations. | 10-06-2011 |
20110264947 | ON-LINE CLIENT SERVICE METHOD FOR STORAGE APPARATUS - An on-line client service method for a storage apparatus includes establishing a link between a client host and the storage apparatus for detecting the current status of the storage apparatus, the client host generating a diagnostic result of the storage apparatus, the client host transmitting the diagnostic result to a far-end server, the far-end server determining whether the storage apparatus functions abnormally according to the diagnostic result. If the storage apparatus functions abnormally, the client host reloads a firmware provided by the far-end server to the storage apparatus, and determines whether the storage apparatus functions abnormally after the storage apparatus is reloaded with the firmware. | 10-27-2011 |
20110283135 | MANAGING MEMORY FAULTS - Embodiments are described for managing memory faults. An example system can include a memory controller module to manage memory cells and report memory faults. An error buffer module can store memory fault information received from the memory controller. A notification module can be in communication with the error buffer module. The notification module may generate a notification of a memory fault in a memory access operation. A system software module can provide services and manage executing programs on a processor. In addition, the system software module can receive the notifications of the memory fault for the memory access operation. A notification handler may be activated by an interrupt when the notification of the memory fault in the memory access operation is received. | 11-17-2011 |
20110302445 | SELECTIVE RETIREMENT OF BLOCKS - Systems and methods are provided for selectively retiring blocks based on refresh events of those blocks. In addition to refresh events, other criteria may be applied in making a decision whether to retire a block. By applying the criteria, the system is able to selectively retire blocks that may otherwise continue to be refreshed. | 12-08-2011 |
20110302446 | MONITORING LOST DATA IN A STORAGE SYSTEM - A data validation method comprises associating a validation chunk with one or more data chunks stored on one or more storage mediums. The validation chunk comprises validation information for verifying whether data recorded in a subdivision of the one or more data chunks is lost. A request is received for an operation to be performed on first data stored in a first subdivision of a first data chunk from among said one or more data chunks. One or more portions of the validation information are examined to determine whether the data recorded in said first subdivision is deemed to be lost. | 12-08-2011 |
20110320862 | Edram Macro Disablement in Cache Memory - Embedded dynamic random access memory (EDRAM) macro disablement in a cache memory includes isolating an EDRAM macro of a cache memory bank, the cache memory bank being divided into at least three rows of a plurality of EDRAM macros, the EDRAM macro being associated with one of the at least three rows, iteratively testing each line of the EDRAM macro, the testing including attempting at least one write operation at each line of the EDRAM macro, determining if an error occurred during the testing, and disabling write operations for an entire row of EDRAM macros associated with the EDRAM macro based on the determining. | 12-29-2011 |
20110320863 | DYNAMIC RE-ALLOCATION OF CACHE BUFFER SLOTS - Dynamic re-allocation of cache buffer slots includes moving data out of a reserved buffer slot upon detecting an error in the reserved buffer slot, creating a new buffer slot, and storing the data moved out of the reserved buffer slot in the new buffer slot. | 12-29-2011 |
20120005524 | FAULT TOLERANCE OF MULTI-PROCESSOR SYSTEM WITH DISTRIBUTED CACHE - A semiconductor chip is described having different instances of cache agent logic circuitry for respective cache slices of a distributed cache. The semiconductor chip further includes hash engine logic circuitry comprising: hash logic circuitry to determine, based on an address, that a particular one of the cache slices is to receive a request having the address, and, a first input to receive notice of a failure event for the particular cache slice. The semiconductor chip also includes first circuitry to assign the address to another cache slice of the cache slices in response to the notice. | 01-05-2012 |
20120030506 | READ DISTURB SCORECARD - Systems and methods are disclosed for handling read disturbs based on one or more characteristics of read operations performed on a non-volatile memory (“NVM”). In some embodiments, a control circuitry of a system can generate a variable damage value determined based on one or more characteristics of a read operation. Using the damage value, the control circuitry can update a score associated with the block. If the control circuitry determines that the score exceeds a pre-determined threshold, at least a portion of the block can be relocated to a different memory location in the NVM. In some embodiments, portions of the block may be relocated over a period of time. | 02-02-2012 |
