Entries |
Document | Title | Date |
20080209266 | Memory device, memory system including the same, and method thereof - A memory device may include a memory cell array, a page buffer circuit, and/or a control logic. The page buffer circuit may include first and second registers and be configured to store data to be programmed in the memory cell array. The control logic may be configured to control the page buffer circuit to reload data stored in the first register into the second register in response to a reload command input if a program operation fails. | 08-28-2008 |
20080301495 | REASSIGNING STORAGE VOLUMES FROM A FAILED PROCESSING SYSTEM TO A SURVIVING PROCESSING SYSTEM - Provided are a method, system, and program for reassigning storage volumes from a failed processing system to a surviving processing system. A first processing system detects a failure of a second processing system. The first processing system determines device groups of storage devices managed by the failed second processing system and determines for each determined device group, hosts that connect to storage devices in the device group. The first processing system sends, for each device group, a unit check to each determined host indicating failure of each device group through one storage device in the device group to which the determined host connects. The determined hosts execute instructions to terminate any I/O operations in progress on the storage devices in the device group in response to the unit check indicating failure of one storage device in the device group and issue, a command to one storage device for the device group to end the busy condition. | 12-04-2008 |
20090019307 | DIGITAL BROADCAST FILE DATA RECEIVING METHOD AND APPARATUS - A digital broadcast file data receiving method and a digital broadcast file data receiving apparatus are provided. The digital broadcast file data receiving method and the digital broadcast file data receiving apparatus enable reception and display of proper broadcast file data by detecting an error in a specific data block and receiving the specific data block again in a process of receiving digital broadcast file data. | 01-15-2009 |
20090077418 | Control of Sparing in Storage Systems - Embodiments include methods, apparatus, and systems for controlling of sparing in a storage system. In one embodiment, a method compares a first amount of time to complete sparing of data from a failed disk in a storage system with a second amount of time to complete a user request to the storage system in order to determine when to create a copy of the data from the failed disk. | 03-19-2009 |
20090106588 | Method and Apparatus for Parallel and Serial Data Transfer - A method and apparatus are disclosed for performing maintenance operations in a system using address, data, and controls which are transported through the system, allowing for parallel and serial operations to co-exist without the parallel operations being slowed down by the serial ones. It also provides for use of common shifters, engines, and protocols as well as efficient conversion of ECC to parity and parity to ECC as needed in the system. The invention also provides for error detection and isolation, both locally and in the reported status. The invention provides for large maintenance address and data spaces (typically 64 bits address and 64 bits data per address supported). | 04-23-2009 |
20090172470 | MANAGING PROCESSING OF A COMPUTING ENVIRONMENT DURING FAILURES OF THE ENVIRONMENT - Recovery processing is provided for management components of an Information Technology (IT) environment. The recovery processing recovers the components, as well as performs one or more tasks that were being performed by the components prior to recovery. | 07-02-2009 |
20090177921 | PORTABLE ELECTRONIC DEVICE AND CONTROL METHOD THEREOF - A flag which is set to the on state when a process of writing data as a data file into a storage area which is permitted to be written only once results in failure is previously set in a data memory of an IC card. When a flag of a to-be-written EF specified by a write binary command is set to the on state, a control element of the IC card compares received data to be written to the EF with data which is already written to the data storage area of the EF. Based on the comparison result, the control element of the IC card rewrites data in the storage area in which the compared data items do not coincide with each other into the received data. | 07-09-2009 |
20090183028 | METHOD AND SYSTEM FOR MODELING, VALIDATING AND AUTOMATICALLY RESOLVING GOALS AND DEPENDENCIES BETWEEN ELEMENTS WITHIN A TOPOLOGY - Computer implemented method, system and computer usable program code for configuring a computing system. A determination is made whether there are any errors in the model, and responsive to determining that there is at least one error in the model, a determination is made whether there is at least one resolution for correcting the at least one error. Responsive to determining that there is at least one resolution for correcting the at least one error, at least one resolution among the at least one resolution for correcting the at least one error is selected to form at least one selected resolution to correct the at least one error. The at least one selected resolution is applied to the model to form a transformed model, and the transformed model is output to a user. | 07-16-2009 |
20090187787 | TRANSFER OF DATA FROM POSITIONAL DATA SOURCES TO PARTITIONED DATABASES IN RESTARTABLE ENVIRONMENTS - Method, computer program product, and system for transferring data from positional data sources to partitioned databases are provided. A record is read from a positional data source. The record is to be written to one of a plurality of partitions of a database. A position of the record in the positional data source is obtained. A transaction is initiated to write the record to the one partition and to store the position of the record in the database. The transaction is committed after the record is successfully written to the one partition and the position of the record is successfully stored in the database. | 07-23-2009 |
20090217090 | Method, operating system and computing hardware for running a computer program - A method for running a computer program on computing hardware, in particular on a microprocessor. The computer program includes multiple program objects designed as tasks, for example. Transient and permanent errors are detected during the running of the computer program on the computing hardware. To be able to handle these transient errors constructively when they occur in a computer system in such a way that the functionality and function reliability of the computer system are restored within the shortest possible error tolerance time, at least one program object that has already been sent for execution is set into a defined state on detection of an error and is restarted from this state. The program object is a runtime object of the computer program, for example, also known as a task. One or more tasks that are still being executed or have already been executed on occurrence of an error are restarted and run again. | 08-27-2009 |
20090240982 | IMAGE READING APPARATUS, METHOD FOR READING IMAGE, IMAGE FORMING APPARATUS, AND PROGRAM - The image reading apparatus continuously reads image data of a plurality of pages of a document, each page being added with identification information including specific information of the page and common information showing relationship with at least one precedent and one subsequent pages, that includes an image storage potion for storing image data of each page of the read document, an identification information extracting portion for extracting the identification information from the image data, a missing page detecting portion for detecting a page missed by failure of reading in the document based on identification information of each extracted page, and a display portion for prompting reading of the document by displaying the missing page, in which when an instruction of rereading is given and identification information of the missing page is extracted from image data read again, the image data is additionally stored in the image storage portion. | 09-24-2009 |
20090276660 | SERVER COMPUTER COMPONENT - Processing means for assisting computer programs running in a distributed computer system, the processing means including: detection means ( | 11-05-2009 |
20090292947 | CASCADING INDEX COMPRESSION - Techniques for maintaining a cascading index are provided. In one approach, one or more branch node compression techniques are applied to the main index of a cascading index. In an approach, a Bloom filter is generated and associated with, e.g., a branch node in the main index. The Bloom filter is used to determine whether, without accessing any leaf blocks, a particular key value exists, e.g., in leaf blocks associated with the branch node. In an approach, a new redo record is generated in response to a merge operation between two levels of the cascading index. The new redo record comprises (a) one or more addresses of blocks that are affected by the merge operation, (b) data is that being “pushed down” to a lower level of the cascading index, and (c) one or more addresses of blocks that are written to disk storage as a result of the merge operation. | 11-26-2009 |
