53rd week of 2015 patent applcation highlights part 50 |
Patent application number | Title | Published |
20150378805 | MANAGEMENT SYSTEM AND METHOD FOR SUPPORTING ANALYSIS OF EVENT ROOT CAUSE - A plurality of multi-purpose diagnostic procedures are associated with a plurality of rules and defined using component types. The rules indicate an association between one or more condition events and a conclusion event. A management system specifies cause candidates based target rules associated with condition events related to the occurrence events, and specifies a multi-purpose diagnostic procedure in association with a target rule that is a basis of a selected cause candidate. The management system creates an expanded diagnostic procedure that is a diagnostic procedure to be performed on one or more management target components for specifying a more specific cause of the selected cause candidate or updating the certainty of the selected cause candidate based on the specified multi-purpose diagnostic procedure and configuration management information that is information about the configuration of a plurality of the management target components. | 2015-12-31 |
20150378806 | SYSTEM ANALYSIS DEVICE AND SYSTEM ANALYSIS METHOD - In variant relation analysis, an abnormality cause is accurately determined. | 2015-12-31 |
20150378807 | PREDICTING PROCESS FAILURES USING ANALYTICS - A set of data records chronicles attributes of a component in a process over a time period. The time period includes a failure event associated with the component. A status is assigned to the component on each record date in the time period based on the temporal proximity of the record date to the failure event. A computer-based predictive analytics model is developed for predicting the assigned statuses based on the attributes of the failing component. The computer-based predictive analytics model is then applied to a second set of data records that is chronicling the component attributes in the current time period, and predicts a future failure event based on those attributes. An action is then performed based on the predicted future failure event. | 2015-12-31 |
20150378808 | Techniques for Handling Errors in Persistent Memory - Examples may include a basic input/output system (BIOS) for a computing platform communicating with a controller for a non-volatile dual in-line memory module (NVDIMM). Communication between the BIOS and the controller may include a request for the controller to scan and identify error locations in non-volatile memory at the NVDIMM. The non-volatile memory may be capable of providing persistent memory for the NVDIMM. | 2015-12-31 |
20150378809 | METHODS FOR IMPLEMENTING ERROR DETECTION AND RECOVERY AND DEVICES THEREOF - A method, device and non-transitory computer readable medium that implements error detection and recovery includes receiving from one or more agents monitoring one or more subsystem processes of a business process operating in a cloud based architecture an identification of an error condition in at least one of the subsystem processes. Additionally, any associated information or data necessary to execute the at least one of the subsystem processes with the identified error condition is received. An error recovery process for the at least one of the subsystem processes with the identified error condition is executed by the application management computing device. The recovered at least one of the subsystem processes with the identified error condition is reinitiated using the received information or data corresponding to the at least one of the subsystem processes with the identified error condition. | 2015-12-31 |
20150378810 | MANAGEMENT APPARATUS, METHOD AND PROGRAM - A disclosed management apparatus monitors hardware faults in an information processing apparatus. And the management apparatus includes a first processing unit that determines whether a first notification representing that a fault occurred includes identification information of hardware in which the fault occurred, upon receiving the first notification from the information processing apparatus; a second processing unit that transmits an execution request to execute a module for obtaining the identification information of the hardware to the information processing apparatus, upon determining that the first notification does not include the identification information of the hardware; and a third processing unit that transmits a stop request to stop executing the module to the information processing apparatus, upon receiving the identification information of the hardware from the information processing apparatus. | 2015-12-31 |
20150378811 | DETECTING THE USE OF STALE DATA VALUES DUE TO WEAK CONSISTENCY - An apparatus and method detect the use of stale data values due to weak consistency between parallel threads on a computer system. A consistency error detection mechanism uses object code injection to build a consistency error detection table during the operation of an application. When the application is paused, the consistency error detection mechanism uses the consistency error detection table to detect consistency errors where stale data is used by the application. The consistency error detection mechanism alerts the user/programmer to the consistency errors in the application program. | 2015-12-31 |
20150378812 | System and Method for Error Recovery in an Asynchronous FIFO - A system and method for error recovery in an asynchronous first-in, first-out device (FIFO) are described herein. The FIFO may comprise a FIFO memory that is controlled with a FIFO controller. In accordance with this disclosure, the FIFO memory may receive input data, temporarily store the input data, and transmit the temporarily stored input data as output data. The FIFO controller comprises a plurality of control registers. During operation, the FIFO controller may detect a bit error in a control register of the plurality of control registers and set a flag associated with the output data. The FIFO controller may subsequently correct the bit error without requiring a reset to a system environment comprising the FIFO. | 2015-12-31 |
20150378813 | SEMICONDUCTOR MEMORY CARD, METHOD FOR CONTROLLING THE SAME, AND SEMICONDUCTOR MEMORY SYSTEM - A semiconductor memory card which can be attached to a host apparatus and can be removed from the host apparatus includes a plurality of data transfer terminals, and an internal circuit transmitting a first signal to at least one first data transfer terminal comprising at least one of the data transfer terminals and transmitting a second signal to at least one second data transfer terminal comprising at least one of the data transfer terminals different from the first data transfer terminals. The second signal is generated by executing a logical operation on the first signal. | 2015-12-31 |
20150378814 | EXTENSIBLE MEMORY HUB - The present disclosure relates to an extensible memory hub. An apparatus may include a first extensible non-volatile memory (NVM) hub (EN hub). The first EN hub includes an upstream interface port configured to couple the first EN hub to an NVM controller or to a second EN hub; a downstream interface port configured to couple the first EN hub to a third EN hub or to a NVM device; at least one NVM device port, each NVM device port configured to couple the first EN hub to a respective NVM device via a NVM channel; and an EN hub controller. The EN hub controller includes command logic configured to initialize the first EN hub in response to an initialize chain command from the NVM controller, the initializing including enumerating each NVM device coupled to the first EN hub and each of one or more associated NVM dies. | 2015-12-31 |
20150378815 | NAND PRE-READ ERROR RECOVERY - Technology for programming a page of memory in a NAND memory device is disclosed and described. In an example, a method may include applying initial programming pulses for lower page programming of the page and pre-reading data of the lower page. The method may further include determining whether to apply an error recovery operation to the data of the lower page. Data indicative of secondary programming pulses to be used for programming upper page data are stored and the upper page data is programmed based on the secondary programming pulses and the data of the lower page. | 2015-12-31 |
20150378816 | STORAGE APPARATUS, STORAGE SYSTEM, AND STORAGE APPARATUS CONTROL METHOD - A control device stores information associating each of a plurality of physical areas with a plurality of logical areas. The control device respectively stores a plurality of first user data included in a first stripe and a first parity data created on the basis thereof in each of the plurality of physical areas, and, in accordance with receiving a write request for updated user data that updates the user data, which is stored in a first physical area, for a first logical area associated with the first physical area, creates a second parity data on the basis of a data group formed using the updated user data and a plurality of second user data that differs from the plurality of first user data. | 2015-12-31 |
20150378817 | Memory System With Error Detection And Retry Modes Of Operation - A memory system includes a link having at least one signal line and a controller. The controller includes at least one transmitter coupled to the link to transmit first data, and a first error protection generator coupled to the transmitter. The first error protection generator dynamically adds an error detection code to at least a portion of the first data. At least one receiver is coupled to the link to receive second data. A first error detection logic determines if the second data received by the controller contains at least one error and, if an error is detected, asserts a first error condition. The system includes a memory device having at least one memory device transmitter coupled to the link to transmit the second data. A second error protection generator coupled to the memory device transmitter dynamically adds an error detection code to at least a portion of the second data. | 2015-12-31 |
