06th week of 2016 patent applcation highlights part 42 |
Patent application number | Title | Published |
20160041812 | SORTING PROCESSES AND ARRANGEMENTS FOR ELECTRONIC MESSAGES - An apparatus displays an arrangement of electronic data sorted by user preferences. The arrangement includes a plurality of electronic objects arranged in a plurality of rows on a graphical display. Each of the objects includes a sender field, a recipient field, a message field, and a time field. The plurality of rows are arranged in the graphical display such that each of the rows is associated with one of the electronic objects. At least one of the fields associated with each object is displayed in each row, and the rows are at least partially arranged by a frequency of communication between the sender and the recipient. | 2016-02-11 |
20160041813 | Multiplication Circuit Providing Dynamic Truncation - A fixed-point multiplier providing reduced energy usage dynamically truncates received operands according to the location of computationally important bits in the operands and provides the truncated operands to a reduced width multiplier offering reduced energy usage. Information about the location of the dynamic truncation is used to properly shift the result of the multiplier to provide an approximation of full multiplication of the operands. | 2016-02-11 |
20160041814 | POWER SUPPLY FOR RING-OSCILLATOR BASED TRUE RANDOM NUMBER GENERATOR AND METHOD OF GENERATING TRUE RANDOM NUMBERS - A true random number generator, a method of generating a true random number and a system incorporating the generator or the method. In one embodiment, the generator includes: (1) a ring oscillator including inverting gates having power inputs and (2) a time-varying power supply coupled to the power inputs to provide power thereto and including power perturbation circuitry operable to perturb the power provided to at least one of the power inputs. | 2016-02-11 |
20160041815 | Computer Source Code Generator for Building Software Applications - A computer program/software/tool that uses a method/technique/process and set of parameters for generating source code for a programming/database/scripting languages straight from a database model or database objects such as Tables, Views, Stored Procedures, User Defined Functions, Types, Sequences, Packages, Indexes and Constraints etc. The method includes steps of creating/generating re-usable program/components/source code for an application, where the developer selects the database object and the type of code they want to generate as an input to the code generator. The code generation method/technique/process utilizes information contained in the database system for the selected database object; uses specific code template; and uses set of parameters provided by the developer and generates source code as an output. A simple two-step process greatly reduces developer effort in going through many code generation options every time they want to generate the code either for an application or an individual component/program. | 2016-02-11 |
20160041816 | SYSTEMS AND METHODS FOR MOBILE APPLICATIONS - Systems and methods for improving the performance of mobile applications are disclosed. An exemplary method can include receiving a request for the application, where the request can include target device information. The method can also determine whether the application has been cached before. If the application has not been cached, the method can download the application as a bytecode and process the bytecode into the native code format, using an Ahead-of-time compiler. The method can also provide the application in the native code format to the target device over the network. | 2016-02-11 |
20160041817 | HYBRID-CLOUD INFRASTRUCTURES - Methods and apparatus for implementing hybrid-cloud computing networks are disclosed. An example computer-implemented method includes receiving, at a computing device, a request to provision a user application. The method further includes identifying an application blueprint corresponding with the request and identifying at least one computing resource corresponding with the request. The method still further includes identifying a network blueprint that includes the at least one computing resource, provisioning a computing network in accordance with the identified network blueprint and provisioning the at least one computing resource in the provisioned computing network. The method also includes, installing the user application in the provisioned at least one computing resource in accordance with the application blueprint. | 2016-02-11 |
20160041818 | Installing an Application into a Virtualized Environment - An electronic device has a plurality of virtualized environments. Selection of an application of an application store is received, and a virtualized environment is identified for installing the application selected from the application store. | 2016-02-11 |
20160041819 | UPDATING SERVICE APPLICATIONS - Disclosed herein are systems, methods, and software for enhancing application update processes. In an implementation, a delta file is received in a data center that hosts various instances of a service application. The delta file represents a difference between a new version of the service application and a previous version of the service application. An instance of the service application installed in the data center is removed from service temporarily in order to update it from the previous version of the service application to the new version of the service application. Upon initiating and completing an update of the instance of the service application to the new version of the service application using at least the delta file, the instance is returned to service. | 2016-02-11 |
20160041820 | VEHICLE AND DEVICE SOFTWARE UPDATES PROPAGATED VIA A VIRAL COMMUNICATION CONTACT - A system for vehicle to another party communications that includes a vehicle personality module adapted to create a vehicle personality and a communications system that utilizes the created vehicle personality for one or more communications instead of a user's profile. The one or more communications are associated with one or more of an identifier and an icon representing the vehicle personality, with this identifier and/or icon sent with at least one communication and displayable to the recipient of the communication. | 2016-02-11 |
20160041821 | Efficient Communication for Devices of a Home Network - Systems and methods are provided for efficient communication through a fabric network of devices in a home environment or similar environment. For example, an electronic device may efficiently control communication to balance power and reliability concerns, may efficiently communicate messages to certain preferred networks by analyzing Internet Protocol version 6 (IPv6) packet headers that use an Extended Unique Local Address (EULA), may efficiently communicate software updates and status reports throughout a fabric network, and/or may easily and efficiently join a fabric network. | 2016-02-11 |
20160041822 | ADDING DIRECTIVES FOR VERSIONS OF SOURCE FILES DIRECTLY INTO SOURCE CODE - A version of the source file is created that includes source code from a source file, and at least a portion of a client-side scripting language file (CSSLF) for generating at least a portion of markup language for a web page to be served to a client device using a webserver. A processor associates metadata with a preprocessed directive (PPD) and a version of the source file (VSF). The metadata can include at least the portion of the CSSLF. The webserver can then retrieve, from a database, only the metadata associated with the PPD in the VSF such that the entire source file does not need to be retrieved. When a request for the metadata associated with the VSF is received, at least the portion of the markup language for the web page can be generated in accordance with the metadata associated with the PPD and the VSF. | 2016-02-11 |
20160041823 | ADAPTATION OF A WEB APPLICATION FOR USE BY A MOBILE DEVICE - Client side code of a web application can be received by a mobile device. The mobile device can automatically inject mobile aware code into the client side code of the web application. The mobile aware code can modify the client side code of the web application for use by the mobile device, wherein the client side code of the web application is not modified for use by the mobile device prior to the mobile aware code being injected. The client side code of the web application modified by the mobile aware code can be executed by the mobile device. | 2016-02-11 |
20160041824 | REFINING DATA UNDERSTANDING THROUGH IMPACT ANALYSIS - In an approach for refining data for an impact analysis, a computer receives a selection of source code and impact analysis criteria, wherein the impact analysis criteria includes at least a time frame. The computer determines a subset of the selected source code, the subset within a time frame specified by the selected impact analysis criteria. The computer returns results based on the selected impact analysis criteria, wherein the results include the subset of the selected source code. | 2016-02-11 |
20160041825 | METHOD AND APPARATUS FOR OBTAINING CONTEXT INFORMATION FOR A SOFTWARE DEVELOPMENT TASK - Aspects are directed to obtaining context information for a software development task. A method includes finding, in response to designating any one tool component associated with the software development task as a root component, at least one other tool component having an at least one-level link with the root component. Context information is extracted n from the root component and the at least one other tool component. A context set is generated based on the extracted context information. | 2016-02-11 |