20100017655 | Error Recovery During Execution Of An Application On A Parallel Computer - Methods, apparatus, and products are disclosed for error recovery during execution of an application on a parallel computer that includes a plurality of compute nodes. Such error recovery includes: storing, by the application during execution on the nodes, application restore data in a restore buffer at predetermined points during execution of the application, the restore data specifying an execution state of the application at one or more points during application execution; encountering, by at least one of the nodes executing the application, a recoverable error during application execution; determining, by the application, the nodes affected by the recoverable error; restarting, by each of the affected nodes, execution of the application; retrieving, by the restarted application executing on each of the affected nodes, the restore data from the restore buffer; and continuing, by each affected node, execution of the application with the execution state specified by the retrieved restore data. | 01-21-2010 |
20100077255 | CATALOG RECOVERY THROUGH SYSTEM MANAGEMENT FACILITIES REVERSE TRANSVERSAL - A method for forward recovery of a catalog of a data storage system, comprising providing a recovery catalog and SMF records. In reverse chronological order, the (i)th entry of the record is checked for a data set change command. If none, the next entry is examined. Otherwise, the (j)th data set is identified and checked for inclusion in the recovery catalog. If it already is, the next entry is selected. If not, a data set location record is added. This process is repeated for each entry in the SMF record. Next, a (h)th data set on the (k)th volume is selected and checked for inclusion in the recovery catalog. If that (h)th data set has been added to the recovery catalog, a next data set is selected. Otherwise, a data set location record for the (h)th data set is added. The process is repeated for each data set on each volume. | 03-25-2010 |
20100077256 | STORAGE CONTROLLER AND DATA ERASING METHOD FOR STORAGE DEVICE - A storage controller changes a block size to carry out a shredding process. A data shredder uses a large block size set by a block size setting part to write shredding data in a storage area of a disk drive and erase data stored therein. An error arising during the writing operation of the shredding data is detected by an error detecting part. When the error is detected, the block size setting part sets the block size smaller by one stage than the initial block size to the data shredder. Every time the error arises, the block size used in the shredding process is diminished. Thus, the number of times of writings of the shredding data is reduced as much as possible to improve a processing speed and erase the data of a wide range as much as possible. | 03-25-2010 |
20100095151 | Processor Apparatus for Executing Instructions with Local Slack Prediction of Instructions and Processing Method Therefor - A processor predicts predicted slack which is a predicted value of local slack of an instruction to be executed and executes the instruction using the predicted slack. A slack table is referred to upon execution of an instruction to obtain predicted slack of the instruction and execution latency is increased by an amount equivalent to the obtained predicted slack. Then, it is estimated, based on behavior exhibited upon execution of the instruction, whether or not the predicted slack has reached target slack which is an appropriate value of current local slack of the instruction. The predicted slack is gradually increased each time the instruction is executed, until it is estimated that the predicted slack has reached the target slack. | 04-15-2010 |
20100153778 | Transient Transaction Execution With On-Demand Persistency - The subject matter disclosed herein provides methods and apparatus, including computer program products for handing transactions. The method may include, for example, processing, at a state correlation engine, a plurality of transactions; saving the effects of at least one of the transactions to a persistence, when the at least one transaction includes a reliable interaction with an external application; saving other transactions to a buffer rather than to the persistence; and reading the at least one transaction from the persistence and continuously executing rules representing the other transactions in response to a failure causing a recovery. Related systems, apparatus, methods, and/or articles are also described. | 06-17-2010 |
20100169709 | System Of Updating Firmware And Method Thereof, And Method Of Creating Firmware - A system and method of updating firmware and a method of creating firmware are provided. The system includes a firmware storage module having first firmware and second firmware. The first and second firmware each have image header file data, including a cyclic redundancy checksum (CRC) and an image header file creation time. The method of updating firmware includes determining whether the first and second firmware have an abnormality according to the CRC information. When an abnormality is present in the first or second firmware, the abnormality-stricken firmware is replaced with new firmware. When the abnormality is absent from the first and second firmware, the first firmware is compared with the second firmware in terms of the image header file creation time such that the firmware with the earlier creation time is replaced by the new firmware. Operable firmware is available even if the firmware updating operation fails. | 07-01-2010 |
20100185897 | FAULT TOLERANT MEMORY APPARATUS, METHODS, AND SYSTEMS - Various embodiments include fault tolerant memory apparatus, methods, and systems, including an apparatus comprising a memory device including a plurality of addressable memory locations, and a memory manager coupled to the memory device, the memory manager including a scheduling unit operable to detect a multi-bit error in data read from the memory device, and to retry the read operation in order to distinguish between an intermittent error and a persistent error. | 07-22-2010 |
20100211822 | DISASTER RECOVERY BASED ON JOURNALING EVENTS PRIORITIZATION IN INFORMATION TECHNOLOGY ENVIRONMENTS - Disaster recovery is performed based on journaling events prioritization in information in an information technology environment. One implementation involves prioritizing log file events for scheduling of jobs on a computing system, by logging events concerning each job execution plan, in a log file, and for disaster recovery, prioritizing logged events based on corresponding job urgency and relevance level and performing recovery by reapplying the events of log files in the priority order such that more urgent and relevant jobs are recovered first. | 08-19-2010 |
20100268987 | Circuits And Methods For Processors With Multiple Redundancy Techniques For Mitigating Radiation Errors - Embodiments of circuits for processors with multiple redundancy techniques for mitigating radiation errors are described herein. Other embodiments and related methods and examples are also described herein. | 10-21-2010 |
20100287410 | SYSTEMS AND METHODS FOR RETRIEVING DATA - Apparatus and methods, such as those that read data from non-volatile integrated circuit memory devices, such as NAND flash. For example, disclosed techniques can be embodied in a device driver of an operating system. Errors are tracked during read operations. If sufficient errors are observed during read operations, the block is then retired when it is requested to be erased or a page of the block is to be written. One embodiment is a technique to recover data from uncorrectable errors. For example, a read mode can be changed to a more reliable read mode to attempt to recover data. One embodiment further returns data from the memory device regardless of whether the data was correctable by decoding of error correction code data or not. | 11-11-2010 |
20100306585 | METHOD AND SYSTEM TO PERFORM TIME CONSUMING FOLLOW-UP PROCESSES - A computer system may receive an instruction to perform an action on an object. A schedule manager may identify a set of processes associated with the action that need to be performed by the computer system. A subset of primary process and a subset of secondary processes may be identified from the set of processes associated with the action. The schedule manager may schedule an asynchronous process to perform the subset of secondary processes on the object. The computer system may perform the subset of primary processes on the object. The subset of secondary process may be performed by the asynchronous process based upon the scheduling. | 12-02-2010 |
20100332900 | Method and apparatus for scrubbing accumulated data errors from a memory system - A data scrubbing apparatus corrects disturb data errors occurring in an array of memory cells such as SMT MRAM cells. The data scrubbing apparatus receives an error indication that an error has occurred during a read operation of a grouping of memory cells within the array of memory cells. The data scrubbing apparatus may generate an address describing the location of the memory cells to be scrubbed. The data scrubbing apparatus then commands the array of memory cells to write back the corrected data. Based on a scrub threshold value, the data scrubbing apparatus writes the corrected data back after a specific number of errors. The data scrubbing apparatus may further suspend writing back during a writing of data. The data scrubbing apparatus provides a busy indicator externally during a write back of corrected data. | 12-30-2010 |