20150378818 | Memory Chip With Error Detection And Retry Modes Of Operation - A memory system includes a link having at least one signal line and a controller. The controller includes at least one transmitter coupled to the link to transmit first data, and a first error protection generator coupled to the transmitter. The first error protection generator dynamically adds an error detection code to at least a portion of the first data. At least one receiver is coupled to the link to receive second data. A first error detection logic determines if the second data received by the controller contains at least one error and, if an error is detected, asserts a first error condition. The system includes a memory device having at least one memory device transmitter coupled to the link to transmit the second data. A second error protection generator coupled to the memory device transmitter dynamically adds an error detection code to at least a portion of the second data. | 2015-12-31 |
20150378819 | MEMORY SYSTEM WITH VARIABLE LENGTH PAGE STRIPES INCLUDING DATA PROTECTION INFORMATION - Methods and apparatuses for enhanced protection of data stored in a non-volatile memory system involve a controller capable of adapting to the failure of one or more non-volatile memory devices in the memory system. The controller stores data in the form of page stripes, each page stripe composed of data pages, and each data page stored in a different non-volatile memory device. The controller also detects failure of a non-volatile memory device in which a data page of a particular page stripe is stored, reconstructs the data page, and stores the reconstructed data page in a new page stripe, where the number of data pages in the new page stripe is less than the number of data pages in the particular page stripe, and where no page of the new page stripe is stored in a memory location within the failed non-volatile memory device. | 2015-12-31 |
20150378820 | High Reliability Erasure Code Distribution - Example apparatus and methods treat some erasure codes differently than other erasure codes. For example, erasure codes that are only involved in error-recovery may never be read and thus may be stored using a different approach than erasure codes that are involved in more regular data reading. If different types of data stores are available, then the erasure codes that are more likely to be read may be stored in data stores having a first (e.g., higher, faster) type of read performance while the erasure codes that are less likely to be read may be stored in data stores having a second (e.g., lower, slower, less expensive) type of read performance. Different data stores may be located on different data storage devices. Different data stores may even be located on a single data storage device. | 2015-12-31 |
20150378821 | EXTENDED LIFETIME MEMORY - A memory controller can include an error correction module for extended lifetime memory that tracks at least one sized block of non-fault consecutive bits within the disabled page as spare blocks and reuses the spare blocks from the disabled pages as an error correction resource for active blocks. The active blocks can store data, data and metadata, or metadata only (e.g., error correction metadata). A method for extended lifetime memory can include, for an active block of metadata containing at least one fault, using at least one spare block to correct the data of the active block. For an active block of data containing at least one fault, the data can be initially corrected via XOR correction with a first spare block and then ultimately corrected via XOR correction with a second spare block. | 2015-12-31 |
20150378822 | RECOVERING AN ENCODED DATA SLICE IN A DISPERSED STORAGE NETWORK - A method begins by a processing module of a dispersed storage network (DSN) receiving a DSN retrieval request regarding a data object and performing a scoring function using properties of the DSN retrieval request and properties of DSN memory of the DSN to produce a storage scoring resultant. The method continues with the processing module identifying a set of primary storage units based on the storage scoring resultant and sending a set of retrieval requests to the set of primary storage units. When a primary storage unit does not provide a favorable response, using the storage scoring resultant to identify an alternative storage unit. When the alternative storage unit is identified, sending a corresponding retrieval request to the alternative storage unit. | 2015-12-31 |
20150378823 | MEMORY DEVICE HAVING ERROR CORRECTION LOGIC - Data is read from memory cells in the memory device. The read data is transferred over a link to a memory controller that is external of the memory device. While the transferring of the read data is ongoing, error detection of the read data is performed inside the memory device using an error correction code. | 2015-12-31 |
20150378824 | MANAGING MEMORY UTILIZATION IN A DISTRIBUTED STORAGE AND TASK NETWORK - A method includes encoding data into pluralities of sets of encoded data slices. The method further includes outputting the pluralities of sets of encoded data slices to DST units, wherein each of the DST units stores a slice grouping of encoded data slices. The method further includes dividing the task into a decode threshold number of partial tasks. The method further includes sending a slice deletion policy to the DST units. On a data chunkset by data chunkset basis: the method further includes selecting a decode threshold number of DST units; assigning the decode threshold number of partial tasks to the decode threshold number of DST units; executing the decode threshold number of partial tasks on the slice groupings to produce partial results; and deleting the plurality of sets of encoded data slices of the given data chunkset in accordance with the slice deletion policy. | 2015-12-31 |
20150378825 | SECURELY STORING DATA IN A DISPERSED STORAGE NETWORK - A method includes monitoring write processing performance while storing a plurality of sets of encoded data slices in storage units. The method includes comparing the write processing performance with a desire write performance range. When the write processing performance compares unfavorably to the desire write performance range, the method includes establishing a data partition between the data segments of the data encoded using the first dispersed storage error encoding parameters and subsequent data segments of the data; determining second dispersed storage error encoding parameters based on the unfavorable comparison between the write processing performance and the desired write performance range; encoding the subsequent data segments of the data using the second dispersed storage error encoding parameters to produce a second plurality of sets of encoded data slices; and monitoring write processing performance while storing the second plurality of sets of encoded data slices in the storage units. | 2015-12-31 |
20150378826 | CIRCUITS, APPARATUSES, AND METHODS FOR CORRECTING DATA ERRORS - One example apparatus includes a first circuit configured to receive first and second data words, to correct one or more errors in the first data word, to merge the corrected first data word and the second data word responsive to a control signal to generate a final merged data word, and to provide the final merged data word to a write circuit. The apparatus also includes a second circuit configured to also receive the first and second data words, to preliminarliy merge the first and second data words responsive to the control signal to generate an initial merged data word, to generate an initial parity code for the initial merged data word, to correct the initial parity code, and to provide the corrected parity code to the write circuit. | 2015-12-31 |
20150378827 | ADJUSTING A DATA STORAGE ADDRESS MAPPING IN A MAINTENANCE FREE STORAGE CONTAINER - A method includes sending, by a computing device, an access request to one or more site controllers. The method further includes identifying, by a site controller, storage containers based on DSN addresses. The method includes sending, by the site controller, the access request to the identified storage containers. The method includes interpreting, by a container controller, the access request to identify storage units affiliated with some of the DSN addresses. The method includes determining, by the container controller, whether the storage units are in a storage failure mode. The method includes when the storage units are in the storage failure mode, determining, by the container controller, whether to rebuild, to change virtual to physical address mapping, or to migrate encoded data slices. The method includes, when the encoded data slices are to be rebuild, facilitating, by the container controller, rebuilding of the encoded data slices. | 2015-12-31 |
20150378828 | TEST DATA MANAGEMENT - A method for managing test data includes receiving a request indicative of a testing application from a requesting user and identifying a plurality of test data in a source database matching the request. Further, the method includes determining a reserved status of the plurality of test data, and, when the reserved status indicates that the plurality of test data is not reserved by the user other than the requesting user, reserving the plurality of test data for the requesting user. Still further, the method includes transferring a copy of the plurality of test data to a test database, wherein a testing application executes based on the copy of the plurality of test data stored in the test database. | 2015-12-31 |