20160041826 | ADAPTATION OF A WEB APPLICATION FOR USE BY A MOBILE DEVICE - Client side code of a web application can be received by a mobile device. The mobile device can automatically inject mobile aware code into the client side code of the web application. The mobile aware code can modify the client side code of the web application for use by the mobile device, wherein the client side code of the web application is not modified for use by the mobile device prior to the mobile aware code being injected. The client side code of the web application modified by the mobile aware code can be executed by the mobile device. | 2016-02-11 |
20160041827 | INSTRUCTIONS FOR MERGING MASK PATTERNS - A method is described that includes fetching an instruction and decoding the instruction. The method further includes fetching a first mask vector from a first mask register space location identified by the instruction. The method further includes fetching a second mask vector from a second mask register space location identified by the instruction. The method also includes executing the instruction by merging the first and second mask vectors into a single data structure and causing the single data structure to be written into a memory location identified by the instruction. | 2016-02-11 |
20160041828 | METHOD AND SYSTEM FOR GENERATING OBJECT CODE TO FACILITATE PREDICTIVE MEMORY RETRIEVAL - A method and system are described for generating reference tables in object code which specify the addresses of branches, routines called, and data references used by routines in the code. In a suitably equipped processing system, the reference tables can be passed to a memory management processor which can open the appropriate memory pages to expedite the retrieval of data referenced in the execution pipeline. The disclosed method and system create such reference tables at the beginning of each routine so that the table can be passed to the memory management processor in a suitably equipped processor. Resulting object code also allows processors lacking a suitable memory management processor to skip the reference table, preserving upward compatibility. | 2016-02-11 |
20160041829 | System and Method for Optimizing Bootup Performance - A system and method of optimizing the performance of an information handling system is disclosed herein. One or more data samples are generated by rebooting an information handling system and identifying one or more files accessed during the bootup of the information handling system. An identifier and access frequency for each of the identified files are stored in a data sample. One or more data samples are merged into a merged data sample. A compression ratio is calculated for each of the identified files. One or more of the files identified in the merged data sample are selected for uncompression. The files selected for uncompression are uncompressed. | 2016-02-11 |
20160041830 | EXTRACTION OF OPERATING SYSTEM-SPECIFIC CHARACTERISTICS VIA A COMMUNICATION INTERFACE - Systems and methods for specifying extended descriptor information in a device accessed using a communication interface are disclosed. One method includes transmitting a request to a device from a host computing system, and receiving an extended capability descriptor identifying to the host computing system at least one extended descriptor set stored on the device. The extended capability descriptor identifies a minimum operating system version able to support a corresponding extended descriptor set. | 2016-02-11 |
20160041831 | Autonomous Sleep Mode - A system and method is disclosed that enables a peripheral or slave device to seamlessly transition in and out of sleep state while remaining completely transparent to host software. When the device is in a sleep mode and incoming data is detected, the device begins a wake-up procedure and data is routed to a first, transitional memory. The size of the transitional memory is selected such that it is capable of buffering data received during time required for the system memory to stabilize from wake-up. Once a second, extended memory is stabilized, the data is buffered from the transitional memory to the extended memory. The device resumes normal operation when its processor has initialized and can read data from the extended memory. | 2016-02-11 |
20160041832 | DYNAMIC DETERMINATION OF HARDWARE - According to the invention, a method for determining what hardware components are installed on a computing device is disclosed. The method may include identifying the computing device, and determining, based on the computing device, a hardware component of the computing device. The method may also include retrieving information about the hardware component, and setting, based at least in part on the information about the hardware component, a parameter for an algorithm of software on the computing device. | 2016-02-11 |
20160041833 | SYSTEM AND METHOD FOR FULLY CONFIGURABLE REAL TIME PROCESSING - Provided are systems, methods, and architectures for a neutral input/output (NIO) platform that includes a core that supports one or more services. The core may be thought of as an application engine that runs task specific applications called services. The services are constructed using defined templates that are recognized by the core, although the templates can be customized. The core is designed to manage and support the services, and the services in turn manage blocks that provide processing functionality to their respective service. Due to the structure and flexibility provided by the NIO platform's core, services, and blocks, the platform can be configured to asynchronously process any input signals from one or more sources and produce output signals in real time. | 2016-02-11 |
20160041834 | Virtual Desktop Client, Control Chip for Virtual Desktop Client and Method for Controlling Server Device - A virtual desktop client for controlling a server device and displaying an operation image corresponding to the server device on a display device is provided. The virtual desktop client includes: a network control module, configured to receive a remote image from the server device; an input driving module, configured to drive an input device connected to the virtual desktop client, and to generate input information by the input device; and a control chip, configured to draw a pattern on the remote image according to the input information to obtain a client-end image, and to display the operation image on the display device according to the client-end image. The control chip further generates control information according to the input information that is associated with a position of the pattern, and transmits the control information to the server device through the network control module. | 2016-02-11 |
20160041835 | Cloud Reference Model Framework - A computing device implemented method, in one embodiment, can include a cloud transformation module transforming content for a compute platform. Additionally, the method can include a cloud control module receiving the content from the cloud transformation module. The method can also include the cloud control module provisioning a virtual machine appliance to form the compute platform. Furthermore, the method can include a cloud instantiation module executing the provisioning of the cloud control module. In addition, the method can include a cloud appliance module adding middleware to a virtual machine to create the virtual machine appliance. Moreover, the method can include a cloud virtualization module producing a virtualized representation of the compute platform. | 2016-02-11 |
20160041836 | DIFFERENTIAL VOLTAGE AND FREQUENCY SCALING (DVFS) SWITCH REDUCTION - Technologies are generally described for systems, devices and methods effective to schedule access to a core. In some examples, a first differential voltage frequency scaling (DVFS) value of a first virtual machine may be received by a virtual machine manager. A second DVFS value of a second virtual machine may be received by the virtual machine manager. A third DVFS value of a third virtual machine may be received by the virtual machine manager. The third DVFS value may be substantially the same as the first DVFS value and different from the second DVFS value. A dispatch cycle may be generated to execute the first, second and third virtual machines on the core. After execution of the first virtual machine, the dispatch cycle may require execution of the third virtual machine before execution of the second virtual machine. | 2016-02-11 |
20160041837 | INDIVIDUALIZING VIRTUAL HARDWARE CONFIGURATIONS OF DEPLOYED DESKTOP VIRTUAL MACHINES USING CUSTOM RESOURCE TEMPLATES - Techniques for achieving virtual hardware resources that are individualized across desktop virtual machines (VMs) are identified. Custom resource templates include virtual resource settings that are targeted for specified desktop VMs and that differ from the parent image (i.e., a template or snapshot). A customization manager processes the custom resource templates and applies the corresponding virtual resource settings directly to the specified desktop VMs. To achieve such customization using conventional techniques requires tedious and error-prone manual intervention as well as memory and time-consuming individualized recompose or re-creation operations. Advantageously, by automating and streamlining the customization process, the identified techniques decrease both memory usage and the time required to individualize the desktop VMs. | 2016-02-11 |