20100332901 | ADVICE-BASED FEEDBACK FOR TRANSACTIONAL EXECUTION - One embodiment provides a system that facilitates the execution of a transaction for a program in a hardware-supported transactional memory system. During operation, the system records a failure state of the transaction during execution of the transaction using hardware transactional memory mechanisms. Next, the system detects a transaction failure associated with the transaction. Finally, the system provides an advice state associated with the recorded failure state to the program to facilitate a response to the transaction failure by the program. | 12-30-2010 |
20110016354 | FAULT TOLERANT BATCH PROCESSING - Among other aspects disclosed are a method and system for processing a batch of input data in a fault tolerant manner. The method includes reading a batch of input data including a plurality of records from one or more data sources and passing the batch through a dataflow graph. The dataflow graph includes two or more nodes representing components connected by links representing flows of data between the components. At least one but fewer than all of the components includes a checkpoint process for an action performed for each of multiple units of work associated with one or more of the records. The checkpoint process includes opening a checkpoint buffer stored in non-volatile memory at the start of processing for the batch. For each unit of work from the batch, if a result from performing the action for the unit of work was previously saved in the checkpoint buffer, the saved result is used to complete processing of the unit of work without performing the action again. If a result from performing the action for the unit of work is not saved in the checkpoint buffer. The action is performed to complete processing of the unit of work and the result from performing the action is saved in the checkpoint buffer. | 01-20-2011 |
20110029811 | SYSTEM AND METHOD FOR SUPPORTING COMPENSATION WORK - A method for supporting compensation work comprises the steps of associating a data structure with a compensation function, and associating the data structure with the at least one event that can be encountered during execution of a forward work. The data structure contains a pair of pointers, which includes a first pointer to a code to be executed for the compensation function, and a second pointer to a stack frame of a closest lexically enclosing scope of a declaration of the compensation function in a computer program text. | 02-03-2011 |
20110035625 | INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING METHOD - In an information processing apparatus for storing, based on a notification sent from a monitor unit used for monitoring a state of print processing of a printing apparatus, the status item presenting the state in a storage region, or deleting the status item stored in the storage region, and for displaying the status item stored in the storage region in a storage order, a monitor unit acquires a plurality of the status items stored in the storage region, compares priority of the acquired plurality of status items and priority of a new status item stored in the storage region, and notifies a control unit to store the status items in the storage region in an order based on priority obtained as a result of the comparison. | 02-10-2011 |
20110066885 | DYNAMIC ATOMIC ARRAYS - Embodiments of the present invention provide techniques, including systems, methods, and computer readable medium, for dynamic atomic arrays. A dynamic atomic array is a data structure that provides an array that can grow or shrink in size as required. The dynamic atomic array is non-blocking, wait-free, and thread-safe. The dynamic atomic array may be used to provide arrays of any primitive data type as well as complex types, such as objects. | 03-17-2011 |
20110066886 | APPARATUS, METHOD, AND COMPUTER-READABLE RECORDING MEDIUM FOR SUPPORTING LICENSE ACQUIREMENT - An apparatus connected to a license management apparatus, storing license status data with license identifiers, via a network, and includes a part for receiving a request to acquire a license corresponding to a license identifier, a part for receiving designation of at least one electronic device for acquiring the license, a part for obtaining a license file corresponding to the license identifier from the license management apparatus, updating the license status data corresponding to the license identifier, and recording the license file to a storage part with the electronic device, a part for executing acquirement, and a part for executing re-execution in a case where the acquiring of the license by the electronic device is determined as a failure according to the result. The re-execution includes displaying the failure of the acquirement on a screen and re-executing the acquirement with the license file based on data input to the screen. | 03-17-2011 |
20110078502 | Switching Between Connectivity Types To Maintain Connectivity - Techniques are provided for leveraging narrowband connectivity (such as dial-up communications or other types of low bandwidth communications) to provision or configure broadband connectivity between a broadband access provider and a broadband device, such as a DSL modem or a cable modem. Specifically, because narrowband connectivity does not require advance configuration or provisioning by the host system of connectivity parameters for an access-seeking device, a modem at an access-seeking device may be leveraged to establish a narrowband connection between that device and a host system and to enable an exchange or negotiation of connectivity parameters necessary to enable future broadband connectivity. Thus, once established, the narrowband connection may be used as a conduit for communicating required provisioning information between the broadband-enabling host and the access-seeking device to enable broadband connectivity by the device in the future. | 03-31-2011 |
20110107144 | STORAGE CONTROLLER AND DATA ERASING METHOD FOR STORAGE DEVICE - A storage controller changes a block size to carry out a shredding process. A data shredder uses a large block size BSZ | 05-05-2011 |
20110113284 | READ RETRY METHOD AND APPARATUSES CAPABLE OF PERFORMING THE READ RETRY METHOD - A read retry method performed in a hard disk drive, the read retry method may include performing a read operation; and ignoring a read error flag generated when a read error is generated, and continuing to perform the read operation. | 05-12-2011 |
20110119526 | LOCAL ROLLBACK FOR FAULT-TOLERANCE IN PARALLEL COMPUTING SYSTEMS - A control logic device performs a local rollback in a parallel super computing system. The super computing system includes at least one cache memory device. The control logic device determines a local rollback interval. The control logic device runs at least one instruction in the local rollback interval. The control logic device evaluates whether an unrecoverable condition occurs while running the at least one instruction during the local rollback interval. The control logic device checks whether an error occurs during the local rollback. The control logic device restarts the local rollback interval if the error occurs and the unrecoverable condition does not occur during the local rollback interval. | 05-19-2011 |
20110126049 | ARCHITECTURE AND METHOD FOR HARDWARE-ASSISTED PROCESSOR CHECKPOINTING AND ROLLBACK - A method to enable an adaptive fault tolerance in a data system is provided. The method includes communicatively coupling a radiation hardened hardware element to at least one interrupt service routine application in a respective at least one processing element, triggering an interrupt service routine by an interrupt signal received from the radiation hardened hardware element at the interrupt service routine application after an execution of a code block by the at least one processing element, and inspecting the internal state of the at least one processing element to determine if an error occurred. | 05-26-2011 |
20110161733 | TRANSACTION REGIONS IN METHODS OF PROCESSING DATA - There is provided a method of processing at least one data message using a computing device having at least a processor, a memory, a display device and an input device, the method including:
| 06-30-2011 |
20110161734 | PROCESS INTEGRITY IN A MULTIPLE PROCESSOR SYSTEM - Disclosed are a method, a system and a computer program product of operating a data processing system that can include or be coupled to multiple processor cores. In one or more embodiments, an error can be determined while two or more processor cores are processing a first group of two or more work items, and the error can be signaled to an application. The application can determine a state of progress of processing the two or more work items and at least one dependency from the state of progress. In one or more embodiments, a second group of two or more work items that are scheduled for processing can be unscheduled, in response to determining the error. In one or more embodiments, the application can process at least one work item that caused the error, and the second group of two or more work items can be rescheduled for processing. | 06-30-2011 |