20150378829 | RESOURCE PRE-CONFIGURATION - In an embodiment, a method of resource pre-configuration includes obtaining, at a target system, configuration information about a resource that is predicted to be used by a transaction which will be executed on the target system. The resource is configured, at the target system, based on the configuration information. The configuring is before the transaction requests use of the resource | 2015-12-31 |
20150378830 | USE OF REPLICATED COPIES TO IMPROVE DATABASE BACKUP PERFORMANCE - A backup computing device detects an interruption while receiving a backup copy of a transaction log of a primary database and directs a secondary computing device to continue generation of the backup copy of the transaction log, based on the copy of the transaction log of the primary database. A primary computing device directs a secondary computing device to generate a backup copy of the data file and the primary computing device generates a backup copy of the transaction log, of a primary database. A primary computing device accesses a snapshot of a plurality of snapshots of a primary database, and generates a first portion of a backup copy of the database. The primary computing device directs a second computing device to generate a non-overlapping portion of the backup copy of the database based on a second snapshot of the plurality of snapshots. | 2015-12-31 |
20150378831 | USING A RECOVERY SNAPSHOT DURING LIVE MIGRATION - Examples perform live migration of VMs from a source host to a destination host using destructive consistency breaking operations. The disclosure makes a record of a consistency group of VMs on storage at a source host as a fail-back in the event of failure. The source VMs are live migrated to the destination host, disregarding consistency during live migration, and potentially violating the recovery point objective. After live migration of all of the source VMs, consistency is automatically restored at the destination host and the live migration is declared a success. | 2015-12-31 |
20150378832 | PERFORMING A REMOTE POINT-IN-TIME COPY TO A SOURCE AND TARGET STORAGES IN FURTHER MIRROR COPY RELATIONSHIPS - Provided are a computer program product, system, and method for performing a remote point-in-time copy to a source and target storages in further mirror copy relationships. Each of a plurality of source copy relationships is from the source storage to one corresponding source copy storage. Each of a plurality of target copy relationships is from the target storage to one corresponding target copy storage, where in each relationship an indicator indicates whether to use a remote first type copy operation. The first type copy operation is used to copy data from the source storage to the target storage and copy data from the source copy storage to the target copy storage for the determined source and target copy relationships having the indicator set. A second type of copy operations is used for source and target relationships not having the indicator set. | 2015-12-31 |
20150378833 | BACKUP AND NON-STAGED RECOVERY OF VIRTUAL ENVIRONMENTS - Methods for creating backup of data of a virtual environment to allow non-staged recovery are described. The described method may include receiving data of a virtual environment through one or more data streams for backup. The method also includes generating metadata corresponding to the received data and storing the received data at a first location of a backup storage unit. Further, the method includes storing the generated metadata at a second location of the backup storage unit, where the second location is different from the first location of the backup storage unit. The method further includes mapping the at least one predefined file to the stored data to create a mapping table to allow direct access to the stored data for non-staged recovery. | 2015-12-31 |
20150378834 | EFFICIENT BUILDING OF RESTORE LIST - A system for building a restore list comprises a processor and a memory. The processor is configured to determine whether a next sibling record comprises a directory. The directory is popped from a directory stack. In the event that the next sibling record comprises a subdirectory of the directory, the processor is configured to push a directory path associated with the next sibling record onto the directory stack. In the event that the next sibling record does not comprise a subdirectory, the processor is configured to add the latest index record associated with the latest index record to a restore list. The memory coupled to the processor and configured to provide the processor with instructions. | 2015-12-31 |
20150378835 | MANAGING DATA STORAGE SYSTEM - In one embodiment, a method for managing a data storage system includes: in response to receiving a data object, sorting data records in the data object on the basis of a first query so as to form a first backup; causing the first backup to be stored in the data storage system; and cause to be stored, in an index of the data storage system, the first query and a first address of the first backup in the data storage system. | 2015-12-31 |
20150378836 | Data Backup Recovery - A mechanism is provided for recovering a data backup comprising a data image and a point-in-time copy of the data image. A virtual data image storage device is provide for storing a copy of the data image, and a virtual snapshot storage device is provided for storing data of the point-in-time copy. The data image is copied to the virtual data image storage device, and data from the point-in-time copy of the data image is copied to the virtual snapshot storage device responsive to the data not existing in the virtual data image storage device. | 2015-12-31 |
20150378837 | MULTIMEDIA FILE REPAIR METHODS AND APPARATUS - Improved methods, systems and apparatus for storing and repairing multimedia files are provided that overcome the limitations of existing multimedia file repair technologies. Backup copies of the multimedia container information associated with given multimedia content data are stored, along with the multimedia content data, on an external storage detachably coupled to a recording device. A primary copy of the multimedia container information is stored on an internal storage associated with the recording device. The recording of the primary container information and the content data is performed in real-time or nearly real-time as the content data is captured by the recording device. In the case of an abnormal event (e.g., battery failure, disconnect of storage media), container information may be selected from the primary copy or the backup copies of the container information, thereby increasing the likelihood that the container file can be successfully repaired or regenerated. | 2015-12-31 |
20150378838 | Data Backup or Restore Using Main Memory and Non-Volatile Storage Media - The invention relates to a computer implemented method for creating a backup of data by a computer system. The creation of the backup comprises: assigning a first memory space in a main memory to data and loading the data into the first memory space; allocating a second memory space in the main memory for acting as container of one or more images of the data in the first memory space; creating the one or more images of the data in the first memory space; and storing the created one or more images in the second memory space and storing a respective copy of at least one of the one or more images in the one or more non-volatile storage media. | 2015-12-31 |
20150378839 | RECOVERY SYSTEM AND METHOD FOR PERFORMING SITE RECOVERY USING REPLICATED RECOVERY-SPECIFIC METADATA - A recovery system and method for performing site recovery utilizes recovery-specific metadata and files of protected clients at a primary site to recreate the protected clients at a secondary site. The recovery-specific metadata is collected from at least one component at the primary site, and stored with the files of protected clients at the primary site. The recovery-specific metadata and the files of the protected clients are replicated to the secondary site so that the protected clients can be recreated at the secondary site using the replicated information. | 2015-12-31 |
20150378840 | ENSURING THE SAME COMPLETION STATUS FOR TRANSACTIONS AFTER RECOVERY IN A SYNCHRONOUS REPLICATION ENVIRONMENT - Disclosed in some examples is a method, the method including detecting that an RDMS is recovering from a failure; sending a request for a last committed transaction on a replication component to the replication component; receiving, from the replication component, the last committed transaction which identifies a transaction that was the last committed transaction at a replication component at a time of RDMS failure; determining that a transaction log on the RDMS includes a transaction that had not yet been replicated at the time of RDMS failure which was committed on the transaction log subsequent to the last committed transaction received from the replication component; and based on that determination rolling back the transaction that had not yet been replicated at the time of RDMS failure. | 2015-12-31 |