20160041838 | VIRTUAL PROCESSOR ALLOCATION TECHNIQUES - One or more virtual processors can be added or removed from a virtual machine based on CPU pressure measured within the virtual machine. In addition to the foregoing, CPU pressure can also be used to determine whether to remove a virtual processor from a virtual machine, which may cause the computer system to consume less power. In the alternative, virtual processors can be parked and/or unparked in order to reduce the amount of power consumed by the virtual machine. In addition, virtual processors can be forcibly parked during a migration operation. | 2016-02-11 |
20160041839 | CERTIFICATE BASED CONNECTION TO CLOUD VIRTUAL MACHINE - In an environment that includes a host computing system that executes virtual machines, and a secure cloud computing channel that communicatively couples the host to a client computing system that is assigned to a particular one of the virtual machines, the particular virtual machine generates a certificate, install the certificate on the itself, and returns a certificate representation to the client. This may occur when the virtual machine is provisioned. During a subsequent connection request from the client to the virtual machine, the virtual machine returns the certificate to the client. The client compares the certificate representation that was returned during provisioning with the certificate returned during the subsequent connection, and if there is a match, then the virtual machine is authenticated to the client. Thus, in this case, the virtual machine authenticates without the client having to generate, install, and manage security for a certificate. | 2016-02-11 |
20160041840 | AUTOMATED TICKETING - Methods, systems, and computer program products for automatically issuing travel documents. Tasks relating to issuance of travel documents are generated by an originating application in response to booking a travel service. The tasks are received and stored in a first queue until a triggering event, such as the arrival of a time for issuance of a document. In response to the triggering event, a task in the first queue may be placed in a second queue for transmission to an issuing application. The documents to be issued may be determined based on records in a passenger name record (PNR) stored in a database. The PNR may be determined based on the task. The PNR may be updated with information indicating whether task processing was successful. In the event of an error, information indicating the cause of the error may be added to the PNR. | 2016-02-11 |
20160041841 | REALIZING JUMPS IN AN EXECUTING PROCESS INSTANCE - A method for realizing jumps in an executing process instance can be provided. The method can include suspending an executing process instance, determining a current wavefront for the process instance and computing both a positive wavefront difference for a jump target relative to the current wavefront and also a negative wavefront difference for the jump target relative to the current wavefront. The method also can include removing activities from consideration in the process instance and also adding activities for consideration in the process instance both according to the computed positive wavefront difference and the negative wavefront difference, creating missing links for the added activities, and resuming executing of the process instance at the jump target. | 2016-02-11 |
20160041842 | DYNAMIC RECONFIGURATION OF APPLICATIONS ON A MULTI-PROCESSOR EMBEDDED SYSTEM - A multiprocessor system and method for swapping applications executing on the multiprocessor system are disclosed. The plurality of applications may include a first application and a plurality of other applications. The first application may be dynamically swapped with a second application. The swapping may be performed without stopping the plurality of other applications. The plurality of other applications may continue to execute during the swapping to perform a real-time operation and process real-time data. After the swapping, the plurality of other applications may continue to execute with the second application, and at least a subset of the plurality of other applications may communicate with the second application to perform the real time operation and process the real time data. | 2016-02-11 |
20160041843 | INVOCATION OF WEB SERVICES BASED ON A POLICY FILE INCLUDING PROCESSES OF WORKFLOW ASSOCIATED WITH USER ROLES - Techniques for orchestrating workflows are disclosed herein. In an embodiment, a method of orchestrating a workflow is disclosed. In an embodiment, data is stored in a policy file which associates attributes with processes. User input is received. A process associated with an attribute is selected, where the attribute is based on the user input. The selected process is performed as part of the workflow. Also, processes may be added dynamically as part of any category inside the policy file without having to recompile or redesign the logic of the BPEL project. | 2016-02-11 |
20160041844 | PREDICTION OF IMPACT OF WORKLOAD MIGRATION - A method, system and product for predicting impact of workload migration. The method comprising: obtaining a utilization pattern of a workload that is being executed on a first platform; generating a synthetic workload that is configured to have the utilization pattern when executed on the first platform; executing the synthetic workload on a second platform; and identifying a change in performance between execution of the synthetic workload on the first platform and between execution of the synthetic workload on the second platform in order to provide a prediction of an impact of migrating the workload from the first platform to the second platform. | 2016-02-11 |
20160041845 | METHOD AND APPARATUS FOR EXECUTING SOFTWARE IN ELECTRONIC DEVICE - An apparatus includes a calculation processing unit configured to perform a calculation in the electronic device, a device manager configured to controls a speed of the calculation processing unit and output load factor information, one or more user-level application programs with a respective load factor limit, configured to request for load factor limit information of the calculation processing unit and calculation of a load with a load factor limit, and a service quality manager configured to receive the load factor limit information and the load with the load factor limit from the user-level application programs with the load factor limit, receive load factor information of the calculation processing unit from the device manager, generate a calculation parameter so that a load factor of the calculation processing unit is within the load factor limit information, and output the load with the load factor limit and the generated calculation parameter. | 2016-02-11 |
20160041846 | PROVIDING CONFIGURABLE WORKFLOW CAPABILITIES - Techniques are described for providing clients with access to functionality for creating, configuring and executing defined workflows that manipulate source data in defined manners, such as under the control of a configurable workflow service that is available to multiple remote clients over one or more public networks. A defined workflow for a client may, for example, include multiple interconnected workflow components that are specified by the client and that each are configured to perform one or more types of data manipulation operations on a specified type of input data. The configurable workflow service may further execute the defined workflow at one or more times and in one or more manners, such as in some situations by provisioning multiple computing nodes provided by the configurable workflow service to each implement at least one of the workflow components for the defined workflow. | 2016-02-11 |
20160041847 | COMPOSITE TASK PROCESSOR - Technologies are generally described for systems, devices and methods effective to process a composite task to be applied to an ontology. In some examples, the methods may include a processor receiving a composite task. The methods may include the processor transforming the composite task into a set of atomic tasks. The set of atomic tasks may include at least a first atomic task, a second atomic task, and a third atomic task. The methods may include the processor determining that the first atomic task is equivalent to the second atomic task based on the ontology. The methods may include the processor removing the second atomic task from the set of atomic tasks to generate a list of atomic tasks. The methods may include the processor applying the list of atomic tasks to the ontology. | 2016-02-11 |
20160041848 | Methods and Apparatuses for Determining a Leak of Resource and Predicting Usage Condition of Resource - A method and an apparatus for determining a leak of a program running resource are disclosed that relate to the field of computer applications. The method for predicting a usage condition of a program running resource includes collecting program running resource usage at least once within each program running resource usage period; decomposing the collected program running resource usage into different resource components; for data contained in each resource component, determining a prediction function for the resource component; determining an overall prediction function for a program running resource according to the determined prediction functions for all the resource components; and predicting a usage condition of the program running resource based on the determined overall prediction function. | 2016-02-11 |
