44th week of 2015 patent applcation highlights part 47 |
Patent application number | Title | Published |
20150309831 | FIGHT-THROUGH NODES WITH DISPOSABLE VIRTUAL MACHINES AND ROLLBACK OF PERSISTENT STATE - A server system receives messages from client computing devices. Each of the messages corresponds to a transaction. The server system assigns each respective transaction to a respective fresh virtual machine. Furthermore, the server system performs, as part of a respective virtual machine processing a respective transaction, a modification associated with the respective transaction to a shared database. The shared database is persisted independently of the plurality of virtual machines. In response to determining that processing of the respective transaction is complete, the server system discards the respective virtual machine. In response to a trigger, such as determining that the respective transaction is associated with a cyber-attack, the server system uses checkpoint data associated with the respective transaction to roll back the modifications associated with the respective transaction to the shared database. | 2015-10-29 |
20150309832 | Isolation Method for Management Virtual Machine and Apparatus - An isolation method for a management virtual machine and an apparatus, which resolves problems that performance of communication between service components is deteriorated, more resources are required for running a virtual machine, and security of the service components is relatively low. The method includes: acquiring a guest identifier; searching, according to the guest identifier, the management virtual machine for a kernel virtual machine; when the kernel virtual machine is not found in the management virtual machine, creating the kernel virtual machine in the management virtual machine; dividing a service provided for a guest virtual machine by the kernel virtual machine into multiple service components; and running the multiple service components in execution environments corresponding to permission of the service components, where the kernel virtual machine includes the multiple execution environments, and the multiple execution environment have different permission. | 2015-10-29 |
20150309833 | METHODS AND SYSTEMS FOR AUTOMATING DEPLOYMENT OF APPLICATIONS IN A MULTI-TENANT DATABASE ENVIRONMENT - In accordance with embodiments disclosed herein, there are provided mechanisms and methods for automating deployment of applications in a multi-tenant database environment. For example, in one embodiment, mechanisms include managing a plurality of machines operating as a machine farm within a datacenter by executing an agent provisioning script at a control hub, instructing the plurality of machines to download and instantiate a lightweight agent; pushing a plurality of URL (Uniform Resource Locator) references from the control hub to the instantiated lightweight agent on each of the plurality of machines specifying one or more applications to be provisioned and one or more dependencies for each of the applications; and loading, via the lightweight agent at each of the plurality of machines, the one or more applications and the one or more dependencies for each of the one or more applications into memory of each respective machine. | 2015-10-29 |
20150309834 | SYSTEM AND METHOD FOR SUPPORTING COMMON TRANSACTION IDENTIFIER (XID) OPTIMIZATION BASED ON RESOURCE MANAGER (RM) INSTANCE AWARENESS IN A TRANSACTIONAL ENVIRONMENT - A system and method can support transaction processing in a transactional environment. A coordinator for a global transaction operates to propagate a common transaction identifier and information for a resource manager instance to one or more participants of the global transaction in the transactional environment. The coordinator allows said one or more participants, which share resource manager instance with the coordinator, to use the common transaction identifier, and can process the global transaction for said one or more participants that share the resource manager instance using one transaction branch. | 2015-10-29 |
20150309835 | SYSTEM AND METHOD FOR SUPPORTING TRANSACTION AFFINITY BASED ON RESOURCE MANAGER (RM) INSTANCE AWARENESS IN A TRANSACTIONAL ENVIRONMENT - A system and method can support transaction processing in a transactional environment. A transactional system operates to route a request to a transactional server, wherein the transactional server is connected to a resource manager (RM) instance. Furthermore, the transactional system can assign an affinity context to the transactional server, wherein the affinity context indicates the RM instance that the transactional server is associated with, and the transactional system can route one or more subsequent requests that are related to the request to the transactional server based on the affinity context. | 2015-10-29 |
20150309836 | AVOIDING TRANSACTION ROLLBACK - A method and apparatus for avoiding a transaction rollback is provided. The method includes determining, by a service status check unit, whether at least one available path exists through a logic flow during an execution of a transaction. The service status check unit forecasts a successful logic flow completion on the determining the existence of at least one available path through the logic flow. The transaction is terminated, based on there being no available path through the logic flow. | 2015-10-29 |
20150309837 | SYSTEM AND METHOD FOR SUPPORTING RESOURCE MANAGER (RM) INSTANCE AWARENESS IN A TRANSACTIONAL ENVIRONMENT - A system and method can support transaction processing in a transactional environment. A transactional server operates to receive resource manager (RM) instance information from a data source that is associated with one or more RM instances, wherein the received instance information allows the transactional server to be aware of which RM instance that the transactional server is currently connected to. Furthermore, the transactional server operates to save the received instance information into one or more tables that are associated with the transactional server. Then, the transactional server can process a global transaction based on the instance information saved in the one or more tables. | 2015-10-29 |
20150309838 | REDUCTION OF PROCESSING DUPLICATES OF QUEUED REQUESTS - Aspects of the present invention disclose a method, computer program product, and system for managing queued requests. The method includes one or more processors accessing a queue that includes a plurality of read requests. The method further includes one or more processors identifying read requests in the plurality of read requests that are identical. The method further includes one or more processors determining whether grouping the identical read requests is an efficient use of one or more resources. In an additional aspect, the method further includes responsive to determining that grouping the identical read requests is an efficient use of one or more resources, one or more processors grouping the identical read requests together for processing as a single request. | 2015-10-29 |
20150309839 | Virtual Machine Live Migration Method, Virtual Machine Memory Data Processing Method, Server, and Virtual Machine System - A virtual machine live migration method and a server, to resolve a problem that live migration of a virtual machine cannot be implemented in an SR-IOV technology scenario. According to the virtual machine live migration method and the server in the embodiments of the present invention, by setting a dirty write flag, a virtual PCIE device of a to-be-migrated virtual machine performs at least one read and write operation on received data; a virtual machine manager of the to-be-migrated virtual machine can identify a change in the data and migrate changed data to a destination virtual machine, thereby resolving a problem in the prior art that data cannot be migrated during a virtual machine live migration process because the data passes through the virtual PCIE device but the virtual machine manager cannot perceive the data. | 2015-10-29 |
20150309840 | AUTOMATED CAPACITY PROVISIONING METHOD USING HISTORICAL PERFORMANCE DATA - The method may include collecting performance data relating to processing nodes of a computer system which provide services via one or more applications, analyzing the performance data to generate an operational profile characterizing resource usage of the processing nodes, receiving a set of attributes characterizing expected performance goals in which the services are expected to be provided, and generating at least one provisioning policy based on an analysis of the operational profile in conjunction with the set of attributes. The at least one provisioning policy may specify a condition for re-allocating resources associated with at least one processing node in a manner that satisfies the performance goals of the set of attributes. The method may further include re-allocating, during runtime, the resources associated with the at least one processing node when the condition of the at least one provisioning policy is determined as satisfied. | 2015-10-29 |
20150309841 | INFORMATION PROCESSING SYSTEM, METHOD OF CONTROLLING INFORMATION PROCESSING SYSTEM AND STORAGE MEDIUM - An information processing system includes: a plurality of processors configured to cause a virtual machine on each processor to be operated or terminated; a plurality of storage devices; and a control device configured to: collect processing loads of the respective processors, cause a first virtual machine which operates on a first processor in which a frequency of a processing load exceeding a first threshold exceeds a first proportion, to be terminated, cause a second processor which is stopped among the plurality of processors, to be operated, and cause a first storage device which is coupled with the terminated first virtual machine among the plurality of storage devices, to be coupled with the operated second processor. | 2015-10-29 |