20150378841 | Techniques to Communicate with a Controller for a Non-Volatile Dual In-Line Memory Module - Examples may include communicating with a controller for a non-volatile dual in-line memory module through a system management bus (SMBus) interface. In some examples, selective assertion of bits maintained in registers accessible through the SMBus interface may enable communication with the controller. The selective assertion may be based on a register map. | 2015-12-31 |
20150378842 | SYSTEMS AND METHODS FOR QUORUM-BASED DATA RECOVERY - The present disclosure includes systems and methods for quorum-based data recovery, in which data is recovered provided at least a minimum number of quorum data portions are presented. In exemplary embodiments, a predetermined minimum number of versions of original data is received, and the original data is reconstructed from the received versions, wherein the original data cannot be reconstructed without loss unless a predetermined minimum number of versions is received. In other embodiments, erroneous or corrupted quorum data portions are detected and associated participants presenting said erroneous or corrupted quorum data portions are identified. | 2015-12-31 |
20150378843 | RESTORATION OF A FILE SYSTEM OBJECT FROM RAW IMAGE BACKUP DATA - In some implementations, blocks of raw image backup data are stored as part of a raw image backup of data in a file system. Blocks of raw image backup data are retrieved from a virtual volume by a restore device, to restore at least one file system object of the file system. | 2015-12-31 |
20150378844 | Systems And Methods For Out-Of-Band Backup And Restore of Hardware Profile Information - Systems and methods are provided that may be implemented for out-of-band backup and/or restore of information handling system components. Such out-of-band backup and restore operations may be performed, in one embodiment, to backup and/or restore hardware profile information such as firmware images and corresponding system configuration information. | 2015-12-31 |
20150378845 | ZERO DATA LOSS TRANSFER PROTOCOL - A method for reliable data synchronization within a network is disclosed. The producer system stories data in a persistent data store and produces one or more data updates. The producer system simultaneously transmits the data updates to a consumer system and initiating storage of the data updates at the producer system. When storage of the data updates at the producer system is complete, the producer system transmits a first acknowledgment to the consumer system. The producer system determines whether a second acknowledgment has been received from the consumer system, wherein the second acknowledgment indicates that the consumer system has successfully stored the data updates at the consumer system. In accordance with a determination that the second acknowledgment has been received from the consumer system, the producer system changes the temporary status of the data updates stored at the producer system to a permanent status. | 2015-12-31 |
20150378846 | METHOD, COMPUTER PROGRAM, AND COMPUTER FOR RESTORING SET OF VARIABLES - A set of variables referred to by unified extensible firmware interface (UEFI) firmware is restored. The UEFI firmware stored in a read-only memory (ROM) is firstly executed after power-up. The UEFI firmware writes a variable set related to boot, into a variable area. As an operating system (OS) also writes a set of variables into the variable area, the boot-related variable set may be altered. The variable set is saved into a prescribed area, such as a universal serial bus (USB) memory key, when the computer boots normally. If alteration of the variable set in the reference area is detected during a boot of the computer, the variable set in the reference area is replaced with the saved variable set. The variable set alteration may be detected using a detection flag which is set immediately after a boot is started and reset immediately before an OS is loaded. | 2015-12-31 |
20150378847 | MAINTAINING CONSISTENCY USING REVERSE REPLICATION DURING LIVE MIGRATION - Examples maintain consistency of writes for a plurality of VMs during live migration of the plurality from a source host to a destination host. The disclosure intercepts I/O writes to a migrated VM at a destination host and mirrors the I/O writes back to the source host. This “reverse replication” ensures that the CG of the source host is up to date, and that the source host is safe to fail back to if the migration fails. | 2015-12-31 |
20150378848 | MANAGEMENT COMPUTER AND MANAGMENT METHOD OF COMPUTER SYSTEM - A management computer stores an operation requirement of a virtual machine and a scheme of a first configuration change executed by a host computer or a storage apparatus. The management computer determines whether a second configuration change configured so as to be executed automatically in the host computer or the storage apparatus is executed. If it is determined that the second configuration change is executed, the management computer predicts a performance index value concerning a prescribed performance index for the computer or the storage apparatus when executing the second configuration change. The management computer determines whether an anticipated effect value of the configuration change scheme is satisfied based on the predicted performance index value, and creates a substitution plan satisfying both an operation requirement and an anticipated effect value of the virtual machine where it is determined that the anticipated effect value is not satisfied. | 2015-12-31 |
20150378849 | METHOD AND DEVICE FOR BACKING UP, RESTORING A VIRTUAL MACHINE - A method for backing up or restoring a virtual machine is provided. The backup method includes creating a virtual machine having a first and a second union file system directory. The first directory read only stores a virtual machine base operating system file. The second directory is readable and writable and stores modifications to the base operating system file, and new files generated during running of the virtual machine. The virtual machine preferentially reads and writes the second directory. When a request to back up the virtual machine is received, the data in the second directory is backed up. The restore method includes preparing a virtual machine for restoring data. When a request to restore the virtual machine is received, the backup data of the second directory is obtained and restored to the second directory of the prepared virtual machine. | 2015-12-31 |
20150378850 | VIRTUAL MACHINE FAULT TOLERANCE - One or more techniques and/or systems are provided for hosting a virtual machine from a snapshot. In particular, a snapshot of a virtual machine hosted on a primary computing device may be created. The virtual machine may be hosted on a secondary computing device using the snapshot, for example, when a failure of the virtual machine on the primary computing device occurs. If a virtual machine type (format) of the snapshot is not supported by the secondary computing device, then the virtual machine within the snapshot may be converted to a virtual machine type supported by the secondary computing device. In this way, the virtual machine may be operable and/or accessible on the secondary computing device despite the failure. Hosting the virtual machine on the secondary computing device provides, among other things, fault tolerance for the virtual machine and/or applications comprised therein. | 2015-12-31 |
20150378851 | MONITORING METHOD, MONITORING DEVICE, AND INFORMATION PROCESSING SYSTEM - A monitoring method that is executed by a monitoring device that monitors communication between an information processing device from among a plurality of information processing devices and a switching device that is coupled to a peripheral device that includes at least one of an input device and an output device, the monitoring method includes storing information on a recovery method for each process of the communication, in a memory; detecting the communication between the information processing device and the switching device; determining whether a failure has occurred in the detected communication by analyzing the detected communication for each of the processes; and executing restoration processing of recovering the detected communication, based on information on the recovery method corresponding to a failed process among the processes, which is stored in the memory when it is determined that the failure has occurred in the detected communication. | 2015-12-31 |
20150378852 | METHODS AND SYSTEMS OF MANAGING AN INTERCONNECTION - A printed circuit card ( | 2015-12-31 |
20150378853 | Orchestrating High Availability Failover for Virtual Machines Stored on Distributed Object-Based Storage - Techniques are disclosed for orchestrating high availability (HA) failover for virtual machines (VMs) running on host systems of a host cluster, where the host cluster aggregates locally-attached storage resources of the host systems to provide an object store, and where persistent data for one or more of the VMs is stored as per-VM storage objects across the locally-attached storage resources comprising the object store. In one embodiment, a host system in the host cluster executing a HA module determines a VM to be restarted on an active host system in the host cluster. The host system further determines if the VM's persistent data is stored in the object store. If so, the host system adds the VM to a list of VMs to be immediately restarted. Otherwise, the host system checks whether the VM is accessible to the host system by querying a storage layer of the host system configured to manage the object store. | 2015-12-31 |