20120072766 | FAULT HANDLING SYSTEMS AND METHODS - Systems and methods for fault handling are presented. In one embodiment, a fault handling method includes: performing an error type detection process including determining if an error is a media error or a connectivity error; performing a detachment determination process to establish an appropriate detachment scenario, wherein the appropriate detachment scenario includes not detaching any mirrors if the connectivity error involves all mirrors; and returning an application write with a failure. In one embodiment, the detachment determination process detaches a mirror in accordance with results of a read-write-back process. In one exemplary implementation, the detachment determination process includes a connectivity status inquiry and mirrors are detached in accordance with results of the connectivity status inquiry. In one exemplary implementation, the connectivity status inquiry includes a SCSI connectivity inquiry. In one embodiment, consistency and synchronization is maintained between the mirrors by utilizing a read-write-back operation. | 03-22-2012 |
20120079313 | DISTRIBUTED MEMORY ARRAY SUPPORTING RANDOM ACCESS AND FILE STORAGE OPERATIONS - A distributed memory array that supports both file storage and random access operations is provided. The distributed memory array includes at least one memory assembly for storing data, each memory assembly having a plurality of memory modules coupled together through a bi-directionally cross-strapped network, each memory module having a switching mechanism. The distributed memory array further includes at least one gateway coupled to the at least one memory assembly through the bi-directionally cross-strapped network. The gateway also includes a plurality of user access ports for providing access to the at least one memory assembly, and a file manager that is configured to receive a request from a user for access to the at least one memory assembly at the user access ports for either file storage or random access operations and to allocate at least one allocation unit of available memory in the at least one memory assembly based on the request from the user. The file manager is further configured to translate further requests from the user to memory mapped transactions for accessing the at least one allocation unit. | 03-29-2012 |
20120079314 | MULTI-LEVEL DIMM ERROR REDUCTION - Embodiments of the present invention include computer-implemented methods for selectively applying remedial actions, according to a predefined order, for reducing the error rate in a computer memory system. In one embodiment, an ordered set of remedial actions are sequentially invoked in response to a single-bit error (SBE) in a DIMM reaching successive error thresholds. For example, in an air-cooled system, the remedial actions may include dynamically increasing a DIMM refresh rate, dynamically increasing a rate of airflow used to cool the DIMMs, and dynamically throttling the DIMMs. The remedial actions may be layered as they are successively invoked, to provide a cumulative remedial effect. At least two of the remedial actions may be simultaneously invoked in response to a multi-bit error rate reaching an associated threshold. | 03-29-2012 |
20120131380 | CRASH RECOVERY MEMORY RESERVATION BASED ON DEVICE DRIVERS FOR AN OPERATIONAL KERNEL - A computing system stores actual memory usage data in a user memory space. The actual memory usage data represents memory usage of a plurality of device drivers that are loaded by a first kernel. The computing system generates an estimate of memory space to be reserved for a second kernel based on the actual memory usage data for the plurality of device drivers that are loaded by the first kernel and reserves memory space for the second kernel using the estimate. | 05-24-2012 |
20120151251 | QUEUE FREEZE ON PROTOCOL ERROR - A method and apparatus for retrieving a state of a processor at a time at which failure is detected. More specifically, the detection of one or more protocol errors results in the halting of operations of one or more system elements, and the retrieving of the state of the processor at the time of the failure. | 06-14-2012 |
20120159238 | System and Method for Recovering from a Configuration Error - A system and method for recovering from a configuration error are disclosed. A Basic Input Output System (BIOS) configures a memory associated with a node of an information handling system and enables a progress monitoring process during configuration of the memory. The memory is disabled if the BIOS determines that a configuration error occurred and a memory reference code associated with the memory is modified in order to prevent a reset of the information handling system. | 06-21-2012 |
20120210162 | STATE RECOVERY AND LOCKSTEP EXECUTION RESTART IN A SYSTEM WITH MULTIPROCESSOR PAIRING - System, method and computer program product for a multiprocessing system to offer selective pairing of processor cores for increased processing reliability. A selective pairing facility is provided that selectively connects, i.e., pairs, multiple microprocessor or processor cores to provide one highly reliable thread (or thread group). Each paired microprocessor or processor cores that provide one highly reliable thread for high-reliability connect with a system components such as a memory “nest” (or memory hierarchy), an optional system controller, and optional interrupt controller, optional I/O or peripheral devices, etc. The memory nest is attached to a selective pairing facility via a switch or a bus. Each selectively paired processor core is includes a transactional execution facility, wherein the system is configured to enable processor rollback to a previous state and reinitialize lockstep execution in order to recover from an incorrect execution when an incorrect execution has been detected by the selective pairing facility. | 08-16-2012 |