20150309842 | Core Resource Allocation Method and Apparatus, and Many-Core System - A core resource allocation method and apparatus, and a many-core system for allocating core resources of the many-core system are disclosed. In the method, after acquiring a quantity of idle cores needed for a user process, an execution core of the many-core system determine at least two scattered core partitions meeting the quantity, where each core partition is a set of one or multiple cores, and all cores in each core partition are idle cores. Then, the execution core combines the at least two scattered core partitions to form one continuous core partition, and allocates the formed continuous core partition to the user process. In this way, process interaction can be directly performed between different cores in a continuous core partition allocated to a user process, thereby improving efficiency of communication between processes. Furthermore, a waste of core resources can be effectively avoided. | 2015-10-29 |
20150309843 | RESOURCE OPTIMIZATION METHOD AND APPARATUS - The present disclosure discloses a resource optimization method and apparatus. The method includes: detecting whether a currently started process is a process of a predetermined type; querying for suspendable processes among other currently running processes if it is detected that the currently started process is a process of the predetermined type; and suspending at least one process among the found suspendable processes. | 2015-10-29 |
20150309844 | Systems and Methods for Audio Attribute Mapping - In a customized content delivery service, such as, for example, a personalized music streaming service delivered over various wireless networks, an end-user can be given the ability to refine or select programming which is presented to them. One approach to achieving this is to present the user with a range of user preference controls, such as sliders, which can be mapped to attributes contained within the scheduling system. Thus, systems and methods are presented for the representation and delivery of such attributes to effect a personalized server, to map controls to these attributes, and to simplify the controls presented to an end-user. In exemplary embodiments of the present invention a song or audio content recommender may use channel specifications and a user profile, as dynamically modified and updated by user preferences expressed via said user preference controls, to generate user and channel specific playlists, to give a user the personalized audio experience he or she actually desires. | 2015-10-29 |
20150309845 | SYNCHRONIZATION METHOD - A synchronization method in a computer system with multiple cores, wherein a group of threads executes in parallel on a plurality of cores, the group of threads being synchronised using barrier synchronisation in which each thread in the group waits for all the others at a barrier before progressing; the group of threads executes until a first thread reaches the barrier; the first thread enters a polling state, repeatedly checking for a release condition indicating the end of the barrier; subsequent threads to reach the barrier are moved to the core on which the first thread is executing; and other cores are powered down as the number of moved threads increases; and wherein when the first thread detects the release condition, the powered down cores are powered up and are available for use by the threads. | 2015-10-29 |
20150309846 | PARALLEL PRIORITY QUEUE UTILIZING PARALLEL HEAP ON MANY-CORE PROCESSORS FOR ACCELERATING PRIORITY-QUEUE-BASED APPLICATIONS - Disclosed are various embodiments for a parallel priority queue implemented on one or more many-core processors and/or multi-core processors such as those in general-purpose graphics processing units (GPGPUs). According to various embodiments, a priority may be determined according to a timestamp of an item, such as an event or an entry, in a priority queue. A priority queue interface may comprise functions to insert and remove entries from the priority queue. Priority order of the entries may be maintained as the entries are inserted and removed from the queue. | 2015-10-29 |
20150309847 | TESTING OPERATION OF MULTI-THREADED PROCESSOR HAVING SHARED RESOURCES - A method of testing simultaneous multi-threaded operation of a shared execution resource in a processor includes running test patterns including irritator threads and non-irritator threads that try to simultaneously use the shared execution resource. Synchronizing the starts of the access of the irritator threads and the non-irritator threads to the shared execution resource includes the initial instructions of the irritator thread disabling execution of the irritator thread using a thread management register, and the initial instructions of the non-irritator thread enabling the irritator thread using the thread management register and starting execution of the non-irritator thread. Ending access to the shared execution resource includes the irritator thread communicating to the non-irritator thread an address of an end of the irritator thread loop, and the non-irritator thread moving the irritator thread out of the loop using thread restart. | 2015-10-29 |
20150309848 | MEMORY EFFICIENT THREAD-LEVEL SPECULATION - A processor device executes program code in one or more threads. The processor device detects a call of a function in one of the threads and executes the function in a further thread. Further, the processor device performs a selection between saving a state of the processor device when starting execution of the function in the further thread and not saving the state of the processor device when starting execution of the function in the further thread. In response to a conflict related to the execution of the function in the further thread, the processor device may perform a rollback to a last saved state of the processor device and execute the function in the thread in which it was called. | 2015-10-29 |
20150309849 | METHOD AND SYSTEM FOR MANAGING AND PRESENTING MULTIPLE APPLICATION CONTAINERS AS A SINGLE LOGICAL CONTAINER - A method for managing application containers, comprising: assigning a first application to a master container in a memory of a system; assigning a second application to a slave container in the memory; using a processor, assigning the master and slave containers to a container group by: delegating access to container meta-data of the slave container by a container run-time of the slave container or by the first application to a container meta-data accessor of the master container via a class loader of the master container; and, delegating interaction between the container run-time of the slave container and a container management channel of the slave container to a container management channel of the master container via the class loader of the master container; and, accessing the first and second applications via the container group. | 2015-10-29 |
20150309850 | Data Transmission Method for Data Transmission System - The present invention relates to a data transmission method applied to a data transmission system comprising a data transmission device, at least one host computer and at least one associated computer, wherein all the at least one host computer and the at least one associated computer are disposed with a plurality of switching system clipboards, and have one computer clipboard thereof. Therefore, by the disposing of the plurality of switching system clipboards, two or more users are allowed to simultaneously carry out their computer switching operations and data transmissions between multi computers through one identical data transmission system, moreover, the file size of the transmitted data does not be limited by the data transmission device of the data transmission system. | 2015-10-29 |
20150309851 | Method and Device for Browsing Webpage - The present invention discloses a method and device for browsing webpage, wherein the method including: creating a plugin/control process independent from a page process for a plugin/control object when a page thread creates the plugin/control object; and placing the independent plugin/control process into a sandbox to run; browsing a webpage by implementing inter-process communication between the plugin/control process and the page process; wherein the page process running outside the sandbox. According to the invention, the web browsing security is guaranteed, and meanwhile the running stability of the browser is enhanced. | 2015-10-29 |
20150309852 | Data Interpretation With Modulation Error Ratio Analysis - Methods and systems for analyzing data are disclosed. An example method can comprise receiving a first data signal, decoding the first data signal, determining a second data signal based on the decoded first data signal, and determining a modulation error ratio based on a difference between the first data signal and the second data signal. | 2015-10-29 |
20150309853 | SYSTEM AND METHOD TO MEASURE AN ERROR RATE OF A WIRELESS LOCAL AREA NETWORK - Embodiments described herein relate generally to a communication between an element manager and a wireless local area network (WLAN) access point (AP). The WLAN AP may be configured with one or more counters. The one or more counters may measure events, such as data transmission and/or reception at the WLAN AP or a carrier sense multiple access with collision avoidance (CSMA/CA) procedure by the WLAN AP. The element manager may be configured to read one or more of these counters and compute one or more values based on the values read from the one or more counters. The element manager may be configured to communicate the one or more computed values to a network manager. Other embodiments may be described and/or claimed. | 2015-10-29 |
20150309854 | BUILDING A FAILURE-PREDICTIVE MODEL FROM MESSAGE SEQUENCES - A method to build a failure predictive model includes: receiving an input of a set of event sequences, where each sequence is labeled as representing a failure or not representing a failure, extracting a single predictive closed pattern from among the input sequences that represents a failure, creating a root node with the single closed pattern, splitting the set of event sequences into a first set that includes the single closed pattern and a second set that excludes the single pattern, and processing each of the first and second sets until at least one child node is created that is labeled as either representing a failure or not representing a failure. | 2015-10-29 |