20150378854 | MAINTAINING INACTIVE COPY RELATIONSHIPS FOR SECONDARY STORAGES OF ACTIVE COPY RELATIONSHIPS HAVING A COMMON PRIMARY STORAGE FOR USE IN CASE OF A FAILURE OF THE COMMON PRIMARY STORAGE - Provided are a computer program product, system, and method for maintaining inactive copy relationships for secondary storages of active copy relationships having a common primary storage for use in case of a failure of the common primary storage. A plurality of active copy relationships are established, each having a common primary storage and one of a plurality of secondary storages. For each possible pair of secondary storages in the active copy relationships, an inactive copy relationship is established to copy data from a first of the secondary storages in the pair to a second of the secondary storages in the pair. In response to a failure of the common primary storage in the active copy relationship, a new active copy relationship is established having a primary and secondary storages from a selected one of the inactive copy relationships. | 2015-12-31 |
20150378855 | STORAGE SUBSYSTEM, AND METHOD FOR VERIFYING STORAGE AREA - There is provided a method for verifying a full drive as an error check processing of a storage drive, but along with the increase in capacity of the storage drive, there are cases where error check cannot be executed before using the storage area. In the present invention, quantity of use of data is estimated, and the storage areas corresponding to the estimated quantity are verified periodically. By verifying the storage area to be used in advance before actual data use, the occurrence of error can be prevented without having to execute a check of the full drive. | 2015-12-31 |
20150378856 | STORAGE SYSTEM, STORAGE DEVICE, CONTROL METHOD AND CONTROL PROGRAM OF STORAGE DEVICE, MANAGEMENT DEVICE, AND CONTROL METHOD AND STORAGE MEDIUM - Convenience of data access is to be secured. A storage system includes two or more storage devices that store original data or copy data of the original data, and a management device that identifies a first storage device for storing the original data and a second storage device for storing the copy data. The storage devices each include two or more data storage units different in accessibility, a data copy control unit that controls generation of the copy data, an access frequency control unit that pseudo-conforms the access frequency to the copy data to the access frequency to the original data, and a data storage location control unit that determines the storage location of the original data and the copy data based on the access frequency and accessibility. | 2015-12-31 |
20150378857 | Persisting High Availability Protection State for Virtual Machines Stored on Distributed Object-Based Storage - Techniques are disclosed for persisting high availability (HA) protection state for virtual machines (VMs) running on host systems of a host cluster, where the host cluster aggregates locally-attached storage resources of the host systems to provide an object store, and where persistent data for the VMs is stored as per-VM storage objects across the locally-attached storage resources comprising the object store. In one embodiment, a host system in the host cluster executing a HA module determines an identity of a VM that has been powered-on in the host cluster. The host system then persists HA protection state for the VM in a storage object of the VM, where the HA protection state indicates that the VM should be restarted on an active host system in the case of a failure in the host cluster. | 2015-12-31 |
20150378858 | STORAGE SYSTEM AND MEMORY DEVICE FAULT RECOVERY METHOD - The present invention aims at providing a storage system capable of shortening the recovery time from failure while ensuring the reliability of data when failure occurs to a storage device. When failure occurs to a storage device, a recovery processing corresponding to the content of failure is executed for the blocked storage device. The storage device recovered via the execution of the recovery processing is subjected to a check corresponding to the operation status of the storage system or the failure history of the storage device. | 2015-12-31 |
20150378859 | FAULT INJECTION TESTING APPARATUS AND METHOD - Provided are fault injection testing apparatus and method which inject faults that may occur in a system or a source file that a user wants to examine and examine which processes are performed by the system or source file when the faults occur. | 2015-12-31 |
20150378860 | Method for Identifying Device, and Device - A method for identifying a device comprising generating, by a control device, an identification identifier of a multimedia device according to device description information of the multimedia device, sending the identification identifier to the multimedia device, so that the multimedia device displays the identification identifier, acquiring, by the control device, the identification identifier displayed by the multimedia device and an appearance image of the multimedia device, and acquiring the device description information according to the identification identifier displayed by the multimedia device, and associating, by the control device, the device description information with the appearance image of the multimedia device, so that a user equipment identifies the multimedia device according to the appearance image. | 2015-12-31 |
20150378861 | IDENTIFICATION OF SOFTWARE PHASES USING MACHINE LEARNING - Technologies for application performance analysis include a computing device capable of executing an application having a number of phases. The computing device collects performance data indicative of a number of performance attributes of the computing device during execution of the application. The computing device may merge data collected from a processor performance monitoring unit with data collected from an operating system of the computing device. The computing device partitions the performance data into a number of clusters using an unsupervised clustering algorithm such as K-means clustering, forming a cluster model. The computing device may partition the performance data into a number of cluster models, apply a classification algorithm such as regularized discriminant analysis to each cluster model, and select the cluster model with the lowest misclassification rate. The computing associates each cluster of the cluster model to a phase of the software application. Other embodiments are described and claimed. | 2015-12-31 |
20150378862 | SELECTION METHOD FOR SELECTING MONITORING TARGET PROGRAM, RECORDING MEDIUM AND MONITORING TARGET SELECTION APPARATUS - A computer identifies a program in which a command history issued to an operating system meets a specific pattern from among a plurality of programs run in a monitoring target system, and selects one or more residual programs as a monitoring target, the one or more residual programs being obtained by excluding the identified program from the plurality of programs. | 2015-12-31 |
20150378863 | ENHANCEMENTS TO LOGGING OF A COMPUTER PROGRAM - Techniques are described for providing recommendations to enhance the logging code in a computer program. In particular, the methods described herein can identify source code locations which lack log printing statements or contain noisy log printing statements. The methods analyze static call graph of the source code, the corresponding commit and bug history, and propose recommendations to enhance logging. The logging behavior in methods whose log printing statements have been significantly modified can be considered to be ideal. The analysis discovers such methods and quantifies their logging behavior. It then compares this logging behavior with the logging behavior of highly critical and/or less critical methods to generate logging enhancement recommendations. | 2015-12-31 |
20150378864 | SYSTEMS AND METHODS FOR INSTRUMENTING APPLICATIONS FOR PERFORMANCE MONITORING - Provided herein are systems and methods for instrumenting scripts of webpages. An agent may intercept a webpage served by an origin server to a client responsive to receiving a request for the webpage from the client. The agent may insert an instrumentation script within a portion of the webpage prior to execution of the one or more scripts of the webpage. The instrumentation script may be configured to instrumentation script configured to embed instrumentation code within the one or more scripts to report on execution of one or more scripts. Upon the client loading the webpage received from the agent, the instrumentation script may be executed on the client and embed the instrumentation code within the one or more scripts. The data may be stored to one of a log file or a server to report on execution of the one or more scripts of the webpage. | 2015-12-31 |
20150378865 | SYSTEM AND METHOD FOR PROVIDING ERROR DETECTION AND NOTIFICATION - An approach is provided for registering an expected event associated with trouble management for a computing environment. The approach also involves monitoring, over a predetermined period, for one or more events relating to one or more actions performed by one or more elements of the computing environment. The approach further involves determining an absence of the expected event from the one or more events for the predetermined period. The approach also involves generating an alarm message in response to the absence of the expected event. | 2015-12-31 |