20120239967 | RECOVERY FROM MEDIUM ERROR ON TAPE ON WHICH DATA AND METADATA ARE TO BE STORED BY USING MEDIUM TO MEDIUM DATA COPY - A copy export application implemented in a computational device receives a request to perform a copy export operation of data and metadata to a selected tape in a tape library coupled to the computational device. The copy export application copies the data from the computational device to the selected tape. The copy export application determines a medium error on the selected tape while copying the metadata from the computational device to the selected tape, subsequent to completion of the copying of the data from the computational device to the selected tape. The copy export application sends a request to a tape control application to replace the selected tape by a new tape and copy the data from the selected tape to the new tape. The copy export application copies the metadata to the new tape. | 09-20-2012 |
20120272095 | COMPUTER BOOTING METHOD AND COMPUTER SYSTEM - A computer booting method is provided for a computer system. The method comprises performing a power-on-self test. When the test result shows no error on the BIOS, a booting procedure is executed. When the test result shows the BIOS is damaged, whether the computer system stores a backup file of the BIOS is determined. When the computer system stores the backup file, the central processing unit reads the data of backup file and write it into a BIOS system memory and a reboot process is performed. When there is no backup file in the computer system, the computer system is connected to an internet server and downloads a BIOS backup file to the system main memory from the internet server. The central processing unit reads the BIOS backup file and write it into the BIOS system memory and a reboot process is formed. | 10-25-2012 |
20120278650 | CONTROLLING NANOSTORE OPERATION BASED ON MONITORED PERFORMANCE - Methods, apparatus and articles of manufacture for controlling nanostore operation based on monitored performance are disclosed. An example method disclosed herein comprises monitoring performance of a nanostore, the nanostore including compute logic and a datastore accessible via the compute logic, and controlling operation of the nanostore in response to detecting a performance indicator associated with wearout of the compute logic to permit the compute logic to continue to access the datastore. | 11-01-2012 |
20120297241 | SYSTEMS AND METHODS FOR MONITORING A MEMORY SYSTEM - Systems and methods are disclosed herein, including those that operate to monitor a first set of operational parameters associated with a memory vault, to adjust a second set of operational parameters associated with the memory vault, and to perform alerting and reporting operations to a host device. | 11-22-2012 |
20120311378 | Techniques for increasing a lifetime of blocks of memory - Techniques are described for increasing a lifetime of blocks of memory. In operation, respective life expectancy scores for each of the blocks are calculated based at least in part on a respective number of times each of the blocks is respectively erased, and further based at least in part on at least one other factor that affects the lifetime of the blocks. An order to write and recycle the blocks is determined, based at least in part on at least some of the respective lifetime expectancy scores. A total amount of the blocks that are erased and written is minimized while lifetime expectancy score variation between the blocks is equalized. | 12-06-2012 |
20120324274 | STORAGE SYSTEM AND CONTROL METHOD FOR A STORAGE SYSTEM - It is provided a storage system for storing write data requested by a host computer, comprising: a data storage device, first and second cache memories, first and second non-volatile memories and at least one power storage device, wherein the storage system stores the requested write data in the data storage device, without storing the requested write data in neither the first cache memory nor the second cache memory in a case where the amount of charge of the at least one power storage device is smaller than the predetermined amount of power, and stores the requested write data in at least one of the first and second cache memories, and then store the requested write data in the data storage device in a case where the amount of charge of the at least one power storage device is equal to or larger than the predetermined amount of power. | 12-20-2012 |
20120331337 | MEMORY CARD CONTROLLER, MEMORY CARD ADAPTOR AND MEMORY CARD DRIVE - A memory card controller includes a receiver, a flow controller, a continuity determination unit, and a command controller. When size of data transferred from the memory card reaches transfer size specified by first read command, the command controller controls the flow controller to transmit a response representing a transfer busy state, and pauses a transfer operation of the memory card. When the receiver receives a second read command in a state that the transfer operation of the memory card is paused, the command controller controls the flow controller to transmit a response representing transfer ready state to the transfer authorization request from the memory card so as to restart a transfer operation of the memory card. | 12-27-2012 |