20110214016 | Performing Aggressive Code Optimization with an Ability to Rollback Changes Made by the Aggressive Optimizations - Mechanisms for aggressively optimizing computer code are provided. With these mechanisms, a compiler determines an optimization to apply to a portion of source code and determines if the optimization as applied to the portion of source code will result in unsafe optimized code that introduces a new source of exceptions being generated by the optimized code. In response to a determination that the optimization is an unsafe optimization, the compiler generates an aggressively compiled code version, in which the unsafe optimization is applied, and a conservatively compiled code version in which the unsafe optimization is not applied. The compiler stores both versions and provides them for execution. Mechanisms are provided for switching between these versions during execution in the event of a failure of the aggressively compiled code version. Moreover, predictive mechanisms are provided for predicting whether such a failure is likely. | 09-01-2011 |
20110214017 | FAILED PROCESS REPORTING - An application programming interface (API) that leverages operating system instrumentation to provide a chain of threads and processes may alleviate some debugging complications. Specifically, the chain may start with the first thread in the process that experienced the original failure and end with the last thread upon which the first thread directly or indirectly depends. The API may aid debugging efforts by classifying all threads related or dependent upon an original failed thread into specific categories of failures, requesting further information from the originating OS concerning specific failed threads, and using that information to debug the failed application or process more thoroughly. | 09-01-2011 |
20110246822 | TRANSACTION PARTICIPANT REGISTRATION WITH CAVEATS - In a distributed computing system, a processing device executing a caveat enabled transaction manager registers one or more transaction participants with the transaction manager. To register a transaction participant, the caveat enabled transaction manager records an address of the transaction participant. The caveat enabled transaction manager additionally determines whether the transaction participant is associated with any transaction caveats. If the transaction participant is associated with a transaction caveat, the caveat enabled transaction manager records the transaction caveat. | 10-06-2011 |
20110246823 | TASK-ORIENTED NODE-CENTRIC CHECKPOINTING (TONCC) - Node-centric checkpointing may be used in a multi-node computing system to provide fault-tolerance. Such checkpointing may involve storage of input and/or output data prior to and/or after execution of a task on a node. | 10-06-2011 |
20110252276 | LOW-OVERHEAD RUN-TIME MEMORY LEAK DETECTION AND RECOVERY - Leaked memory in a computer system is detected and recovered by first detecting memory leakage within the computer system based on nonlinear and non-parametric time-series regression analysis of software telemetry data generated by one or more software process running on the computer system. If existence of memory leakage is detected, then memory that has leaked is specifically identified and recovered. This is done by halting one or more of the software processes, generating a core image file or files of the halted software process(es), and re-starting the halted process or processes without waiting for analysis of the core image file(s). Then, the core image file is evaluated to specifically identify leaked memory in the computer system based on the core image file. Finally, the identified leaked memory is recovered. | 10-13-2011 |
20110276826 | COMMUNICATION DEVICES AND METHODS WITH ONLINE PARAMETER CHANGE - Methods and devices are provided where when an online parameter change is requested a data transfer unit is stopped, a parameter change is communicated and the data transfer unit is started with changed parameters to generate new data transfer units. | 11-10-2011 |
20110296238 | DATA ENCRYPTION CONVERSION FOR INDEPENDENT AGENTS - The re-encryption of data can be performed with independent cryptographic agents that can automatically encrypt and decrypt data in accordance with cryptographic regions, such that data within a single cryptographic region is encrypted and decrypted with the same cryptographic key. An “in-place” re-encryption can be performed by reading data from a chunk in an existing cryptographic region, shrinking the existing cryptographic region past the chunk, expanding a replacement cryptographic region over the chunk, and then writing the data back to the same location, which is now part of the replacement cryptographic region. An “out-of-place” re-encryption can be performed by reading data from a chunk in an existing cryptographic region and then writing the data back to a location immediately adjacent that is part of a replacement cryptographic region. After the re-encrypted data is “shifted”, the cryptographic regions can be expanded and contracted appropriately, and another chunk can be selected. | 12-01-2011 |
20110296239 | SYSTEM FOR HANDLING STORAGE SYSTEM REQUESTS - A file storage system that uses a server to communicate between a client and a storage system. The server receives a file storage request pertaining to a file, generates and stores a file record for the request and forwards the request to a file storage system. The server performs either an internal retry or forwards a no-file response from the storage system to the client computer in response to receiving a no-file file status from the storage system depending on an amount of elapsed time from the time the server initially receives the file storage request. | 12-01-2011 |
20110320869 | HOMOGENEOUS RECOVERY IN A REDUNDANT MEMORY SYSTEM - Providing homogeneous recovery in a redundant memory system that includes a memory controller, a plurality of memory channels in communication with the memory controller, an error detection code mechanism configured for detecting a failing memory channel, and an error recovery mechanism. The error recovery mechanism is configured for receiving notification of the failing memory channel, for blocking off new operations from starting on the memory channels, for completing any pending operations on the memory channels, for performing a recovery operation on the memory channels and for starting the new operations on at least a first subset of the memory channels. The memory system is capable of operating with the first subset of the memory channels. | 12-29-2011 |
20120005529 | SYSTEM AND METHOD FOR SUPPORTING COMPENSATION WORK USING A PROCESS EXECUTION ENGINE - A system and method can support a compensation work. The system includes one or more compensation functions that use a process state to realize the compensation work associated with a forward work, wherein the compensation work is executed at a different runtime from an execution time of the forward work, and wherein the process state contains data needed to execute the compensation work. The system also includes a process execution engine that can dynamically manage process state to make the state available to the compensation functions. The process state is retrieved based on a closure data structure that holds an expression and an environment of variable bindings, in which the expression is to be evaluated. | 01-05-2012 |
20120011399 | METHOD FOR DATA SYNCHRONIZATION AND MOBILE TERMINAL USING THE SAME - A method of controlling a mobile terminal, method including performing, via a controller on the mobile terminal, data synchronizations with at least one external device, displaying, via a display on the mobile terminal, a list of data synchronization history corresponding to the performed data synchronizations, determining, via the controller, whether or not a particular data synchronization from the list includes an error, undoing, via the controller, the particular data synchronization to a state prior to the particular data synchronization, if it is determined that the particular data synchronization includes the error, and re-performing, via the controller, the particular data synchronization using data corresponding to the undone particular data synchronization. | 01-12-2012 |
20120011400 | Method for operating a remote procedure call handler in a client and a server and computer system comprising the same - The invention is directed to a computer system comprising a server and a client and a method for operating a remote procedure call handler in the client and the server. The Method for operating a remote procedure call handler in the client according to the invention comprises the following steps:
| 01-12-2012 |
20120023367 | ACCURATE FAULT STATUS TRACKING OF VARIABLE ACCESS SENSORS - A method for accurately tracking fault status in a computer system. The method includes storing a prior state for a sensor associated with a component of the computer system and receiving a sensor reading. When the prior state indicates the sensor was unavailable or unreadable such as when the component was removed, the method includes resending or re-emitting a faulty event to the fault diagnosing module, e.g., after reinsertion of the component in the computer system while it is still faulty. The method may include, prior to the triggering of the resending of the faulty event, determining that the sensor is in a non-nominal state. The method may also include storing in the data storage a definition of a nominal state for the sensor such that the determining the sensor is in the non-nominal state includes comparing one or more sensor readings with the nominal state definition. | 01-26-2012 |