20160041849 | SYSTEM, METHOD AND PRODUCT FOR TASK ALLOCATION - A method comprising calculating for each agent, an average quality of tasks that were completed in the past by the agent; allocating tasks to the agents, wherein said allocating comprises selecting an agent to perform a task, the selection is based on the average quality of the agent; in response to the agent completing the task, computing a reward for the agent, wherein the reward is calculated according to a total contribution of the agent to the system by completing the task; whereby biasing said allocating to prefer allocating tasks to a first agent over a second agent, if a quality of the first agent is greater than a quality of the second agent, wherein said biasing is not dependent on prior knowledge of the qualities. Optionally, the agents choose whether or not to perform a task and an agent's quality affects the contributions of the agent performing tasks. | 2016-02-11 |
20160041850 | COMPUTER SYSTEM AND CONTROL METHOD - When a CPU core ( | 2016-02-11 |
20160041851 | EXECUTING A COMMAND ON AN OPTIMAL SMART DEVICE - Executing a command on an optimal smart device. One aspect of the present invention provides a method for executing a command. The method includes: receiving a command at a plurality of smart devices; determining a score for each smart device of the plurality of smart devices; communicating the score between each smart device of the plurality of smart devices; comparing the score between each smart device of the plurality of smart devices; and executing the command at one smart device of the plurality of smart devices based on comparing the score between each smart device. | 2016-02-11 |
20160041852 | Directed Event Signaling For Multiprocessor Systems - Multi-processor computing device methods manage resource accesses by a signaling event manager signaling processor elements requesting access to a resource to wake up to access the resource when the resource is available or wait for an event when the resource is busy. Processor elements may enter a sleep state while awaiting access to the requested resource. When multiple elements are waiting for the resource, the processor element with a highest assigned priority is signaled to wake up when the resource is available without waking other elements. Priorities may be assigned to processor elements waiting for the resource based on a heuristic or parameter that may depend on a state of the computing device or the processor elements. A sleep duration may be estimated for a processor element waiting for a resource and the processor element may be removed from a scheduling queue or assigned another thread during the sleep duration. | 2016-02-11 |
20160041853 | TRACKING SOURCE AVAILABILITY FOR INSTRUCTIONS IN A SCHEDULER INSTRUCTION QUEUE - A processor includes an execution unit to execute instructions and a scheduler unit to store a queue of instructions for execution by the execution unit. The scheduler unit includes a wake array including a plurality of source slots to store source identifiers for sources associated with the instructions, a picker to schedule a particular instruction for execution in the execution unit, broadcast a destination identifier associated with the particular instruction to a first subset of the source slots, and a delay element to receive the destination identifier broadcast by the picker and communicate a delayed version of the destination identifier to a second subset of the source slots different from the first subset. | 2016-02-11 |
20160041854 | METHOD AND APPARATUS FOR INFORMING CONNECTION CONDITION BETWEEN EXTERNAL DEVICE AND ROUTER - A method for informing a connection condition between an external device and a router, includes: monitoring whether a predetermined event occurs, the predetermined event being one of connecting the external device to the router or disconnecting the external device from the router; determining a registered port of a plugin of the router from one or more ports of a plugin center, if the predetermined event occurs; and sending to the plugin, through the registered port of the plugin, a first notification to indicate that the predetermined event occurs. | 2016-02-11 |
20160041855 | METHOD AND APPARATUS FOR TRANSMITTING DATA ELEMENTS BETWEEN THREADS OF A PARALLEL COMPUTER SYSTEM - Transmitting data elements from source threads to sink threads, which are executed on a plurality of processor cores of a parallel computer system, by using at least one global logical queue, the at least one global logical queue including an associated physical queue for each of the plurality of processor cores and a data element management table that stores, for each source thread executed on a processor core, a count that specifies a total number of data elements that are enqueued by the respective source thread and that are located in one of the physical queues of the at least one global logical queue, and a processor core index that specifies a specific processor core associated with a physical queue that contains the data elements enqueued by the respective source thread. | 2016-02-11 |
20160041856 | Memory Processing Core Architecture - Aspects of the present invention provide a memory system comprising a plurality of stacked memory layers, each memory layer divided into memory sections, wherein each memory section connects to a neighboring memory section in an adjacent memory layer, and a logic layer stacked among the plurality of memory layers, the logic layer divided into logic sections, each logic section including a memory processing core, wherein each logic section connects to a neighboring memory section in an adjacent memory layer to form a memory vault of connected logic and memory sections, and wherein each logic section is configured to communicate directly or indirectly with a host processor. Accordingly, each memory processing core may be configured to respond to a procedure call from the host processor by processing data stored in its respective memory vault and providing a result to the host processor. As a result, increased performance may be provided. | 2016-02-11 |
20160041857 | OPTIMIZING PLACEMENT PLANS FOR HOST FAILURE IN CLOUD COMPUTING ENVIRONMENTS - Embodiments of the present invention provide systems, methods, and computer program products for optimizing a placement plan. In one embodiment, a method is disclosed in which a request for registration with an external advisor is received. A time to live is received from each external advisor and used to determine an overall timeout period value for a placement engine. After receiving a predictive failure alert, internal and external advisors are ranked according to criteria and advice is received from the qualified advisors. A placement plan is generated based on the advice received from the advisors. | 2016-02-11 |
20160041858 | INFORMATION PROCESSING DEVICE, EXTERNAL STORAGE DEVICE, HOST DEVICE, RELAY DEVICE, CONTROL PROGRAM, AND CONTROL METHOD OF INFORMATION PROCESSING DEVICE - According to the embodiments, an external storage device switches to an interface controller for supporting only a read operation of nonvolatile memory when a shift condition for shifting to a read only mode is met. A host device switches to an interface driver for supporting only the read operation of the nonvolatile memory when determining to recognize as read only memory based on information acquired from the external storage device. | 2016-02-11 |
20160041859 | SYNCHRONIZATION TESTING OF ACTIVE CLUSTERED SERVERS - In a computing device that performs synchronization testing of a plurality of active clustered servers, a request to check synchronization between slave data stored and master data is received. The request includes master synchronization test values computed by a master node that include a number of records included in a dataset and a sum of modification time values for the records. Slave synchronization test values are computed that include a number of records included in the dataset of the slave data and a sum of modification time values for the records in the dataset of the slave data. The computed slave synchronization test values are compared to the master synchronization test values. A message is sent to the requesting device indicating the slave node is synchronized when the computed synchronization test values match or indicating the slave node is not synchronized when the computed synchronization test values do not match. | 2016-02-11 |
20160041860 | MICROCOMPUTER AND MICROCOMPUTER SYSTEM - A microcomputer includes a plurality of functional blocks that exchange information with each other. A nonvolatile memory can rewrite information stored therein and first data has been written therein in advance. A central processing unit processes information read from the nonvolatile memory or writes information to the nonvolatile memory. An abnormality detecting unit detects an abnormality in exchange of data between the plurality of functional blocks. A nonvolatile memory checking unit reads the first data from the nonvolatile memory when the abnormality detecting unit has detected an abnormality, compares the first data with second data indicating the content of the first data when written to the nonvolatile memory, and detects an abnormality in the nonvolatile memory when a result of the comparison shows that the first data is not identical to the second data. | 2016-02-11 |
20160041861 | METHOD AND DEVICE FOR MONITORING DATA ERROR STATUS IN A MEMORY - A method for monitoring data error status of a memory device includes generating, by a memory controller, a data status indication code indicating error status of a data chunk transmitted by the memory controller and outputting, by the memory controller, the data status indication code to a user interface. | 2016-02-11 |