20130007508 | MANAGING STORAGE PROVIDERS IN A CLUSTERED APPLIANCE ENVIRONMENT - Receiving a power off alert indicating a power off condition of a first processing system on which a first storage provider is installed, the first storage provider managing at least one storage controller. Responsive to the power off alert, issuing a first command to a second storage provider installed on a second processing system, the first command indicating to the second storage provider to assume management of the storage controller. | 01-03-2013 |
20130007509 | METHOD AND APPARATUS TO UTILIZE LARGE CAPACITY DISK DRIVES - A method of utilizing storage in a storage system comprises prioritizing a plurality of storage areas in the storage system for data recovery with different priorities; and performing data recovery of the storage system at an occurrence of a failure involving one or more of the storage areas in the storage system based on the priorities. Data recovery for one storage area having a higher priority is to occur before data recovery for another storage area having a lower priority in the storage system. In various embodiments, the prioritization is achieved by monitoring the access characteristics, or the priority is specified by the host or management computer based on the usage and/or importance of data stored in the storage system, or the priority is determined by the storage system based on the area assignment/release (i.e., usage) of thin provisioned volumes. | 01-03-2013 |
20130024722 | VIRTUAL DISK REPLICATION USING LOG FILES - Techniques involving replication of virtual machines at a target site are described. One representative technique includes an apparatus including a virtual machine configured to provide storage access requests targeting a virtual disk. A storage request processing module is coupled to the virtual machine to receive the storage access requests and update the virtual disk as directed by the storage access requests. A replication management module is coupled to the virtual machine to receive the storage access requests in parallel with the storage request processing module, and to store information associated with the storage access requests in a log file(s). The log file may be transferred to a destination as a recovery replica of at least a portion of the virtual disk. | 01-24-2013 |
20130031406 | APPARATUS AND METHOD FOR WRITING DATA BASED ON DRIVE STATE - Disclosed are an apparatus and method for writing data based on a drive state. In one embodiment, a method may comprise receiving a command to store data to a first area of a data storage device, detecting whether the data storage device is in a first state indicating a lowered write reliability, and writing the data to a second area when the first state is detected, the second area having a higher write reliability than the first area. In another embodiment, an apparatus may comprise a processor configured to receive a command to write data to a first area of a data storage device, detect whether the data storage device is in a first mode indicating a reduced writing reliability relative to a second mode, and write the data to a second area of the data storage device when the first mode is detected. | 01-31-2013 |
20130067270 | QUERYING AND REPAIRING DATA - Aspects of the subject matter described herein relate to querying and repairing data. In aspects, a component may detect that data on storage has become corrupted. In response, the component may request data from one or more redundant copies of the data and may determine which of the redundant copies, if any, are not corrupted. If a non-corrupted copy is found, the component may send a request that the corrupted data be repaired and may identify the non-corrupted copy to use to repair the corrupted data. | 03-14-2013 |
20130124914 | Method and Device for Detecting Data Reliability - Embodiments of the present invention disclose a method and a device for detecting data reliability, which belong to the field of computer technologies. The method includes: dividing source data into multiple source data blocks; establishing a corresponding duplicate data block for each source data block, where the duplicate data block and the source data block are stored in different physical memory blocks respectively; establishing a corresponding reliability maintenance data structure for the source data block; and registering the reliability maintenance data structure with a first reliability maintenance thread of a central processing unit, the source data block corresponding to the reliability maintenance data structure registered with the first reliability maintenance thread, comparing a reliability check value of the source data block with a reliability check value recorded in the reliability maintenance data structure, and replacing the source data block having the error with the duplicate data block. | 05-16-2013 |