20120023368 | Compressed Replay Buffer - A compressed replay buffer in a first electronic unit of an electronic system holds commands in a table. As commands are transmitted from the first electronic unit to a second electronic unit, the command, along with associated data, command type, and the like are stored in a row in the table. No rows in the table contain “dead cycles” to indicate that no command was sent on a particular cycle on a bus over which the commands were transmitted. The second electronic unit may request that the first electronic unit replay some number of commands. In response, the first electronic unit uses commands in the compressed replay buffer, along with required timings stored on the first electronic unit, to replay the number of commands requested. | 01-26-2012 |
20120023369 | BATCHING TRANSACTIONS TO APPLY TO A DATABASE - Provided are a method, system and program for batching transactions to apply to a database. A transaction manager receives a plurality of transactions to apply to a database and adds the transactions to a work queue. One of a plurality of agents processes a batch of transactions from the work queue. Each agent executes a batch of transactions from the work queue against the database independent of the operations of other of the agents executing batches of transactions. The agent applies the transactions in the batch against the database and commits the transactions in the batch to the database in response to completing all of the transactions. | 01-26-2012 |
20120060057 | Register Error Correction of Speculative Data in an Out-of-Order Processor - In one embodiment, a processor comprises a first register file configured to store speculative register state, a second register file configured to store committed register state, a check circuit and a control unit. The first register file is protected by a first error protection scheme and the second register file is protected by a second error protection scheme. A check circuit is coupled to receive a value and corresponding one or more check bits read from the first register file to be committed to the second register file in response to the processor selecting a first instruction to be committed. The check circuit is configured to detect an error in the value responsive to the value and the check bits. Coupled to the check circuit, the control unit is configured to cause reexecution of the first instruction responsive to the error detected by the check circuit. | 03-08-2012 |
20120079322 | PREVENTING DATA LOSS IN A STORAGE SYSTEM - Storage servers use a fast, non-volatile or persistent memory to store data until it can be written to slower mass storage devices such as disk drives. If the server crashes before a write can complete, the data remains safely stored in non-volatile memory. If the data cannot be committed to disk when the server reboots (e.g. because the destination mass storage device is unavailable), it is stored in a file. When the disk reappears, the data in the file may be used to restore a file or filesystem on the disk to a consistent state. | 03-29-2012 |
20120117423 | FAULT TOLERANCE IN DISTRIBUTED SYSTEMS - Fault tolerance is provided in a distributed system. The complexity of replicas and rollback requests are avoided; instead, a local failure in a component of a distributed system is tolerated. The local failure is tolerated by storing state related to a requested operation on the component, persisting that stored state in a data store, such as a relational database, asynchronously processing the operation request, and if a failure occurs, restarting the component using the stored state from the data store. | 05-10-2012 |
20120144234 | AUTOMATIC ERROR RECOVERY MECHANISM FOR A DATABASE SYSTEM - A computer-implemented method, apparatus and article of manufacture for performing an automatic error recovery in a database system. Automatic error recovery is performed for a query execution plan, following errors, problems or failures that occur during execution, by automatically or manually deactivating and/or activating components, features or code paths, and then re-submitting the query execution plan for execution in the computer system. | 06-07-2012 |
20120151260 | System and Method for Autonomous NAND Refresh - A background scheduler is provided that utilizes low-level communications (e.g., communications with a generic or controller-specific solid state, non-volatile memory driver) to control locking, reading, rewriting and unlocking of pages of data in the non-volatile memory. Such low-level communications cause data to be rewritten to the non-volatile memory independent of the file system in an effort to avoid data loss prior to an estimated data retention period. | 06-14-2012 |
20120179933 | PATTERN-DEPENDENT ERROR CORRECTION METHOD AND SYSTEM - A pattern-dependent error correction method and system for a code group alignment finite state machine (FSM) are disclosed. A state corrector generates a start-of-stream delimiter (SSD) detected signal to the FSM when the FSM is in an idle state and at least one condition due to a lost SSD signal is met; and the state corrector generates an idle detected signal to the FSM when at least one condition due to a lost idle signal is met. A pattern corrector generates a corrected code pattern {J,K} to FSM when the FSM is in an idle state and at least one condition due to a false idle state is met; and the pattern corrector generates a corrected code pattern {T,R} to the FSM when the FSM is in a data state, a start of stream state or a data error state, and at least one condition due to a false packet end is met. | 07-12-2012 |
20120226938 | DATA MIGRATION MANAGEMENT APPARATUS AND INFORMATION PROCESSING SYSTEM - The present invention provides a data migration management apparatus that can easily create a re-execution task for re-executing an error-terminated data migration task, and also can increase the possibility of the re-execution task being successful. In a case where a data migration from a migration-source volume to a migration-destination volume fails, the management apparatus uses the information of the failed task to create a re-execution task. The management apparatus changes the configuration of a volume pair as necessary. The management apparatus manages the failed task in association with the re-execution task. | 09-06-2012 |
20120284562 | Computer Processor Providing Error Recovery with Idempotent Regions - A computer architecture allows for simplified recovery after mis-speculation during speculative execution by controlling speculation to occur within idempotent regions that may be recovered by re-execution of the region without the need for restoring complex state information from checkpoints. A compiler for increasing the size of idempotent regions is also disclosed. | 11-08-2012 |
20120297248 | BLOCK WRITE HANDLING AFTER CORRUPTION - A memory device recognizes that data corruption is present in a block. In response, rather than skip the block and continue write operations into a different uncorrupted block, the memory device continues to write data into the corrupted block. The memory device may write data on the basis of logical groups. The logical groups may be smaller than a block and larger than a page, but other sizes are also possible. In response to write corruption in the block (e.g., from power loss during a write operation), the memory device may skip certain parts of the block and continue writing into the block. For example, the memory device may skip the remainder of the page range in which the logical group was going to be written when data corruption occurred, and instead write that logical group into the block from the start of the next logical group unit, the next available page, or any other boundary. | 11-22-2012 |
20120324282 | EVENT BASED MODEL FOR MANAGING APPLICATION HEALTH AND FAILURE RECOVERY FOR ASYNCHRONOUS PROCESSING SYSTEMS - A method for event management in asynchronous work processing including timing at least one step in an asynchronous work process, wherein the at least one step is performed by an application and the at least one step has an expected time of completion; determining an error preventing step completion in response to the expected time of completion expiring; correcting the error; and re-performing the at least one step. | 12-20-2012 |
20130007518 | TRANSPARENT FAILOVER - Described are embodiments directed at persistent handles that are used to retain state across network failures and server failovers. Persistent handles are requested by a client after a session has been established with a file server. The request for the persistent handle includes a handle identifier generated by the client. The server uses the handle identifier to associate with state information. When there is a network failure or a server failover, and a reconnection to the client, the handle identifier is used to identify replayed requests that if replayed would create an inconsistent state on the server. The replayed requests are then appropriately handled. | 01-03-2013 |