20160041862 | METHOD AND SYSTEM FOR TIMEOUT MONITORING - Embodiments relate to systems and methods for timeout monitoring of concurrent commands or parallel communication channels comprising assigning or de-assigning each one of the commands or communication channels to a corresponding one of a plurality of timeout timers when corresponding commands are to be transmitted or command acknowledges are received respectively. | 2016-02-11 |
20160041863 | SYSTEM AND ABNORMAL CONDITION DETECTION METHOD - A system includes a plurality of information processing apparatuses; and a management apparatus configured to: transmit Hamilton path information including a communication route information and order information indicating a position in a communication order assigned to the each of the plurality of information processing apparatuses, to each of the plurality of information processing apparatuses, and transmit a first message to one or more information processing apparatuses that are free from an abnormal condition according to the communication order, and wherein each of the plurality of information processing apparatuses is configured to: transmit a second message including information about an abnormal condition that has been detected to a next transmission destination that is free from an abnormal condition, when the first message is received, and transmit the information about an abnormal condition that has been detected to the management apparatus, when the next transmission destination fails to be identified. | 2016-02-11 |
20160041864 | METHOD FOR PROCESSING DATA AND ELECTRONIC DEVICE THEREFOR - Methods and devices are provided in which generation of an error is identified while a function of a program is performed. A message is displayed relating to existence of a solution corresponding to the error. | 2016-02-11 |
20160041865 | INFORMATION PROCESSING APPARATUS, CONTROL METHOD FOR CONTROLLING INFORMATION PROCESSING APPARATUS, AND STORAGE MEDIUM - An information processing apparatus configured to record logs includes a log collection unit that collects logs recorded according to executed functions and store an audit log file including the collected logs, a detection unit that detects an error in the collection of logs recorded according to the executed functions, and a control unit that, when the error is detected, compresses the stored audit log file and separately stores the compressed log file while continuing to collect logs. | 2016-02-11 |
20160041866 | PROCESSING RUN-TIME ERROR MESSAGES AND IMPLEMENTING SECURITY POLICIES IN WEB HOSTING - A user administers web hosting on user's server from his computer remotely. When a run time error is generated, an error message is sent to a server connected to a knowledge database. If the error matches the known error form the knowledge database, the user is provided an article with a solution to the run-time error. Statistics of occurrence of the errors are saved in the knowledge database. The frequently occurring errors are provided to developers for creating hosting application updates. Additionally, security policies of the user's server can be updated based on the data from the knowledge database. | 2016-02-11 |
20160041867 | SYSTEMS AND METHODS FOR REMOTE MONITORING IN A COMPUTER NETWORK - Systems and methods for providing automated problem reporting in elements used in conjunction with computer networks are disclosed. The system comprises a plurality of elements that perform data migration operations and a reporting manager or monitor agent which monitors the elements and data migration operations. Upon detection of hardware or software problems, the reporting manager or monitor agent automatically communicates with elements affected by the problem to gather selected hardware, software, and configuration information, analyzes the information to determine causes of the problem, and issues a problem report containing at least a portion of the selected information. The problem report is communicated to a remote monitor that does not possess access privileges to the elements, allowing automated, remote monitoring of the elements without compromising security of the computer network or elements. | 2016-02-11 |
20160041868 | Data Rebuild on Feedback from a Queue in a Non-Volatile Solid-State Storage - A storage cluster is provided. The storage cluster includes a plurality of storage nodes, each of the plurality of storage nodes having nonvolatile solid-state memory and a plurality of operations queues coupled to the solid-state memory. The plurality of storage nodes is configured to distribute the user data and metadata throughout the plurality of storage nodes such that the plurality of storage nodes can access the user data with a failure of two of the plurality of storage nodes. Each of the plurality of storage nodes is configured to determine whether a read of 1 or more bits in the solid-state memory via a first path is within a latency budget. The plurality of storage nodes is configured to perform a read of user data or metadata via a second path, responsive to a determination that the read of the bit via the first path is not within the latency budget. | 2016-02-11 |
20160041869 | Masking Defective Bits in a Storage Array - A method of failure mapping is provided. The method includes distributing user data throughout a plurality of storage nodes through erasure coding, wherein the plurality of storage nodes are housed within a chassis that couples the storage nodes as a storage cluster. Each of the plurality of storage nodes has a non-volatile solid-state storage with flash memory or other types of non-volatile memory and the user data is accessible via the erasure coding from a remainder of the plurality of storage nodes in event of two of the plurality of storage nodes being unreachable. The method includes determining that a non-volatile memory block in the memory has a defect and generating a mask that indicates the non-volatile memory block and the defect. The method includes reading from the non-volatile memory block with application of the mask, wherein the reading and the application of the mask are performed by the non-volatile solid-state storage. | 2016-02-11 |
20160041870 | Adjustable Error Correction Based on Memory Health in a Storage Unit - A method for adjustable error correction in a storage cluster is provided. The method includes determining health of a non-volatile memory of a non-volatile solid-state storage unit of each of a plurality of storage nodes in a storage cluster on a basis of per flash package, per flash die, per flash plane, per flash block, or per flash page. The determining is performed by the storage cluster. The plurality of storage nodes is housed within a chassis that couples the storage nodes as the storage cluster. The method includes adjusting erasure coding across the plurality of storage nodes based on the health of the non-volatile memory and distributing user data throughout the plurality of storage nodes through the erasure coding. The user data is accessible via the erasure coding from a remainder of the plurality of storage nodes if any of the plurality of storage nodes are unreachable. | 2016-02-11 |
20160041871 | INFORMATION PROCESSING APPARATUS - According to one embodiment, an information processing apparatus includes a host and a memory system. The memory system includes a nonvolatile memory. The host includes a volatile memory, a first host control unit, and a second host control unit. The volatile memory includes a first area to be used by the host and a second area as a cache memory to temporarily store data of the nonvolatile memory. The first host control unit computes a first code, and stores the first data and the first code in the second area. The first code is redundant information of the first data. The second host control unit reads second data and a second code from the second area, performs error detection on the second data based on the second code, and transfers the second data. The second code is redundant information of the second data. | 2016-02-11 |
20160041872 | SEMICONDUCTOR MEMORY DEVICE - A semiconductor memory device includes: a core block suitable for storing write data as normal data or a part of combined data according to a data masking signal, and masking information indicating data masking of the combined data; and an error correcting code (ECC) block suitable for performing an ECC decoding operation on the normal data, and bypassing the ECC decoding operation on the combined data according to the masking information, wherein the combined data further includes masked data. | 2016-02-11 |
20160041873 | DIE-LEVEL MONITORING IN A STORAGE CLUSTER - In some embodiments, a method for die-level monitoring is provided. The method includes distributing user data throughout a plurality of storage nodes through erasure coding, wherein the plurality of storage nodes are housed within a chassis that couples the storage nodes. Each of the storage nodes has a non-volatile solid-state storage with non-volatile memory and the user data is accessible via the erasure coding from a remainder of the storage nodes in event of two of the storage nodes being unreachable. The method includes producing diagnostic information that diagnoses the non-volatile memory on a basis of per package, per die, per plane, per block, or per page, the producing performed by each of the plurality of storage nodes. The method includes writing the diagnostic information to a memory in the storage cluster. | 2016-02-11 |