20150309855 | METHOD AND SYSTEM FOR DETECTING SYMPTOMS AND DETERMINING AN OPTIMAL REMEDY PATTERN FOR A FAULTY DEVICE - A method, non-transitory computer readable medium, and anomaly detection computing apparatus that detects one or more of a plurality of symptoms associated with a device when the device is operating in a fault mode. One or more of a plurality of components of the device that are potentially faulty are identified based on the detected symptoms. One or more tests are performed on each of the one or more of the components to confirm that at least a subset of the one or more of the components is faulty. An optimal remedy pattern is determined for the subset of the one or more of the components based at least in part on historical data and cost data obtained from a database, and the optimal remedy pattern is output. | 2015-10-29 |
20150309856 | Imminent Read Failure Detection Using High/Low Read Voltage Levels - Methods and systems are disclosed for imminent read failure detection using high/low read voltage levels. In certain embodiments, data stored within an array of non-volatile memory (NVM) cells is checked using read voltage levels below and above a normal read voltage level. An imminent read failure is then indicated if errors are detected within the same address for both voltage checks. Further, data stored can be checked using read voltage levels that are incrementally decreased below and incrementally increased above a normal read voltage level. An imminent read failure is then indicated if read errors are detected within the same address for both voltage sweeps and if high/low read voltage levels triggering faults differ by less than a predetermined threshold value. An address sequencer, error correction code (ECC) logic, and a bias generator can be used to implement the imminent failure detection. | 2015-10-29 |
20150309857 | Imminent Read Failure Detection Based Upon Unacceptable Wear For NVM Cells - Methods and systems are disclosed for imminent read failure detection based upon unacceptable wear for non-volatile memory (NVM) cells. In certain embodiments, a first failure time is recorded when a first diagnostic mode detects an uncorrectable error within the NVM cell array using a first set of read voltage levels below and above a normal read voltage level. A second failure time is recorded when a second diagnostic mode detects an uncorrectable error within the NVM cell array using a second set of read voltage levels below and above a normal read voltage level. The first and second failure times are then compared against a threshold wear time value to determine whether or not an imminent read failure is indicated. The diagnostic modes can be run separately for erased NVM cell distributions and programmed NVM cell distributions to provide separate wear rate determinations. | 2015-10-29 |
20150309858 | Imminent Read Failure Detection Based Upon Changes In Error Voltage Windows For NVM Cells - Methods and systems are disclosed for imminent read failure detection based upon changes in error voltage windows for non-volatile memory (NVM) cells. In certain embodiments, data stored within an array of NVM cells is checked at a first time using a diagnostic mode and high/low read voltage sweeps to determine a first error voltage window where high/low uncorrectable errors are detected. Stored data is then checked at a second time using the diagnostic mode and high/low read voltage sweeps to determine a second error voltage window where high/low uncorrectable errors are detected. The difference between the error voltage windows are then compared against a voltage difference threshold value to determine whether or not to indicate an imminent read failure condition. An address sequencer, error correction code (ECC) logic, and a bias generator can be used to implement the imminent failure detection. | 2015-10-29 |
20150309859 | Apparatus and Method of Error Monitoring with a Diagnostic Module - A vehicle computer system configured to communicate with a mobile device, comprising a wireless transceiver configured to communicate with the mobile device. The vehicle computer system also includes a processor in communication with the wireless transceiver and memory. The processor is configured to monitor activity occurring at the wireless transceiver, receive a message from the wireless transceiver that includes information related to one or more software states of the wireless transceiver, determine an error has occurred at the wireless transceiver, save the information related to the one or more software states of the wireless transceiver in the memory, and send the information related to the one or more software states. | 2015-10-29 |
20150309860 | ADVANCED DAB FEC PROCESSING IN PACKET MODE UTILIZING TOKENS - In an embodiment, a method for performing forward error correction (FEC) on protected data packets is disclosed. The method involves creating a FEC table having columns for application data and columns for error-correction data (EC data). Then, a number of protected application data packets are received and placed in the FEC table. If an application data packet is received, then the application data from the packet is placed in the application data column. If an application data packet is not received, generated zeroes are placed in the application data column. Once the application data columns of the FEC table are full, EC data corresponding to the application data is received and placed in the EC data columns of the FEC table. The rows of the FEC table are then fed to the decoder for error correction. | 2015-10-29 |
20150309861 | DATA BUS DRIVING CIRCUIT, AND SEMICONDUCTOR DEVICE AND SEMICONDUCTOR MEMORY DEVICE INCLUDING THE SAME - Provided is a data bus driving circuit including: a data processing unit that processes input data and outputs processed data; a first logic inversion unit that selects, based on a determination result signal, one of the processed data and inverted data obtained by logically inverting each value of a plurality of bits constituting the processed data, and outputs the selected data to a data bus; and an inversion determination unit that compares the data output from the first logic inversion unit with the input data that has not been processed by the data processing unit, and outputs the determination result signal based on a comparison result. | 2015-10-29 |
20150309862 | CACHE CONTROL DEVICE HAVING FAULT-TOLERANT FUNCTION AND METHOD OF OPERATING THE SAME - The cache control device having the fault-tolerant function includes a cache memory configured to store first data with respect to a specific address read from a main memory, and generate and store a first parity bit corresponding to the first data, a shadow cache memory configured to store second data with respect to the specific address, and generate and store a second parity bit corresponding to the second data, and a fault detector configured to perform a parity check operation on the data of the specific address and the parity bit stored in at least one of the cache memory and the shadow cache memory when receiving a data read request with respect to the specific address from a processor, and transmit the data stored in a non-erroneous memory to the processor according to a result of the parity check operation. | 2015-10-29 |
20150309863 | PRACTICAL DYNAMIC PROOFS OF RETRIEVABILITY - Certain embodiments of the present invention involve a method of storing an erasure coded copy of block data, and storing newly updated block data into a separate erasure-coded log structure. The method also includes auditing both the erasure copy of block data and the newly updated block data. The erasure copy of block data and the newly updated block data are probabilistically checked during the audit. In certain other embodiments the newly updated block data is stored in a log structure. | 2015-10-29 |
20150309864 | DATA STORAGE DEVICE AND METHOD FOR OPERATING THE SAME - A method for operating a data storage device that includes reading data and storage parity data, generating transformation parity data through a masking operation on the storage parity data, and performing an error correcting operation on the data, based on the transformation parity data. | 2015-10-29 |
20150309865 | MEMORY CONTROL UNIT AND DATA STORAGE DEVICE INCLUDING THE SAME - A data storage device includes a storage memory device; a signal generation block suitable for generating control signals to be provided to the storage memory device; and an error correction code (ECC) block suitable for ECC-encoding data to be stored in the storage memory device, wherein the ECC block operates before the signal generation block. | 2015-10-29 |
20150309866 | REJUVENATION OF LEGACY CODE INTO RESOURCES-ORIENTED ARCHITECTURES - A method for building a web-based application may include defining a scope of the web-based application, via a programming module, based on a plurality of parameters of a non-web-based application, and defining an error-handling mechanism based on an error-handling mechanism of the non-web-based application. The method may further include defining a plurality of resources for the web-based application, defining the mechanism of function for each resource of the plurality of resources, and generating the web-based application | 2015-10-29 |
20150309867 | COMPOSITE SEMICONDUCTOR MEMORY DEVICE WITH ERROR CORRECTION - A composite semiconductor memory device, comprising: a plurality of nonvolatile memory devices; and an interface device connected to the plurality of nonvolatile memory devices and for connection to a memory controller, the interface device comprising an error correction coding (ECC) engine. Also, a memory system, comprising: a memory controller; and at least one composite semiconductor memory device configured for being written to and read from by the memory controller and comprising a built-in error correction coding (ECC) engine. Also, a memory system, comprising: a composite semiconductor memory device comprising a plurality of nonvolatile memory devices; and a memory controller connected to the at least one composite semiconductor memory device, for issuing read and write commands to the composite semiconductor memory device to cause data to be written to or read from individual ones of the nonvolatile memory devices; the composite semiconductor memory device providing error-free writing and reading of the data. | 2015-10-29 |