20150378866 | SYSTEM AND METHOD TO CLASSIFY AUTOMATED CODE INSPECTION SERVICES DEFECT OUTPUT FOR DEFECT ANALYSIS - A method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The programming instructions are operable to receive a tool error output determined by a code inspection tool and select at least one defect classification mapping profile based on the code inspection tool. Additionally, the programming instructions are operable to map the tool error output to one or more output classifications using the selected at least one defect classification mapping profile and generate at least one report based on the one or more output classifications. | 2015-12-31 |
20150378867 | DETECTING THE USE OF STALE DATA VALUES DUE TO WEAK CONSISTENCY - An apparatus and method detect the use of stale data values due to weak consistency between parallel threads on a computer system. A consistency error detection mechanism uses object code injection to build a consistency error detection table during the operation of an application. When the application is paused, the consistency error detection mechanism uses the consistency error detection table to detect consistency errors where stale data is used by the application. The consistency error detection mechanism alerts the user/programmer to the consistency errors in the application program. | 2015-12-31 |
20150378868 | TECHNOLOGIES FOR DETERMINING BINARY LOOP TRIP COUNT USING DYNAMIC BINARY INSTRUMENTATION - Technologies for binary loop trip count computation include a computing device that dynamically instruments binary code, executes the instrumented code, and records execution statistics during execution of the instrumented code. The computing device may instrument only instructions affecting local control flow within functions of the binary code. The computing device may combine execution statistics from multiple threads or process instances of the binary code. After completing execution of the instrumented code, the computing device generates a control flow graph indicative of control flow of the binary code and recursively detects binary loops within the binary code. The computing device calculates a trip count for reach detected binary loop using the recorded execution statistics. Other embodiments are described and claimed. | 2015-12-31 |
20150378869 | MEASURING THE LOGGING QUALITY OF A COMPUTER PROGRAM - Techniques are described for measuring or quantifying the logging behavior in the source code of a computer program. In particular, the techniques select a method identified as exhibiting the ideal logging behavior in a computer program and then compute the overall logging quality score for the entire computer program based on the deviation in logging behaviors between the selected method and all other methods in the source code of the project. This overall logging quality score can be compared to various benchmarks of existing projects with high logging quality. If the software logging quality is found to be low, various steps can be taken by the developers to improve the logging before the software release. | 2015-12-31 |
20150378870 | TIME TRAVEL DEBUGGING IN MANAGED RUNTIME - Various technologies described herein pertain to time travel debugging in a managed runtime system. The managed runtime system can include an execution component that executes a managed program component. Moreover, the managed runtime system can include a time travel debugger component. The time travel debugger component can be configured to record a sequence of live-object snapshots of program states during execution of the managed program component. A live-object snapshot can include live objects from a heap in memory at a given time during the execution. Moreover, the time travel debugger component can be configured to replay at least a portion of the execution of the managed program component based upon the live-object snapshots. | 2015-12-31 |
20150378871 | TECHNIQUES FOR EDIT-AND-CONTINUE AND ENHANCED OPTIMIZED DEBUGGING ON OPTIMIZED CODE - Methods, systems, and computer program products are provided that enable a portion of code to be marked in source code to disable compilation optimizations for the marked portion of code, while the rest of the source code is compiled with optimizations. In this manner, edit-and-continue debugging may be performed on the compiled source code in an enhanced manner. Modifications made to the marked source code (as well as the rest of the source code) may be compiled in an incremental manner, such that the portions of the source code affected by the modifications are compiled, while unaffected portions of the source code are not recompiled. | 2015-12-31 |
20150378872 | METHODS AND APPARATUSES FOR AUTOMATED TESTING OF STREAMING APPLICATIONS USING MAPREDUCE-LIKE MIDDLEWARE - A method for automated parallel testing of a software application using value replication is disclosed. An example embodiment may include marking at least one event in the software application with a primary marker that includes a primary marker label and a primary marker configuration value. The primary marker may be replicated to create a replicate marker that has a replicate marker label and a replicate configuration value. The replicate marker label and configuration value may be different from the primary marker label and configuration value. Parallel executions of the software application may be performed using the primary and replicate markers so that the software application is executed with both the primary and replicate marker configuration values. The disclosed middleware-level method transparently implements such replication of the output marker values. That is to make any MapReduce-style applications easily take advantage of output value replication. | 2015-12-31 |
20150378873 | AUTOMATICALLY RECOMMENDING TEST SUITE FROM HISTORICAL DATA BASED ON RANDOMIZED EVOLUTIONARY TECHNIQUES - Disclosed herein are a system and a method for automated test suite optimization and recommendation, based on historical data, using randomized evolutionary techniques. The system analyzes historical data pertaining to file change pattern and test case execution history to identify test cases that match application being tested. Further, based on the test cases identified, the system generates optimized test suite recommendations to the user. | 2015-12-31 |
20150378874 | Defect Classification And Association In A Software Development Environment - Defect classification and association in a software development environment. The embodiments herein relates to a software development environment, and more particularly to managing defects in a software development environment. The defect management engine may use information present in the code repository to create a master list of features and/or sub-features. Using the master list, the defect management engine may scan and parse all reported defects (which may be present in the defect repository The defect management engine may associate defects with features present in the master list. The defect management engine may then extract the test cases and map the test cases to the defects. The defect management engine may determine the test coverage metric and the test case sufficiency metric. The defect management engine may also label unmapped defects as orphan defects. | 2015-12-31 |
20150378875 | GENERATING AN OPTIMIZED TEST SUITE FROM MODELS FOR USE IN A SOFTWARE TESTING ENVIRONMENT - Generating an optimized test suite for use in a software testing environment. This invention relates to software testing systems, and more particularly to generating an optimized test suite for using in a software testing system. The principal object of this invention is to propose a method and system for generation of an optimized test suite using a sequential process with a combination of custom and generic optimization techniques. | 2015-12-31 |
20150378876 | VISUAL GRAPHICAL USER INTERFACE VERIFICATION - An automated testing system is described for efficient visual verification of graphical user interfaces of software applications. A pattern is formed for the user interface of a page of the application indicating regions of the page where user interface elements should be located and identifying which user interface element should be located in which region. During test execution, image recognition is performed using previously stored snapshots of user interface elements to determine whether the application's user interface elements appear in correct positions on the page. | 2015-12-31 |
20150378877 | METHOD AND SYSTEM FOR TESTING SOFTWARE - In one embodiment, a method of testing a software is disclosed. The method comprises: providing an input event to the software under test, wherein the software under test is associated with a time delay between an input event and an output event; identifying one or more discrete time instances based on the time delay between the input event and the output event; and testing the software under test by synthetically setting a clock to the one or more discrete time instances. | 2015-12-31 |
20150378878 | AUTOMATION TESTING OF GUI FOR NON-STANDARD DISPLAYS - The embodiments herein relate to Graphical User Interface (GUI) testing and, more particularly, to automate the testing of GUI for non-standard displays. Initially, an automation module is pre configured with the test cases that are required to test the GUI of the Device Under Test (DUT). Further, the DUT's display is auto configured with an interpretation & reconstruction module which fetches the display parameters and allocates required memory in a memory buffer. Later, the automation module provides the system inputs to DUT in which test cases are executed. Now, the interpretation & reconstruction module interprets and reconstructs the GUI content of DUT by fetching it from its display port. Later, the reconstructed display content will be updated to the memory buffer which is further verified by automation module. | 2015-12-31 |