20160041874 | SYSTEMS AND METHODS FOR ENHANCED DATA RECOVERY IN A SOLID STATE MEMORY SYSTEM - Systems and method relating generally to data processing, and more particularly to systems and methods for accessing a data set from a solid state storage device, using a data decoding circuit to apply a data decoding algorithm to the data set to yield a decoded output, where the decoded output includes at least one error, identifying at least one critical location in the data set, and estimating a voltage associated with the data in the data set corresponding to the critical location. | 2016-02-11 |
20160041875 | SEMICONDUCTOR MEMORY DEVICE AND METHOD OF CONTROLLING THE SAME - A semiconductor memory device includes a plurality of detecting code generators configured to generate a plurality of detecting codes to detect errors in a plurality of data items, respectively, a plurality of first correcting code generators configured to generate a plurality of first correcting codes to correct errors in a plurality of first data blocks, respectively, each of the first data blocks containing one of the data items and a corresponding detecting code, a second correcting code generators configured to generate a second correcting code to correct errors in a second data block, the second data block containing the first data blocks, and a semiconductor memory configured to nonvolatilely store the second data block, the first correcting codes, and the second correcting code. | 2016-02-11 |
20160041876 | MEMORY MODULE, MEMORY SYSTEM HAVING THE SAME, AND METHODS OF READING THEREFROM AND WRITING THERETO - A method of reading from a memory module which includes a plurality of memories is provided. The method includes reading data corresponding to a plurality of burst length units from the plurality of memories; correcting an error of the read data using a storage error correction code; and outputting the error corrected data by a unit of data corresponding to one burst length unit. | 2016-02-11 |
20160041877 | STORAGE CONTROL DEVICE AND STORAGE CONTROL METHOD - A storage control apparatus includes a controller to, when more storage devices, among a plurality of storage devices across which a plurality of information areas storing information representing redundant data and one or more spare areas are distributed, than the number of the spare areas fail, perform a rebuild process of information stored in a plurality of information areas of a failed first storage device included in the plurality of combinations of the plurality of information areas and the one or more spare areas, the rebuild process including restoring information corresponding to one information area of the failed first storage device included in one combination among the plurality of combinations, and determining a write destination storage device to which the restored information is to be written in accordance with the number of times information is read from a non-failed second storage device. | 2016-02-11 |
20160041878 | Failure Mapping in a Storage Array - A storage cluster is provided. The storage cluster includes a plurality of storage nodes within a chassis. The plurality of storage nodes has flash memory for storage of user data and is configured to distribute the user data and metadata throughout the plurality of storage nodes such that the storage nodes can access the user data with a failure of two of the plurality of storage nodes. Each of the storage nodes is configured to generate at least one address translation table that maps around defects in the flash memory on one of a per flash package basis, per flash die basis, per flash plane basis, per flash block basis, per flash page basis, or per physical address basis. Each of the plurality of storage nodes is configured to apply the at least one address translation table to write and read accesses of the user data. | 2016-02-11 |
20160041879 | DATA BACKUP TO AND RESTORE FROM TRUSTED DEVICES - Multiple computing devices ( | 2016-02-11 |
20160041880 | EFFICIENT APPLICATION RECOVERY IN AN INFORMATION MANAGEMENT SYSTEM BASED ON A PSEUDO-STORAGE-DEVICE DRIVER - The disclosed systems and methods enable an application to start operating and servicing users soon after and during the course of its backup data being restored, no matter how long the restore may take. This is referred to as “instant application recovery” in view of the fact that the application may be put back in service soon after the restore operation begins. Any primary data generated by the application during “instant application recovery” is not only retained, but is efficiently updated into restored data. An enhanced data agent and an associated pseudo-storage-device driver, which execute on the same client computing device as the application, enable the application to operate substantially concurrently with a full restore of backed up data. According to the illustrative embodiment, the pseudo-storage-device driver presents a pseudo-volume to the file system associated with the application, such that the pseudo-volume may be used as a store for primary data during the period of “instant application recovery.” | 2016-02-11 |
20160041881 | VIRTUAL MACHINE HIGH AVAILABILITY MANAGEMENT - Systems and methods for virtual machine high availability management. An example method may comprise: identifying a virtual machine; receiving information pertaining to the virtual machine; initiating virtual machine availability management, wherein the availability management commences without virtual machine shutdown; detecting a failure of the virtual machine; and causing re-launch of the virtual machine using the received information. | 2016-02-11 |
20160041882 | SAFE DATA ACCESS FOLLOWING STORAGE FAILURE - A request identifier is employed with various systems and methods in order to enable an application to pause execution during a failure and subsequently resume execution and communication with a storage system once the failure is resolved. An application residing on a node may attempt to access target data on a storage system. The application sends a request to access the target data. The request may be associated with a request identifier that identifies the application. When the storage system experiences a failure, the application receives a failure notification. The application pauses execution as a result of the notification. When the node reestablishes a connection to the storage system, the application resumes execution using the same request identifier. If the resume request is granted, the application is guaranteed that the target data was not modified during the failure. | 2016-02-11 |
20160041883 | COMPUTER SYSTEM - A computer system includes an interrupt controller to notify a bus error occurrence, and a multithreaded processor. The multithreaded processor includes a schedule register that settles a sequence of performing a plurality of virtual CPUs and stores data for virtual CPUs to be performed, and a virtual CPU execution portion that performs virtual CPUs according to a sequence settled by the schedule register. Virtual CPUs operate different operating systems (OS's) and include a first virtual CPU that operates a management OS to manage other OS's. When notified of bus error occurrence, the virtual CPU execution portion operates only the first virtual CPU regardless of an execution sequence settled in the schedule register. The first virtual CPU reinitializes a bus where an error occurred. | 2016-02-11 |
20160041884 | DATA BACKUP USING METADATA MAPPING - An information processing apparatus, backup method, and program product that enable efficient differential backup. In one embodiment, an information processing apparatus for files stored in a storage device includes: a metadata management unit for managing metadata of files stored in the storage device; a map generation unit for generating a map which indicates whether metadata associated with an identification value uniquely identifying a file in the storage device is present or absent; and a backup management unit for scanning the metadata to detect files that have been created, modified, or deleted since the last backup, and storing at least a data block and the metadata for a detected file in a backup storage device as backup information in association with the identification value. | 2016-02-11 |
20160041885 | Data Replicating System, Data Replicating Method, Node Device, Management Device and Computer Readable Medium - Each node constituting this data replicating system returns a response to a data operation requesting device upon having written, into a temporary storage device of the node itself, a post-update log of a data record for which an operation requested by a data operation request was executed. Furthermore, when a checkpoint is reached, each node updates a data record storage unit of the node itself on the basis of the post-update log of the data record stored in the temporary storage device of the node itself, writes the post-update log of the data record stored in the temporary storage device of the node itself into an update history storage unit of the node itself, and writes, into a shared storage device shared with other nodes, checkpoint information having information for specifying a latest post-update log written into the update history storage unit. | 2016-02-11 |
20160041886 | DATA STORAGE UPON DATABASE FAILURE - Data values stored in a primary database are synchronized to a reading database in M seconds. In the event of a failure of the primary database, a transaction processing server determines a transaction request in M seconds and performing a transaction processing of the transaction request to acquire a corresponding transaction identification and a data variation value, determines whether a data value corresponding to the transaction identification is stored in a standby database or not; if not, determines an accurate data value corresponding to the transaction identification by using the data value stored in the reading database and the data variation value; and stores the transaction identification and the accurate data value in the standby database to provide a service based on the data value stored in the standby database. The techniques of the present disclosure prevent the transaction from being interrupted and improve user experience. | 2016-02-11 |