20150309868 | METHOD AND APPARATUS TO PERFORM CONCURRENT READ AND WRITE MEMORY OPERATIONS - Subject matter disclosed herein relates to read and write processes of a memory device. During a write process to a particular partition in a memory array, a response to a read request of contents of the particular partition may be delayed. In some embodiments, the contents of the particular partition may be indirectly read during the write process without delaying the response to the read request. The contents of the particular partition can be indirectly read by determining the contents of the particular partition based, at least in part, on an error correction code based, at least in part, on contents of memory partitions of the memory array. | 2015-10-29 |
20150309869 | ERROR-CORRECTION ENCODING AND DECODING - A data encoding method includes storing K input data symbols; assigning the symbols to respective symbol locations in a notional square array, having n rows and n columns of locations, to define a plurality of k-symbol words in respective rows; encoding the words by encoding rows and columns of the array dependent on a product code having identical row and column codes, each being a reversible error-correction code of dimension k and length n=2n′, thereby to define a codeword, having n | 2015-10-29 |
20150309870 | MEMORY DEVICE WITH INTERNAL SIGNAL PROCESSING UNIT - A method for operating a memory includes storing data in a plurality of analog memory cells that are fabricated on a first semiconductor die by writing input storage values to a group of the analog memory cells. After storing the data, multiple output storage values are read from each of the analog memory cells in the group using respective, different threshold sets of read thresholds, thus providing multiple output sets of the output storage values corresponding respectively to the threshold sets. The multiple output sets of the output storage values are preprocessed by circuitry that is fabricated on the first semiconductor die, to produce preprocessed data. The preprocessed data is provided to a memory controller, which is fabricated on a second semiconductor die that is different from the first semiconductor die. so as to enable the memory controller to reconstruct the data responsively to the preprocessed data. | 2015-10-29 |
20150309871 | SYSTEMS AND METHODS FOR DATA STORAGE REMEDIATION - Systems, methods, and non-transitory computer-readable media can receive an indication that a drive included in a set of drives has experienced an error. Acquiring first data associated with the drive can be attempted. The drive can be prompted to undergo a power-cycle. Acquiring second data associated with the drive can be attempted. At least one of the first data or the second data can be analyzed to determine that the drive is remediable. At least the drive included in the set of drives can be remediated, such as by being rebuilt or reconfigured. | 2015-10-29 |
20150309872 | DATA RECOVERY ONCE ECC FAILS TO CORRECT THE DATA - An apparatus comprising a memory and a controller. The memory is configured to process a plurality of read/write operations. The memory comprises a plurality of memory modules each having a size less than a total size of the memory. The controller is configured to salvage data stored in a failed page of the memory determined to exceed a maximum number of errors. The controller copies raw data stored in the failed page. The controller identifies locations of a first type of data cells that fail erase identification. The controller identifies locations of a second type of data cells that have program errors. The controller flips data values in the raw data at the locations of the first type of data cells and the locations of the second type of data cells. The controller is configured to perform error correcting code decoding on the raw data having flipped data values. The controller salvages data stored in the failed page. | 2015-10-29 |
20150309873 | Memory Controllers To Form Symbols Based On Bursts - A memory controller is to interface with a memory, associated with a plurality of pins, based on a codeword. The codeword is to include a plurality of n-bit symbols. An n-bit symbol of the codeword is to be formed from a plurality of n bursts over time associated with one of the pins of the memory. | 2015-10-29 |
20150309874 | A METHOD AND APPARATUS FOR CODE LENGTH ADAPTATION FOR ACCESS TO KEY-VALUE BASED CLOUD STORAGE SYSTEMS - A method and apparatus is disclosed herein for code length adaptation for access to key-value based storage systems. In one embodiment, the method comprises receiving a data object and a request; dividing the data object into K portions, where K is an integer; selecting an FEC coding rate based on backlog associated with at least one queue; applying FEC coding based on the FEC rate set to the K portions to create N FEC coded data blocks, where N is an integer greater than or equal to K; and sending the N FEC coded data blocks to the storage system. | 2015-10-29 |
20150309875 | ERROR-CORRECTION ENCODING AND DECODING - A data encoding method includes storing K input data symbols; assigning the symbols to respective symbol locations in a notional square array, having n rows and n columns of locations, to define a plurality of k-symbol words in respective rows; encoding the words by encoding rows and columns of the array dependent on a product code having identical row and column codes, each being a reversible error-correction code of dimension k and length n=2n′, thereby to define a codeword, having n | 2015-10-29 |
20150309876 | REUSE OF PROBLEMATIC DISKS IN A REDUNDANT DISK SYSTEM - The present disclosure discloses a method and system for reuse of a problematic disk in a Redundant Array of Independent Disks (RAID) system. The method includes performing formatting, initializing and validating operations on a first disk in the RAID system in response to the first disk experiencing a problem and determining that is not a hard error. The method may also include setting the first disk as a second-level redundant disk in the RAID system in order for the RAID system to use the first disk again in response to success of the validating operation on the first disk. The method and the system can enable the problematic disks isolated out of the system due to media errors and/or slow disk errors in the high-end RAID storage to be reused by the RAID system under the precondition of ensuring the reliability of the system. | 2015-10-29 |
20150309877 | DISPERSED STORAGE WRITE PROCESS - A method includes issuing write commands to DS storage units regarding encoded data slices. A write command causes a storage unit to store an encoded data slice, but not allow access to the stored encoded data slices. The method includes receiving write acknowledgements from at least some of DS storage units to produce received write acknowledgements. The method includes, when a write threshold number of the received write acknowledgements have been received within a given time frame, issuing commit commands to the DS storage units. A commit command causes the storage unit to allow access to the stored encoded data slice. The method includes, when the write threshold number of the received write acknowledgements have not been received within the given time frame, issuing rollback commands to the DS units. A rollback command causes the storage unit to continue to not allow access to the stored encoded data slice. | 2015-10-29 |
20150309878 | METHOD AND COMPUTATION NODE FOR PROCESSING APPLICATION DATA - The present invention provides a method and a computation node for processing application data. The method includes: starting, by an operating system, a service process; establishing, by the operating system, a socket connection between the service process and backup software, where the service process has a root operation right, and the service process and the backup software have the same user identifier; sending, by the backup software through the socket, a processing request for application data; receiving, by the service process through the socket, the processing request for application data, where the processing request is sent by the backup software, sending the processing request for application data to corresponding application software, receiving application data returned by the corresponding application software, and sending the returned application data to the backup software through the socket. | 2015-10-29 |
20150309879 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND PROGRAM - An information processing apparatus protects data stored in a storage device by saving setting data stored on a first storage device to a second storage device when the first storage device fails, or when an encryption function is enabled or disabled. The process of protecting the date includes, after a reservation for saving setting data is made, saving the setting data, cancelling the reservation, and making a reservation for restoring the setting data. If the setting data is to be restored, it is determined whether the reservation for restoring the setting data has been made, and if the reservation has been made, the setting data is restored to the first storage device. | 2015-10-29 |
20150309880 | EFFICIENT VIDEO DATA DEDUPLICATION - Various embodiments for performing video data deduplication by a processor device are provided. An accompanying audio stream of a video stream for a selected data block is analyzed for similarity with a pre-existing data block having a predetermined value representative of a plurality of coordinate points of corresponding video at a certain time. | 2015-10-29 |
20150309881 | CENTRALIZED EXECUTION OF SNAPSHOT BACKUPS IN A DISTRIBUTED APPLICATION ENVIRONMENT - Systems and methods for centralizing database manipulation for a plurality of heterogeneous databases are disclosed. A single or limited number of central servers can be used to manage a plurality of hosted client systems. With such a technique, database consistent backups can be performed without requiring altering of the central server, even when different database engines are used across the hosted client systems. | 2015-10-29 |