20150378879 | METHODS, SOFTWARE, AND SYSTEMS FOR SOFTWARE TESTING - An embodiment of a method of testing software can include, as performed by at least one computing device, evaluating a first criterion for a plurality of software components, selecting a subset of the plurality of software components based on the evaluated first criterion, evaluating a second criterion for a plurality of test cases each defining a respective test to evaluate functionality of at least one of the software components, selecting a subset of the plurality of test cases based on the evaluated second criterion, and testing the selected subset of the plurality of software components utilizing the selected subset of the plurality of test cases. | 2015-12-31 |
20150378880 | Dynamically Configurable Test Doubles For Software Testing And Validation - Method for generating dynamically configurable test doubles for software testing includes: detecting functions or methods invocations in a source code under test; collecting information about parameters and return types of one or more of original functions and original methods that are invoked by the source code under test, generating test doubles using source code with alternative definitions based on collected information; instrumenting the source code under test to replace the calls to one or more of original functions and methods with calls to the generated test doubles; and dynamically configuring runtime behavior of the generated test doubles, where all input parameters and return values of the one or more of original functions and original methods are provided to respective retrieved trigger objects by passing said input parameters and return values as arguments to function calls. | 2015-12-31 |
20150378881 | PLATFORM-INDEPENDENT SELENIUM TO APPLICATION LIFECYCLE MANAGEMENT ("ALM") SERVER CONNECTIVITY - A method for providing a platform-independent wrapper for an application lifecycle management representational state of transfer server application programming interface (“ALM REST API”), The method may include using a receiver to receive defects from a test automation tool and using a processor to marshal the defects into XML objects. The method may further include using a transmitter to transmit the XML objects to the ALM REST API and using the receiver to receive XML test scripts from the ALM REST API. In addition, the method may include using the processor to unmarshal the test scripts into JAVA objects and using the transmitter to transmit the JAVA objects to the test automation tool. | 2015-12-31 |
20150378882 | BOOTING AN APPLICATION FROM MULTIPLE MEMORIES - Disclosed herein are system, apparatus, article of manufacture, method and/or computer program product embodiments for booting an application from multiple memories. An embodiment operates by executing in place from a first memory a first portion of the application, loading a second portion of the application from a second memory, and executing the second portion of the application. | 2015-12-31 |
20150378883 | IMAGE PROCESSING APPARATUS AND CONTROL METHOD THEREOF - An image processing apparatus and control method are provided. An image processing apparatus including: a storage configured to store data which is divided into a plurality of units of code; a random access memory (RAM) configured to be loaded with the data; a central processing unit (CPU) configured to execute the data; and a storage controller configured to read a requested unit of code from the storage in response to receiving a request from the CPU for the unit of code to be currently executed, and load the read unit of code to the RAM so that the unit of code can be processed by the CPU, wherein the storage controller performs validation with regard to the unit of code when reading the unit of code from the storage, and loads the unit of code, when the validation passes, to the RAM. | 2015-12-31 |
20150378884 | STORAGE SYSTEM CONTROLLING ADDRESSING OF SOLID STORAGE DISKS (SSD) - In accordance with various embodiments of the invention, the storage processor | 2015-12-31 |
20150378885 | SOLID STATE DRIVING INCLUDING NONVOLATILE MEMORY, RANDOM ACCESS MEMORY AND MEMORY CONTROLLER - A solid state drive includes a nonvolatile memory, a random access memory, and a memory controller. The nonvolatile memory contains a plurality of nonvolatile memories chips and a buffer chip. The memory controller is formed of an internal bus, a host interface, a memory interface, a buffer control circuit, and a processor. | 2015-12-31 |
20150378886 | SOFTWARE-DEFINED SSD AND SYSTEM USING THE SAME - Flash geometry information of the solid state disk (SSD) is maintained as is a logically-addressable SSD (laSSD) geometry information of the SSD. Based on the flash geometry and the laSSD geometry, virtual super blocks are configured by dynamically binding logical SSD logical block addresses (SLBAs) of a virtual super block with a physical super block within the laSSD. A virtual super block is made of a number of virtual blocks and each virtual block made of a number of virtual pages. Each of the virtual blocks corresponds to a physical block of a physical super block within the laSSD such that the virtual pages of the virtual block correspond to like physical pages of a corresponding physical block. Host logical block addresses (LBAs) are assigned to laSSD LBAs (SLBAs), which identify the virtual super blocks used for striping across physical super blocks. | 2015-12-31 |
20150378887 | NONVOLATILE MEMORY DEVICE AND OPERATING METHOD THEREOF - A nonvolatile memory device includes a mat including a plurality of memory blocks, an address decoder configured to select one of the memory blocks in response to an address, an input/output circuit including first and second page buffers configured to program a plurality of data pages into a single physical page of the selected one of the memory blocks or store the plurality of data pages read from the single physical page of the selected one of the memory blocks, and a control logic configured to perform a dumping operation at an other one of the first page buffers and second page buffers when a data input operation or a data output operation is performed at one of the first and second page buffers of the input/output circuit. The input/output circuit includes a plurality of page buffers. The plurality of page buffers include the first and second page buffers. | 2015-12-31 |
20150378888 | CONTROLLER, FLASH MEMORY APPARATUS, AND METHOD FOR WRITING DATA INTO FLASH MEMORY APPARATUS - A storage controller for determining an amount of data to be sent to a flash memory apparatus for storage comprises a communications interface for communicating with the flash memory apparatus and a processor. The flash memory apparatus comprises a block including a plurality of pages. And at least one of the pages is unavailable for storage. The processor is configured to receive information of the block sent by the flash memory apparatus, wherein the information includes capacity of one or more unavailable pages in the block. And then, the processor determines an available capacity of the block, based on the information and a total capacity of the block. Further, the processor obtains data to be sent to the flash memory apparatus, wherein an amount of the data is equal to the available capacity of the block. At last, the processor sends the data to the flash memory apparatus. | 2015-12-31 |
20150378889 | PERSISTENT CONTENT IN NONVOLATILE MEMORY - Applications may request persistent storage in nonvolatile memory. The persistent storage is maintained across power events and application instantiations. Persistent storage may be maintained by systems with or without memory management units. | 2015-12-31 |
20150378890 | MULTI-DIMENTIONAL DATA RANDOMIZATION - The disclosed technology provides for multi-dimensional data randomization in a memory cell array using circular shifts of an initial scrambling sequence. Data addressed to a first row of a data array is randomized using the initial scrambling sequence and data addressed to each row of the memory cell array is randomized using a scrambling sequence that is equal to a circular shift of the initial sequence. | 2015-12-31 |
20150378891 | MANAGING READ TAGS IN A TRANSACTIONAL MEMORY - Managing cache evictions during transactional execution of a process. Based on initiating transactional execution of a memory data accessing instruction, memory data is fetched from a memory location, the memory data to be loaded as a new line into a cache entry of the cache. Based on determining that a threshold number of cache entries have been marked as read-set cache lines, determining whether a cache entry that is a read-set cache line can be replaced by identifying a cache entry that is a read-set cache line for the transaction that contains memory data from a memory address within a predetermined non-conflict address range. Then invalidating the identified cache entry of the transaction. Then loading the fetched memory data into the identified cache entry, and then marking the identified cache entry as a read-set cache line of the transaction. | 2015-12-31 |
20150378892 | COMPUTER SYSTEM AND MEMORY ALLOCATION ADJUSTMENT METHOD FOR COMPUTER SYSTEM - In a computer system in which a virtualization control unit controls a plurality of virtual machines, if memory is collected regardless of a memory usage status of the virtual machine, cache miss increases and an IO performance of overall system deteriorates. In order to solve this problem, a usage status of a cache region within a memory which is utilized by each OS that the plurality of the virtual machines has, and based on a monitoring result, the virtualization control unit decides an allocation region of the memory as a collection target among the allocation region of the memory already allocated to each OS, and collects the allocation region of the memory as the collection target from the OS as a current allocation destination. | 2015-12-31 |