20130159765 | STORAGE SUBSYSTEM AND METHOD FOR RECOVERING DATA IN STORAGE SUBSYSTEM - When a double failure occurs in a storage device storing a mutual conversion table such as a track management information table in thin provisioning, the storage address of the track within the storage subsystem cannot be specified and user data is lost. In order to solve the problem, the present invention provides a storage subsystem capable of recovering data by referring to a track address stored in an accessible track management information table or a user data section, renewing the damaged track management information table to restore the corresponding relationship between track management information tables, and enabling the user data to be accessed again. | 06-20-2013 |
20130191682 | HOMOGENEOUS RECOVERY IN A REDUNDANT MEMORY SYSTEM - A computer implemented method for providing homogeneous recovery in a redundant memory system. The method includes receiving a notification that a memory channel has failed, where the memory channel is one of a plurality of memory channels in a memory system. New operations are blocked from starting on the memory channels in response to the notification, and any pending operations on the memory channels are completed in response to the notification. A recovery operation is performed on the memory channels in response to the completing. The new operations are started on at least a first subset of the memory channels in response to the recovery operation completing. The memory system is configured to operate with the first subset of the memory channels. | 07-25-2013 |
20130212425 | ENHANCED DEBUGGING FOR EMBEDDED DEVICES - Methods, machine-readable tangible storage media, and data processing systems that enable a debug host device to acquire memory dump information from a debug target device after the target device suffers an unrecoverable system malfunction are disclosed. In one embodiment, data in the volatile memory on a debug target device is accessed via a hardware integrated debug framework, which is also used to access data on a nonvolatile electronically erasable semiconductor memory of a debug target device, and one or more registers of one or more processors on a debug target device, and a core dump is created on the debug host device. | 08-15-2013 |
20130227341 | SAS HOST CACHE CONTROL - A SAS method to control host controller failure that includes, in response to receipt of a failure signal indicating that a host controller has failed, sending a wakeup signal to a host cache module of the failed host controller to cause the host cache module to determine whether there is trapped data in the host cache module that has not been transferred to a storage system. In response to receipt of a cache state signal indicating that there is trapped data in the host cache module that has not been transferred to the storage system, initiating transfer of the trapped data from the host cache module of the failed host controller to a host cache module of another host controller. | 08-29-2013 |
20130254589 | STORAGE SYSTEM, STORAGE APPARATUS, AND DATA RESTORATION METHOD - In a storage system a first control device can restore in a restoration destination storage device a second set of data stored in a second storage device on the basis of a first set of data stored in a first storage device. A third storage device stores progress information indicative of the progress of restoration performed by a first control device. A second control device restores a portion of the second set of data which is not yet restored on the basis of the progress information stored in the third storage device at the time of detecting that the first control device has stopped. | 09-26-2013 |
20130254590 | REAL TIME DATABASE SYSTEM - A real time database system configured to store a database content with a plurality of data sets, the database content being partitioned in different partitions. The system comprises a plurality of master databases, each master database containing a partition of the database content, each partition being provided on a different physical storage unit and at least one replica database, each replica database containing subpartitions of the partitions stored in master databases. The system further comprises at least one distributor configured to route a request for a data set to the master database, where the data set to which the request refers to, is provided, and distributor configured to divide each partition into several subpartitions. Additionally, the system comprises at least one replicator, configured to generate a replica of each subpartition, and configured to store each replica on a replica database. | 09-26-2013 |
20130332768 | STORAGE SYSTEM, STORAGE CONTROL APPARATUS AND METHOD - A storage system comprises a storage device for storing data, a control apparatus which controls the storage device and comprises multiple communication ports, and a switch apparatus which expands the number of storage device couplings and comprises multiple communication ports. Respective multiple communication ports of the control apparatus are coupled to respective multiple communication ports of the switch apparatus, and the switch apparatus is coupled to the storage device. The control apparatus configures at least one communication port of the multiple communication ports of the control apparatus, to a dedicated communication port for outputting only a prescribed command issued when a failure is detected. | 12-12-2013 |