20150309882 | SYSTEMS AND METHODS FOR MINIMIZING NETWORK BANDWIDTH FOR REPLICATION/BACK UP - Systems and methods are disclosed for backing up a client data set on a computer by identifying changed files; generating a first sub-file signature for one or more segments of a changed file; subsequently generating a second sub-file signature for each file segment to detect insertions, removals, and rearrangements of data in the file; transmitting one more changed segment(s) in the file; and writing a manifest file reflecting the new target state. | 2015-10-29 |
20150309883 | Recording Activity of Software Threads in a Concurrent Software Environment - A technique for failure monitoring and recovery of a first application executing on a first virtual machine includes storing machine state information during execution of the first virtual machine at predetermined checkpoints. An error message that includes an application error state at a failure point of the first application is received, by a hypervisor, from the first application. The first virtual machine is stopped in response to the error message. The hypervisor creates a second virtual machine and a second application from the stored machine state information that are copies of the first virtual machine and the first application. The second virtual machine and the second application are configured to execute from a checkpoint preceding the failure point. In response to receipt of a failure interrupt by the second application, one or more recovery processes are initiated in an attempt to avert the failure point. | 2015-10-29 |
20150309884 | RECOVERY OF A TRANSACTION AFTER XA END - Embodiments of the present invention disclose a method for recovery of a two-phase commit transaction. A computer transmits a first transaction identifier to a data store, wherein the first transaction identifier defines a two-phase commit transaction. The computer transmits a prepare command for the first transaction identifier to a first resource manager. The computer determines if a failure and restart occurred within a distributed data processing environment, wherein the failure and restart occurs after the first resource manager receives an end command, but prior to completing execution of the prepare command for the first transaction identifier. Responsive to determining the failure and restart did occur within the distributed data processing environment, the computer retrieves the first transaction identifier from the data store. The computer transmits a rollback command for the retrieved first transaction identifier to the first resource manager. | 2015-10-29 |
20150309885 | METHOD AND DEVICE FOR PROCESSING DATA AND ELECTRONIC APPARATUS - A method and a device for processing data and an electronic apparatus are provided. The method comprises: obtaining recovery data and modification data when original data is modified, wherein the modification data is data obtained after modifying the original data, and the recovery data is data configured to recover at least a part of the modification data to data in the original data; executing one of the recovery data and the modification data; and executing the other one of the recovery data and the modification data when failing to executing one of the recovery data and the modification data. With the present disclosure, the problem that recovering the system or the system files causes the system unable to work normally is solved, and a stability of the system is enhanced. The present disclosure can be used in the solution for computer viruses. | 2015-10-29 |
20150309886 | FLASH MEMORY CONTROLLER AND DATA STORAGE DEVICE AND FLASH MEMORY CONTROL METHOD - A flash memory control technique with high reliability is provided. A flash memory controller provides a volatile storage area for temporary storage of logical-to-physical address mapping data between a host and a flash memory as well as error detection codes encoded from the logical-to-physical address mapping data. When reading from the volatile storage area, the microcontroller of the flash memory controller is configured to perform an error detection procedure based on the error detection codes. The microcontroller is further configured to restore the logical-to-physical address mapping data in the volatile storage area based on a backup of the logical-to-physical address mapping data. | 2015-10-29 |
20150309887 | Automatic Failure Recovery Using Snapshots and Replicas - In one embodiment, a method of data recovery in a storage system includes, upon failure to fulfill an I/O request for requested data to a primary volume, consulting a change set to determine whether the requested data are current in a snapshot or replica. Further, such an embodiment includes providing the requested data using the snapshot or replica without further accessing the change set, if the requested data are current in the snapshot or replica, or issuing an error or failure status, if the requested data are not current. | 2015-10-29 |
20150309888 | Cooperative Data Recovery In A Storage Stack - Example embodiments respond to input/output (I/O) requests to a storage stack having a hierarchy of layers. In one such embodiment, responsive to an I/O request for data from a higher layer of the stack to a lower of the stack in hierarchy order, a first help response is generated at the lower layer and sent to the higher layer to recover the data. In turn, at the higher layer, it is determined whether a recover mechanism can fulfill the I/O request and, if not, a second help response is generated and sent to a next higher layer in the hierarchy. At the next higher layer, it is determined whether a recovery mechanism can fulfill the I/O request and, if not, a third help response is generated and sent to an even next higher layer in the hierarchy. | 2015-10-29 |
20150309889 | RECOVERY OF A TRANSACTION AFTER XA END - Embodiments of the present invention disclose a method for recovery of a two-phase commit transaction. A computer transmits a first transaction identifier to a data store, wherein the first transaction identifier defines a two-phase commit transaction. The computer transmits a prepare command for the first transaction identifier to a first resource manager. The computer determines if a failure and restart occurred within a distributed data processing environment, wherein the failure and restart occurs after the first resource manager receives an end command, but prior to completing execution of the prepare command for the first transaction identifier. Responsive to determining the failure and restart did occur within the distributed data processing environment, the computer retrieves the first transaction identifier from the data store. The computer transmits a rollback command for the retrieved first transaction identifier to the first resource manager. | 2015-10-29 |
20150309890 | EMULATING A STRETCHED STORAGE DEVICE USING A SHARED REPLICATED STORAGE DEVICE - Exemplary methods, apparatuses, and systems include receiving a command from a recovery manager running on a management server within a first or second datacenter. In response to the command, device identifiers for one or more logical storage devices within the first datacenter are requested. In response to the request, a first device identifier for a first logical storage device within the first datacenter and a peer device identifier for a second logical storage device within the second datacenter are received. Data is replicated from the first logical storage device to the second logical storage device. The first and second logical storage devices are in an active-passive configuration, the first logical storage device storing the replicated data being active and the second logical storage device storing the replicated data being passive. The command with the peer device identifier is sent to the underlying storage. | 2015-10-29 |
20150309891 | FAILURE RECOVERY METHOD IN INFORMATION PROCESSING SYSTEM AND INFORMATION PROCESSING SYSTEM - Services are promptly resumed at the time of a failure recovery in an information processing system. Before a first server system | 2015-10-29 |
20150309892 | INTERCONNECT PATH FAILOVER - One or more techniques and/or systems are provided for interconnect failover between a primary storage controller and a secondary storage controller. The secondary storage controller may be configured as a backup or failover storage controller for the primary storage controller in the event the primary storage controller fails. Data and/or metadata describing the data (e.g., data and/or metadata stored within a write cache) may be mirrored from the primary storage controller to the secondary storage controller over one or more interconnect paths. Responsive to identifying a failover trigger for a failed interconnect path, the secondary storage controller is instructed to fence (e.g., block) I/O operations from the failed interconnect path. Streams of data and/or metadata that were affected by the failure may be instructed to transmit such data and/or metadata over one or more non-failed interconnect paths to the secondary storage controller during failover of the failed interconnect path. | 2015-10-29 |
20150309893 | METHOD OF RECOVERING APPLICATION DATA - A method of recovering application data from the memory of a failed node in a computer system comprising a plurality of nodes connected by an interconnect and of writing the application data to a replacement node; wherein a node of the computer system executes an application which creates application data storing the most recent state of the application in a node memory; the node fails; the node memory of the failed node is then controlled using a failover memory controller; and the failover memory controller copies the application data from the node memory of the failed node to a node memory of the replacement node over the interconnect. | 2015-10-29 |