20130024727 | METHOD FOR AUTOMATICALLY RELOADING SOFTWARE AND A DEVICE FOR AUTOMATICALLY RELOADING SOFTWARE - Method for automatically reloading software characterized in that it comprises: a step of detecting corruption (E | 01-24-2013 |
20130061090 | PARTIAL REBOOTING RECOVERY APPARATUS AND METHOD - A partial rebooting recovery apparatus is provided. The partial rebooting recovery apparatus may store a system state of a predetermined booting point in time, may receive a failure signal of a system, may call a failure recovery processing function, may recover the system to the system state of the predetermined booting point in time, based on the failure signal, and may reboot the system from a point in time at which the system is recovered. | 03-07-2013 |
20130086419 | SYSTEM AND METHOD FOR PERSISTING TRANSACTION RECORDS IN A TRANSACTIONAL MIDDLEWARE MACHINE ENVIRONMENT - A transactional system can utilize the distributed storage and high availability (HA) capability provided by a clustered database to support easy and feasible disaster recovery. The transactional middleware machine environment comprises one or more transactional application servers associated with a transaction. The one or more transactional application servers operate to persist transactional log information associated with the transaction in a database that connects with said one or more transactional application servers at a local site. The database at the local site operates to replicate the persisted transactional log information to a remote database at a remote site. The remote database allows a different transactional application server at the remote site to recover the persisted transactional log information and complete the transaction, when a disaster disables the local site. | 04-04-2013 |
20130166950 | DATA PROCESSING DEVICE - A data processing device | 06-27-2013 |
20130198564 | PARAMETERIZED DYNAMIC MODEL FOR CLOUD MIGRATION - Technologies are generally presented for a migration system and a method for moving data and applications from a cloud or non-cloud network to a cloud network employing a Parameterized Dynamic Model (PDM) having one or more multi-dimensional parameters. In some examples, the PDM parameters may represent the Service level Agreement (SLA) requirements that a target cloud may need to satisfy for a successful cloud migration. The PDM may include a Model Execution Code (MEC) module configured to execute the PDM acting upon the PDM parameter in a cloud environment following the sequencing defined in the PDM as a sequencing parameter. The PDM-MEC based migration system may also include fault-tolerance and error recovery during the migration while the MEC code is executed. | 08-01-2013 |
20130212432 | SYSTEMS, METHODS, AND APPARATUS FOR FACILITATING CLAIMS PROCESSING - Systems, apparatus, methods, and articles of manufacture provide for facilitating upload of one or more electronic files from a user device to a remote server. In some embodiments, a background upload process manages connectivity of the user device to the remote server and staging file uploads in a disconnected mode for automatic processing when connectivity is restored. | 08-15-2013 |
20130246845 | SYSTEMS AND METHODS FOR SUPPORTING TRANSACTION RECOVERY BASED ON A STRICT ORDERING OF TWO-PHASE COMMIT CALLS - Systems and methods are provided for supporting transaction recovery based on a strict ordering of two-phase commit calls. At least one resource manager in a mid-tier transactional environment can be designated as the “determiner resource,” in order to support eliminating mid-tier transaction logs (TLOG) in processing a two-phase transaction. A transaction manager can prepare all other resource managers in the mid-tier transactional system before the determiner resource. Furthermore, the transaction manager can rely on the list of outstanding transactions to be committed that is provided by the determiner resource for recovering the transaction. The transaction manager can commit an in-doubt transaction returned from a resource manager that matches the list of in-doubt transactions returned from the determiner resource. Otherwise, the transaction manager can roll back the in-doubt transaction. | 09-19-2013 |
20130262925 | RESCHEDULING FAILED BACKUP JOBS - Techniques for rescheduling a failed backup job are described in various implementations. A method that implements the techniques may include identifying a failed instance of a backup job, and determining an estimated amount of time to complete a rescheduled execution of the failed instance. The method may also include determining an available window of time in a backup schedule that equals or exceeds the estimated amount of time to complete the rescheduled execution, and rescheduling the failed instance for execution during the available window of time. | 10-03-2013 |
20130275805 | PROVIDING APPLICATION BASED MONITORING AND RECOVERY FOR A HYPERVISOR OF AN HA CLUSTER - An embodiment of the invention is directed to a method associated with a node comprising a hypervisor and guest VMs, each guest VM being managed by the hypervisor and disposed to run applications, the node being joined with other nodes to form an HA cluster. The method includes establishing an internal bidirectional communication channel between each guest VM and the hypervisor, and further includes sending commands and responses thereto through the channel, wherein respective commands manage a specified application running on the given guest VM. The messages are selectively monitored, to detect a failure condition associated with the specified application running on the given guest VM. Responsive to detecting a failure condition, action is taken to correct the failure condition, wherein the action includes sending at least one command through the internal channel from the hypervisor to the given guest VM. | 10-17-2013 |
20130275806 | RECONFIGURABLE RECOVERY MODES IN HIGH AVAILABILITY PROCESSORS - A method for performing error recovery that includes creating, by a processor, a recovery checkpoint. The processor is dynamically switched into a non-recoverable processing mode of operation based on creating the software recovery checkpoint. The non-recoverable processing mode of operation is a mode in which a subset of hardware error recovery resources are powered-down or re-purposed for instruction processing. It is determined, during the non-recoverable processing mode of operation, that a new software recovery checkpoint is required. Based on the determining that a new software recovery checkpoint is required, the processor is dynamically switched into a recoverable processing mode of operation. The recoverable processing mode of operation is a mode in which hardware error recovery resources, including at least one of the hardware error recovery resources in the subset, are purposed for hardware error recovery operations. | 10-17-2013 |
20130275807 | INFORMATION PROCESSING APPARATUS AND INSTALLATION METHOD - The installation of multiple applications by an installer is executed in a mode that does not display an error message in a display device. Upon an installation performed by the installer ending, the result of the installation performed by the installer is determined. As a result of the determination, an installer that failed at the installation is caused to re-execute the installation of the application whose installation failed in a mode that displays an error message in the display device. As a result of the re-execution, an error message is displayed in the display device by the installer that failed at the installation. | 10-17-2013 |
20130283097 | DYNAMIC NETWORK TASK DISTRIBUTION - Methods, systems, and programming for distributing tasks to a network of machines are disclosed. A plurality of tasks is received, each task having an associated priority level. Each of the plurality of tasks is assigned to a priority line of a plurality of priority lines based on the associated priority level of each of the plurality of tasks. A distribution strategy is determined for the plurality of tasks based on an analysis of at least one worker machine. A group of tasks is scheduled from the plurality of priority lines to a gateway line based on the distribution strategy. Tasks are pushed from the gateway line to the at least one worker machine to process the tasks. The progress of tasks processed by worker machines is monitored and results of tasks are fetched and delivered to users of user devices. | 10-24-2013 |
20130290779 | PREVENTING AUDIT LOSS FOR ASYNCHRONOUS TARGET - Aspects of the subject matter described herein relate to auditing operations. In aspects, operations may be audited synchronously and/or asynchronously to one or more audit targets. When auditing synchronously, audit records may be written synchronously to an audit target. When auditing asynchronously, a buffer may be used to store audit records until the audit records are flushed to an audit target. If an error occurs in auditing, a policy may be evaluated to determine how to respond. One exemplary response includes failing an operation that triggered a subsequent audit record. Furthermore, if a buffer was unable to be copied to an audit target, the contents of the buffer may be preserved and one or more retries may be attempted to copy the buffer to the audit target. | 10-31-2013 |