20160041887 | Error Recovery in a Storage Cluster - A plurality of storage nodes within a single chassis is provided. The plurality of storage nodes is configured to communicate together as a storage cluster. The plurality of storage nodes has a non-volatile solid-state storage for user data storage. The plurality of storage nodes is configured to distribute the user data and metadata associated with the user data throughout the plurality of storage nodes, with erasure coding of the user data. The plurality of storage nodes is configured to recover from failure of two of the plurality of storage nodes by applying the erasure coding to the user data from a remainder of the plurality of storage nodes. The plurality of storage nodes is configured to detect an error and engage in an error recovery via one of a processor of one of the plurality of storage nodes, a processor of the non-volatile solid state storage, or the flash memory. | 2016-02-11 |
20160041888 | LINK STATE RELAY FOR PHYSICAL LAYER EMULATION - One embodiment of the present invention provides a fault-management system. During operation, the system identifies a failure at a remote location associated with a communication service. The system then determines a local port used for the communication service, and suspends the local port, thereby allowing the failure to be detected by a device coupled to the local port. | 2016-02-11 |
20160041889 | OPTIMIZING PLACEMENT PLANS FOR HOST FAILURE IN CLOUD COMPUTING ENVIRONMENTS - Embodiments of the present invention provide systems, methods, and computer program products for optimizing a placement plan. In one embodiment, a method is disclosed in which a request for registration with an external advisor is received. A time to live is received from each external advisor and used to determine an overall timeout period value for a placement engine. After receiving a predictive failure alert, internal and external advisors are ranked according to criteria and advice is received from the qualified advisors. A placement plan is generated based on the advice received from the advisors. | 2016-02-11 |
20160041890 | PARALLEL COMPUTER SYSTEM AND CONTROL METHOD FOR PARALLEL COMPUTER SYSTEM - A parallel computer system includes a parallel computer including nodes connected via communication routes and respectively executing calculations, and a control device to allocate a job to a predetermined number of nodes. The control device includes a job allocation processor to allocate, to a peripheral region of first N-dimensional job nodes allocated with a first job, any of an empty node, a zero-dimensional job node, and a node at a side or a surface with one node length of M-dimensional job nodes, N=<1 and M2016-02-11 | |
20160041891 | Storage Module and Method for Analysis and Disposition of Dynamically Tracked Read Error Events - A method for analyzing a read error event is provided comprising reading a page of data stored in memory, determining a read error event for the page of data, and identifying a scope of the read error event in the memory. In another embodiment, a method for performing a preliminary read error recovery is provided comprising reading a first data unit from memory and identifying a bit error rate for a first data unit with a correction engine, determining that the bit error rate is above a threshold, accessing a data structure including entries identifying data units and read error event information associated with the data units, identifying a second data unit in an entry that matches the first data unit, and performing a preliminary read error recovery process on the first data unit using the information in the entry to reduce the bit error rate below the threshold. | 2016-02-11 |
20160041892 | SYSTEM FOR DISCOVERING BUGS USING INTERVAL ALGEBRA QUERY LANGUAGE - A system for discovering bugs comprises an input interface and a processor. The input interface is configured to receive a bug definition. The bug definition includes a set operator with a time constraint and one or more set operands. The input interface is configured to receive an event log. The processor is configured to determine a list of bug occurrences using the bug definition and the event log. | 2016-02-11 |
20160041893 | SYSTEM AND METHOD FOR DISPLAY OF SOFTWARE QUALITY - A method for code analysis comprising steps of inputting program code to an analyzer, assigning an objective quality measure to components of the analyzed code; and displaying graphically the objective quality measures. | 2016-02-11 |
20160041894 | STRUCTURED LOGGING AND INSTRUMENTATION FRAMEWORK - A structured logging and instrumentation framework may include a structured logging service that interacts with one or more instrumentation points of an application at runtime. The structured logging service may expose a structured logging application programming interface that may be called by an instrumentation point for passing structured trace event information. The structured logging service may be implemented as a source of structured trace event information for one or more consumers and may output structured trace event information as a serialized string or as one or more strongly-typed key-value pairs. | 2016-02-11 |
20160041895 | PREPROCESSOR DIRECTIVE SYMBOL ANALYZER DEVICES AND METHODS - Generally discussed herein are systems, apparatuses, or methods for preprocessor directive symbol definition and preprocessor directive symbol usage analysis. In one or more embodiments a method can include applying a heuristic to a first preprocessor directive symbol from a build file or sub-build file of one or more build files or source code files and a second preprocessor directive symbol from a source code file. The method can include determining a likelihood that the first preprocessor directive symbol is presented erroneously in the source code file as the second preprocessor directive symbol based on a result of applying the heuristic. | 2016-02-11 |
20160041896 | Integration Process Management Console With Error Resolution Interface - An information handling system for resolving integrated business process system errors includes a processor executing instructions to scrub an error message for an integrated business process system error from an integrated business process event to remove user specific information. The information handling system further includes a processor interface device for transmitting a search request to a multi-user community scrubbed system error database at a storage device for scrubbed resolution articles using the scrubbed error message. The information handling system includes the processor interface device sending the scrubbed resolution articles in a rank-order to display, via an error resolution graphical user interface. | 2016-02-11 |
20160041897 | GENERATION OF AUTOMATED UNIT TESTS FOR A CONTROLLER LAYER SYSTEM AND METHOD - A method, computer program product, and computer system for receiving, by a computing device, a selection of one or more files for which to have one or more automated unit tests generated for an application under test. An action in the application under test is received while the application under test is used. Behavior data of how the application under test responds to the action is tracked. An automated unit test of the one or more automated unit tests is generated for underlying code of the application under test invoked when receiving the action based upon, at least in part, the behavior data of how the application under test responds to the action. | 2016-02-11 |
20160041898 | GENERATION OF AUTOMATED UNIT TESTS FOR A CONTROLLER LAYER SYSTEM AND METHOD - A method, computer program product, and computer system for receiving, by a computing device, a selection of one or more files for which to have one or more automated unit tests generated for an application under test. An action in the application under test is received while the application under test is used. Behavior data of how the application under test responds to the action is tracked. An automated unit test of the one or more automated unit tests is generated for underlying code of the application under test invoked when receiving the action based upon, at least in part, the behavior data of how the application under test responds to the action. | 2016-02-11 |
20160041899 | GUIDED REMEDIATION OF ACCESSIBILITY AND USABILITY PROBLEMS IN USER INTERFACES - A user interface is analyzed to identify a problem element in the user interface. A problem in the user interface is related to an initial value of an attribute of the problem element. A changed value of the attribute of the problem element is computed. A determination is made that the changed value satisfies a compliance rule applicable to the user interface. A first record and a second record are selected from a historical data. The first record includes a first value of a metric usable with the user interface, and the second record includes a second value of the metric. A difference between the second value and the first value is associated with the changed value as an expected change in the metric due to the changed value. The changed value and the expected change in the metric are presented as a remedy for the problem. | 2016-02-11 |