20140006847 | Defect Management in Memory Systems | 01-02-2014 |
20140019800 | INADVERTENT FREED STORAGE RECOVERY - An abnormal termination recovery is performed where storage is referenced shortly after the storage has been freed. More specifically, when storage is freed, and that storage is accessed, an abnormal termination error (e.g., a page translation exception event) occurs due to referencing storage that has not been obtained. When the abnormal termination error occurs, an abnormal termination recovery operation is accessed. The abnormal termination recovery operation scans a history of storage freeing operations (e.g., FREEMAIN operations) to determine whether the storage location accessed by the storage access that caused the abnormal termination error was recently freed from within the same address space. If the storage location was recently freed, then the abnormal termination recovery operation reverses the storage freeing operation by issuing a storage obtaining operation (e.g., a GETMAIN operation) to re-obtain the storage. | 01-16-2014 |
20140025989 | INFORMATION PROCESSING SYSTEM AND PROCESSING METHOD FOR INFORMATION PROCESSING SYSTEM - An information processing system includes a first control unit including a first memory configured to store first software, and a first controller configured to perform processing based on the first software and to update the first software in a case where an instruction to update the first software is received, and a second control unit configured to be coupled to the first control unit, the second control unit including a second memory configured to store second software that is the same as the first software, a second controller configured to perform processing based on the second software, and a first power supply circuit configured to start power supply to the second controller in a case where a failure in the first control unit is detected. | 01-23-2014 |
20140053015 | Error Control Coding - A data writer is described comprising: a memory to store at least one amount of source data that is to be written to a data storage medium; a processor to arrange the source data into subsets and generate ECC data in respect of each subset, wherein the source data and the associated ECC data are to be written to a data storage medium via a plurality of individual data channels, and wherein the ECC data comprises at least a first degree of ECC protection having a first level of redundancy in respect of a first subset and a second degree of ECC protection having a second level of redundancy in respect of a second subset; a plurality of data writing elements, each to write data from an associated data channel, concurrently with the writing by the other data writing elements of data from respective data channels, to a data storage medium; and a controller, to control the writing by the data writing elements of the source data and the associated ECC data to the data storage medium. | 02-20-2014 |
20140068318 | MEMORY SYSTEM AND CONTROL METHOD - According to one embodiment, a memory system includes a first memory, a second memory, and a control unit. The first memory includes a volatile first register retaining a first operation parameter. The control unit performs a first operation of retaining the first operation parameter in the second memory. Then, the control unit turns OFF the first memory while retaining the first operation parameter in the second memory when an operation mode is switched from a first mode to a power saving second mode. Then, the control unit performs a second operation of turning on the first memory, and transferring the first operation parameter retained in the second memory to the first register when the operation mode is switched from the second mode to the first mode. | 03-06-2014 |
20140089725 | PHYSICAL MEMORY FAULT MITIGATION IN A COMPUTING ENVIRONMENT - Effects of a physical memory fault are mitigated. In one example, to facilitate mitigation, memory is allocated to processing entities of a computing environment, such as applications, operating systems, or virtual machines, in a manner that minimizes impact to the computing environment in the event of a memory failure. Allocation includes using memory structure information, including, information regarding fault containment zones, to allocate memory to the processing entities. By allocating memory based on fault containment zones, a fault only affects a minimum number of processing entities. | 03-27-2014 |
20140089726 | DETERMINING WHETHER A RIGHT TO USE MEMORY MODULES IN A RELIABILITY MODE HAS BEEN ACQUIRED - Examples disclosed herein relate to determining whether a right to use memory modules in a reliability mode has been acquired. Examples include determining whether the right to use a plurality of memory modules in a reliability mode has been acquired, if a performance mode is selected for operation of the plurality of memory modules. | 03-27-2014 |