20130311825 | CALL RESTORATION IN RESPONSE TO APPLICATION FAILURE - A communication system, method, and components are described. Specifically, the method described herein provides the ability for an application sequence of a communication session to be reconstructed during the communication session and even though SIP standards dictate that the reconstruction of the application sequence should be denied and the session should be terminated. | 11-21-2013 |
20130339788 | SYSTEM AND METHOD FOR FAULT TOLERANT COMPUTING USING GENERIC HARDWARE - A dual redundant process controller is provided. The controller comprises a first processor, memory, and instance of a process control application stored in the first memory. The controller further comprises a second processor, memory, and instance of the process control application stored in the second memory. When executed by the first processor, the first application instance writes a first synchronization information to the second memory, reads a second synchronization information from the first memory, and, when the second synchronization information disagrees with the first synchronization information after passage of a predetermined time-out interval, performs a resynchronization function; and wherein, when executed by the second processor, the second application instance writes the second synchronization information to the first memory, reads the first synchronization information from the second memory, and, when the first synchronization information disagrees with the second synchronization information after passage of the predetermined time-out interval, performs the resynchronization function. | 12-19-2013 |
20140019803 | HARDWARE RECOVERY IN MULTI-THREADED PROCESSOR - A computer system includes a simultaneous multi-threading processor and memory in operable communication with the processor. The processor is configured to perform a method including running multiple threads simultaneously, detecting a hardware error in one or more hardware structures of the processing circuit, and identifying one or more victim threads of the multiple threads. The processor is further configured to identify a plurality of hardware structures associated with execution of the one or more victim threads, isolate the one or more victim threads from the rest of the multiple threads by preventing access to the plurality of hardware structures by the multiple threads, flush the one or more victim threads by resetting hardware states of the plurality of hardware structures, and restore the one or more victim threads by restoring the plurality of hardware structures to a known safe state. | 01-16-2014 |
20140047269 | OPERATING METHOD FOR MEMORY SYSTEM INCLUDING NONVOLATILE RAM AND NAND FLASH MEMORY - An operating method for a memory system including a nonvolatile random access memory (NVRAM) and a NAND flash memory includes; performing a normal read operation directed to the target memory cell in response to a read request, determining that a read fail has occurred as a result of the normal read operation, then performing a read retry operation by iterations directed to the target memory cell according to a first read retry scheme until a pass read retry iteration successfully reads the target memory cell, and storing pass information associated with the pass read retry iteration in the NVRAM. | 02-13-2014 |
20140089734 | THREAD SPARING BETWEEN CORES IN A MULTI-THREADED PROCESSOR - Embodiments relate to thread sparing between cores in a processor. An aspect includes determining that a number of recovery attempts made by a first thread on the first core has exceeded a recovery attempt threshold, and sending a request to transfer the first thread. Another aspect includes, selecting a second core from a plurality of cores to receive the first thread from the first core, wherein the second core is selected based on the second core having an idle thread. Another aspect includes transferring a last good architected state of the first thread from the first core to the second core. Another aspect includes loading the last good architected state of the first thread by the idle thread on the second core. Yet another aspect includes resuming execution of the first thread on the second core from the last good architected state of the first thread by the idle thread. | 03-27-2014 |
20140101483 | Systems and Methods for Modified Quality Based Priority Scheduling During Iterative Data Processing - Systems, circuits, devices and/or methods related to systems and methods for data processing, and more particularly to systems and methods for priority based data processing. | 04-10-2014 |
20140157048 | TRANSACTIONS AND FAILURE - Disclosed herein are techniques for system recovery. It is determined whether a transaction depends on a change committed before a failure. It is further determined whether a transaction conflicts with a change interrupted by the failure. | 06-05-2014 |
20140181582 | AUTOMATIC RETRY FOR POSITION IDENTIFIERS - Applications performance for applications that access connections may be improved by providing a method of automatically retrying failed connections. A method for executing a communication interface may include receiving a retry timer length, receiving an indication that an application group is executing, opening position identifiers for the application group, failing to open at least one position identifier, and automatically retrying opening the position identifier after the retry timer length. | 06-26-2014 |
20140195850 | NON-DISRUPTIVE RESTORATION OF A STORAGE VOLUME - A system implements a method to non-disruptive restoration of storage services provided by a storage volume of the system. Upon detecting a disruption of storage services at the storage volume, the method freezes the input/output (I/O) operations of applications that are accessing the storage volume. The disrupted storage services are restored. And the configurations of the storage volume are maintained during restoration of the disrupted storage services. Afterward, the frozen I/O operations are activated, allowing the applications to continue their accessing of the storage volume. | 07-10-2014 |
20140281705 | MECHANISM FOR FACILITATING DYNAMIC AND EFFICIENT MANAGEMENT OF INSTRUCTION ATOMICITY VOLATIONS IN SOFTWARE PROGRAMS AT COMPUTING SYSTEMS - A mechanism is described for facilitating dynamic and efficient management of instruction atomicity violations in software programs according to one embodiment. A method of embodiments, as described herein, includes receiving, at a replay logic from a recording system, a recording of a first software thread running a first macro instruction, and a second software thread running a second macro instruction. The first software thread and the second software thread are executed by a first core and a second core, respectively, of a processor at a computing device. The recording system may record interleavings between the first and second macro instructions. The method includes correctly replaying the recording of the interleavings of the first and second macro instructions precisely as they occurred. The correctly replaying may include replaying a local memory state of the first and second macro instructions and a global memory state of the first and second software threads. | 09-18-2014 |
20140289557 | METHOD AND SYSTEM FOR DATA MIGRATION - A method and a system for data migration are described, the method for data migration including: slicing data in an original system to obtain a data slice; importing the data slice into a new system; and redoing, in the new system, respective data corresponding to at least one pre-recorded write request according to a sequence number order of the at least one pre-recorded write request, wherein the at least one pre-recorded write request above is to simultaneously write to both the original system and the new system. In the method and the system, data in an original system can be seamlessly imported to a new system without forbidding writes to the original system, and the data in the new system can be recovered to the latest by a redo technique. Without any awareness of users, the data migration can be achieved in the background. | 09-25-2014 |
20140325271 | TERMINAL DEVICE, INFORMATION PROCESSING METHOD, AND COMPUTER PROGRAM PRODUCT - According to an embodiment, a terminal device includes a memory unit, a managing unit, a manipulation recording unit, and at least one of first and second detecting units. The managing unit generates and deletes a processing unit which executes a transaction for individually manipulating data with respect to data elements and data containers stored in the memory unit. The manipulation recording unit records manipulation information while a transaction is being executed by the processing unit. The first and second detecting units detect the presence or absence of competition. The first detecting unit detects competition during an execution state of a transaction as set by the processing unit. The second detecting unit detects competition during a commit preparation state of a transaction as set by the processing unit. When at least either the first detecting unit or the second detecting unit detects competition, the processing unit aborts the transaction. | 10-30-2014 |