20150309894 | Fast Failover for Application Performance Based WAN Path Optimization with Multiple Border Routers - According to one aspect, a control entity (such as a policy server) in communication with a plurality of border routers in a network, generates failover entries for one or more traffic flows. Each failover entry specifies a backup path to be used by a border router when the border router determines that a wide area network interface of the border router has failed. The control entity sends the failover entries to each of the border routers. A border router operating in a network stores failover entries for one or more traffic flows. For packets received at the border router either from a local area network interface or via a tunnel from another border router, when the border router detects that the wide area network interface has failed, the border router determines how to handle the packets based on the stored failover entries. | 2015-10-29 |
20150309895 | DECISION-MAKING SUPPORT SYSTEM AND DECISION-MAKING SUPPORT METHOD - A decision-making support device configured to store a predetermined criterion defining a damage degree according to a content of each of disasters, and predetermined information symbolizing various human activities in disasters, and configured to determine a damage degree for each of areas at a disaster-stricken area by comparing disaster information acquired from a predetermined interface with a predetermined criterion, determine an activity degree of human activities for each of the areas based on appearance frequency of predetermined information in various types of information acquired from a predetermined interface or disaster information, identify, as a support-needed area, an area with a higher damage degree and a lower activity degree than those of other areas, or an area with the damage degree and the activity degree higher by a predetermined level or more than those of other areas, and output information of the support-needed area to a predetermined device. | 2015-10-29 |
20150309896 | Method, System, and Apparatus for Cloud Application Redundancy - A redundancy method, system, and apparatus, which can acquire first description information of a cloud application needing redundancy, where the first description information includes information about a source virtual machine and a source network which are used at a production site by the cloud application needing redundancy; and can generate second description information of the cloud application needing redundancy at a redundancy site based on the first description information that gives an overall description about the cloud application needing redundancy, where the second description information gives an overall description about the deployment of the cloud application needing redundancy at the redundancy site; and the redundancy site is capable of acquiring the second description information, to recover the cloud application needing redundancy at the redundancy site, thereby implementing redundancy based on a cloud application. | 2015-10-29 |
20150309897 | ERROR RECOVERY CIRCUIT FACING CPU ASSEMBLY LINE - Disclosed is an error recovery circuit facing a CPU assembly line, comprising: on-chip monitoring circuits ( | 2015-10-29 |
20150309898 | STORAGE CONTROL OF STORAGE MEDIA SUBJECT TO WRITE AMPLIFICATION EFFECTS - According to one aspect of the present invention, there is provided a method for performing storage control. Member storage media and a hot spare storage medium are identified in a storage system. The member storage media are members of a storage medium array, and the hot spare storage medium is for joining in the storage medium array when a member storage medium fails. Data on a member storage medium having a write amplification effect is migrated to the hot spare storage medium. In the member storage medium having a write amplification effect, an erase operation is performed on a storage medium where the migrated data is located. Embodiments of the present invention can alleviate adverse impact caused by a write amplification effect. | 2015-10-29 |
20150309899 | MEMORY MIRRORING - Memory system enabling memory mirroring in single write operations for the primary and backup data storage. The memory system utilizes a memory channel including one or more latency groups, with each latency group encompassing a number of memory modules that have the same signal timing to the controller. A primary copy and a backup copy of a data element can be written to two memory modules in the same latency group of the channel and in a single write operation. The buses of the channel may have the same trace length to each of the memory modules within a latency group. | 2015-10-29 |
20150309900 | INFORMATION PROCESSING APPARATUS AND CONTROL METHOD OF INFORMATION PROCESSING APPARATUS - An information processing apparatus including a removable storage device for storing data includes a control unit that determines whether communication is possible with the storage device and, if communication with the storage device is determined not to be possible, prohibit data from being written to the storage device. When the information processing apparatus is started up, the control unit again determines whether communication is possible with the storage device to which the control unit prohibits data writing and permits data writing to the storage device if communication with the storage device is determined to be possible. | 2015-10-29 |
20150309901 | EMULATING A STRETCHED STORAGE DEVICE USING A SHARED STORAGE DEVICE - Exemplary methods, apparatuses, and systems include receiving a device discovery command from a recovery manager running on a management server within a first or second datacenter. In response to the device discovery command, device identifiers for one or more logical storage devices within the first datacenter are requested. In response to the request, a device discovery response including a first identifier is received. The received device discovery response is modified to include the first device identifier as the identifier for both an underlying logical storage device and as an identifier for a peer logical storage device. The modified response is returned to the recovery manager in response to the device discovery command. | 2015-10-29 |
20150309902 | STORAGE CONTROL DEVICE AND DATA RECOVERY METHOD - A storage control device includes a processor. The processor is configured to acquire, when a first fault has occurred in a first storage device, first storage data to be used in recovery of the first storage device from a plurality of first storage control devices. The processor is configured to derive, when a second fault has occurred in a second storage device controlled by a second storage control device, first processed data from the first storage data. The first processed data is to be used in recovery of the second storage device. The processor is configured to notify the second storage control device of the first processed data. | 2015-10-29 |
20150309903 | RECOVERY CIRCUIT FOR BASIC INPUT-OUTPUT SYSTEM - A recovery circuit for a basic input-output system (BIOS) of a computer includes a storage, a platform controller hub (PCH), and a processor. An effective chip select signal is received by a chip selection pin of the storage via a second pin of the processor when a first pin of the processor does not receive any signals, data in the processor is transmitted to the PCH to make the computer boot up, the data in the processor is transmitted to the storage to erase and update data in the storage. | 2015-10-29 |
20150309904 | TESTING OPTIMIZATION OF MICROPROCESSOR TABLE FUNCTIONS - Embodiments relate to testing memory write operations. An aspect includes detecting a first write operation to a set of “n” divisions in a memory table, and defining a selected set of entries of an optimization checking table corresponding to the set of “n” divisions of the memory table. The aspect includes determining that at least one selected entry of the selected set of entries is not among an optimal set of entries of the checking table. The aspect further includes determining whether to generate an optimization error or to end an optimization analysis of the first write operation without generating the optimization error by comparing the first time stamps of one or both of the at least one selected entry and one or more optimal entries of the optimal set of entries to a temporal window defined by a predetermined duration. | 2015-10-29 |
20150309905 | TESTING OPTIMIZATION OF MICROPROCESSOR TABLE FUNCTIONS - Embodiments relate to testing memory write operations. An aspect includes detecting a first write operation to a set of “n” divisions in a memory table, and defining a selected set of entries of an optimization checking table corresponding to the set of “n” divisions of the memory table. The aspect includes determining that at least one selected entry of the selected set of entries is not among an optimal set of entries of the checking table. The aspect further includes determining whether to generate an optimization error or to end an optimization analysis of the first write operation without generating the optimization error by comparing the first time stamps of one or both of the at least one selected entry and one or more optimal entries of the optimal set of entries to a temporal window defined by a predetermined duration. | 2015-10-29 |
20150309906 | SYSTEM AND METHODS FOR AUTOMATED TESTING OF FUNCTIONALLY COMPLEX SYSTEMS - A system for automated testing of functionally complex systems prior to placing them into production, comprising a test manager module operating on a server computer, a test data storage subsystem coupled to the test manager module and adapted to store at least test results, a test execution module operating on a server computer, and a test analysis module operating on a server computer and adapted to receive test data from the test data storage subsystem. The test manager module causes tests to be executed by the test execution engine, and on detection of an anomalous test result, the test manager module at least causes additional testing to be performed and causes the test analysis module to analyze the results of at least some of the additional testing in order to isolate at least one component exhibiting anomalous behavior. | 2015-10-29 |