20160041900 | TESTING INTEGRATED BUSINESS SYSTEMS - Methods, systems, and computer readable medium are disclosed to test a first business system and a second business system. A test of the first business system is performed, wherein the first business system is integrated with the second business system. One or more calls are recorded from the first business system to the second business system during the test of the first business system. The one or more calls from the first business system are identified for a test of the second business system. | 2016-02-11 |
20160041901 | DYNAMIC ASSIGNMENT OF TRANSFERS OF BLOCKS OF DATA - A computer-program causing a computing device to transmit, from a data transfer thread of a multitude of data transfer threads executed within a data storage cluster and to a distribution thread at a network address on a network, a request for an assignment of an exchange of data with at least one computation thread of a multitude of computation threads executed within a data processing cluster; exchange a block of data with a single computation thread of the multitude of computation threads in response to receipt of an assignment to exchange the block of data with the single computation thread; and exchange multiple blocks of data with multiple computation threads of the multitude of computation threads in a round robin manner among the multiple computation threads in response to receipt of an assignment to exchange the multiple blocks of data with the multiple computation threads. | 2016-02-11 |
20160041902 | APPARATUS, SYSTEM, AND METHOD FOR DESTAGING CACHED DATA - Apparatuses, systems, methods, and computer program products are disclosed for destaging cached data. A method includes caching write in a nonvolatile solid-state cache by appending the data to a log of the nonvolatile solid-state cache. The log includes a sequential, log-based structure preserved in the nonvolatile solid-state cache. A method includes destaging at least a portion of the data from the nonvolatile solid-state cache to the backing store in a cache log order. The cache log order comprises an order in which the data was appended to the log of the nonvolatile solid-state cache. | 2016-02-11 |
20160041903 | Garbage collection based on temperature - A storage device made up of multiple storage media is configured such that one such media serves as a cache for data stored on another of such media. The device includes a controller configured to manage the cache by consolidating information concerning obsolete data stored in the cache with information concerning data no longer desired to be stored in the cache, and erase segments of the cache containing one or more of the blocks of obsolete data and the blocks of data that are no longer desired to be stored in the cache to produce reclaimed segments of the cache. | 2016-02-11 |
20160041904 | FILE SYSTEM INDIRECTION TECHNIQUE FOR DIRECTLY MANAGING SOLID STATE DEVICES - A technique uses file system indirection to manage solid state devices (SSDs). Based on relocation of data on the SSDs from a first SSD storage block to a second SSD storage block, a flash translation layer (FTL) driver may update a per-volume indirection file to reference the second SSD storage block and no longer reference the first SSD storage block. Based on a mismatch between the per-volume indirection file and a buffer tree, the buffer tree is updated to reference the second SSD storage block. Alternatively, the FTL driver may create and insert an entry into a mapping table, wherein the entry may reference the first SSD storage block and also reference the second SSD storage block. The buffer tree may then be updated to reference the second SSD storage block based on the new entry, and the new entry may then be deleted after the buffer tree is updated. | 2016-02-11 |
20160041905 | Cache Line Compaction of Compressed Data Segments - Methods, devices, and non-transitory process-readable storage media for compacting data within cache lines of a cache. An aspect method may include identifying, by a processor of the computing device, a base address (e.g., a physical or virtual cache address) for a first data segment, identifying a data size (e.g., based on a compression ratio) for the first data segment, obtaining a base offset based on the identified data size and the base address of the first data segment, and calculating an offset address by offsetting the base address with the obtained base offset, wherein the calculated offset address is associated with a second data segment. In some aspects, the method may include identifying a parity value for the first data segment based on the base address and obtaining the base offset by performing a lookup on a stored table using the identified data size and identified parity value. | 2016-02-11 |
20160041906 | SHARDING OF IN-MEMORY OBJECTS ACROSS NUMA NODES - Techniques are provided for sharding objects across different compute nodes. In one embodiment, a database server instance generates, for an object, a plurality of in-memory chunks including a first in-memory chunk and a second in-memory chunk, where each in-memory chunk includes a different portion of the object. The database server instance assigns each in-memory chunk to one of a plurality of computer nodes including the first in-memory chunk to a first compute node and a second in-memory chunk to a second local memory of a second compute node. The database server instance stores an in-memory map that indicates a memory location for each in-memory chunk. The in-memory map indicates that the first in-memory chunk is located in the first local memory of the first compute node and that the second in-memory chunk is located in the second local memory of the second compute node. | 2016-02-11 |
20160041907 | SYSTEMS AND METHODS TO MANAGE TIERED CACHE DATA STORAGE - Systems and methods for managing records stored in a storage cache are provided. A cache index is created and maintained to track where records are stored in buckets in the storage cache. The cache index maps the memory locations of the cached records to the buckets in the cache storage and can be quickly traversed by a metadata manager to determine whether a requested record can be retrieved from the cache storage. Bucket addresses stored in the cache index include a generation number of the bucket that is used to determine whether the cached record is stale. The generation number allows a bucket manager to evict buckets in the cache without having to update the bucket addresses stored in the cache index. Further, the bucket manager is tiered thus allowing efficient use of differing filter functions and even different types of memories as may be desired in a given implementation. | 2016-02-11 |
20160041908 | SYSTEMS AND METHODS FOR MAINTAINING THE COHERENCY OF A STORE COALESCING CACHE AND A LOAD CACHE - A method for maintaining the coherency of a store coalescing cache and a load cache is disclosed. As a part of the method, responsive to a write-back of an entry from a level one store coalescing cache to a level two cache, the entry is written into the level two cache and into the level one load cache. The writing of the entry into the level two cache and into the level one load cache is executed at the speed of access of the level two cache. | 2016-02-11 |
20160041909 | MOVING DATA BETWEEN CACHES IN A HETEROGENEOUS PROCESSOR SYSTEM - Apparatus, computer readable medium, integrated circuit, and method of moving a plurality of data items to a first cache or a second cache are presented. The method includes receiving an indication that the first cache requested the plurality of data items. The method includes storing information indicating that the first cache requested the plurality of data items. The information may include an address for each of the plurality of data items. The method includes determining based at least on the stored information to move the plurality of data items to the second cache. The method includes moving the plurality of data items to the second cache. The method may include determining a time interval between receiving the indication that the first cache requested the plurality of data items and moving the plurality of data items to the second cache. A scratch pad memory is disclosed. | 2016-02-11 |
20160041910 | CACHE OPTIMIZATION - A system and method for management and processing of resource requests at cache server computing devices is provided. Cache server computing devices segment content into an initialization fragment for storage in memory and one or more remaining fragments for storage in a media having higher latency than the memory. Upon receipt of a request for the content, a cache server computing device transmits the initialization fragment from the memory, retrieves the one or more remaining fragments, and transmits the one or more remaining fragments without retaining the one or more remaining fragments in the memory for subsequent processing. | 2016-02-11 |
20160041911 | Push-Based Cache Invalidation Notification - In one embodiments, one or more first computing devices receive updated values for user data associated with a plurality of users; and for each of the user data for which an updated value has been received, determine one or more second systems that each have subscribed to be notified when the value of the user datum is updated and each have a pre-established relationship with the user associated with the user datum; and push notifications to the second systems indicating that the value of the user datum has been updated without providing the updated value for the user datum to the second systems. | 2016-02-11 |