20140351637 | EXECUTING A KERNEL DEVICE DRIVER AS A USER SPACE PROCESS - Two or more ports of a same type are identified in a computer. A separate device driver process is initiated for each of the identified ports. A one-to-one correspondence between each of the ports and each of the device driver processes is established. | 11-27-2014 |
20140365823 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND COMPUTER PROGRAM - An information processing device includes: a nonvolatile memory having a program area storing a program for booting a system, and backup areas each storing a backup program identical in content to the program; a process executing unit that executes the program to perform a boot process of the system; an error detection unit that performs error detection on the program in parallel with the boot process; and a reboot unit that, when the error detection unit detects an error in the program, performs a recovery process to replace the program with one of the backup programs, and reboots the system using the replaced program. In the recovery process, the reboot unit refers to history information indicating a history of replacement of the program with the backup programs, selects the backup program used for the replacement from among the backup programs, and replaces the program with the selected backup program. | 12-11-2014 |
20140380095 | MEMORY UNCORRECTABLE ERROR HANDLING TECHNIQUE FOR REDUCING THE IMPACT OF NOISE - Techniques for handling uncorrectable errors occurring during memory accesses reduce the likelihood of mis-correction of errors due to the presence of noise. When an uncorrectable memory error is detected in response to an access to a memory device, a memory controller managing the interface to the memory halts issuing of access requests to the memory device until a predetermined time period has elapsed. In-flight memory requests are marked for retry, and responses to pending request are flushed. A calibration command may be issued after the predetermined time period has elapsed. After the predetermined time period has elapsed and any calibration performed, the requests marked for retry are issued to the memory device. | 12-25-2014 |
20140380096 | MEMORY UNCORRECTABLE ERROR HANDLING TECHNIQUE FOR REDUCING THE IMPACT OF NOISE - Techniques for handling uncorrectable errors occurring during memory accesses reduce the likelihood of mis-correction of errors due to the presence of noise. When an uncorrectable memory error is detected in response to an access to a memory device, a memory controller managing the interface to the memory halts issuing of access requests to the memory device until a predetermined time period has elapsed. In-flight memory requests are marked for retry, and responses to pending request are flushed. A calibration command may be issued after the predetermined time period has elapsed. After the predetermined time period has elapsed and any calibration performed, the requests marked for retry are issued to the memory device. | 12-25-2014 |
20150019910 | METHOD OF HANDLING AN EMAIL MESSAGING CAMPAIGN - A computer-implemented method of handling a current email messaging campaign to be broadcast to increase a deliverability parameter regarding a percentage of the campaign which has been successfully delivered is described. The email messaging campaign comprises a plurality of email messages with the same message content and a plurality of different email addresses to send the message content to. The method is implemented on a processor and comprises: receiving feedback data relating to a delivery error arising from a previous email messaging campaign previously broadcast to a plurality of recipients; categorising the feedback data into one of a plurality of categories to identify a type of error; selecting one of a plurality of predetermined corrective actions based on the category of the feedback data determined in the categorising step; and dynamically and automatically modifying the current outgoing email messaging campaign which has yet to be broadcast using the corrective action chosen in the selecting step. | 01-15-2015 |
20150052394 | METHOD OF OPERATING NONVOLATILE MEMORY DEVICE COMPRISING RESISTANCE MATERIAL - A method of operating a nonvolatile memory device comprises applying a read current with a first level to a nonvolatile memory cell comprising a variable resistance material, determining read data based on the applied read current, checking a syndrome corresponding to the read data to determine whether the read data is pass or fail, changing the read current from the first level to a second level, which is different from the first level, according to the determination of whether the read data is pass or fail, and performing a read-retry operation comprising applying the read current of the second level to the nonvolatile memory cell. | 02-19-2015 |
20150309889 | RECOVERY OF A TRANSACTION AFTER XA END - Embodiments of the present invention disclose a method for recovery of a two-phase commit transaction. A computer transmits a first transaction identifier to a data store, wherein the first transaction identifier defines a two-phase commit transaction. The computer transmits a prepare command for the first transaction identifier to a first resource manager. The computer determines if a failure and restart occurred within a distributed data processing environment, wherein the failure and restart occurs after the first resource manager receives an end command, but prior to completing execution of the prepare command for the first transaction identifier. Responsive to determining the failure and restart did occur within the distributed data processing environment, the computer retrieves the first transaction identifier from the data store. The computer transmits a rollback command for the retrieved first transaction identifier to the first resource manager. | 10-29-2015 |
20150347244 | REPLAYING JOBS AT A SECONDARY LOCATION OF A SERVICE - Jobs submitted to a primary location of a service within a period of time before and/or after a fail-over event are determined and are resubmitted to a secondary location of the service. For example, jobs that are submitted fifteen minutes before the fail-over event and jobs that are submitted to the primary network before the fail-over to the second location is completed are resubmitted at the secondary location. After the fail-over event occurs, the jobs are updated with the secondary network that is taking the place of the primary location of the service. A mapping of job input parameters (e.g. identifiers and/or secrets) from the primary location to the secondary location are used by the jobs when they are resubmitted to the secondary location. Each job determines what changes are to be made to the job request based on the job being resubmitted. | 12-03-2015 |
20160004573 | SALVAGING HARDWARE TRANSACTIONS WITH INSTRUCTIONS - A transactional memory system salvages a hardware transaction. A processor of the transactional memory system records information about an about-to-fail handler for transactional execution of a code region, and records information about a lock elided to begin transactional execution of the code region. The processor detects a pending point of failure in the code region during the transactional execution, and based on the detecting, stops transactional execution at a first instruction in the code region and executes the about-to-fail handler using the information about the about-to-fail handler. The processor, executing the about-to-fail handler, acquires the lock using the information about the lock, commits speculative state of the stopped transactional execution, and starts non-transactional execution at a second instruction following the first instruction in the code region. | 01-07-2016 |
20160041881 | VIRTUAL MACHINE HIGH AVAILABILITY MANAGEMENT - Systems and methods for virtual machine high availability management. An example method may comprise: identifying a virtual machine; receiving information pertaining to the virtual machine; initiating virtual machine availability management, wherein the availability management commences without virtual machine shutdown; detecting a failure of the virtual machine; and causing re-launch of the virtual machine using the received information. | 02-11-2016 |
20160041882 | SAFE DATA ACCESS FOLLOWING STORAGE FAILURE - A request identifier is employed with various systems and methods in order to enable an application to pause execution during a failure and subsequently resume execution and communication with a storage system once the failure is resolved. An application residing on a node may attempt to access target data on a storage system. The application sends a request to access the target data. The request may be associated with a request identifier that identifies the application. When the storage system experiences a failure, the application receives a failure notification. The application pauses execution as a result of the notification. When the node reestablishes a connection to the storage system, the application resumes execution using the same request identifier. If the resume request is granted, the application is guaranteed that the target data was not modified during the failure. | 02-11-2016 |
20160196192 | USING TRANSACTIONAL EXECUTION FOR RELIABILITY AND RECOVERY OF TRANSIENT FAILURES | 07-07-2016 |
20160196193 | USING TRANSACTIONAL EXECUTION FOR RELIABILITY AND RECOVERY OF TRANSIENT FAILURES | 07-07-2016 |
20190149403 | DYNAMIC SERVER ALLOCATION FOR AUTOMATED SERVER BUILDS | 05-16-2019 |