20150309907 | SYSTEM AND METHOD FOR TESTING COMPUTING HARDWARE IN COMPUTER RACK - A method for testing computing hardware detects the current time as being within a predetermined time period and transfers virtual machines (VMs) from a plurality of physical machines to other physical machines as targets according to a load balancing strategy. The load balancing strategy sums of a load ratio of one physical machine including the VM and a load ratio of one physical machine as a target for the transfer; if the sum of the two ratios is less than a preset load ratio, the VM-transferring physical machine is put into a standby state when the transfer takes place as long as the current time is still inside the predetermined time period. Physical machines which are in the standby state and have not been tested are awoken, and the awoken physical machines are connected to the server for testing. | 2015-10-29 |
20150309908 | GENERATING AN INTERACTIVE VISUALIZATION OF METRICS COLLECTED FOR FUNCTIONAL ENTITIES - Data values of metrics for a plurality of functional entities are aggregated, the aggregating producing aggregated values for the respective metrics. A set of the aggregated values is produced for the respective metrics. Based on the set of aggregated values, an interactive visualization of the metrics is generated, the interactive visualization including visual indicators based on the aggregated values for the respective metrics across a plurality of time intervals. The interactive visualization is selectable to focus on a portion of the interactive visualization. | 2015-10-29 |
20150309909 | ELECTRONIC DEVICE AND FAULT ANALYSING METHOD - An electronic device includes a signal generator, a selecting unit, an acquisition unit, a storing unit, and a control unit. The control unit outputs a control signal to the selecting unit according to a signal selected by the user and reading a table of the storing unit. The selecting unit receives the control signal, to select a corresponding input connect to a corresponding output of the signal generator, to output a corresponding signal. The acquisition unit measures the corresponding signal to produce measurement data, compares the measurement data and a standard data to produce an analysis result, and send the analysis result to the control unit. The control unit sends the analysis result to a screen or a remote device to display. | 2015-10-29 |
20150309910 | Website Performance Tracking - Novel tools and techniques are provided for tracking website performance and providing a user with website performance data. Embodiments include systems, methods and apparatus for identifying that the user has accessed a website from a user device, obtaining one or more website performance metrics and forwarding one or more website performance metrics to a performance information generator associated with a website performance tracking server. A performance information message is then created by the performance information generator and the performance information message is transmitted to the user device. The performance information message may be displayed to the user on the user device. In selected embodiments, the performance information message is displayed to the user in real-time as the user accesses the website. | 2015-10-29 |
20150309911 | USER EXPERIENCE DIAGNOSTICS WITH ACTIONABLE INSIGHTS - The performance of computer system responses to user requests is measured and evaluated in the context of physical computing resource operation. Diagnostic information related to computer system performance is selectively provided based the measured performance and physical computing resource operation. | 2015-10-29 |
20150309912 | Electronics Recycling Retail Desktop Verification Device - A verification device for evaluating a used electronic device brought in for resale, intended to be used to assist a retail clerk in a resale transaction, said verification device capable of performing a functional test of a device, performing a cosmetic test of a device, and calculating its resale value. | 2015-10-29 |
20150309913 | IDENTIFYING POTENTIALLY UNINITIALIZED SOURCE CODE VARIABLES - Computer program source code is represented by nodes in a control flow graph. A set of target nodes is identified, where each node in the set of target nodes includes at least one line of source code that defines a modification to a particular variable used in the computer program. A usage score relating to the variable is calculated for each target node. Each usage score is then recalculated based on the earlier scores and also based on the modifications to the variable that are defined by the lines of source code. Each recalculated score is compared to its corresponding earlier score, and if any score has changed, then the process repeats. Scores are recalculated based on the most recently calculated scores until the scores stop changing. The final scores may then be displayed. | 2015-10-29 |
20150309914 | METAPHOR BASED LANGUAGE FUZZING OF COMPUTER CODE - The disclosed subject matter provides for software testing using metaphor based language fuzzing. Metaphor based language fuzzing can decompose a code segment into a metaphor representing the code segment. The metaphor can be mutated based on determined logical perturbations to any element of the metaphor. The mutation of the metaphor can act as a surrogate for mutation of the code segment. The mutated metaphor can be analyzed to reveal performance differences in comparison to the code segment. These performance difference can be correlated to mutation of the metaphor such that a corresponding mutation of the code segment can be correlated by extrapolation. Moreover, mutators can be stored and reused on other metaphors. Furthermore, employing a metaphor as a root language surrogate can facilitate generating a reduced number of mutators as compared to directly mutating code segments in a plurality of computer languages. | 2015-10-29 |
20150309915 | CALL CHAIN INTERVAL RESOURCE IMPACT AGGREGATION DIFFERENCING - Embodiments profile usage of memory and other resource. Stack traces have lifespans, resource impacts, and constituent call chains. Aggregation unifies shared call chains and sums resource impacts after assigning traces to snapshot sets based on trace lifespans and user-defined snapshot request timestamps. | 2015-10-29 |
20150309916 | REMOTE DEBUGGING INTO MOBILE WEB APPLICATIONS ACROSS DEVICES - Disclosed herein are technologies for remote debugging in mobile web applications using a platform-independent debugging proxy server. Particularly, the debugging proxy server acts as an intermediary by fetching and performing instrumentation on a requested webpage by a target browser. This Abstract is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. | 2015-10-29 |
20150309917 | Automation Framework Interface - An automation framework interface and a method for managing and operating automation software suites using the automation framework interface. The automation framework interface provides a user access to a plurality of automation suites that can be operated on an automation framework. Each of the plurality of automation suites includes a plurality of automation cases, each being an individual test case to be run on the automation framework. The automation framework interface provides a main page for selecting a specific automation suite from the plurality of automation suites, which then directs the user to an automation suite page for the specific automation suite. The automation suite page similarly allows the user to select a specific automation case from the plurality of automation cases for the specific automation suite. Through the automation framework interface the user can view operation metrics and automation logs for each of the plurality of automation cases. | 2015-10-29 |
20150309918 | METHOD OF OPTIMIZING EXECUTION OF TEST CASES AND A SYSTEM THEREOF - The present subject matter relates to a computer implemented method and a computer system for optimizing execution of test cases. The method comprises calculating failure probability level of plurality of test cases based on plurality of test results associated to each of the plurality of test cases and determining dynamic risk profile level based on weights assigned to the failure probability level and risk impact parameter of the plurality of test cases. The method further comprises determining one or more set of optimal test cases to be executed based on the dynamic risk profile level of the plurality of test cases satisfying one or more test rule parameters. Upon determining, the method comprises identifying sequence of executing the one or more set of optimal test cases based on the one or more test sequence parameters and executing the one or more set of optimal test cases in the identified sequence. | 2015-10-29 |
20150309919 | SYSTEM AND METHOD FOR GENERATING SYNTHETIC DATA FOR SOFTWARE TESTING PURPOSES - According to one aspect, it is appreciated that it may be useful and particularly advantageous to provide a data generator that creates more realistic data for testing purposes, especially in data systems where large volumes of data are necessary. In one implementation, a data generator is provided that produces relationally consistent data for testing purposes. For instance, a synthetic data generation process may be performed that produces any number of relationally consistent data table structures. Further, in another implementation, generation of the data can be statistically influenced so that the data generated can take on the “look and feel” of production data. Also, data may be produced as needed, and its generation may be performed in parallel, depending on interdependencies in the data. | 2015-10-29 |