20150378893 | MANAGING CACHE POOLS - Apparatuses, systems, and methods are disclosed for managing cache pools. A storage request module monitors storage requests received by a cache. The storage requests include read requests and write requests. A read pool module adjusts a size of a read pool of the cache to increase a read hit rate of the storage requests. A dirty write pool module adjusts a size of a dirty write pool of the cache to increase a dirty write hit rate of the storage requests. | 2015-12-31 |
20150378894 | SYSTEM AND METHOD FOR IMPLEMENTING CACHE CONSISTENT REGIONAL CLUSTERS - When multiple regional data clusters are used to store data in a system, maintaining cache consistency across different regions is important for providing a desirable user experience. In one embodiment, there is a master data cluster where all data writes are performed, and the writes are replicated to each of the slave data clusters in the other regions. Appended to the replication statements are invalidations for cache values for the keys whose values have been changed in the master data cluster. An apparatus in the master data cluster logs replication statements sent to the slave databases. When a slave database fails, the apparatus extracts the invalidations intended for the failed database and publishes the invalidations to a subscriber in the region of the failed database. The subscriber sends the invalidations to the local caches to cause stale data for those keys to be deleted from the caches. | 2015-12-31 |
20150378895 | DETECTING CACHE CONFLICTS BY UTILIZING LOGICAL ADDRESS COMPARISONS IN A TRANSACTIONAL MEMORY - A processor in a multi-processor configuration is configured perform dynamic address translation from logical addresses to real address and to detect memory conflicts for shared logical memory in transactional memory based on logical (virtual) addresses comparisons. | 2015-12-31 |
20150378896 | COLLECTING MEMORY OPERAND ACCESS CHARACTERISTICS DURING TRANSACTIONAL EXECUTION - A transactional execution of a set of instructions in a transaction of a program may be initiated to collect memory operand access characteristics of a set of instructions of a transaction during the transactional execution. The memory operand access characteristics may be stored upon a termination of the transactional execution of the set of instructions. The memory operand access characteristics may include an address of an accessed storage location, a count of a number of times the storage location is accessed, a purpose value indicating whether the storage location is accessed for a fetch, store, or update operation, a count of a number of times the storage location is accessed for one or more of a fetch, store, or update operation; a translation mode in which the storage location is accessed; and an addressing mode. | 2015-12-31 |
20150378897 | SPECULATION CONTROL FOR IMPROVING TRANSACTION SUCCESS RATE, AND INSTRUCTION THEREFOR - Throttling instruction execution in a transaction operating in a processor configured to execute memory instructions out-of-order in a pipelined processor, wherein memory instructions are instructions for accessing operands in memory is provided. Included is executing, by the processor, instructions of a transaction comprising determining whether the transaction is in throttling mode and based on the transaction being in throttling mode, executing memory instructions in-program-order. Also included is based on the transaction not-being in throttling mode, executing memory instructions out-of-program order. | 2015-12-31 |
20150378898 | TRANSACTIONAL EXECUTION PROCESSOR HAVING A CO-PROCESSOR ACCELERATOR, BOTH SHARING A HIGHER LEVEL CACHE - A higher level shared cache of a hierarchical cache of a multi-processor system utilizes transaction identifiers to manage memory conflicts in corresponding transactions. The higher level cache is shared with two or more processors. A processor may have a corresponding accelerator that performs operations on behalf of the processor. Transaction indicators are set in the higher level cache corresponding to the cache lines being accessed. The transaction aborts if a memory conflict with the transaction's cache lines from another transaction is detected, and the corresponding cache lines are invalidated. For a successfully completing transaction, the corresponding cache lines are committed and the data from store operations is stored. | 2015-12-31 |
20150378899 | TRANSACTIONAL EXECUTION PROCESSOR HAVING A CO-PROCESSOR ACCELERATOR, BOTH SHARING A HIGHER LEVEL CACHE - A higher level shared cache of a hierarchical cache of a multi-processor system utilizes transaction identifiers to manage memory conflicts in corresponding transactions. The higher level cache is shared with two or more processors. A processor may have a corresponding accelerator that performs operations on behalf of the processor. Transaction indicators are set in the higher level cache corresponding to the cache lines being accessed. The transaction aborts if a memory conflict with the transaction's cache lines from another transaction is detected, and the corresponding cache lines are invalidated. For a successfully completing transaction, the corresponding cache lines are committed and the data from store operations is stored. | 2015-12-31 |
20150378900 | CO-PROCESSOR MEMORY ACCESSES IN A TRANSACTIONAL MEMORY - Buffering a memory operand from a co-processor associated with a processor as a speculative store in a store accumulator of the processor, the processor including a cache and the store accumulator, the store accumulator buffering memory operands for writing to a higher level cache. Executing a transactional memory transaction, including the following. Suspending storing of memory operands in the store accumulator entries into the next higher level cache. Initiating a co-processor operation. Accumulating co-processor memory operands into corresponding locations of one or more queue entries of the accumulator associated with the transaction, and not storing the co-processor memory operands into the cache. Based on the transaction ending, storing accumulated co-processor memory operands from the one or more store accumulator entries associated with the transaction into the next higher level cache. | 2015-12-31 |
20150378901 | CO-PROCESSOR MEMORY ACCESSES IN A TRANSACTIONAL MEMORY - Buffering a memory operand from a co-processor associated with a processor as a speculative store in a store accumulator of the processor, the processor including a cache and the store accumulator, the store accumulator buffering memory operands for writing to a higher level cache. Executing a transactional memory transaction, including the following. Suspending storing of memory operands in the store accumulator entries into the next higher level cache. Initiating a co-processor operation. Accumulating co-processor memory operands into corresponding locations of one or more queue entries of the accumulator associated with the transaction, and not storing the co-processor memory operands into the cache. Based on the transaction ending, storing accumulated co-processor memory operands from the one or more store accumulator entries associated with the transaction into the next higher level cache. | 2015-12-31 |
20150378902 | CONDITIONAL INCLUSION OF DATA IN A TRANSACTIONAL MEMORY READ SET - Determining, by a processor having a cache, if data in the cache is to be monitored for cache coherency conflicts in a transactional memory (TM) environment. A processor executes a TM transaction, that includes the following. Executing a memory data access instruction that accesses an operand at an operand memory address. Based on either a prefix instruction associated with the memory data access instruction, or an operand tag associated with the operand of the memory data access instruction, determining whether a cache entry having the operand is to be marked for monitoring for cache coherency conflicts while the processor is executing the transaction. Based on determining that the cache entry is to be marked for monitoring for cache coherency conflicts while the processor is executing the transaction, marking the cache entry for monitoring for conflicts. | 2015-12-31 |
20150378903 | CO-PROCESSOR MEMORY ACCESSES IN A TRANSACTIONAL MEMORY - Monitoring, by a processor having a cache, addresses accessed by a co-processor associated with the processor during transactional execution of a transaction by the processor. The processor executes a transactional memory (TM) transaction, including receiving, by the processor, a memory address range of data that a co-processor may access to perform a co-processor operation. The processor saves the memory address range. Based on receiving, by the processor, a cache coherency request that conflicts with the saved address range, the processor aborts the TM transaction. | 2015-12-31 |
20150378904 | ALLOCATING READ BLOCKS TO A THREAD IN A TRANSACTION USING USER SPECIFIED LOGICAL ADDRESSES - A processor in a multi-processor configuration is configured to execute an instruction that specifies a virtual address range to be monitored to protect reads in a transaction. The processor translates the virtual address range to a series of real pages. The real starting address and ending address pairs for each real page are stored for use later on to resolve a potential cross-interrogation (XI) conflict with a real address on the XI bus. | 2015-12-31 |