20140095926 | DYNAMIC CACHE CORRECTION MECHANISM TO ALLOW CONSTANT ACCESS TO ADDRESSABLE INDEX - A technique is provided for a cache. A cache controller accesses a set in a congruence class and determines that the set contains corrupted data based on an error being found. The cache controller determines that a delete parameter for taking the set offline is met and determines that a number of currently offline sets in the congruence class is higher than an allowable offline number threshold. The cache controller determines not to take the set in which the error was found offline based on determining that the number of currently offline sets in the congruence class is higher than the allowable offline number threshold. | 04-03-2014 |
20140281677 | ERROR CORRECTION METHOD AND DEVICE AND INFORMATION STORING DEVICE - Error correction is carried out on first data stored in an external memory after determining that the first data contains a correctable error. Prior to starting the error correction of the first data, other accesses to the first data are blocked. Thereafter, the first data is corrected and overwritten by the corrected data (second data). After storing the second data in the external memory, accesses to the second data are permitted. | 09-18-2014 |
20140281678 | MEMORY CONTROLLER AND MEMORY SYSTEM - According to one embodiment, a memory controller includes a plurality of operation units respectively provided for a plurality of stages and each performing an error correcting operation for data supplied from an external device or data read from a nonvolatile semiconductor memory. | 09-18-2014 |
20140281679 | SELECTIVE FAULT STALLING FOR A GPU MEMORY PIPELINE IN A UNIFIED VIRTUAL MEMORY SYSTEM - One embodiment of the present invention is a parallel processing unit (PPU) that includes one or more streaming multiprocessors (SMs) and implements a selective fault-stalling pipeline. Upon detecting a memory access fault associated with an operation executing on a particular SM, a replay unit in the selective fault-stalling pipeline considers the operation as a faulting operation. Subsequently, instead of notifying the SM of the memory access fault, the replay unit recirculates the operation—reinserting the operation into the selective fault-stalling pipeline. Recirculating faulting operations in such a fashion enables the SM to execute other operation while the replay unit stalls the faulting request until the associated access fault is resolved. Advantageously, the overall performance of the PPU is improved compared to conventional PPUs that, upon detecting a memory access fault, cancel the associated operation and subsequent operations. | 09-18-2014 |
20140281680 | DUAL DATA RATE BRIDGE CONTROLLER WITH ONE-STEP MAJORITY LOGIC DECODABLE CODES FOR MULTIPLE BIT ERROR CORRECTIONS WITH LOW LATENCY - A memory module includes a bridge controller having a first interface and a second interface. The first interface receives commands and data from a host and the second interface is coupled to one or more memory components. The bridge controller performs multiple-bit error detection and correction on data stored in the one or more memory components. | 09-18-2014 |
20150074450 | HARD DISK DRIVE (HDD) EARLY FAILURE DETECTION IN STORAGE SYSTEMS BASED ON STATISTICAL ANALYSIS - In one embodiment, a system includes a processor and logic integrated with and/or executable by the processor, the logic being configured to detect a failure event indicating possible failure of a storage device, initiate a rebuild for the storage device which experienced the failure event, receive information about the storage device which experienced the failure event, and apply a set of statistical process control rules to the information to determine whether the failure event is statistically abnormal. Other systems, methods, and computer program products for providing early warning of storage device failure are also described in additional embodiments. | 03-12-2015 |
20160092325 | FAILURE LOGGING MECHANISM TO REDUCE GARBAGE COLLECTION TIME IN PARTIALLY REUSED BAD BLOCKS - A memory system logs failures to optimize garbage collection in partial bad blocks that are reused in non-volatile memory. A failure in a primary block may be logged in an inverse global address table. A garbage collection operation can reference the log in order to automatically avoid the failure in the primary block when the primary block is picked as the source block for garbage collection. Likewise, the garbage collection operation may scan only the logged wordlines in the secondary block when the secondary block is picked as the source block for garbage collection. | 03-31-2016 |
20220138073 | MEMORY SUB-SYSTEM TEMPERATURE CONTROL - A method includes monitoring a temperature of a memory component of a memory sub-system to determine that the temperature of the memory component corresponds to a first monitored temperature value; writing data to the memory component of the memory sub-system while the temperature of the memory component corresponds to the first monitored temperature value; determining that the first monitored temperature value exceeds a threshold temperature range; monitoring the temperature of the memory component of the memory sub-system to determine that the temperature of the memory component corresponds to a second monitored temperature value that is within the threshold temperature range; and rewriting the data to the memory component of the memory sub-system while the temperature of the memory component corresponds to the second monitored temperature value. | 05-05-2022 |