20150309920 | METHOD AND SYSTEM FOR TESTING CONTROL SOFTWARE OF A CONTROLLED SYSTEM - The present invention relates to a method and a system for testing control software of a controlled system, the controlled system comprising one or more electronic control units, one or more actuators, and one or more sensors, each sensor being adapted to input a respective sensor signal to at least one of the one or more electronic control units and each actuator being adapted to act responsive to respective control signals input from at least one of the electronic control units, and each electronic control unit being configured to execute a respective executable control program based on control software code data to output one or more control signals to the one or more actuators on the basis of input sensor signals. The control testing process comprises providing control software code data for each of the one or more electronic control units, providing simulation code data for the controlled system, creating a system model based on the provided control software code data provided for each of the one or more electronic control units and the provided simulation code data, creating an executable program based on the created system model, and performing a software verification process on the basis of the executable program. | 2015-10-29 |
20150309921 | SYSTEM AND METHOD FOR MANAGING ELECTRONIC ASSETS - An asset management system is provided which comprises one or more controllers, which operate as main servers and can be located at the headquarters of an electronic device manufacturer to remotely control their operations at any global location. The controller can communicate remotely over the Internet or other network to control one or more secondary or remote servers, herein referred to as appliances. The appliances can be situated at different manufacturing, testing or distribution sites. The controller and appliances comprise hardware security modules (HSMs) to perform sensitive and high trust computations, store sensitive information such as private keys, perform other cryptographic operations, and establish secure connections between components. The HSMs are used to create secure end-points between the controller and the appliance and between the appliance and the secure point of trust in an asset control core embedded in a device. | 2015-10-29 |
20150309922 | ON-DEMAND SOFTWARE TEST ENVIRONMENT GENERATION - A method and a system to create a software test environment on demand are described. An example system includes a dependency module to, upon receiving a command identifying a primary function to be created in a test environment, identify one or more dependencies of the primary function. The dependencies are other functions or databases that the primary function depends upon. The dependency module generates a topology of the test environment that indicates the relationship of the dependencies to the primary function. A provisioning module provisions a plurality of pools based on the topology. An enterprise service bus (ESB) routing module updates ESB routing of the primary function to route to the plurality of pools in the test environment. A credentials module provides credentials of the pools in the test environment. | 2015-10-29 |
20150309923 | STORAGE CONTROL APPARATUS AND STORAGE SYSTEM - A storage control apparatus includes a processor. The processor is configured to detect a dependency relationship between a first data access and a second data access made after passage of a delay time from the first data access. The first data access is made to a first storage area in a first storage device. The second data access is made to a second storage area in the first storage device. The processor is configured to transfer, when a current data access is made to the first storage area in a state in which the dependency relationship is detected, data in the second storage area to a second storage device before the delay time passes. The second storage device has a higher access speed than the first storage device. | 2015-10-29 |
20150309924 | CONTROL APPARATUS AND CONTROL METHOD WITH MULTIPLE FLASH MEMORY CARD CHANNELS - A control apparatus with multiple flash memory card channels includes a host side port unit, an instruction data processing unit, and flash memory card port units. The host side port unit exchanges a host side instruction and host side read/write data with a high-speed serial communication protocol host side. The flash memory card port units respectively exchange flash memory card instructions and flash memory card read/write data with a plurality of flash memory cards. An instruction from the high-speed serial communication protocol host side is divided into multiple sub-instructions to be respectively transmitted to the flash memory card port units and exchange of instruction and data with a plurality of flash memory cards is carried out in a coincident period of time so as to achieve the purposes of expanding access capacity and increasing access speed, reducing the operation cost of products, and enhancing flexibility of use of flash memory cards. | 2015-10-29 |
20150309925 | METHOD FOR COMPLETING A SECURE ERASE OPERATION - A system that may reliably erase a storage device, such as a solid state drive. The system issues an erasure command to the storage device. Such a command may be issued over a bus connecting a processing unit to one or more storage devices to be erased. The system, including the storage device, may be prepared for the erasure operation via performing one or more operations. Those operations may include: using hardware of the system to initiate a hard reset of the storage device; preventing access to the storage device while the erasure operation is being performed; and/or erasing hidden areas on the storage device. The system may be configured to perform the hard reset and may be configured not to alter a command to perform secure erase. Further, the erasure process may include writing a signature to certain areas of the storage device to confirm that erasure was performed. | 2015-10-29 |
20150309926 | FLEXIBLE WEAR MANAGEMENT FOR NON-VOLATILE MEMORY - Systems and methods of memory cell wear management that can achieve a more uniform distribution of write cycles across a memory cell address space. The systems and methods allow physical addresses of memory cells subjected to a high number of write cycles to be swapped with physical addresses of memory cells subjected to a lower number of write cycles. The physical address of a group of memory cells is a “hot address” if the write cycle count for that memory cell group exceeds a specified threshold. If the write cycle count for a group of memory cells does not exceed the specified threshold, then the physical address of that memory cell group is a “cold address”. The systems and methods allow the specified threshold of write cycle counts to be dynamically incremented to assure that cold addresses are available for swapping with hot addresses in the memory cell address space. | 2015-10-29 |
20150309927 | Hybrid Non-Volatile Memory System - A hybrid non-volatile system uses non-volatile memories based on two or more different non-volatile memory technologies in order to exploit their relative advantages. In an exemplary embodiment, the memory system includes a controller and a flash memory, where the controller has a non-volatile RAM based on an alternate technology such as FeRAM. The flash memory is used for the storage of user data and the non-volatile RAM in the controller is used for system control data. The use of an alternate non-volatile memory technology in the controller allows for a non-volatile copy of the most recent control data to be accessed more quickly as it can be updated on a bit by bit basis. In another exemplary embodiment, the alternate non-volatile memory is used as a cache where data can safely be staged prior to its being written to the memory or read back to the host. | 2015-10-29 |
20150309928 | METADATA REDUNDANCY SCHEMES FOR NON-VOLATILE MEMORIES - Systems and methods are provided for storing data to or reading data from a non-volatile memory (“NVM”), such as flash memory, using a metadata redundancy scheme. In some embodiments, an electronic device, which includes an NVM, may also include a memory interface for controlling access to the NVM. The memory interface may receive requests to write user data to the NVM. The user data from each request may be associated with metadata, such as a logical address, flags, or other data. In response to a write request, the NVM interface may store the user data and its associated metadata in a first memory location (e.g., page), and may store a redundant copy of the metadata in a second memory location. This way, even if the first memory location becomes inaccessible, the memory interface can still recover the metadata from the backup copy stored in the second memory location. | 2015-10-29 |
20150309929 | COMPUTER SYSTEM, DATA MANAGEMENT METHOD, AND RECORDING MEDIUM FOR STORING PROGRAM - A search server for which data stored in a hierarchical control server utilizing a plurality of storage devices is the object of a search, wherein the search server is designed to update a search index to data while the data exists in an upper-hierarchy storage of the hierarchical control server. Included in a computer system are: a storage unit for storing the usage status of an upper-hierarchy storage area of a hierarchical storage having the upper-hierarchy storage area and a lower-hierarchy storage area; and a determination unit for determining, according to the stored usage status, which process should be given priority between an indexing process for data that is an index-updating candidate among data stored in the hierarchical storage, or a migration process for moving the data to the lower-hierarchy storage area. | 2015-10-29 |
20150309930 | Dynamic Power Reduction and Performance Improvement in Caches Using Fast Access - With the increasing demand for improved processor performance, memory systems have been growing increasingly larger to keep up with this performance demand. Caches, which dictate the performance of memory systems are often the focus of improved performance in memory systems, and the most common techniques used to increase cache performance are increased size and associativity. Unfortunately, these methods yield increased static and dynamic power consumption. In this invention, a technique is shown that reduces the power consumption in associative caches with some improvement in cache performance. The architecture shown achieves these power savings by reducing the number of ways queried on each cache access, using a simple hash function and no additional storage, while skipping some pipe stages for improved performance. Up to 90% reduction in power consumption with a 4.6% performance improvement was observed. | 2015-10-29 |